AI and Cybersecurity Research Publications

2023

1.
Botha J, Botha D, Leenen L. Botha, J., Botha, D.P., Leenen, L. An Analysis of Crypto Scams during the Covid-19 Pandemic: 2020-2022. . In: Proceedings of the 18th International Conference on Cyber Warfare and Security (ICCWS). Maryland USA, 9-10 March 2023. Academic Publishers; 2023.

Blockchain and cryptocurrency adoption has increased significantly since the start of the Covid-19 pandemic. This adoption rate has overtaken the Internet adoption rate in the 90s and early 2000s, but as a result, the instances of crypto scams have also increased. The types of crypto scams reported are typically giveaway scams, rug pulls, phishing scams, impersonation scams, Ponzi schemes as well as pump and dumps. The US Federal Trade Commission (FTC) reported that in May 2021 the number of crypto scams were twelve times higher than in 2020, and the total loss increased by almost 1000%. The FTC also reported that Americans have lost more than $80 million due to cryptocurrency investment scams from October 2019 to October 2020, with victims between the ages of 20 and 39 represented 44% of the reported cases. Social Media has become the go-to place for scammers where attackers hack pre-existing profiles and ask targets’ contacts for payments in cryptocurrency. In 2020, both Joe Biden and Bill Gates’ Twitter accounts were hacked where the hacker posted tweets promising that for all payments sent to a specified address, double the amount will be returned, and this case of fraud was responsible for $100,000 in losses. A similar scheme using Elon Musk’s Twitter account resulted in losses of nearly $2 million. This paper analyses the most significant blockchain and cryptocurrency scams since the start of the Covid-19 pandemic, with the aim of raising awareness and contributing to protection against attacks. Even though the blockchain is a revolutionary technology with numerous benefits, it also poses an international crisis that cannot be ignored.

@inbook{494,
  author = {Johnny Botha and D.P. Botha and Louise Leenen},
  title = {Botha, J., Botha, D.P., Leenen, L. An Analysis of Crypto Scams during the Covid-19 Pandemic: 2020-2022. .},
  abstract = {Blockchain and cryptocurrency adoption has increased significantly since the start of the Covid-19 pandemic. This adoption rate has overtaken the Internet adoption rate in the 90s and early 2000s, but as a result, the instances of crypto scams have also increased. The types of crypto scams reported are typically giveaway scams, rug pulls, phishing scams, impersonation scams, Ponzi schemes as well as pump and dumps. The US Federal Trade Commission (FTC) reported that in May 2021 the number of crypto scams were twelve times higher than in 2020, and the total loss increased by almost 1000%. The FTC also reported that Americans have lost more than $80 million due to cryptocurrency investment scams from October 2019 to October 2020, with victims between the ages of 20 and 39 represented 44% of the reported cases. Social Media has become the go-to place for scammers where attackers hack pre-existing profiles and ask targets’ contacts for payments in cryptocurrency. In 2020, both Joe Biden and Bill Gates’ Twitter accounts were hacked where the hacker posted tweets promising that for all payments sent to a specified address, double the amount will be returned, and this case of fraud was responsible for $100,000 in losses. A similar scheme using Elon Musk’s Twitter account resulted in losses of nearly $2 million. This paper analyses the most significant blockchain and cryptocurrency scams since the start of the Covid-19 pandemic, with the aim of raising awareness and contributing to protection against attacks. Even though the blockchain is a revolutionary technology with numerous benefits, it also poses an international crisis that cannot be ignored.},
  year = {2023},
  journal = {Proceedings of the 18th International Conference on Cyber Warfare and Security (ICCWS). Maryland USA, 9-10 March 2023},
  month = {2023},
  publisher = {Academic Publishers},
}
1.
Jafta Y, Leenen L, Meyer T. Investigating Ontology-based Data Access with GitHub. In: Lecture Notes in Computer Science 13870 (Proceedings of the 20th Extended Semantic Web Conference). Vol. 13870. Springer; 2023.

