首页 > 最新文献

Information Security Journal: A Global Perspective最新文献

英文 中文
A systematic review and taxonomy of web applications threats 对web应用程序威胁的系统回顾和分类
Pub Date : 2020-12-31 DOI: 10.1080/19393555.2020.1853855
Yassine Sadqi, Yassine Maleh
ABSTRACT Nowadays, web application security is one of the relevant issues in the IT security domain due to the continued growth in the number of web-related attacks. As a result, attacks, with various and varied motivations, have developed and become increasingly sophisticated. They mainly target data related to economic activities. Thus, they cause significant damage to the overall functioning of information systems. To address the various threats, several robust taxonomies exist in the literature. Each taxonomy and classification has advantages and limitations. We first define the different threat classifications related to the context of Web applications. The objective of this analysis is to provide a synthesis of the advantages and disadvantages of each classification. The current work analyses different taxonomies for web applications threats, in order to propose our proper taxonomy. The proposed taxonomy takes advantage of the benefits of existing taxonomies and provides an integrated approach for classifying both client-side and server-side attacks. The finding will help researchers to find a clear and detailed taxonomy of the different threats related to web applications.
随着网络攻击的不断增加,web应用程序的安全成为IT安全领域的热点问题之一。因此,各种动机的攻击已经发展并变得越来越复杂。它们主要针对与经济活动有关的数据。因此,它们对信息系统的整体功能造成重大损害。为了应对各种威胁,文献中存在几种健壮的分类法。每种分类法和分类都有其优点和局限性。我们首先定义与Web应用程序上下文相关的不同威胁分类。本分析的目的是综合每种分类的优缺点。本文分析了web应用程序威胁的不同分类,以提出合适的分类方法。建议的分类法利用了现有分类法的优点,并提供了对客户端和服务器端攻击进行分类的集成方法。这一发现将帮助研究人员找到与网络应用程序相关的不同威胁的清晰而详细的分类。
{"title":"A systematic review and taxonomy of web applications threats","authors":"Yassine Sadqi, Yassine Maleh","doi":"10.1080/19393555.2020.1853855","DOIUrl":"https://doi.org/10.1080/19393555.2020.1853855","url":null,"abstract":"ABSTRACT Nowadays, web application security is one of the relevant issues in the IT security domain due to the continued growth in the number of web-related attacks. As a result, attacks, with various and varied motivations, have developed and become increasingly sophisticated. They mainly target data related to economic activities. Thus, they cause significant damage to the overall functioning of information systems. To address the various threats, several robust taxonomies exist in the literature. Each taxonomy and classification has advantages and limitations. We first define the different threat classifications related to the context of Web applications. The objective of this analysis is to provide a synthesis of the advantages and disadvantages of each classification. The current work analyses different taxonomies for web applications threats, in order to propose our proper taxonomy. The proposed taxonomy takes advantage of the benefits of existing taxonomies and provides an integrated approach for classifying both client-side and server-side attacks. The finding will help researchers to find a clear and detailed taxonomy of the different threats related to web applications.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132680205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A modified LSB image steganography method using filtering algorithm and stream of password 一种采用滤波算法和密码流的改进LSB图像隐写方法
Pub Date : 2020-11-29 DOI: 10.1080/19393555.2020.1854902
Md. Rashedul Islam, T. R. Tanni, S. Parvin, M. J. Sultana, Ayasha Siddiqa
ABSTRACT Data is one of the most significant assets nowadays and needs to address correctly in the growing risk of cybersecurity. Additionally, every year, data is stolen and modified from the internet when transmitting. Therefore, to improve security while transmission, there are two techniques available called cryptography and steganography. In cryptography, the information is encrypted to ciphertexts using a private key, but the message’s existence is visible to others, no matter how unbreakable they are. On the other hand, steganography hides the secret data in an ordinary non-secret file to avoid visual detection. This paper proposed a new data hiding method using LSB image steganography, where confidential information uses only the selected image pixel. For that, image pixel information is used to filter the complete image to decide the candidate pixel, and a user-defined password is used to secure the LSB steganography. For better security, before applying steganography, the AES method encrypts the secret message. In the experiment, MSE and PSNR value are measured to assess the quality of the resultant stego image. The stego image provides higher PSNR and less MSE value as compared to other studied methods, which illustrate the flexibility of the proposed method.
