Everyone Archives - Behaviour-Centric Cybersecurity Center (BCCC) /research/bccc/tag/everyone/ Mon, 27 Apr 2026 15:10:24 +0000 en-CA hourly 1 https://wordpress.org/?v=6.9.4 New Article Alert! /research/bccc/2026/04/27/new-article-alert-18/ Mon, 27 Apr 2026 15:10:20 +0000 /research/bccc/?p=3583 Unveiling malicious PDF behavior: Interpretable classification and profiling of malicious PDF using TabNet With the inevitable growth of information digitization, Portable Document Format (PDF) has become one of the most popular exploited file formats for document exchange among various applications and platforms. Consequently, PDF files have become an attractive target for attackers to infect and […]

The post New Article Alert! appeared first on Behaviour-Centric Cybersecurity Center (BCCC).

]]>

With the inevitable growth of information digitization, Portable Document Format (PDF) has become one of the most popular exploited file formats for document exchange among various applications and platforms. Consequently, PDF files have become an attractive target for attackers to infect and deliver malicious codes to users. Despite the efficacy and success of machine learning classifiers in detecting malicious PDF files, they require tedious feature engineering and have some limitations. Additionally, one of the main reasons for resistance to using deep learning models is their lack of interpretability. To address these challenges, this study proposes using the TabNet model for malicious PDF detection, offering global and local interpretability while maintaining high or competitive detection performance. The Optuna optimization framework is employed to further enhance the model’s capabilities. The proposed approach is evaluated on the real-world Evasive-PDFMal2022 dataset and demonstrates state-of-the-art performance compared to baseline methods.

The post New Article Alert! appeared first on Behaviour-Centric Cybersecurity Center (BCCC).

]]>
Shaping Young Minds: Cybersecurity Career Exploration in Schools /research/bccc/2026/04/25/shaping-young-minds-cybersecurity-career-exploration-in-schools/ Sat, 25 Apr 2026 15:42:23 +0000 /research/bccc/?p=3573 James Cardinal McGuigan Catholic High School (April 22, 2026) EShaping Young Minds: Cybersecurity Career Exploration in Schools Prof. Arash Habibi Lashkari, Founder and Director of the Behaviour-Centric Cybersecurity Center (BCCC), recently participated as a Career Coach at Ontario Career Lab, engaging with Grade 9 and 10 students at James Cardinal McGuigan Catholic High School. As […]

The post Shaping Young Minds: Cybersecurity Career Exploration in Schools appeared first on Behaviour-Centric Cybersecurity Center (BCCC).

]]>
James Cardinal McGuigan Catholic High School (April 22, 2026)

EShaping Young Minds: Cybersecurity Career Exploration in Schools

Prof. Arash Habibi Lashkari, Founder and Director of the Behaviour-Centric Cybersecurity Center (BCCC), recently participated as a Career Coach at Ontario Career Lab, engaging with Grade 9 and 10 students at James Cardinal McGuigan Catholic High School.

As part of the Understanding Cybersecurity Series (UCS), the session introduced students to real-world career pathways in cybersecurity, artificial intelligence, and technology. Through interactive discussions, students explored opportunities, challenges, and the skills needed to succeed in these rapidly evolving fields.

This initiative reflects BCCC’s commitment to early engagement and knowledge mobilization, helping inspire the next generation of cybersecurity professionals.

The post Shaping Young Minds: Cybersecurity Career Exploration in Schools appeared first on Behaviour-Centric Cybersecurity Center (BCCC).

]]>
New Article Alert! /research/bccc/2026/04/20/new-article-alert-17/ Mon, 20 Apr 2026 16:13:59 +0000 /research/bccc/?p=3568 Unveiling intruders’ behaviors: explainable AI-based profiling of malicious bot activities in IoT networks The rapid proliferation of Internet of Things (IoT) devices has improved connectivity but introduced new cybersecurity risks, particularly from botnets. Detecting and identifying malicious botnet activities is crucial for early attack mitigation, understanding attack patterns, and deploying effective countermeasures. However, state-of-the-art IoT […]

The post New Article Alert! appeared first on Behaviour-Centric Cybersecurity Center (BCCC).