Data analysis-based decision-making is performed daily by domain experts. As data grows, getting access to relevant data becomes a challenge. In an approach known as Ontology-based data access (OBDA), AQ1 ontologies are advocated as a suitable formal tool to address complex data access. This technique combines a domain ontology with a data source by using a declarative mapping specification to enable data access using a domain vocabulary.We investigate this approach by studying the theoretical background; conducting a literature review on the implementation of OBDA in production systems; implementing OBDA on a relational dataset using an OBDA tool and; providing results and analysis of query answering.We selected Ontop (https://ontop-vkg.org) to illustrate how this technique enhances the data usage of the GitHub community. AQ2 Ontop is an open-source OBDA tool applied in the domain of relational databases. The implementation consists of the GHTorrent dataset and an extended SemanGit ontology. We perform a set of queries to highlight a subset of the features of this data access approach. The results look positive and can assist various use cases related to GitHub data with a semantic approach. OBDA does provide benefits in practice, such as querying in domain vocabulary and making use of reasoning over the axioms in the ontology. However, the practical impediments we observe are in the “manual” development of a domain ontology and the creation of a mapping specification which requires deep knowledge of a domain and the data. Also, implementing OBDA within the practical context of an information system requires careful consideration for a suitable user interface to facilitate the query construction from ontology vocabulary. Finally, we conclude with a summary of the paper and direction for future research.

@inbook{493,
  author = {Yahlieel Jafta and Louise Leenen and Thomas Meyer},
  title = {Investigating Ontology-based Data Access with GitHub},
  abstract = {Data analysis-based decision-making is performed daily by
domain experts. As data grows, getting access to relevant data becomes a
challenge. In an approach known as Ontology-based data access (OBDA), AQ1
ontologies are advocated as a suitable formal tool to address complex
data access. This technique combines a domain ontology with a data
source by using a declarative mapping specification to enable data access
using a domain vocabulary.We investigate this approach by studying the
theoretical background; conducting a literature review on the implementation
of OBDA in production systems; implementing OBDA on a relational
dataset using an OBDA tool and; providing results and analysis of
query answering.We selected Ontop (https://ontop-vkg.org) to illustrate
how this technique enhances the data usage of the GitHub community. AQ2
Ontop is an open-source OBDA tool applied in the domain of relational
databases. The implementation consists of the GHTorrent dataset and
an extended SemanGit ontology. We perform a set of queries to highlight
a subset of the features of this data access approach. The results look
positive and can assist various use cases related to GitHub data with
a semantic approach. OBDA does provide benefits in practice, such as
querying in domain vocabulary and making use of reasoning over the
axioms in the ontology. However, the practical impediments we observe
are in the “manual” development of a domain ontology and the creation
of a mapping specification which requires deep knowledge of a domain
and the data. Also, implementing OBDA within the practical context
of an information system requires careful consideration for a suitable
user interface to facilitate the query construction from ontology vocabulary.
Finally, we conclude with a summary of the paper and direction
for future research.},
  year = {2023},
  journal = {Lecture Notes in Computer Science 13870 (Proceedings of the 20th Extended Semantic Web Conference)},
  volume = {13870},
  month = {2023},
  publisher = {Springer},
}

2020

1.
Roodt J, Leenen L, van Vuuren J. Modelling Of The Complex Societal Problem Of Establishing A National Energy Sufficiency Competence . In: 23rd International Conference on Information Fusion. ; 2020.

Complex societal problems require a multi-disciplinary and multi-method approach to develop models that can support the development of solutions. General morphological analysis is a qualitative method to extract information from experts through facilitation and the use of customized software. Ontologies provide semantic representation of knowledge bases together with automated reasoning capabilities. These two approaches, combined with the use of concept maps, provide an integrated approach which can be used to understand complex and ill-structured problem domains and to aid in business modelling, strategy and scenario development and finally, decision-making. The resulting models are subjective constructs reflecting the knowledge and understanding of the analysts. Subsequent synthesis of new understanding and decisions rely on the robust validation and verification of the underlying logic and assumptions of the conceptual models. Morphological Analysis and ontological constructs are applied in terms of an integrated Morphological Ontology Design Engineering methodology (MODE), which is based on Design Science. The paper is developed around the opportunity of scoping the applied research competence required to support a nation’s progress toward energy sufficiency. This paper presents a complex fused model for national energy sufficiency in New Zealand. The approach can be used to address other ill- structured complex societal problems.

