首页 > 最新文献

Information Security Journal: A Global Perspective最新文献

英文 中文
Security and privacy preservation using constructive hierarchical data-sharing approach in cloud environment 云环境中使用建设性分层数据共享方法的安全和隐私保护
Pub Date : 2022-10-17 DOI: 10.1080/19393555.2022.2128942
Rajesh Bingu, S. Jothilakshmi, N. Srinivasu
ABSTRACT With the vast development in the cloud computing environment, many cloud users intend to outsource the data to a remote location and share the data with multiple users. The hierarchical model is an extensively used data organization process. It is highly complex to guarantee integrity, privacy, and confidentiality of the data and the structure of the model when the sensitive data is held in this manner. This research attempts to give a solution to hierarchically ensure the security and privacy of the information while data sharing occurs. A constructive hierarchical data sharing (CHDS) method is proposed to adopt symmetric encryption over the rooted hierarchical graph structure. The hierarchical graph model deals with incoming data features to establish the model’s privacy and authenticity. Based on this model, the proposed CHDS is known to be transparent, secure, and confident in the public environment. Here, performance metrics like computational complexity, key generation, prediction accuracy, and execution time are evaluated. The outcomes provide the security of the multi-party environment without forfeiting sensible resources when the hierarchical model grows to a more significant number of siblings, edges, and vertices. The proposed CHDS gives a better trade-off when compared with various existing approaches.
{"title":"Security and privacy preservation using constructive hierarchical data-sharing approach in cloud environment","authors":"Rajesh Bingu, S. Jothilakshmi, N. Srinivasu","doi":"10.1080/19393555.2022.2128942","DOIUrl":"https://doi.org/10.1080/19393555.2022.2128942","url":null,"abstract":"ABSTRACT With the vast development in the cloud computing environment, many cloud users intend to outsource the data to a remote location and share the data with multiple users. The hierarchical model is an extensively used data organization process. It is highly complex to guarantee integrity, privacy, and confidentiality of the data and the structure of the model when the sensitive data is held in this manner. This research attempts to give a solution to hierarchically ensure the security and privacy of the information while data sharing occurs. A constructive hierarchical data sharing (CHDS) method is proposed to adopt symmetric encryption over the rooted hierarchical graph structure. The hierarchical graph model deals with incoming data features to establish the model’s privacy and authenticity. Based on this model, the proposed CHDS is known to be transparent, secure, and confident in the public environment. Here, performance metrics like computational complexity, key generation, prediction accuracy, and execution time are evaluated. The outcomes provide the security of the multi-party environment without forfeiting sensible resources when the hierarchical model grows to a more significant number of siblings, edges, and vertices. The proposed CHDS gives a better trade-off when compared with various existing approaches.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"216 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122388810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mitigation strategies for distributed denial of service (DDoS) in SDN: A survey and taxonomy SDN中分布式拒绝服务(DDoS)的缓解策略:调查和分类
Pub Date : 2022-10-07 DOI: 10.1080/19393555.2022.2111004
Suruchi Karnani, H. K. Shakya
ABSTRACT Software-defined network (SDN) plays a dominant role in meeting today’s business requirements with its ingrained features like programmability, agility, and central management. Although, distributed denial-of-service (DDoS) attacks can threaten the flexibility and availability of resources in SDN. In recent years, attackers participate actively to abuse the network elements with extensive efforts. With that, efforts have been put parallelly to defend against DDoS attacks by the researchers too. This survey performed on DDoS attack mitigation strategies in the SDN environment. As a result of this work, the mitigation taxonomy has evolved. The taxonomy of SDN DDoS mitigation strategies is categorized into four: Application plane, Control plane, Data plane, and Communication interfaces. An in-depth review of existing literature on mitigating DDoS in SDN encapsulated. This article sheds light on the nuts and bolts, strengths and limitations of mitigation strategies in SDN environment to support research and security domains.
软件定义网络(SDN)以其固有的可编程性、敏捷性和集中管理等特点在满足当今的业务需求方面起着主导作用。然而,分布式拒绝服务(DDoS)攻击会威胁到SDN中资源的灵活性和可用性。近年来,攻击者积极参与,对网元进行了广泛的滥用。与此同时,研究人员也在努力防范DDoS攻击。该调查对SDN环境中的DDoS攻击缓解策略进行了研究。作为这项工作的结果,缓解分类法得到了发展。SDN DDoS缓解策略分为四类:应用平面、控制平面、数据平面和通信接口。对SDN中缓解DDoS的现有文献进行了深入的回顾。本文阐明了SDN环境中缓解策略的具体细节、优势和局限性,以支持研究和安全领域。
{"title":"Mitigation strategies for distributed denial of service (DDoS) in SDN: A survey and taxonomy","authors":"Suruchi Karnani, H. K. Shakya","doi":"10.1080/19393555.2022.2111004","DOIUrl":"https://doi.org/10.1080/19393555.2022.2111004","url":null,"abstract":"ABSTRACT Software-defined network (SDN) plays a dominant role in meeting today’s business requirements with its ingrained features like programmability, agility, and central management. Although, distributed denial-of-service (DDoS) attacks can threaten the flexibility and availability of resources in SDN. In recent years, attackers participate actively to abuse the network elements with extensive efforts. With that, efforts have been put parallelly to defend against DDoS attacks by the researchers too. This survey performed on DDoS attack mitigation strategies in the SDN environment. As a result of this work, the mitigation taxonomy has evolved. The taxonomy of SDN DDoS mitigation strategies is categorized into four: Application plane, Control plane, Data plane, and Communication interfaces. An in-depth review of existing literature on mitigating DDoS in SDN encapsulated. This article sheds light on the nuts and bolts, strengths and limitations of mitigation strategies in SDN environment to support research and security domains.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"195 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122435681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A real-time machine learning application for browser extension security monitoring 浏览器扩展安全监控的实时机器学习应用程序
Pub Date : 2022-10-03 DOI: 10.1080/19393555.2022.2128944
T. P. Fowdur, Shuaïb Hosenally
ABSTRACT One of the most common attacks in browser extensions is Cross-site scripting (XSS). To address these challenges, several browsers have proposed a new mechanism where legitimate browser extensions can only be installed from their respective Web Stores. Nonetheless, this mechanism is not flawless and multiple users still choose to install browser extensions from other sources, leaving them exposed to multiple types of attacks. This paper proposes a browser extension capable of detecting XSS attacks using Machine Learning (ML), as well as other irregularities that may occur in recently installed browser extensions. Regarding the detection of XSS attacks, the detection model is based on the Support Vector Machine (SVM) and it was able to detect malicious scripts with an accuracy of 99.5%, a precision of 99.4%, and a recall of 99.0%. Additionally, the detection of two other types of irregularities, namely the presence of blacklisted or irregular URLs located in the browser extension, and the presence of undesirable data in the manifest file of the browser extension, were considered. A Windows application was also designed in Java and deployed alongside the browser extension to monitor suspicious network requests from the newly installed browser extension.