]]>

The rapid proliferation of Internet of Things (IoT) devices has improved connectivity but introduced new cybersecurity risks, particularly from botnets. Detecting and identifying malicious botnet activities is crucial for early attack mitigation, understanding attack patterns, and deploying effective countermeasures. However, state-of-the-art IoT botnet detection models often struggle to handle imbalanced data, capture temporal patterns, and provide interpretable, explainable insights. This work proposes an IoT botnet detection and profiling model that leverages Explainable Artificial Intelligence (XAI) methods, including eXtreme Gradient Boosting (XGBoost) for feature selection, a Long Short-Term Memory (LSTM) neural network model for botnet detection and classification, and Shapley Additive Explanations (SHAP) for interpretability. This model integrates a feature selection approach that combines correlation analysis with the XGBoost algorithm to improve efficiency. The LSTM model is optimized and fine-tuned using Bayesian optimization to achieve accurate botnet detection and classification. The SHAP method provides interpretable insights into individual and collective botnet behaviors for profiling. Finally, the performance of the proposed model was evaluated with the augmented BCCC-Aposemat-IoT-Bot-2024 dataset and compared with state-of-the-art models. The results demonstrate that our proposed model achieves competitive performance while offering key advantages, including effective handling of sequential and imbalanced data, improved computational efficiency, and enhanced explainability.

The post New Article Alert! appeared first on Behaviour-Centric Cybersecurity Center (BCCC).

]]>
Elevating Cybersecurity Vigilance: Fusing Knowledge Dissemination via the Understanding Cybersecurity Series (UCS) Knowledge Mobilization Program /research/bccc/2026/04/13/elevating-cybersecurity-vigilance-fusing-knowledge-dissemination-via-the-understanding-cybersecurity-series-ucs-knowledge-mobilization-program/ Mon, 13 Apr 2026 15:49:06 +0000 /research/bccc/?p=3548 UWORCS 2026, Western University (April 10, 2026) Elevating Cybersecurity Vigilance: Fusing Knowledge Dissemination via the Understanding Cybersecurity Series (UCS) knowledge mobilization Program We continue advancing cybersecurity awareness through our Understanding Cybersecurity Series (UCS), designed for students, researchers, developers, and industry professionals. UCS aims to equip communities with the knowledge and tools needed to address evolving […]

The post Elevating Cybersecurity Vigilance: Fusing Knowledge Dissemination via the Understanding Cybersecurity Series (UCS) Knowledge Mobilization Program appeared first on Behaviour-Centric Cybersecurity Center (BCCC).

]]>
UWORCS 2026, Western University (April 10, 2026)

Elevating Cybersecurity Vigilance: Fusing Knowledge Dissemination via the Understanding Cybersecurity Series (UCS) knowledge mobilization Program

We continue advancing cybersecurity awareness through our Understanding Cybersecurity Series (UCS), designed for students, researchers, developers, and industry professionals. UCS aims to equip communities with the knowledge and tools needed to address evolving cyber threats and strengthen digital resilience.

Last week, our director, Prof. Arash Habibi Lashkari, delivered a keynote talk at the UWORCS 2026 Conference hosted at Western University. The talk, “Elevating Cybersecurity Vigilance: Advancing AI-Powered Security and Security of AI Through the UCS Knowledge Mobilization Program,” explored the dual role of AI in cybersecurity, as both a powerful defense mechanism and an emerging attack surface.

The post Elevating Cybersecurity Vigilance: Fusing Knowledge Dissemination via the Understanding Cybersecurity Series (UCS) Knowledge Mobilization Program appeared first on Behaviour-Centric Cybersecurity Center (BCCC).

]]>
New Article Alert! /research/bccc/2026/04/09/new-article-alert-16/ Thu, 09 Apr 2026 15:45:20 +0000 /research/bccc/?p=3531 MQTTFlowLyzer: interpretable TabNet-based flow-level MQTT intrusion detection for IoT MQTT is widely used in IoT systems but remains vulnerable due to its lightweight design. This paper proposes an interpretable deep learning-based intrusion detection framework that processes raw PCAP data through flow-based analysis. It introduces MQTTFlowLyzer for extracting protocol-aware features and presents the BCCC-IoT-MQTT-IDS-2025 dataset, which […]

The post New Article Alert! appeared first on Behaviour-Centric Cybersecurity Center (BCCC).

]]>

MQTT is widely used in IoT systems but remains vulnerable due to its lightweight design. This paper proposes an interpretable deep learning-based intrusion detection framework that processes raw PCAP data through flow-based analysis. It introduces MQTTFlowLyzer for extracting protocol-aware features and presents the BCCC-IoT-MQTT-IDS-2025 dataset, which includes diverse attack scenarios. The framework leverages TabNet, GANDALF, and NODE to enable accurate and interpretable detection of known and novel attacks. Results show strong performance across attack types, with attention-based explanations providing insights into behavioral patterns and supporting zero-day threat identification.

