Skip to main content Skip to local navigation
Home » Posts tagged 'Behaviour-Centric Cybersecurity Center (BCCC)' (Page 3)

Behaviour-Centric Cybersecurity Center (BCCC)

Encrypted Traffic Dataset (BCCC-DarkNet-2025)

BCCC-DarkNet-2025 is an augmented, research-driven dataset that supports encrypted traffic analysis and threat detection across anonymized communication networks. It integrates and extends two benchmark datasets, CIC-Darknet2020 and Darknet-Dataset-2020, selected for their robust coverage of encryption protocols and darknet-specific traffic behaviors. The dataset includes diverse encrypted traffic types like VPN, Tor, I2P, Freenet, and ZeroNet, with multi-class labeling and protocol-specific annotations. These […]

Cloud DDoS Attacks (BCCC-cPacket-Cloud-DDoS-2024)

The distributed denial of service attack poses a significant threat to network security. The effectiveness of new detection methods depends heavily on well-constructed datasets. After an in-depth analysis of 16 publicly available datasets and identifying their shortcomings across various dimensions, the 'BCCC-cPacket-Cloud-DDoS-2024' is meticulously created, addressing challenges identified in previous datasets through a cloud infrastructure. […]

DNS over HTTPS ( BCCC-CIRA-CIC-DoHBrw-2020 )

The 'BCCC-CIRA-CIC-DoHBrw-2020' dataset was created to address the imbalance in the 'CIRA-CIC-DoBre-2020' dataset. Unlike the 'CIRA-CIC-DoHBrw-2020' dataset, which is skewed with about 90% malicious and only 10% benign Domain over HTTPS (DoH) network traffic, the 'BCCC-CIRA-CIC-DoHBrw-2020' dataset offers a more balanced composition. It includes equal numbers of malicious and benign DoH network traffic instances, with […]

New Article Alert!

SCsVulSegLyzer: Detecting and Extracting Vulnerable Segments from Smart Contracts Using Weakly-Supervised Learning Smart contracts (SCs) are widely used in finance but remain attractive targets for hackers due to vulnerabilities, the immaturity of Solidity, and blockchain’s immutability. We present SCsVulSegLytix, a Transformer-based model that detects and extracts vulnerable segments directly from Solidity code using only contract-level […]

National Cybersecurity Consortium (NCC) conference, "Securing Canada: Evolving Threats and Innovations in Cybersecurity" and "AI-Driven Cybersecurity"

Banff, Alberta, Canada (June 25-26) National Cybersecurity Consortium (NCC) conference, "Securing Canada: Evolving Threats and Innovations in Cybersecurity" and "AI-Driven Cybersecurity" Our founder and director, Prof. XYZ, was honored to serve as a panelist for two key discussions at the National Cybersecurity Consortium (NCC) Conference: “Securing Canada: Evolving Threats and Innovations in Cybersecurity” and “AI-Driven […]

Enhancing Cybersecurity Resilience: Advancing AI-Powered Security and Security of AI Through the UCS Knowledge Mobilization Program

Université du Québec en Outaouais (UQO) (May 28) Enhancing Cybersecurity Resilience: Advancing AI-Powered Security and Security of AI Through the UCS Knowledge Mobilization Program In this talk, we explore the evolving landscape of cybersecurity, focusing on how open-source tools and datasets drive the development of AI-powered solutions. Researchers and practitioners can leverage these resources to enhance threat detection, automate responses, […]

New Article Alert!

Hybrid attention-enhanced explainable model for encrypted traffic detection and classification Encrypted traffic detection is critical as protocols like TLS, VPNs, and Tor dominate modern networks. We propose a Hybrid Attention–LightGBM model with an augmented multi-dataset approach and Explainable AI tools (SHAP, LIME) to enhance interpretability, scalability, and generalization. Experiments show it outperforms state-of-the-art methods in […]

York U innovations advance global cybersecurity education

York U innovations advance global cybersecurity education:   Through the development of innovative open-source tools and initiatives, York University’s Behaviour-Centric Cybersecurity Center (BCCC) is advancing public engagement and cybersecurity education across the globe. 

New Article Alert!

Unveiling evasive malware behavior: toward generating a multi-sources benchmark dataset and evasive malware behavior profiling using network traffic and memory analysis Traditional detection methods struggle with evolving malware, and single-source datasets are no longer sufficient. We introduce BCCC-Mal-NetMem-2025, a multi-source dataset combining memory and network data, enriched with a benign behavior profiler (BUEBP) and the […]

Enhancing Cybersecurity Resilience: Advancing AI-Powered Security and Security of AI Through the UCS Knowledge Mobilization Program

Dalhousie University, Canada (Mar 7) Enhancing Cybersecurity Resilience: Advancing AI-Powered Security and Security of AI Through the UCS Knowledge Mobilization Program In this talk, we explore the evolving landscape of cybersecurity, focusing on how open-source tools and datasets drive the development of AI-powered solutions. Researchers and practitioners can leverage these resources to enhance threat detection, automate responses, and build more […]