数据是当今最重要的资产之一,在日益增长的网络安全风险中需要正确处理。此外,每年都有数据在传输过程中被窃取和修改。因此,为了提高传输时的安全性,有两种可用的技术:密码学和隐写术。在密码学中,使用私钥将信息加密为密文,但是消息的存在对其他人是可见的,无论它们是多么牢不可破。另一方面,隐写术将秘密数据隐藏在普通的非秘密文件中,以避免视觉检测。本文提出了一种利用LSB图像隐写技术的数据隐藏新方法,其中机密信息仅使用选定的图像像素。为此,使用图像像素信息对完整图像进行过滤以确定候选像素,并使用用户自定义密码来保护LSB隐写。为了提高安全性,在应用隐写术之前,AES方法会对秘密消息进行加密。在实验中,测量了MSE和PSNR值来评估得到的隐去图像的质量。与其他研究方法相比,隐去图像具有更高的PSNR和更小的MSE值,说明了该方法的灵活性。
{"title":"A modified LSB image steganography method using filtering algorithm and stream of password","authors":"Md. Rashedul Islam, T. R. Tanni, S. Parvin, M. J. Sultana, Ayasha Siddiqa","doi":"10.1080/19393555.2020.1854902","DOIUrl":"https://doi.org/10.1080/19393555.2020.1854902","url":null,"abstract":"ABSTRACT Data is one of the most significant assets nowadays and needs to address correctly in the growing risk of cybersecurity. Additionally, every year, data is stolen and modified from the internet when transmitting. Therefore, to improve security while transmission, there are two techniques available called cryptography and steganography. In cryptography, the information is encrypted to ciphertexts using a private key, but the message’s existence is visible to others, no matter how unbreakable they are. On the other hand, steganography hides the secret data in an ordinary non-secret file to avoid visual detection. This paper proposed a new data hiding method using LSB image steganography, where confidential information uses only the selected image pixel. For that, image pixel information is used to filter the complete image to decide the candidate pixel, and a user-defined password is used to secure the LSB steganography. For better security, before applying steganography, the AES method encrypts the secret message. In the experiment, MSE and PSNR value are measured to assess the quality of the resultant stego image. The stego image provides higher PSNR and less MSE value as compared to other studied methods, which illustrate the flexibility of the proposed method.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122377283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A four-part typology to assess organizational and individual security awareness 评估组织和个人安全意识的四部分类型
Pub Date : 2020-11-28 DOI: 10.1080/19393555.2020.1855374
Mathias Reveraert, Tom Sauer
ABSTRACT This article provides a four-part typology of security awareness. We argue that existing awareness typologies that distinguish problem awareness from solution awareness and that separate descriptive awareness from prescriptive awareness are on its own insufficient and need to be merged to have a complete picture of security awareness. Renaming and bridging both distinctions leads to four security awareness types: (1) Cognitive awareness of the threat; (2) Attitudinal awareness of the threat; (3) Cognitive awareness of the mitigation; and (4) Attitudinal awareness of the mitigation. Each type is subsequently explained in greater detail and illustrated by referring to the 2020 worldwide outbreak of COVID-19. Furthermore, it is demonstrated that the typology is applicable to study both organizational awareness and individual awareness.