The post New Article Alert! appeared first on Behaviour-Centric Cybersecurity Center (BCCC).

]]>
New Dataset Alert! (BCCC-MalMem-SnapLog-2025) /research/bccc/2026/04/07/new-dataset-alert-bccc-malmem-snaplog-2025/ Tue, 07 Apr 2026 13:43:08 +0000 /research/bccc/?p=3513 Malware Memory Snapshot and process-level behavioral Log Dataset (BCCC-MalMem-SnapLog-2025) The dataset was systematically developed to capture memory-level behavioral dynamics of malware and benign processes through interval-based snapshot analysis. Unlike prior datasets that predominantly rely on static binaries or network-level observations, this dataset focuses on runtime memory behavior and process persistence, enabling a deeper understanding of how malicious activities […]

The post New Dataset Alert! (BCCC-MalMem-SnapLog-2025) appeared first on Behaviour-Centric Cybersecurity Center (BCCC).

]]>

Malware Memory Snapshot and process-level behavioral Log Dataset (BCCC-MalMem-SnapLog-2025)

The dataset was systematically developed to capture memory-level behavioral dynamics of malware and benign processes through interval-based snapshot analysis. Unlike prior datasets that predominantly rely on static binaries or network-level observations, this dataset focuses on runtime memory behavior and process persistence, enabling a deeper understanding of how malicious activities evolve over time. It integrates diverse malware families and benign software, ensuring realistic and unbiased modeling of system-level threats in dynamic execution environments.

Captured and labeled 2 Data sources: Memory snapshot data and process-level behavioral logs
Testbed: Controlled execution environment with interval-based memory dumping across multiple time windows
Attack Profile: Eight malware categories, including Backdoor, Hoax, HackTool, Trojan, Worm, Virus, Rootkit, and Exploit, alongside benign software samples
Data size: 40 TB of memory snapshots and associated behavioral records across multiple execution intervals
Data records: 2000 malware samples and 250 benign samples with varying persistence patterns across snapshots
Data capturing: Interval-based memory snapshot collection capturing transient and persistent process behaviors
Extracted Features: Memory and process-level features capturing temporal persistence, behavioral transitions, and execution patterns. . .

Dataset: BCCC-MalMem-SnapLog-2025

The post New Dataset Alert! (BCCC-MalMem-SnapLog-2025) appeared first on Behaviour-Centric Cybersecurity Center (BCCC).

]]>
Malware Memory Snapshot and process-level behavioral Log Dataset (BCCC-MalMem-SnapLog-2025) /research/bccc/ucs-technical/cybersecurity-datasets-cds/malware-memory-interval-based-snapshot-dataset-bccc-malmem-snaplog-2025/ Sun, 29 Mar 2026 05:17:10 +0000 /research/bccc/?page_id=3491 The dataset was systematically developed to capture memory-level behavioral dynamics of malware and benign processes through interval-based snapshot analysis. Unlike prior datasets that predominantly rely on static binaries or network-level observations, this dataset focuses on runtime memory behavior and process persistence, enabling a deeper understanding of how malicious activities evolve over time. It integrates diverse […]

The post Malware Memory Snapshot and process-level behavioral Log Dataset (BCCC-MalMem-SnapLog-2025) appeared first on Behaviour-Centric Cybersecurity Center (BCCC).

]]>

The dataset was systematically developed to capture memory-level behavioral dynamics of malware and benign processes through interval-based snapshot analysis. Unlike prior datasets that predominantly rely on static binaries or network-level observations, this dataset focuses on runtime memory behavior and process persistence, enabling a deeper understanding of how malicious activities evolve over time. It integrates diverse malware families and benign software, ensuring realistic and unbiased modeling of system-level threats in dynamic execution environments.

Captured and labeled 2 Data sources: Memory snapshot data and process-level behavioral logs
Testbed: Controlled execution environment with interval-based memory dumping across multiple time windows
Attack Profile: Eight malware categories, including Backdoor, Hoax, HackTool, Trojan, Worm, Virus, Rootkit, and Exploit, alongside benign software samples
Data size: 40 TB memory snapshots and associated behavioral records across multiple execution intervals
Data records: 2000 malware samples and 250 benign samples with varying persistence patterns across snapshots
Data capturing: Interval-based memory snapshot collection capturing transient and persistent process behaviors
Extracted Features: Memory and process-level features capturing temporal persistence, behavioral transitions, and execution patterns

This dataset introduces a temporal memory-based analysis framework, where malware and benign processes are observed across multiple time intervals to capture both transient and persistent behaviors. A novel representation of process persistence patterns (single, multiple, and timeout-based appearances across snapshots) enables fine-grained modeling of execution dynamics. By combining memory snapshots with behavioral logs, the dataset supports multi-perspective analysis of system-level activities, going beyond traditional static or network-based approaches. This design enables the development of advanced AI and LLM-based detection systems that leverage temporal evolution, contextual behavior, and cross-snapshot correlations to identify sophisticated malware that evades conventional detection mechanisms.