@{375,
  author = {JH Roodt and Louise Leenen and Jansen van Vuuren},
  title = {Modelling Of The Complex Societal Problem Of  Establishing A National Energy Sufficiency Competence},
  abstract = {Complex societal problems require a multi-disciplinary and multi-method approach to develop models that can support the development of solutions. General morphological analysis is a qualitative method to extract information from experts through facilitation and the use of customized software. Ontologies provide semantic representation of knowledge bases together with automated reasoning capabilities. These two approaches, combined with the use of concept maps, provide an integrated approach which can be used to understand complex and ill-structured problem domains and to aid in business modelling, strategy and scenario development and finally, decision-making. The resulting models are subjective constructs reflecting the knowledge and understanding of the analysts. Subsequent synthesis of new understanding and decisions rely on the robust validation and verification of the underlying logic and assumptions of the conceptual models. 
Morphological Analysis and ontological constructs are applied in terms of an integrated Morphological Ontology Design Engineering methodology (MODE), which is based on Design Science. The paper is developed around the opportunity of scoping the applied research competence required to support a nation’s progress toward energy sufficiency. This paper presents a complex fused model for national energy sufficiency in New Zealand. The approach can be used to address other ill- structured complex societal problems.},
  year = {2020},
  journal = {23rd International Conference on Information Fusion},
  pages = {880 - 887},
  month = {06/07-09/07},
  isbn = {978-0-578-64709-8},
}
1.
Jafta Y, Leenen L, Chan P. An Ontology for the South African Protection of Personal Information Act. In: The 19th European Conference on Cyber Warfare and Security. UK: Academic Conferences and Publishing International Limited; 2020.

The protection and management of data, and especially personal information, is becoming an issue of critical importance in both the business environment and in general society. Various institutions have justifiable reasons to gather the personal information of individuals but they are required to comply with any legislation involving the processing of such data. Organisations thus face legal and other repercussions should personal information be breached or treated negligently. Most countries have adopted privacy and data protection laws or are in the process of enacting such laws. In South Africa, the Protection of Privacy Information Act (POPIA) was formally adopted in 2013 but it is yet to be implemented. When the implementation of the Act is announced, role players (responsible parties and data subjects) affected by POPIA will have a grace period of a year to become compliant and/or understand how the Act will affect them. One example of a mandate that follows from POPIA is data breach notification. This paper presents the development of a prototype ontology on POPIA to promote transparency and education of affected data subjects and organisations including government departments. The ontology provides a semantic representation of a knowledge base for the regulations in the POPIA and how it affects these role players. The POPIA is closely aligned with the European Union’s General Data Protection Regulation (GDPR), and the POPIA ontology is inspired by similar ontologies developed for the GDPR.

@{374,
  author = {Y Jafta and Louise Leenen and P Chan},
  title = {An Ontology for the South African Protection of Personal Information Act},
  abstract = {The protection and management of data, and especially personal information, is becoming an issue of critical importance in both the business environment and in general society. Various institutions have justifiable reasons to gather the personal information of individuals but they are required to comply with any legislation involving the processing of such data. Organisations thus face legal and other repercussions should personal information be breached or treated negligently. Most countries have adopted privacy and data protection laws or are in the process of enacting such laws. In South Africa, the Protection of Privacy Information Act (POPIA) was formally adopted in 2013 but it is yet to be implemented. When the implementation of the Act is announced, role players (responsible parties and data subjects) affected by POPIA will have a grace period of a year to become compliant and/or understand how the Act will affect them. One example of a mandate that follows from POPIA is data breach notification. This paper presents the development of a prototype ontology on POPIA to promote transparency and education of affected data subjects and organisations including government departments. The ontology provides a semantic representation of a knowledge base for the regulations in the POPIA and how it affects these role players. The POPIA is closely aligned with the European Union’s General Data Protection Regulation (GDPR), and the POPIA ontology is inspired by similar ontologies developed for the GDPR.},
  year = {2020},
  journal = {The 19th European Conference on Cyber Warfare and Security},
  pages = {158 - 176},
  month = {25/06 - 26/06},
  publisher = {Academic Conferences and Publishing International Limited},
  address = {UK},
  isbn = {978-1-912764-61-7},
}
1.
van Vuuren J, Leenen L. Proving It Is the Data That Is Biased, Not the Algorithm Through a Recent South African Online Case Study. Journal of Information Warfare. 2020;19(3).

