Marko Schuba’s research while affiliated with FH Aachen and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (29)


CampusQuest: Motivating Computer Science Students for Cybersecurity from Day One
  • Conference Paper

January 2025

Luca Pöhler

·

Marko Schuba

·

Tim Höner

·

[...]

·

Georg Neugebauer

AI Support for Establishing and Operating an Information Security Management System (ISMS)

January 2025

·

11 Reads

The increasing complexity of information security threats and ever more stringent legal requirements mean that more and more organizations are setting themselves the goal of implementing an effective and efficient information security management system (ISMS). This paper examines the ways in which artificial intelligence (AI) in the form of a chatbot can support the development and operation of an ISMS. In particular, it evaluates how a chatbot can be integrated into standard setup and operating processes within an ISMS. In addition, various possible applications are shown and advantages, disadvantages and limitations are discussed. It turns out that the use of a chatbot as a supporting tool has many advantages and, in the hands of specialist personnel, offers a useful addition to established methods. Consequently, chatbots open up the possibility for organizations to optimize their organizational and operational processes.


On the Lack of Phishing Misuse Prevention in Public Artificial Intelligence Tools

January 2025

·

13 Reads

Phishing remains one of the most common and effective forms of social engineering, with cybercriminals constantly refining their tactics to exploit human vulnerabilities. The sheer volume of phishing attacks is staggering: almost 1.2% of all emails sent are malicious. This equates to around 3.4 billion phishing emails per day. The effectiveness of phishing attacks is also underlined by numerous studies. Phishing is identified as the leading initial attack vector, responsible for 41% of security incidents. This means that practically every company is threatened by phishing attacks.In parallel, there have been rapid advances in the field of artificial intelligence (AI) in recent years, giving the general public access to powerful tools that can handle complex tasks with ease. However, alongside these benefits, the potential for abuse has also become a major concern. The integration of AI into social engineering attacks has significantly increased the opportunities for cybercriminals. Research has shown that AI-generated phishing emails are difficult for humans to distinguish from real messages. According to one study, phishing emails written by AI were opened by 78% of recipients, with 21% clicking on malicious content such as links or attachments. Although the click-through rate is still lower compared to human-crafted emails, generative AI tools (GenAI) can help cybercriminals compose phishing emails at least 40% faster, which can lead to a significant increase in phishing success rates. The increasing potential to use public AI tools for abusive purposes has also been recognized by the developers of AI models. Thus, publicly available AI tools often have built-in mechanisms to detect and prevent misuse. This paper examines the potential for misuse of publicly available AI in the context of phishing attacks, focusing on the content generation phase. In particular, the study examines the effectiveness of existing abuse prevention mechanisms implemented by AI platforms like fine-tuning, filters, rejection sampling, system prompts and dataset filtering. To this end, it is explored how prompts to the AI need to be altered for circumventing the misuse preventing mechanisms. While in some cases the simple request to write a phishing email succeeds, other AI tools implement more sophisticated mechanisms. In the end, however, all prevention safeguards could be circumvented. The findings highlight the significant threat posed by AI-powered social engineering attacks and emphasize the urgent need for robust defense in depth strategies against phishing attacks and increased awareness to mitigate the risks in the evolving digital landscape.In addition, the paper demonstrates that the quality of the AI tool varies in terms of the phishing emails generated. To this end, the phishing emails generated by circumventing the protection mechanisms of the AI are (subjectively) compared and evaluated by the authors. The preliminary conclusion is that automatically generated phishing emails of some public AI tools can certainly match that of manually generated emails. While the objective confirmation of this hypothesis requires further study even the subjective quality of the generated phishing emails shows the dimension of the problem.






Human-centric Introduction to a Complex Cybersecurity Standard

January 2023

·

8 Reads

Industrial automation and control systems (IACS) operate in complex and increasingly networked environments of industrial plants. Due to the increasing number of cyberattacks, these systems are also exposed to the growing threat of being attacked. IACS are often found in critical infrastructure such as power supply or water treatment plants, as well as in industry, so their compromise can result in devastating consequences. To prevent this, the IEC-62443 series of standards was developed to address the cybersecurity of IACS. In order to achieve cybersecurity in accordance with the IEC-62443 standard, the human factor plays a major role, as it is humans that need to implement and manage the cybersecurity controls. To help those users to get started and gain a basic understanding of important IEC-62443 concepts such as zones and conduits, defense in depth, and security levels, this paper defines an experience-based practical approach to train users w.r.t. application and implementation of the standard.


Training for Digital Forensics and Incident Response

January 2023

·

52 Reads

The work of an digital forensics expert is far more extensive and varied today than it was just a few years ago. Especially after hacking attacks on organizations, experts in DFIR (Digital Forensics and Incident Response) come into play. In this paper, we present a learning platform that enables people to learn DFIR from scratch. To achieve this goal, the content of the learning platform was defined, evaluated and prepared with the help of experts from industry and government. For this purpose, expert interviews were conducted, which were subsequently evaluated. The results of these interviews were incorporated into initial scenarios that were implemented in individual modules on the learning platform Ilias, with a distinction being made between the basics and the main DFIR part. In the basic part, an introduction to IT forensics is offered, which is supplemented by further technical modules. This includes training in the use of the Linux operating system, which is frequently used in digital forensics, as well as the acquisition and analysis of RAM iand hard disk images. In the main part, the focus is to apply the learnings from the basic sections and to enhance them with incident related knowledge for DFIR projects, in which digital forensics experts gather and analyse evidence on various systems of the attacked organizations by searching and gathering so-called IoCs (Indicators of Compromise) from log files and other sources. Once the analysis part is complete, and all evidence has been collected, cleanup, recovery and restart of systems may take place, which is handled in the last section of the main training module.