本文提供了安全意识的四部分类型。我们认为,现有的区分问题意识和解决方案意识以及区分描述性意识和说明性意识的意识类型本身是不够的,需要合并以获得安全意识的完整图景。重命名和弥合这两种差异导致了四种安全意识类型:(1)对威胁的认知意识;(2)威胁的态度意识;(3)缓解认知意识;(4)缓解的态度意识。随后对每种类型进行了更详细的解释,并以2020年全球COVID-19疫情为例进行了说明。结果表明,该类型学既适用于组织意识研究,也适用于个体意识研究。
{"title":"A four-part typology to assess organizational and individual security awareness","authors":"Mathias Reveraert, Tom Sauer","doi":"10.1080/19393555.2020.1855374","DOIUrl":"https://doi.org/10.1080/19393555.2020.1855374","url":null,"abstract":"ABSTRACT This article provides a four-part typology of security awareness. We argue that existing awareness typologies that distinguish problem awareness from solution awareness and that separate descriptive awareness from prescriptive awareness are on its own insufficient and need to be merged to have a complete picture of security awareness. Renaming and bridging both distinctions leads to four security awareness types: (1) Cognitive awareness of the threat; (2) Attitudinal awareness of the threat; (3) Cognitive awareness of the mitigation; and (4) Attitudinal awareness of the mitigation. Each type is subsequently explained in greater detail and illustrated by referring to the 2020 worldwide outbreak of COVID-19. Furthermore, it is demonstrated that the typology is applicable to study both organizational awareness and individual awareness.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123885500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Facial blemishes detection and encryption with secure force algorithm into HCC2D code for biometric-passport 面部瑕疵检测及安全力算法加密成HCC2D条码,用于生物识别护照
Pub Date : 2020-11-19 DOI: 10.1080/19393555.2020.1846823
Z. Choudhury, M. Rabbani
ABSTRACT A biometric passport includes demographic information and biometric details. It contains some applications that are currently and probable concerning national security such as frontier protection, illegal immigration, criminals, terrorists, and fake passport. Over the fifteen years, most of the countries have adopted biometric-passports based on International Civil Aviation Organization (ICAO) and Machine Readable Travel Documents (MRTD) standardization. However, the Radio Frequency Identification (RFID) system contains a threat scenario that exists in privacy violation issues such as identity theft, data leakage threats, host listing, and tracking. To overcome these issues, this paper proposed a face recognition based on facial blemishes detection and encrypted into the High Capacity Color 2-Dimensional (HCC2D) code for biometric passport security. This includes facial blemishes features detection to generate the template and encrypted by applying the Secure Force (SF) algorithm to secure biometric information. Facial blemishes are detected by applying the Active Appearance Model (AAM) using Principle Component Analysis (PCA) and Canny edge detector with Speeded Up Robust Features (SURF) detection algorithm. The proposed technique attained a 93.06% accuracy level for the dataset Indian Institute of Technology Kanpur (IITK). This technique will enhance biometric passport security to protect the biometric information from an intruder.
生物特征护照包括人口统计信息和生物特征细节。它包含一些目前和可能涉及国家安全的应用,如边境保护、非法移民、犯罪分子、恐怖分子、假护照。在过去的15年中,大多数国家都采用了基于国际民航组织(ICAO)和机读旅行证件(MRTD)标准化的生物识别护照。然而,射频识别(RFID)系统存在威胁场景,存在身份盗窃、数据泄露威胁、主机列表和跟踪等隐私侵犯问题。为了克服这些问题,本文提出了一种基于面部瑕疵检测的人脸识别方法,并将其加密为高容量彩色二维(HCC2D)码,用于生物识别护照的安全。这包括面部瑕疵特征检测以生成模板,并通过应用安全力(SF)算法加密以保护生物特征信息。采用主成分分析(PCA)的主动外观模型(AAM)和基于加速鲁棒特征(SURF)检测算法的Canny边缘检测器对面部缺陷进行检测。该技术在印度坎普尔理工学院(IITK)的数据集上达到了93.06%的精度水平。该技术将提高生物特征护照的安全性,以保护生物特征信息免受入侵者的侵害。
{"title":"Facial blemishes detection and encryption with secure force algorithm into HCC2D code for biometric-passport","authors":"Z. Choudhury, M. Rabbani","doi":"10.1080/19393555.2020.1846823","DOIUrl":"https://doi.org/10.1080/19393555.2020.1846823","url":null,"abstract":"ABSTRACT A biometric passport includes demographic information and biometric details. It contains some applications that are currently and probable concerning national security such as frontier protection, illegal immigration, criminals, terrorists, and fake passport. Over the fifteen years, most of the countries have adopted biometric-passports based on International Civil Aviation Organization (ICAO) and Machine Readable Travel Documents (MRTD) standardization. However, the Radio Frequency Identification (RFID) system contains a threat scenario that exists in privacy violation issues such as identity theft, data leakage threats, host listing, and tracking. To overcome these issues, this paper proposed a face recognition based on facial blemishes detection and encrypted into the High Capacity Color 2-Dimensional (HCC2D) code for biometric passport security. This includes facial blemishes features detection to generate the template and encrypted by applying the Secure Force (SF) algorithm to secure biometric information. Facial blemishes are detected by applying the Active Appearance Model (AAM) using Principle Component Analysis (PCA) and Canny edge detector with Speeded Up Robust Features (SURF) detection algorithm. The proposed technique attained a 93.06% accuracy level for the dataset Indian Institute of Technology Kanpur (IITK). This technique will enhance biometric passport security to protect the biometric information from an intruder.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134598958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A security-attribute-based access control along with user revocation for shared data in multi-owner cloud system 多所有者云系统中共享数据的基于安全属性的访问控制和用户撤销
