Arash Habibi Lashkari

Arash Habibi Lashkari
York University

Associate professor

About

144
Publications
200,082
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
3,823
Citations
Introduction
Dr. Arash Habibi Lashkari is a senior member of the IEEE and an Associate Professor in Cybersecurity at York University. Prior to this, he was an Associate Professor at the Faculty of Computer Science, University of New Brunswick (UNB), and the Research Coordinator of the Canadian Institute for Cybersecurity (CIC). His research focuses on cyber threat modeling and detection, malware analysis, big data security, internet traffic analysis, and cybersecurity dataset generation.
Additional affiliations
July 2021 - December 2021
University of New Brunswick
Position
  • Professor (Associate)
July 2018 - June 2021
University of New Brunswick
Position
  • Professor (Assistant)
July 2017 - June 2018
University of New Brunswick
Position
  • Research Associate
Education
February 2015 - February 2017
University of New Brunswick
Field of study
  • Cybersecurity
July 2010 - June 2013
Universiti Teknologi Malaysia
Field of study
  • Information Secuirty
January 2008 - June 2010
University of Malaysia (UM)
Field of study
  • Information Security

Publications

Publications (144)
Chapter
In this chapter, we will explore the intersecting, albeit unique, concepts of ownership, property, and possession. We will distinguish between public, private, and personal data as seen in the eyes of the law, connecting those concepts to our foundational legal knowledge from the first chapter. At the end of this chapter, we will realize the inters...
Chapter
In 2020, with the dawn of a new decade ahead of us—the 2020s—many of us looked back at the end of 2019 and the start of 2020 as a turning point; an opportunity for a fresh start. At that point in time, we had no idea of the dramatic social, educational, and occupational changes that this year would have in store for us all. While the new decade has...
Chapter
In this, our final chapter, we will discuss slime of the emergent, upcoming, and future issues in cybersecurity law, which include: globalization and determination of jurisdictional authority; digital marketplaces and consumer rights; anonymized DarkNet markets and the influx of cryptocurrencies; existing and anticipated challenges to law enforceme...
Chapter
Cybersecurity law is not simply the application of legal systems to the protection of private data; it also includes using our legal systems to address criminal activity that is conducted using networked technologies—otherwise known as cybercrime. This chapter will outline the types of cybersecurity laws needed to address issues such as interperson...
Chapter
In this chapter, we will create the necessary context for future chapters, by starting with the foundations of the law and the legal system. This chapter will be the base for everything that follows. To begin, we will discuss the origins and purpose of law, including the jurisprudential theories of law. We will outline the sources and systems which...
Book
Cybersecurity, data privacy law, and the related legal implications overlap into a relevant and developing area in the legal field. However, many legal practitioners lack the foundational understanding of computer processes which are fundamental for applying existing and developing legal structures to the issue of cybersecurity and data privacy. At...
Conference Paper
Full-text available
The intrusion detection systems are a critical component of any cybersecurity infrastructure. With the increase in speed and density of network traffic, the intrusion detection systems are incapable of efficiently detecting these attacks. During recent years, deep neural networks have demonstrated their performance and efficiency in several machine...
Conference Paper
Full-text available
In the past few years, there has been an exponential growth in network and Internet traffic. This trend will continue to increase due to digitalization and resulting in more inter-connectivity among the users. Due to this, more data has started being treated as streaming data. This data distribution, mostly non-stationary, high-speed, and infinite...
Conference Paper
Full-text available
Malicious domains are one of the major threats that have jeopardized the viability of the Internet over the years. Threat actors usually abuse the Domain Name System (DNS) to lure users to be victims of malicious domains hosting drive-by-download malware, botnets, phishing websites, or spam messages. Each year, many large corporations are impacted...
Article
Digital investigators need to evaluate their existing counter-anti-forensic tools to assess the reliability of their tools against attackers' anti-forensic tools. The evaluation enables them to choose more reliable defensive strategies against the attackers. Game-theoretic algorithms simulate the interactions that happen between an attacker and an...
Chapter
The rise of digital information has given birth to cyber frauds such as fraudulent transactions, extortion, denial of service attacks, and credit card fraud. The number of cyber incidents is growing rapidly. In order to curb these incidents, it is imperative to understand what are the cyber threats and what motivations drive these cyber incidents....
Chapter
This chapter summarizes the cybersecurity issues discussed in this book.
Chapter
This chapter instigates cybersecurity vulnerabilities in FinTech. It discusses several general and specific cybersecurity vulnerabilities exploited in the past. Specific cybersecurity vulnerabilities consist of human, technology, and transaction vulnerabilities. The overall purpose of identifying different types of vulnerabilities is to understand...
Chapter
This chapter introduces information security governance, various policies and standards used to profile information security governance, and available security governance models. It provides insight into the roles and responsibilities of individuals working at top-, middle-, and lower-level management. A security governance framework has two primar...
Chapter
Financial market infrastructure is the worst affected part of FinTech institutions. It witnesses most of the cyberattacks that have a devastating impact on its essential components. The essential financial market infrastructure components such as payment systems, central securities depositories, securities settlement systems, central counterparties...
