Skip to content
GCC AI Research

Hackers and the Internet of Things

KAUST ·

Summary

Cybersecurity specialist James Lyne spoke at KAUST's 2018 Winter Enrichment Program (WEP) about cybersecurity threats and techniques. Lyne demonstrated hacking and phishing attacks, emphasizing how hackers can exploit personal information by bypassing basic security measures. He highlighted the increasing sophistication of cybercriminals and the existence of illicit marketplaces on the dark web where hacking applications are sold. Why it matters: Raising awareness of cybersecurity threats is crucial for protecting individuals and organizations in Saudi Arabia and the broader region as digital infrastructure expands.

Get the weekly digest

Top AI stories from the GCC region, every week.

Related

LLM-based Multi-class Attack Analysis and Mitigation Framework in IoT/IIoT Networks

arXiv ·

This paper introduces a framework that combines machine learning for multi-class attack detection in IoT/IIoT networks with large language models (LLMs) for attack behavior analysis and mitigation suggestion. The framework uses role-play prompt engineering with RAG to guide LLMs like ChatGPT-o3 and DeepSeek-R1, and introduces new evaluation metrics for quantitative assessment. Experiments using Edge-IIoTset and CICIoT2023 datasets showed Random Forest as the best detection model and ChatGPT-o3 outperforming DeepSeek-R1 in attack analysis and mitigation.

Blocking microgrid cyberattacks to keep the power flowing

KAUST ·

KAUST researchers are simulating cyberattacks on microgrids to assess their impact and develop detection/suppression methods. They used the Canadian urban distribution model with four inverter-based distributed generations (DGs) to capture system dynamics. The simulations considered attacks altering measurement data, modifying control signals, and causing sudden load changes, all of which had damaging effects. Why it matters: This research is crucial for ensuring the resilience of increasingly complex microgrids against cyber threats, especially as they become more integrated into critical infrastructure.