In the recent past, some Internet users questioned the reliability of online news, but not necessarily the role of search engines in programming public discourse. In 2018, South African Twitter users accused Google of peddling misinformation when Google Image searches for the phrase “squatter camps in South Africa” displayed images of white squatter camps. Many ana-lysts blamed Google’s algorithm for displaying bias. In this article, the authors use this example in comparing the findings of six different search engines to counter this argument. Search engines that are diverse in their scope and origin are used to prove that is it not the algorithm, but rather the data that is biased.

@article{373,
  author = {Jansen van Vuuren and Louise Leenen},
  title = {Proving It Is the Data That Is Biased, Not the Algorithm Through a Recent South African Online Case Study},
  abstract = {In the recent past, some Internet users questioned the reliability of online news, but not necessarily the role of search engines in programming public discourse. In 2018, South African Twitter users accused Google of peddling misinformation when Google Image searches for the phrase “squatter camps in South Africa” displayed images of white squatter camps. Many ana-lysts blamed Google’s algorithm for displaying bias. In this article, the authors use this example in comparing the findings of six different search engines to counter this argument. Search engines that are diverse in their scope and origin are used to prove that is it not the algorithm, but rather the data that is biased.},
  year = {2020},
  journal = {Journal of Information Warfare},
  volume = {19},
  pages = {118-129},
  issue = {3},
  publisher = {Peregrine Technical Solutions},
  address = {Virginia, USA},
  isbn = {1445-3312},
}
1.
van Vuuren J, Leenen L, Pieterse P. Development and Implementation of Cybercrime Strategies in Africa with Specific Reference to South Africa. Journal of Information Warfare. 2020;19(3).

Cybercrime is increasing at a rate few individuals would have predicted. IBM estimated in 2016 that, in 2019, the cost of cybercrime would reach $2 trillion, a threefold increase from the 2015 estimate of $500 billion. The growth of the Internet and the rapid development of technology provide enormous economic and social benefits but at the same time provide platforms for cybercriminals to exploit. Organised crime is using more sophisticated techniques, which require highly skilled and specialised law enforcement responses. One example is the use of cryptocurrencies, which makes it easier for cybercriminals to hide their proceeds. Regulatory measures often lag behind. In this paper, the authors give an overview of the growing threat of cybercrime with a specific focus on high levels of cybercrime in Africa. The focus then turns to the development of national cybercrime strategies and implementation. Results from literature and the authors’ analyses of two cyber indices to measure the capabilities and capacities of countries are combined to present a framework for the development of a cybercrime strategy, and in particular, a strategy customised for African countries.

@article{372,
  author = {Jansen van Vuuren and Louise Leenen and P Pieterse},
  title = {Development and Implementation of Cybercrime Strategies in Africa with Specific Reference to South Africa},
  abstract = {Cybercrime is increasing at a rate few individuals would have predicted. IBM estimated in 2016 that, in 2019, the cost of cybercrime would reach $2 trillion, a threefold increase from the 2015 estimate of $500 billion. The growth of the Internet and the rapid development of technology provide enormous economic and social benefits but at the same time provide platforms for cybercriminals to exploit. Organised crime is using more sophisticated techniques, which require highly skilled and specialised law enforcement responses. One example is the use of cryptocurrencies, which makes it easier for cybercriminals to hide their proceeds. Regulatory measures often lag behind.
In this paper, the authors give an overview of the growing threat of cybercrime with a specific focus on high levels of cybercrime in Africa. The focus then turns to the development of national cybercrime strategies and implementation. Results from literature and the authors’ analyses of two cyber indices to measure the capabilities and capacities of countries are combined to present a framework for the development of a cybercrime strategy, and in particular, a strategy customised for African countries.},
  year = {2020},
  journal = {Journal of Information Warfare},
  volume = {19},
  pages = {83 - 101},
  issue = {3},
  publisher = {Peregrine Technical Solutions},
  address = {Virginia, USA},
  isbn = {1445-3312},
}
1.
Ramluckan T, van Niekerk B, Leenen L. Cybersecurity and Information Warfare Research in South Africa: Challenges and Proposed Solutions. Journal of Information Warfare. 2020;19(1).