Pub Date : 2020-11-05 DOI: 10.1080/19393555.2020.1842568
S. Raj, B. Kumar, G. Venkatesan
ABSTRACT Cloud storage is a cloud implementation that facilitates agencies to set up in-house information storage installations. Cloud storage actually creates security problems. When the information is communicated by groups; both cloud-specific and standard insider threats are visible. A key research problem is the secure sharing among group members, which confronts the internal threats of legitimate and malevolent users. In this paper, in this paper, an effective structured data sharing mechanism for user revocation in the multi-owner cloud system is proposed. The proposed method is based on the following five entities: data owner, cloud storage, central authority, and cryptographic server, and data users. The data owner will submit to cryptographic servers’ data, user list and parameters capable of generating an Access Control List (ACL). A trusted third party is a cryptographic server that provides the symmetric key that triggers the encrypted data. The cryptographic server then divides the key into three sections for each user within the group. Quantitative findings indicate the sustainability of the mechanism proposed in contrast with conventional schemes.
云存储是一种便于机构建立内部信息存储装置的云实现。云存储实际上会产生安全问题。当信息被分组传播时;云特有的和标准的内部威胁都是可见的。一个关键的研究问题是群组成员之间的安全共享,它面临着合法用户和恶意用户的内部威胁。本文提出了一种有效的多所有者云系统中用户撤销的结构化数据共享机制。该方法基于以下五个实体:数据所有者、云存储、中央权威机构和加密服务器以及数据用户。数据所有者将提交加密服务器的数据、用户列表和能够生成访问控制列表(ACL)的参数。受信任的第三方是提供触发加密数据的对称密钥的加密服务器。然后,加密服务器为组内的每个用户将密钥分成三个部分。定量结果表明,与传统方案相比,所提出的机制具有可持续性。
{"title":"A security-attribute-based access control along with user revocation for shared data in multi-owner cloud system","authors":"S. Raj, B. Kumar, G. Venkatesan","doi":"10.1080/19393555.2020.1842568","DOIUrl":"https://doi.org/10.1080/19393555.2020.1842568","url":null,"abstract":"ABSTRACT Cloud storage is a cloud implementation that facilitates agencies to set up in-house information storage installations. Cloud storage actually creates security problems. When the information is communicated by groups; both cloud-specific and standard insider threats are visible. A key research problem is the secure sharing among group members, which confronts the internal threats of legitimate and malevolent users. In this paper, in this paper, an effective structured data sharing mechanism for user revocation in the multi-owner cloud system is proposed. The proposed method is based on the following five entities: data owner, cloud storage, central authority, and cryptographic server, and data users. The data owner will submit to cryptographic servers’ data, user list and parameters capable of generating an Access Control List (ACL). A trusted third party is a cryptographic server that provides the symmetric key that triggers the encrypted data. The cryptographic server then divides the key into three sections for each user within the group. Quantitative findings indicate the sustainability of the mechanism proposed in contrast with conventional schemes.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"53 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130765495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Security Enhancement of Symmetric Key Crypto Mechanism based on Double Stage Secret Model 基于双阶段秘密模型的对称密钥加密机制安全性增强
Pub Date : 2020-11-03 DOI: 10.1080/19393555.2020.1842945
Sreeparna Chakrabarti, G. S. Babu
ABSTRACT All smart services in cloud computing platforms have a data-sharing process to execute the task. Moreover, several crypto techniques were implemented to provide efficient and secure data transmission channel. However, it has been suffered with a number of issues because of several harmful attacks and unauthenticated key retrieval. Thus in the wireless medium, transferring the data amid two users are challengeable task. To overcome this issue, a novel Double-Stage Secret (DSS) cryptosystem is proposed to prevent the attacks in the communication channel, here the encryption and decryption function is processed based on some specific condition. If the DSS condition is satisfied then the client or user is requested to decrypt the message. To validate the secure and success rate of the proposed model, an efficient novel back sniff is developed and launched in the data transmission channel and its secure range is evaluated. In addition, the simulation of this research is done by Java, running on net beans IDE 8.2 in windows 10 platform and the results illustrated that the proposed model has attained high performance by gaining a high secure rate and less processing time of encryption and decryption than the existing algorithms.
