Skip to main content

Research Repository

Advanced Search

All Outputs (22)

Exploring the use of fitness landscape analysis for understanding malware evolution (2024)
Presentation / Conference Contribution
Babaagba, K., Murali, R., & Thomson, S. L. (2024, July). Exploring the use of fitness landscape analysis for understanding malware evolution. Presented at ACM Genetic and Evolutionary Computation Conference (GECCO) 2024, Melbourne, Australia

We conduct a preliminary study exploring the potential of using fitness landscape analysis for understanding the evolution of malware. This type of optimisation is fairly new and has not previously been studied through the lens of landscape analysis.... Read More about Exploring the use of fitness landscape analysis for understanding malware evolution.

A Generative Neural Network for Improving Metamorphic Malware Detection in IoT Mobile Devices (2023)
Book Chapter
Turnbull, L., Tan, Z., & Babaagba, K. O. (2024). A Generative Neural Network for Improving Metamorphic Malware Detection in IoT Mobile Devices. In A. Ismail Awad, A. Ahmad, K. Raymond Choo, & S. Hakak (Eds.), Internet of Things Security and Privacy: Practical and Management Perspectives (24-53). CRC Press. https://doi.org/10.1201/9781003199410-2

There has been an upsurge in malicious attacks in recent years, impacting computer systems and networks. More and more novel malware families aimed at information assets were launched daily over the past year. A particularly threatening malicious gro... Read More about A Generative Neural Network for Improving Metamorphic Malware Detection in IoT Mobile Devices.

Applications of Evolutionary Computation: 25th European Conference, EvoApplications 2022, Held as Part of EvoStar 2022, Madrid, Spain, April 20–22, 2022, Proceedings (2022)
Book
Jiménez Laredo, J. L., Hidalgo, J. I., & Babaagba, K. O. (Eds.). (2022). Applications of Evolutionary Computation: 25th European Conference, EvoApplications 2022, Held as Part of EvoStar 2022, Madrid, Spain, April 20–22, 2022, Proceedings. Springer. https://doi.org/10.1007/978-3-031-02462-7

This book constitutes the refereed proceedings of the 25th International Conference on Applications of Evolutionary Computation, EvoApplications 2022, held as part of Evo*2022, in April 2022, co-located with the Evo*2022 events EuroGP, EvoCOP, and Ev... Read More about Applications of Evolutionary Computation: 25th European Conference, EvoApplications 2022, Held as Part of EvoStar 2022, Madrid, Spain, April 20–22, 2022, Proceedings.

Toward Machine Intelligence that Learns to Fingerprint Polymorphic Worms in IoT (2022)
Journal Article
Wang, F., Yang, S., Wang, C., Li, Q., Babaagba, K., & Tan, Z. (2022). Toward Machine Intelligence that Learns to Fingerprint Polymorphic Worms in IoT. International Journal of Intelligent Systems, 37(10), 7058-7078. https://doi.org/10.1002/int.22871

Internet of Things (IoT) is fast growing. Non-PC devices under the umbrella of IoT have been increasingly applied in various fields and will soon account for a significant share of total Internet traffic. However, the security and privacy of IoT and... Read More about Toward Machine Intelligence that Learns to Fingerprint Polymorphic Worms in IoT.

Application of evolutionary machine learning in metamorphic malware analysis and detection (2021)
Thesis
Babaagba, K. O. Application of evolutionary machine learning in metamorphic malware analysis and detection. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/Output/2801469

In recent times, malware detection and analysis are becoming key issues. A dangerous class of malware is metamorphic malware which is capable of modifying its own code and hiding malicious instructions within normal program code. Current malware dete... Read More about Application of evolutionary machine learning in metamorphic malware analysis and detection.

A Review of Agent Based University Course Time Tabling Systems (2017)
Journal Article
Babaagba, K., & Arekete, S. (2017). A Review of Agent Based University Course Time Tabling Systems. International Journal of Engineering Development and Research, 5(2), 566-568

In this paper, we carry out an extensive survey of various mobile agent systems that have been utilized in solving university course time tabling problem. University time tabling is an NP-hard problem which has been researched by vast amount of resea... Read More about A Review of Agent Based University Course Time Tabling Systems.

A Design of an Agent Based System for Timetabling (2017)
Journal Article
Babaagba, K., & Arekete, S. (2017). A Design of an Agent Based System for Timetabling. International Journal of Engineering Development and Research, 5(2), 1168-1175

Time tabling forms an important part of most educational systems. This is because most educational institutes largely rely on time tables for their day to day activities. A number of these institutions rather use the very strenuous and slow manual ti... Read More about A Design of an Agent Based System for Timetabling.