Cybersecurity is often incorrectly assumed to be a purely technical field; however, there are numerous multidisciplinary aspects, such as, for example, human factors, legal, and governance issues. The broad scope, combined with other historical or bureaucratic factors, can provide challenges to researchers and students where appropriate methodologies do not necessarily conform to traditional disciplinary norms; prejudice against research approaches can occur as a result of ‘old school thought’. This paper aims to investigate the South African national and institutional perspectives for higher education and research, identify challenges, and propose solutions to facilitate multidisciplinary research into cybersecurity and Information Warfare (IW) in South Africa.

@article{371,
  author = {T Ramluckan and B van Niekerk and Louise Leenen},
  title = {Cybersecurity and Information Warfare Research in South Africa: Challenges and Proposed Solutions},
  abstract = {Cybersecurity is often incorrectly assumed to be a purely technical field; however, there are numerous multidisciplinary aspects, such as, for example, human factors, legal, and governance issues. The broad scope, combined with other historical or bureaucratic factors, can provide challenges to researchers and students where appropriate methodologies do not necessarily conform to traditional disciplinary norms; prejudice against research approaches can occur as a result of ‘old school thought’. This paper aims to investigate the South African national and institutional perspectives for higher education and research, identify challenges, and propose solutions to facilitate multidisciplinary research into cybersecurity and Information Warfare (IW) in South Africa.},
  year = {2020},
  journal = {Journal of Information Warfare},
  volume = {19},
  pages = {80-95},
  issue = {1},
  publisher = {Peregrine Technical Solutions},
  address = {Virginia, USA},
  isbn = {ISSN 1445-3312},
}

2011

1.
Leenen L, Alberts R, Britz K, Gerber A, Meyer T. Developing a Knowledge System for Information Operations. In: 6th International Conference on Information Warfare and Security. Washington D.C., United States of America; 2011. doi:10204/4951.

In this paper we describe a research project to develop an optimal information retrieval system in an Information Operations domain. Information Operations is the application and management of information to gain an advantage over an opponent and to defend one’s own interests. Corporations, governments, and military forces are facing increasing exposure to strategic information-based actions. Most national defence and security organisations regard Information Operations as both a defensive and offensive tool, and some commercial institutions are also starting to recognise the value of Information Operations. An optimal information retrieval system should have the capability to extract relevant and reasonably complete information from different electronic data sources which should decrease information overload. Information should be classified in a way such that it can be searched and extracted effectively. The authors of this paper have completed an initial phase in the investigation and design of a knowledge system that can be used to extract relevant and complete knowledge for the planning and execution of Information Operations. During this initial phase of the project, we performed a needs analysis and problem analysis and our main finding is the recommendation of the use of logic-based ontologies: it has the advantage of an unambiguous semantics, facilitates intelligent search, provides an optimal trade-off between expressivity and complexity, and yields optimal recall of information. The risk of adopting this technology is its status as an emerging technology and therefore we include recommendations for the development of a prototype system.

@{465,
  author = {Louise Leenen and Ronell Alberts and Katarina Britz and Aurona Gerber and Tommie Meyer},
  title = {Developing a Knowledge System for Information Operations},
  abstract = {In this paper we describe a research project to develop an optimal information retrieval system in an Information Operations domain. Information Operations is the application and management of information to gain an advantage over an opponent and to defend one’s own interests. Corporations, governments, and military forces are facing increasing exposure to strategic information-based actions. Most national defence and security organisations regard Information Operations as both a defensive and offensive tool, and some commercial institutions are also starting to recognise the value of Information Operations. An optimal information retrieval system should have the capability to extract relevant and reasonably complete information from different electronic data sources which should decrease information overload. Information should be classified in a way such that it can be searched and extracted effectively. The authors of this paper have completed an initial phase in the investigation and design of a knowledge system that can be used to extract relevant and complete knowledge for the planning and execution of Information Operations. During this initial phase of the project, we performed a needs analysis and problem analysis and our main finding is the recommendation of the use of logic-based ontologies: it has the advantage of an unambiguous semantics, facilitates intelligent search, provides an optimal trade-off between expressivity and complexity, and yields optimal recall of information. The risk of adopting this technology is its status as an emerging technology and therefore we include recommendations for the development of a prototype system.},
  year = {2011},
  journal = {6th International Conference on Information Warfare and Security},
  month = {17/03-18/03},
  address = {Washington D.C., United States of America},
  isbn = {978-1-906638-93-1},
  doi = {10204/4951},
}
  • CSIR
  • DSI
  • Covid-19