Chapter
This chapter examines a thorough overview of FinTech and its significance in one’s day-to-day life. FinTech has revolutionized modern businesses by introducing digital technology. It has transformed traditional businesses into techno-savvy point-of-sale companies. With the big investments in essential financial sectors, including banks, e-commerce,...
Chapter
This chapter provides the essential details to design a cybersecurity framework for FinTech institutions. The details are based on the fundamentals of protecting the FinTech ecosystem against cyberattacks. The chapter presents available cybersecurity frameworks for financial institutions. These frameworks guide identifying vulnerabilities, assets,...
Chapter
Cybersecurity threats exploit cybersecurity vulnerabilities that pose cybersecurity risks. Cyber risks are combated with safeguards that are used to protect assets and finally, assets are prone to cybersecurity threats. The represents a cyber risk life cycle. This chapter provides a comprehensive introduction to cyber risks in FinTech institutions....
Chapter
In this chapter, cybersecurity principles to protect digital information against cyber threats and cyber threat actors are discussed. Three fundamental principles to protect data include confidentiality, integrity, and availability. These principles are extended by adding two more principles of accountability and authenticity. The main motivations...
Chapter
The problem of cybersecurity is not limited to a particular department or section, but it is an enterprise-wide problem. It requires an interdisciplinary approach to address various cybersecurity issues arising from different sources in the organization. A comprehensive cybersecurity policy and strategy ensures healthy cybersecurity practices in th...
Chapter
This chapter examines the importance of information technology risk management and summarizes the prominent risk management frameworks used to mitigate risks in information technology systems. It explores the risk management life cycle, starting from the threat identification to the quantitative and qualitative risk analysis and moving toward the r...
Chapter
This chapter examines the importance of security operations in cybersecurity and elaborates five prominent actions performed by a security operations team. It explores the generation of security operations over four decades, starting from malicious code injections to sophisticated destruction of service. With the paramount data being generated from...
Book
This book uncovers the idea of understanding cybersecurity management in FinTech. It commences with introducing fundamentals of FinTech and cybersecurity to readers. It emphasizes on the importance of cybersecurity for financial institutions by illustrating recent cyber breaches, attacks, and financial losses. The book delves into understanding cyb...
Conference Paper
Darknet traffic classification is significantly important to categorize real-time applications. Although there are notable efforts to classify darknet traffic which rely heavily on existing datasets and machine learning classifiers, there are extremely few efforts to detect and characterize darknet traffic using deep learning. This work proposes a...
Conference Paper
The unrivaled threat of android malware is the root cause of various security problems on the internet. Although there are remarkable efforts in detection and classification of android malware based on machine learning techniques, a small number of attempts are made to classify and characterize it using deep learning. Detecting android malware in s...
Article
Full-text available
While encryption is powerful at protecting information, it critically relies upon the mystery/private cryptographic key’s security. Poor key management would compromise any robust encryption algorithm. In this way, securing information is reduced to the issue of securing such keys from unauthorized access. In this work, KeyShield is proposed, a sca...
Patent
Full-text available
Systems and methods are provided for determining the security risk associated with one or more users of a computer network. Users are monitored over time to build security related profiles which are employed to assess the risk they impose on the network. The user profiles , which may be computed as online and network user profiles for each user , a...
Article
Digital forensic investigators’ aim is identifying, collecting and presenting reliable, accurate, and admissible evidence in court. However, anti-forensics manipulate, obfuscate, hide, and remove the remaining piece of evidence in a compromised system. Anti-forensics interrupt investigation procedures; thus, the investigators require specific defen...
Article
Full-text available
Malicious online advertisement detection has attracted increasing attention in recent years in both academia and industry. The existing advertising blocking systems are vulnerable to the evolution of new attacks and can cause time latency issues by analyzing web content or querying remote servers. This article proposes a lightweight detection syste...
Article
Forensic science aims to present evidence in the courtroom, in a forensically sound manner. Therefore, forensic procedures must guarantee the provability, admissibility, accuracy, and authenticity of the case's evidence. However, anti-forensics threaten forensic procedures by forging, hiding, and even modifying remaining evidence in a crime scene....
Conference Paper
Full-text available
Over the recent years, cyber security has become a significant aspect for more and more businesses, which highly depend on online services and managements. With the help of cyber risk assessment, companies can design appropriate risk control systems, manage potential cyber losses, and leverage effective technical solutions. However, due to the limi...
Chapter
The likelihood of suffering damage from an attack is obvious with the exponential growth in the size of computer networks and the internet. Meanwhile, intrusion detection systems (IDSs) and intrusion prevention systems (IPSs) are one of the most important defensive tools against the ever more sophisticated and ever-growing frequency of network atta...
Article
Visualization helps to comprehend and analyse large amounts of data, a fundamental necessity for network security due to the large volume of audits traces produced each day. In this paper, we dissect the majority of recent work conducted in network security visualization and offer a taxonomy that provides a basis for classifying recently published...