Graph Injection Attack based on Node Similarity and Non-linear Feature Injection Strategy
Presentation / Conference Contribution
Li, Q., Gao, Y., Wang, F., Wang, C., Babaagba, K. O., & Tan, Z. (2024, October). Graph Injection Attack based on Node Similarity and Non-linear Feature Injection Strategy. Presented at 20th EAI International Conference on Security and Privacy in Communication Networks, Dubai, United Arab Emirates

Graph Neural Networks (GNNs) exhibit promise in the domains of network analysis and recommendation systems. Notwithstanding , these networks are susceptible to node injection attacks. To mitigate this vulnerability, the academic community has put for... Read More about Graph Injection Attack based on Node Similarity and Non-linear Feature Injection Strategy.

Multi-Objective Evolutionary Algorithm for Automatic Generation of Adversarial Metamorphic Malware
Presentation / Conference Contribution
Babaagba, K., Wylie, J., Ayodele, M., & Tan, Z. (2024, September). Multi-Objective Evolutionary Algorithm for Automatic Generation of Adversarial Metamorphic Malware. Presented at 29th European Symposium on Research in Computer Security - SECAI, Bydgoszcz, Poland

The rise of metamorphic malware, a dangerous type of malware, has sparked growing research interest due to its increasing attacks on information assets and computer networks. Sophos’ recent threat report reveals that 94% of malware targeting organiza... Read More about Multi-Objective Evolutionary Algorithm for Automatic Generation of Adversarial Metamorphic Malware.

Image Encryption Using Dynamic Salt Injection, Hybrid Chaotic Maps, and Dual Operation Substitution
Presentation / Conference Contribution
Khattak, A. A., Babaagba, K., Liu, X., & Shah, S. A. (2024, August). Image Encryption Using Dynamic Salt Injection, Hybrid Chaotic Maps, and Dual Operation Substitution. Presented at The 2024 International Conference on Automation and Computing (ICAC 2024), Sunderland, UK

In today's digital world, securing the multimedia data, especially images transmitted over unsecure networks, is critically important. In this paper, a novel chaos-based image encryption algorithm is proposed, which utilises dynamic salt injection, h... Read More about Image Encryption Using Dynamic Salt Injection, Hybrid Chaotic Maps, and Dual Operation Substitution.

Can Federated Models Be Rectified Through Learning Negative Gradients?
Presentation / Conference Contribution
Tahir, A., Tan, Z., & Babaagba, K. O. Can Federated Models Be Rectified Through Learning Negative Gradients?. Presented at 13th EAI International Conference, BDTA 2023, Edinburgh

Federated Learning (FL) is a method to train machine learning (ML) models in a decentralised manner, while preserving the privacy of data from multiple clients. However, FL is vulnerable to malicious attacks, such as poisoning attacks, and is challen... Read More about Can Federated Models Be Rectified Through Learning Negative Gradients?.

Emotion Recognition on Social Media Using Natural Language Processing (NLP) Techniques
Presentation / Conference Contribution
Gomez, L. R., Watt, T., Babaagba, K. O., Chrysoulas, C., Homay, A., Rangarajan, R., & Liu, X. (2023, August). Emotion Recognition on Social Media Using Natural Language Processing (NLP) Techniques. Presented at ICISS 2023: The 6th International Conference on Information Science and Systems, Edinburgh

In recent years, text has been the main form of communication on social media platforms such as Twitter, Reddit, Facebook, Instagram and YouTube. Emotion Recognition from these platforms can be exploited for all sorts of applications. Through the mea... Read More about Emotion Recognition on Social Media Using Natural Language Processing (NLP) Techniques.

Challenges and Considerations in Data Recovery from Solid State Media: A Comparative Analysis with Traditional Devices
Presentation / Conference Contribution
Spalding, A., Tan, Z., & Babaagba, K. O. (2023, November). Challenges and Considerations in Data Recovery from Solid State Media: A Comparative Analysis with Traditional Devices. Presented at The International Symposium on Intelligent and Trustworthy Computing, Communications, and Networking (ITCCN-2023), Exeter, UK

Data recovery for forensic analysis of both hard drives and solid state media presents its own unique set of challenges. Hard drives face mechanical failures and data fragmentation , but their sequential storage and higher success rates make recovery... Read More about Challenges and Considerations in Data Recovery from Solid State Media: A Comparative Analysis with Traditional Devices.