云计算平台中的所有智能服务都有一个数据共享过程来执行任务。此外,还采用了多种加密技术来提供高效、安全的数据传输通道。然而,由于一些有害的攻击和未经身份验证的密钥检索,它遭受了许多问题。因此,在无线介质中,在两个用户之间传输数据是一项具有挑战性的任务。为了解决这一问题,提出了一种新的双阶段秘密(DSS)密码系统来防止通信信道中的攻击,并根据特定的条件对加密和解密功能进行处理。如果满足DSS条件,则请求客户端或用户解密消息。为了验证该模型的安全性和成功率,开发了一种高效的新型后嗅探器,并在数据传输通道中启动,并对其安全范围进行了评估。此外,本文还在windows 10平台下的net beans IDE 8.2上使用Java进行了仿真,结果表明,与现有算法相比,本文提出的模型具有较高的安全率和较少的加解密处理时间,达到了较高的性能。
{"title":"The Security Enhancement of Symmetric Key Crypto Mechanism based on Double Stage Secret Model","authors":"Sreeparna Chakrabarti, G. S. Babu","doi":"10.1080/19393555.2020.1842945","DOIUrl":"https://doi.org/10.1080/19393555.2020.1842945","url":null,"abstract":"ABSTRACT All smart services in cloud computing platforms have a data-sharing process to execute the task. Moreover, several crypto techniques were implemented to provide efficient and secure data transmission channel. However, it has been suffered with a number of issues because of several harmful attacks and unauthenticated key retrieval. Thus in the wireless medium, transferring the data amid two users are challengeable task. To overcome this issue, a novel Double-Stage Secret (DSS) cryptosystem is proposed to prevent the attacks in the communication channel, here the encryption and decryption function is processed based on some specific condition. If the DSS condition is satisfied then the client or user is requested to decrypt the message. To validate the secure and success rate of the proposed model, an efficient novel back sniff is developed and launched in the data transmission channel and its secure range is evaluated. In addition, the simulation of this research is done by Java, running on net beans IDE 8.2 in windows 10 platform and the results illustrated that the proposed model has attained high performance by gaining a high secure rate and less processing time of encryption and decryption than the existing algorithms.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122868114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fast secure matrix multiplications over ring-based homomorphic encryption 基于环同态加密的快速安全矩阵乘法
Pub Date : 2020-10-28 DOI: 10.1080/19393555.2020.1836288
P. Mishra, Deevashwer Rathee, D. Duong, Masaya Yasuda
ABSTRACT As widespread development of biometrics, concerns about security and privacy are rapidly increasing. Secure matrix computation is one of the most fundamental and useful operations for statistical analysis and machine learning with protecting the confidentiality of input data. Secure computation can be achieved by homomorphic encryption, supporting meaningful operations over encrypted data. HElib is a software library that implements the Brakerski-Gentry-Vaikuntanathan (BGV) homomorphic scheme, in which secure matrix-vector multiplication is proposed for operating matrices. Recently, Duong et al. (Tatra Mt. Publ) proposed a new method for secure single matrix multiplication over a ring-LWE-based scheme. In this paper, we generalize Duong et al.’s method for secure multiple matrix multiplications over the BGV scheme. We also implement our method using HElib, and show that our method is much faster than the matrix-vector multiplication in HElib for secure matrix multiplications.