Conference Paper
Malware detection is one of the most important factors in the security of smartphones. Academic researchers have extensively studied Android malware detection problems. Machine learning methods proposed in previous work typically reported high detection performance and fast prediction times on fixed and defective datasets. Therefore, based on these...
Article
In the face of escalating global Cybersecurity threats, having an automated forewarning system that can find suspicious user profiles is paramount. It can work as a prevention technique for planned attacks or ultimate security breaches. Significant research has been established in attack prevention and detection, but has demonstrated only one or a...
Code
CICFlowMeter is a network traffic flow generator distributed by CIC to generate 84 network traffic features. It reads pcap file and generate a graphical report of the features extracted and also provides csv file of the report. It is an open source application written in Java and can be downloaded from Github. Its source codes can be integrated to...
Conference Paper
With exponential growth in the size of computer networks and developed applications, the significant increasing of the potential damage that can be caused by launching attacks is becoming obvious. Meanwhile, Intrusion Detection Systems (IDSs) and Intrusion Prevention Systems (IPSs) are one of the most important defense tools against the sophisticat...
Conference Paper
During the last decade, botnet emerged as one of the most serious malware which possess a serious threat to the Internet. Due to significant research effort in this domain there are many different detection methods based on diverse technical principles. Of these, detection based-on network traffic analysis is one of the noninvasive and resilient de...
Conference Paper
Full-text available
During the last decade, botnet emerged as one of the most serious malware which possess a serious threat to the Internet. Due to significant research effort in this domain there are many different detection methods based on diverse technical principles. Of these, detection based-on network traffic analysis is one of the noninvasive and resilient de...
Article
Full-text available
Fog computing-enhanced Internet of Things (IoT) has recently received considerable attention, as the fog devices deployed at the network edge can not only provide low latency, location awareness but also improve real-time and quality of services in IoT application scenarios. Privacy-preserving data aggregation is one of typical fog computing applic...
Book
Full-text available
امروزه اهمیت و جایگاه تجارت الکترونیکی و امنیت آن نه تنها برای متخصصین علوم رایانه و الکترونیکی بلکه برای عموم اقشار جامعه نیز پوشیده نیست. چراکه، بی شک در دنیای الکترونیکی امروز از یک سو تجارت الکترونیکی با سرعت زیاد به عضوی جدانشدنی در زندگی روزمره ما بدل گردیده و از طرف دیگر امنیت در دنیای الکترونیکی نیز مهم ترین و غیر قابل انکارترین چالش موجود...
Article
Full-text available
Phishing e-mails are a security issue that not only annoys online users, but has also resulted in significant financial losses for businesses. Phishing advertisements and pornographic e-mails are difficult to detect as attackers have been becoming increasingly intelligent and professional. Attackers track users and adjust their attacks based on use...
Article
Full-text available
The urgently growing number of security threats on Internet and intranet networks highly demands reliable security solutions. Among various options, Intrusion Detection (IDSs) and Intrusion Prevention Systems (IPSs) are used to defend network infrastructure by detecting and preventing attacks and malicious activities. The performance of a detection...
Conference Paper
Full-text available
The Web has long become a major platform for online criminal activities. URLs are used as the main vehicle in this domain. To counter this issues security community focused its efforts on developing techniques for mostly blacklisting of malicious URLs. While successful in protecting users from known malicious domains, this approach only solves part...
Conference Paper
Full-text available
Traffic characterization is one of the major challenges in today’s security industry. The continuous evolution and generation of new applications and services, together with the expansion of encrypted communications makes it a difficult task. Virtual Private Networks (VPNs) are an example of encrypted communication service that is becoming popular,...
Article
Full-text available
Most sectors of the economy like the universities, high-tech, financial services, and government institutions have data center. However, there are some issues which encompass current data center such as physical location, energy consumption, performance, flexibility. Big organizations like Google, IBM have migrated toward cloud computing, and using...
Article
Graphical passwords have been proposed as an alternative to textual passwords, due to its complexity that users are having in remembering their password combination. Graphical password was introduced by Blonder in 1996, which was easier to remember because of its graphical content. Therefore usability and memo ability are improved. In this paper, w...
Book
اصول و مبانی امنیت شبکه (کاربردها و استانداردها) ویلیام استالینگز فهرست کتاب فصل اول: مقدمه بخش اول: رمزنگاري فصل دوم: رمزگذاري متقارن و محرمانگی پیغام فصل سوم: رمزنگاري کلید- عمومی و احرازهویت پیغام بخش دوم: کاربردهاي امنیت شبکه فصل چهارم: توزیع کلید و احرازهویت کاربر فصل پنجم: کنترل دسترسی شبکه و امنیت محاسبات ابري فصل ششم: امنیت لایه –...
Conference Paper
Cloud computing has become a new computing paradigm as it can provide scalable IT infrastructure, QoS-assured services and customizable computing environment. Although there are many research activities or business solutions for Cloud computing, most of them are focused on single-provider Cloud. As a key service delivery platform in the field of se...
Article
Full-text available
Service composition is becoming increasingly pervasive, affecting the way service computing is utilized. Service composition has become an essential element of service deployment due to the fact that single services are unable to fulfill user requirements. Owing to the dramatic growth of services claiming similar functionalities, creating a value-a...