Image Forgery Detection using Cryptography and Deep Learning
Presentation / Conference Contribution
Oke, A., & Babaagba, K. O. (2023, August). Image Forgery Detection using Cryptography and Deep Learning. Presented at EAI BDTA 2023 - 13th EAI International Conference on Big Data Technologies and Applications, Edinburgh

The advancement of technology has undoubtedly exposed everyone to a remarkable array of visual imagery. Nowadays, digital technology is eating away the trust and historical confidence people have in the integrity of imagery. Deep learning is often us... Read More about Image Forgery Detection using Cryptography and Deep Learning.

An Evolutionary based Generative Adversarial Network Inspired Approach to Defeating Metamorphic Malware
Presentation / Conference Contribution
Babaagba, K. O., & Wylie, J. (2023, July). An Evolutionary based Generative Adversarial Network Inspired Approach to Defeating Metamorphic Malware. Presented at The Genetic and Evolutionary Computation Conference (GECCO) 2023, Lisbon

Defeating dangerous families of malware like polymorphic and metamorphic malware have become well studied due to their increased attacks on computer systems and network. Traditional Machine Learning (ML) models have been used in detecting this malwar... Read More about An Evolutionary based Generative Adversarial Network Inspired Approach to Defeating Metamorphic Malware.

A Generative Adversarial Network Based Approach to Malware Generation Based on Behavioural Graphs
Presentation / Conference Contribution
McLaren, R. A., Babaagba, K., & Tan, Z. (2022, September). A Generative Adversarial Network Based Approach to Malware Generation Based on Behavioural Graphs. Presented at The 8th International Conference on machine Learning, Optimization and Data science - LOD 2022, Certosa di Pontignano, Siena – Tuscany, Italy

As the field of malware detection continues to grow, a shift in focus is occurring from feature vectors and other common, but easily obfuscated elements to a semantics based approach. This is due to the emergence of more complex malware families that... Read More about A Generative Adversarial Network Based Approach to Malware Generation Based on Behavioural Graphs.

A Generative Neural Network for Enhancing Android Metamorphic Malware Detection based on Behaviour Profiling
Presentation / Conference Contribution
Turnbull, L., Tan, Z., & Babaagba, K. (2022, June). A Generative Neural Network for Enhancing Android Metamorphic Malware Detection based on Behaviour Profiling. Presented at The 2022 5th IEEE Conference on Dependable and Secure Computing (IEEE DSC 2022), Edinburgh [Online]

Malicious software trends show a persistent yearly increase in volume and cost impact. More than 350,000 new malicious or unwanted programs that target various technologies were registered daily over the past year. Metamorphic malware is a specifical... Read More about A Generative Neural Network for Enhancing Android Metamorphic Malware Detection based on Behaviour Profiling.

A Study on the Effect of Feature Selection on Malware Analysis using Machine Learning
Presentation / Conference Contribution
Babaagba, K. O., & Adesanya, S. O. (2019, March). A Study on the Effect of Feature Selection on Malware Analysis using Machine Learning. Presented at ICEIT 2019: 2019 8th International Conference on Educational and Information Technology, Cambridge, UK

In this paper, the effect of feature selection in malware detection using machine learning techniques is studied. We employ supervised and unsupervised machine learning algorithms with and without feature selection. These include both classification... Read More about A Study on the Effect of Feature Selection on Malware Analysis using Machine Learning.

Evolutionary based Transfer Learning Approach to Improving Classification of Metamorphic Malware
Presentation / Conference Contribution
Babaagba, K. O., & Ayodele, M. (2023, April). Evolutionary based Transfer Learning Approach to Improving Classification of Metamorphic Malware. Presented at EvoApplications 2023: 26th International Conference on the Applications of Evolutionary Computation, Brno, Czech Republic

The proliferation of metamorphic malware has recently gained a lot of research interest. This is because of their ability to transform their program codes stochastically. Several detectors are unable to detect this malware family because of how quick... Read More about Evolutionary based Transfer Learning Approach to Improving Classification of Metamorphic Malware.

Improving Classification of Metamorphic Malware by Augmenting Training Data with a Diverse Set of Evolved Mutant Samples
Presentation / Conference Contribution
Babaagba, K., Tan, Z., & Hart, E. (2020, July). Improving Classification of Metamorphic Malware by Augmenting Training Data with a Diverse Set of Evolved Mutant Samples. Presented at The 2020 IEEE Congress on Evolutionary Computation (IEEE CEC 2020), Glasgow, UK

Detecting metamorphic malware provides a challenge to machine-learning models as trained models might not generalise to future mutant variants of the malware. To address this, we explore whether machine-learning models can be improved by augmenting t... Read More about Improving Classification of Metamorphic Malware by Augmenting Training Data with a Diverse Set of Evolved Mutant Samples.