随着生物识别技术的广泛发展,人们对安全性和隐私性的担忧也在迅速增加。安全矩阵计算是统计分析和机器学习中最基本和最有用的运算之一,它可以保护输入数据的机密性。安全计算可以通过同态加密实现,支持对加密数据进行有意义的操作。HElib是一个实现Brakerski-Gentry-Vaikuntanathan (BGV)同态方案的软件库,其中对矩阵的运算提出了安全的矩阵-向量乘法。最近,Duong等人(Tatra Mt. Publ)提出了一种基于环lwe方案的安全单矩阵乘法新方法。本文推广了Duong等人在BGV方案上的安全多重矩阵乘法方法。我们还使用HElib实现了我们的方法,并表明我们的方法在安全矩阵乘法方面比HElib中的矩阵向量乘法快得多。
{"title":"Fast secure matrix multiplications over ring-based homomorphic encryption","authors":"P. Mishra, Deevashwer Rathee, D. Duong, Masaya Yasuda","doi":"10.1080/19393555.2020.1836288","DOIUrl":"https://doi.org/10.1080/19393555.2020.1836288","url":null,"abstract":"ABSTRACT As widespread development of biometrics, concerns about security and privacy are rapidly increasing. Secure matrix computation is one of the most fundamental and useful operations for statistical analysis and machine learning with protecting the confidentiality of input data. Secure computation can be achieved by homomorphic encryption, supporting meaningful operations over encrypted data. HElib is a software library that implements the Brakerski-Gentry-Vaikuntanathan (BGV) homomorphic scheme, in which secure matrix-vector multiplication is proposed for operating matrices. Recently, Duong et al. (Tatra Mt. Publ) proposed a new method for secure single matrix multiplication over a ring-LWE-based scheme. In this paper, we generalize Duong et al.’s method for secure multiple matrix multiplications over the BGV scheme. We also implement our method using HElib, and show that our method is much faster than the matrix-vector multiplication in HElib for secure matrix multiplications.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134007599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
A dictionary-based method for detecting machine-generated domains 一种基于字典的检测机器生成域的方法
Pub Date : 2020-10-22 DOI: 10.1080/19393555.2020.1834650
Tianyu Wang, Li-Chiou Chen, Y. Genc
ABSTRACT Internet robots, also known as bots, have transformed the businesses and society with convenience. However, the dynamics of these interactions could be under adversarial circumstances with detrimental effects on network security. Bots that use domain-generation algorithms (DGAs) can generate many random domains dynamically so that static domain blacklists become ineffective in preventing malicious attacks by botnets. Various families of recent botnets have used DGA to establish communication with the bots. Researchers have introduced various detection methods with moderate success. Methods proposed so far either detect only DGAs that use non-variations forms or focus on the classification accuracy instead of time complexity, which would be critical in real-world production. The goal of this article is to explore how machine learning can help in detecting machine-generated domain names. To that end, we propose a dictionary-based n-gram method that can detect 39 DGA variations. We compared our method with existing research and found that our method can improve the performance of the existing classification algorithms. At last, our method can achieve competitive results as the LSTM model while requiring less time and complexity. Our research helps real-time production for DGA detection and provides insight in protecting DNS server and information security.