The full research paper outlining the details of the dataset and its underlying principles:

"", Yasin Dehfouli and Arash Habibi Lashkari, Journal of Information Security and Applications, Volume 94, November 2025,

Download Dataset:

The post Malware Memory Snapshot and process-level behavioral Log Dataset (BCCC-MalMem-SnapLog-2025) appeared first on Behaviour-Centric Cybersecurity Center (BCCC).

]]>
IoT Bot Dataset (BCCC-Aposemat-IoT-BoT-2024) /research/bccc/ucs-technical/cybersecurity-datasets-cds/bccc-aposemat-bot-iot-2024-developed-and-designed-for-large-language-models-llm/ Fri, 27 Mar 2026 16:33:37 +0000 /research/bccc/?page_id=3486 The dataset was systematically developed by augmenting and refining the Aposemat-Bot-IoT-23 dataset to address limitations in class imbalance, labeling consistency, and feature representation. Unlike prior datasets that include limited or uneven distributions of malware families, this dataset focuses on high-quality botnet traffic and benign behavior, ensuring reliable and scalable modeling of IoT botnet activities. It […]

The post IoT Bot Dataset (BCCC-Aposemat-IoT-BoT-2024) appeared first on Behaviour-Centric Cybersecurity Center (BCCC).

]]>

The dataset was systematically developed by augmenting and refining the Aposemat-Bot-IoT-23 dataset to address limitations in class imbalance, labeling consistency, and feature representation. Unlike prior datasets that include limited or uneven distributions of malware families, this dataset focuses on high-quality botnet traffic and benign behavior, ensuring reliable and scalable modeling of IoT botnet activities. It captures detailed network and transport-layer behaviors using protocol-aware flow representations, enabling comprehensive analysis of bot-driven cyber threats in IoT environments.

Captured and labeled 1 Data source: TCP/IP-based network traffic converted into bidirectional flow representations
Testbed: Real-world IoT network traffic scenarios from the Aposemat-Bot-IoT benchmark environment
Attacks Profile: Multiple botnet families including Mirai, Gagfyt, IRCBot, Kenjiro, Torii, Linux Mira, Okiru, and others, alongside benign traffic
Data size: Hundreds of millions of network flow records derived from large-scale PCAP files
Data records: Over 235 million malicious bot records in addition to benign traffic samples
Data capturing: Derived from labeled PCAP files with Zeek logs and flow reconstruction
Extracted Features: 315 flow-based features capturing packet-level, statistical, temporal, and bidirectional traffic characteristics.

This dataset introduces a robust flow-based representation framework using the NTLFlowLyzer analyzer, enabling the extraction of bidirectional, time-dependent behavioral features across the network and transport layers. A novel and precise labeling methodology was applied by aligning flow records with Zeek-generated logs using IP-port matching, thereby ensuring accurate binary and multi-class annotations. To address significant class imbalance and scalability challenges, a cluster-based undersampling (CBUS) strategy was employed to preserve the data's structural characteristics while maintaining computational feasibility. Furthermore, careful preprocessing steps, including the removal of ambiguous “suspicious” samples, normalization, and proportional sampling, ensure high-quality, reliable training data. This dataset supports the development of advanced AI and LLM-based intrusion detection systems, enabling behavior-centric, scalable, and realistic modeling of IoT botnet threats in complex network environments.

The full research paper outlining the details of the dataset and its underlying principles:

"Unveiling Intruders' Behaviors: Explainable AI-Based Profiling of Malicious Bot Activities in IoT Networks”, Sepideh Niktabe, Dilli Sharma, and Arash Habibi Lashkari, Journal of Supercomputing, Volume 82, April 2026

Download Dataset:

The post IoT Bot Dataset (BCCC-Aposemat-IoT-BoT-2024) appeared first on Behaviour-Centric Cybersecurity Center (BCCC).