Citations (12)


... Sophisticated and diverse honeypot systems have been developed by researchers, with complexity being evolved in response to the observed behavior of attackers. The unique challenges and risks associated with IoT devices are understood to be invaluable through these systems [11]. Moreover, the enhancement of deployment and management in software-defined networks (SDNs) is achieved effectively by integrating honeypots. ...

Reference:

Advancing Cybersecurity with Honeypots and Deception Strategies
An ICS Honeynet for Detecting and Analyzing Cyberattacks in Industrial Plants
  • Citing Conference Paper
  • December 2021

... The IoT has seen significant growth, resulting in increased convenience for individuals [1][2][3]. The advent of fifth-generation mobile telecommunications technology (5G) is expected to facilitate the development of Internet of Things (IoT) technologies [18]. ...

Challenges and Opportunities in Securing the Industrial Internet of Things
  • Citing Preprint
  • November 2021

... Furthermore, the growing usage of Industrial Internet of Things (IIoT) devices also complicates the security landscape, since such devices tend not to meet the stringent categories of needed security to fend off complex cyberattacks. These efforts constitute a multifaceted challenge that consists of physical securing, network securing, and operational securing [33]. ...

Challenges and Opportunities in Securing the Industrial Internet of Things
  • Citing Article
  • September 2020

IEEE Transactions on Industrial Informatics

... Their approach offers fine-grained access control policies, not only with respect to remote participants on the Internet, but also between devices in the local network. In contrast to other similar approaches (e.g., [15,17,43], etc.), there is a specification of rules for local network traffic. ...

Towards In-Network Security for Smart Homes
  • Citing Conference Paper
  • August 2018

... Second, with the selected industrial communication standards at hand, they are categorized into standards that (a) don't specify the usage of certificates (including PROFIBUS DP [65], MODBUS-RTU [66], CC-Link [67], DeviceNet [68], CANopen [69], CC-Link IE Field [70], POWERLINK [71], and EtherCAT [72]); (b) specify the usage of certificates but don't specify the management of certificates (including MODBUS-TCP [73]); and (c) also specify the management of certificates (including EtherNet/IP with Common Industrial Protocol (CIP) Security [74], PROFINET [52], OPC UA [62], and IEC/IEEE 60802 [60] Third, the industrial communication standards that are categorized as belonging to (c) are considered in more detail. The remainder of this section strives to summarize the certificate management approaches presented in EtherNet/IP with CIP Security, PROFINET, OPC UA, and IEC/IEEE 60802 TSN profile for industrial automation. ...

Intrusion Detection of the ICS Protocol EtherCAT
  • Citing Article
  • May 2017

DEStech Transactions on Computer Science and Engineering

... A wide collection of scientific literature about security aspects relative to the major RTE protocols is available. In [11] and [12] two attacks to Ethercat are described, both aimed at jeopardizing the network. In [13] five attack strategies to Powerlink are discussed. ...

Intrusion Detection of the ICS Protocol EtherCAT
  • Citing Conference Paper
  • Full-text available
  • March 2017

... This attack vector, introduced in [1], has been explored extensively against multiple cryptographic schemes, as we will discuss in Section 2.3. In this setting, an adversary, who has physical access to a device, might retrieve chunks of memory content from the device via carrying out a cold-rebooting on it [1][2][3]. In general terms, the adversary forces the operating system to shut down, which causes it to go past all tasks that typically execute during a normal shutdown, such as the file system synchronization. ...

Cold Boot Attacks on DDR2 and DDR3 SDRAM
  • Citing Conference Paper
  • August 2015

... Despite their complexity, the current 286 firmware used in PLCs suffers from security weaknesses and susceptibility to attacks, much like the 287 original operating systems. An example is the Backhoff CX5020 utilizing Windows CE 6.0 Plus, which 288 possesses exploitable flaws [39]. Surprisingly, many similar vulnerabilities were discovered in typical 289 microprocessor-based devices. ...

ICS/SCADA Security Analysis of a Beckhoff CX5020 PLC

... It is noted in Windows phone forensics, and mobile forensics in general, that data acquisition involves the installation of a small program on the device to extract data [15]. However, not only is Ubuntu Touch still under development, but the underlying hardware is as well. ...

Windows Phone 7 from a Digital Forensics' Perspective

Lecture Notes of the Institute for Computer Sciences

... There have also been recent developments to the the Volatility Framework through building of plugins and proposing a more efficient and user-friendly way to conduct memory forensics. In (Logen et al., 2012), a Graphical User Interface (GUI) was presented which addressed the concern of some forensic investigators not been able to use the command line interface utility. This offered additional utilities such as storage of the forensic results or artifcats gathered in a database as well as shortcuts for long Volatility command sequences and provided new commands which were based on data stored on the database. ...

Simplifying RAM Forensics: A GUI and Extensions for the Volatility Framework
  • Citing Conference Paper
  • August 2012