互联网机器人,又称机器人,以其便捷的方式改变着商业和社会。然而,这些相互作用的动态可能在对抗性环境下对网络安全产生不利影响。利用域生成算法(DGAs)的机器人可以动态生成大量随机域,使得静态域黑名单无法有效防范僵尸网络的恶意攻击。最近的各种僵尸网络都使用DGA来建立与机器人的通信。研究人员介绍了各种检测方法,并取得了一定的成功。目前提出的方法要么只检测使用非变化形式的DGAs,要么关注分类精度而不是时间复杂度,这在实际生产中是至关重要的。本文的目的是探索机器学习如何帮助检测机器生成的域名。为此,我们提出了一种基于字典的n-gram方法,可以检测39种DGA变化。将我们的方法与已有的研究进行了比较,发现我们的方法可以提高现有分类算法的性能。最后,我们的方法可以获得与LSTM模型相当的结果,同时所需的时间和复杂度也更低。我们的研究有助于DGA检测的实时生产,并为保护DNS服务器和信息安全提供见解。
{"title":"A dictionary-based method for detecting machine-generated domains","authors":"Tianyu Wang, Li-Chiou Chen, Y. Genc","doi":"10.1080/19393555.2020.1834650","DOIUrl":"https://doi.org/10.1080/19393555.2020.1834650","url":null,"abstract":"ABSTRACT Internet robots, also known as bots, have transformed the businesses and society with convenience. However, the dynamics of these interactions could be under adversarial circumstances with detrimental effects on network security. Bots that use domain-generation algorithms (DGAs) can generate many random domains dynamically so that static domain blacklists become ineffective in preventing malicious attacks by botnets. Various families of recent botnets have used DGA to establish communication with the bots. Researchers have introduced various detection methods with moderate success. Methods proposed so far either detect only DGAs that use non-variations forms or focus on the classification accuracy instead of time complexity, which would be critical in real-world production. The goal of this article is to explore how machine learning can help in detecting machine-generated domain names. To that end, we propose a dictionary-based n-gram method that can detect 39 DGA variations. We compared our method with existing research and found that our method can improve the performance of the existing classification algorithms. At last, our method can achieve competitive results as the LSTM model while requiring less time and complexity. Our research helps real-time production for DGA detection and provides insight in protecting DNS server and information security.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127634116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Feature indexing and search optimization for enhancing the forensic analysis of mobile cloud environment 特征索引和搜索优化,增强移动云环境的取证分析
Pub Date : 2020-10-22 DOI: 10.1080/19393555.2020.1839605
Ibrahim Ali Alnajjar, M. Mahmuddin
ABSTRACT The increased utilization of Mobile Cloud Computing (MCC) technology creates an opportunity for cybercrimes. Modeling the suitable methods for mobile cloud forensic examination and analysis is essential to improve the investigation performance. This paper incorporates data mining and optimization methods to enforce precise handling of the mobile cloud evidence in examination and analysis to improve the investigation performance. It enhances the analysis of the mobile cloud forensics with the incorporation of the evidence indexing, cross-referencing, and keyword searching as the sub-processes. The proposed Forensic Examination and analysis methodology using the Data mining and Optimization (FEDO) approach examines the key features of the evidence and indexes the pieces of evidence with key features to facilitate the investigation over the massive cloud evidence. By analyzing the temporal and geo-information, it applies cross-referencing to alleviate the evidence toward the case-specific evidence. The proposed methodology improves the searching capability of the investigation through the Linearly Decreasing Weight (LDW) strategy based Particle Swarm Optimization (PSO) algorithm. Thus, the experimental results demonstrate that the proposed forensic methodology yields better investigation performance in terms of accuracy of evidence detection.