]]>
IoT MQTT IDS Dataset (BCCC-IoT-MQTT-IDS-2025) /research/bccc/ucs-technical/cybersecurity-datasets-cds/bccc-mqtt-augmented-ids-2026-developed-and-designed-for-large-language-models-llm/ Fri, 27 Mar 2026 15:55:18 +0000 /research/bccc/?page_id=3480 The dataset was systematically developed by integrating and augmenting multiple high-quality MQTT-based intrusion detection datasets, enabling a comprehensive and protocol-aware representation of IoT communication. Unlike prior datasets that predominantly focus on packet-level or TCP-based analysis with limited consideration of application-layer semantics, this dataset captures rich MQTT behavioral patterns by leveraging protocol-aware feature extraction and diverse […]

The post IoT MQTT IDS Dataset (BCCC-IoT-MQTT-IDS-2025) appeared first on Behaviour-Centric Cybersecurity Center (BCCC).

]]>

The dataset was systematically developed by integrating and augmenting multiple high-quality MQTT-based intrusion detection datasets, enabling a comprehensive and protocol-aware representation of IoT communication. Unlike prior datasets that predominantly focus on packet-level or TCP-based analysis with limited consideration of application-layer semantics, this dataset captures rich MQTT behavioral patterns by leveraging protocol-aware feature extraction and diverse attack scenarios across multiple sources.

Captured and labeled 1 Data source: MQTT-based network traffic transformed into protocol-aware flow representations
Source datasets: Combination of MQTTset, MQTT-IoT-IDS2020, and DoS/DDoS-MQTT-IoT datasets
Attacks Profile: Diverse MQTT-specific attacks including brute-force authentication, malformed messages, SlowITe flooding, scanning, and DoS/DDoS variants
Data size: Multi-gigabyte-scale PCAP data aggregated from multiple datasets
Data records: Millions of packets and MQTT flows across all categories
Data capturing: Aggregated from multiple benchmark datasets with controlled preprocessing and balancing
Extracted Features: 404 MQTT-aware features (reduced to 378 after preprocessing) capturing session behavior, message patterns, and bidirectional interactions

This dataset introduces a protocol-aware, flow-based representation via the MQTTFlowLyzer analyzer, enabling the extraction of temporal, statistical, and behavioral characteristics beyond traditional packet-level inspection. By incorporating MQTT semantics into flow construction, the dataset enables deeper modeling of session dynamics and message-level interactions, which are critical for detecting sophisticated attacks that mimic benign traffic. Furthermore, the dataset is designed to support advanced AI and LLM-based intrusion detection, where high-dimensional behavioral features can be leveraged by attention-based and deep tabular models for adaptive feature selection and contextual threat analysis. This framework facilitates the development of next-generation intrusion detection systems that move beyond isolated traffic analysis toward context-aware, protocol-sensitive security intelligence tailored for IoT environments.

The full research paper outlining the details of the dataset and its underlying principles:

"MQTTFlowLyzer: InterpretableTabNet-Based Flow-Level MQTTIntrusion Detection for IoT”, Arefeh Kouhi and Arash Habibi Lashkari, Journal of Supercomputing, Volume 82, article number 334, 2026, March 2026

Download Dataset:

The post IoT MQTT IDS Dataset (BCCC-IoT-MQTT-IDS-2025) appeared first on Behaviour-Centric Cybersecurity Center (BCCC).

]]>
New Article Alert! /research/bccc/2026/01/01/new-article-alert-15/ Thu, 01 Jan 2026 18:19:48 +0000 /research/bccc/?p=3401 CAN-BiGRUBERT: Unveiling Automotive Vehicle Intruders by Profiling and Characterizing Anomalies in Controller Area Network In-vehicle Controller Area Networks (CAN) are vulnerable to various injection attacks that can compromise the safety of vehicle occupants and result in financial losses. While a substantial body of work on CAN intrusion detection exists, it lacks multiclass attack classification models. […]

The post New Article Alert! appeared first on Behaviour-Centric Cybersecurity Center (BCCC).

]]>

In-vehicle Controller Area Networks (CAN) are vulnerable to various injection attacks that can compromise the safety of vehicle occupants and result in financial losses. While a substantial body of work on CAN intrusion detection exists, it lacks multiclass attack classification models. Current multiclass models do not encompass all attack types or account for the vehicle’s state, i.e., whether the car is stationary or in motion. This work addresses these limitations by proposing CAN-BiGRUBERT, a multiclass CAN intrusion detection model that jointly predicts the vehicle state and attack class from CAN traffic windows. CAN-BiGRUBERT employs Bidirectional Encoder Representations from Transformers (BERT) to capture spatial dependencies within individual CAN frames, and a Bidirectional Gated Recurrent Unit (BiGRU) network to capture temporal dependencies across multiple frames in a window.  

The post New Article Alert! appeared first on Behaviour-Centric Cybersecurity Center (BCCC).

]]>