移动云计算(MCC)技术的日益普及为网络犯罪创造了机会。建模适合移动云取证检测分析的方法,是提高调查性能的关键。本文结合数据挖掘和优化方法,对移动云证据在检验分析中进行精准处理,提高侦查效能。将证据索引、交叉引用和关键字搜索作为子流程,增强了移动云取证的分析能力。采用数据挖掘和优化(FEDO)方法的法医检验和分析方法检查证据的关键特征,并对具有关键特征的证据片段进行索引,以促进对大量云证据的调查。通过对时间信息和地理信息的分析,采用交叉引用的方法来减轻证据对具体案件证据的依赖。该方法通过基于线性降权(LDW)策略的粒子群优化(PSO)算法提高了调查的搜索能力。因此,实验结果表明,所提出的法医方法在证据检测的准确性方面具有更好的调查性能。
{"title":"Feature indexing and search optimization for enhancing the forensic analysis of mobile cloud environment","authors":"Ibrahim Ali Alnajjar, M. Mahmuddin","doi":"10.1080/19393555.2020.1839605","DOIUrl":"https://doi.org/10.1080/19393555.2020.1839605","url":null,"abstract":"ABSTRACT The increased utilization of Mobile Cloud Computing (MCC) technology creates an opportunity for cybercrimes. Modeling the suitable methods for mobile cloud forensic examination and analysis is essential to improve the investigation performance. This paper incorporates data mining and optimization methods to enforce precise handling of the mobile cloud evidence in examination and analysis to improve the investigation performance. It enhances the analysis of the mobile cloud forensics with the incorporation of the evidence indexing, cross-referencing, and keyword searching as the sub-processes. The proposed Forensic Examination and analysis methodology using the Data mining and Optimization (FEDO) approach examines the key features of the evidence and indexes the pieces of evidence with key features to facilitate the investigation over the massive cloud evidence. By analyzing the temporal and geo-information, it applies cross-referencing to alleviate the evidence toward the case-specific evidence. The proposed methodology improves the searching capability of the investigation through the Linearly Decreasing Weight (LDW) strategy based Particle Swarm Optimization (PSO) algorithm. Thus, the experimental results demonstrate that the proposed forensic methodology yields better investigation performance in terms of accuracy of evidence detection.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"12 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120808904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Integrated framework for cybersecurity auditing 网络安全审计集成框架
Pub Date : 2020-10-18 DOI: 10.1080/19393555.2020.1834649
Osamah M. Al-Matari, Iman M. A. Helal, Sherif A. Mazen, Sherif Elhennawy
ABSTRACT Organizations receive several cyberattacks on their daily operations, thus the need for auditing. However, there is no unified tool to perform cybersecurity audit tasks which are expensive and tedious. In this paper, we build a cybersecurity framework to perform cybersecurity auditing process in organizations. It covers several types of threats and risks by providing the information systems auditors and cybersecurity professionals with several types of controls. Moreover, it illustrates the essential tools and techniques for cybersecurity auditing. The proposed framework clarifies the security issues through output reports. These reports specify the cybersecurity gaps. Also, it helps practitioners to generate an integrated tool to support cybersecurity auditors learning how to secure organizations and finding a mechanism to achieve the cybersecurity audit tasks.
组织在日常运营中会受到多次网络攻击,因此需要进行审计。然而,目前还没有统一的工具来执行网络安全审计任务,这既昂贵又繁琐。在本文中,我们构建了一个网络安全框架来执行组织的网络安全审计过程。它通过向信息系统审计员和网络安全专业人员提供几种类型的控制,涵盖了几种类型的威胁和风险。此外,它还说明了网络安全审计的基本工具和技术。建议的框架通过输出报告澄清了安全问题。这些报告详细说明了网络安全方面的差距。此外,它还帮助从业者生成一个集成工具,以支持网络安全审计员学习如何保护组织并找到实现网络安全审计任务的机制。
{"title":"Integrated framework for cybersecurity auditing","authors":"Osamah M. Al-Matari, Iman M. A. Helal, Sherif A. Mazen, Sherif Elhennawy","doi":"10.1080/19393555.2020.1834649","DOIUrl":"https://doi.org/10.1080/19393555.2020.1834649","url":null,"abstract":"ABSTRACT Organizations receive several cyberattacks on their daily operations, thus the need for auditing. However, there is no unified tool to perform cybersecurity audit tasks which are expensive and tedious. In this paper, we build a cybersecurity framework to perform cybersecurity auditing process in organizations. It covers several types of threats and risks by providing the information systems auditors and cybersecurity professionals with several types of controls. Moreover, it illustrates the essential tools and techniques for cybersecurity auditing. The proposed framework clarifies the security issues through output reports. These reports specify the cybersecurity gaps. Also, it helps practitioners to generate an integrated tool to support cybersecurity auditors learning how to secure organizations and finding a mechanism to achieve the cybersecurity audit tasks.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129556957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
Information Security Journal: A Global Perspective
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1