{"title":"A real-time machine learning application for browser extension security monitoring","authors":"T. P. Fowdur, Shuaïb Hosenally","doi":"10.1080/19393555.2022.2128944","DOIUrl":"https://doi.org/10.1080/19393555.2022.2128944","url":null,"abstract":"ABSTRACT One of the most common attacks in browser extensions is Cross-site scripting (XSS). To address these challenges, several browsers have proposed a new mechanism where legitimate browser extensions can only be installed from their respective Web Stores. Nonetheless, this mechanism is not flawless and multiple users still choose to install browser extensions from other sources, leaving them exposed to multiple types of attacks. This paper proposes a browser extension capable of detecting XSS attacks using Machine Learning (ML), as well as other irregularities that may occur in recently installed browser extensions. Regarding the detection of XSS attacks, the detection model is based on the Support Vector Machine (SVM) and it was able to detect malicious scripts with an accuracy of 99.5%, a precision of 99.4%, and a recall of 99.0%. Additionally, the detection of two other types of irregularities, namely the presence of blacklisted or irregular URLs located in the browser extension, and the presence of undesirable data in the manifest file of the browser extension, were considered. A Windows application was also designed in Java and deployed alongside the browser extension to monitor suspicious network requests from the newly installed browser extension.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122684146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Intelligent security sanitizing gate 智能安全消毒门
Pub Date : 2022-09-08 DOI: 10.1080/19393555.2022.2118089
Mohammed Elwan, Amira Salem, Hossam Fawky, Ahmed Mahmoud ramadan
ABSTRACT It is very difficult to keep track of employee attendance manually. In addition to the length of time that the registration process takes, there are still chances that some errors may occur. It’s easy to put an end to errors, save time and eliminate hassles with a dedicated attendance recording app that automates the process. With these tools, you can track employee entry and exit processes, keep a record of hours worked, manage employee overtime, half-offs, days off, and much more. In this research paper, a gate has been proposed through which employees’ departure and attendance are calculated. Prevent any unwanted person from entering at the same time, a unit can be added through which individuals are sterilized for the Prevention of viruses. The proposed system showed high efficiency in recording the attendance and departure of employees and preventing any unwanted person from entering. The raspberry pi 4 model/ 8GB is used and Practical tests were conducted and applied to the system of employees in one of the educational institutions and proved highly efficient.
手工记录员工考勤是非常困难的。除了注册过程需要的时间长度之外,仍然有可能发生一些错误。通过一个专门的考勤记录应用程序,可以很容易地结束错误,节省时间,消除麻烦。有了这些工具,您可以跟踪员工的入职和离职流程,记录工作时间,管理员工加班、半工半休、休假等等。在本研究中,我们提出了一个闸门,通过它来计算员工的离职和出勤。防止任何不需要的人进入,同时,可以增加一个单位,通过个人消毒,以防止病毒。该系统在记录员工的出勤和离开以及防止任何不需要的人进入方面显示出高效率。使用raspberry pi 4型号/ 8GB,并在某教育机构的员工系统中进行了实际测试和应用,证明了其高效。
{"title":"Intelligent security sanitizing gate","authors":"Mohammed Elwan, Amira Salem, Hossam Fawky, Ahmed Mahmoud ramadan","doi":"10.1080/19393555.2022.2118089","DOIUrl":"https://doi.org/10.1080/19393555.2022.2118089","url":null,"abstract":"ABSTRACT It is very difficult to keep track of employee attendance manually. In addition to the length of time that the registration process takes, there are still chances that some errors may occur. It’s easy to put an end to errors, save time and eliminate hassles with a dedicated attendance recording app that automates the process. With these tools, you can track employee entry and exit processes, keep a record of hours worked, manage employee overtime, half-offs, days off, and much more. In this research paper, a gate has been proposed through which employees’ departure and attendance are calculated. Prevent any unwanted person from entering at the same time, a unit can be added through which individuals are sterilized for the Prevention of viruses. The proposed system showed high efficiency in recording the attendance and departure of employees and preventing any unwanted person from entering. The raspberry pi 4 model/ 8GB is used and Practical tests were conducted and applied to the system of employees in one of the educational institutions and proved highly efficient.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132874951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimized generative adversarial network with fractional calculus based feature fusion using Twitter stream for spam detection 基于分数阶微积分的特征融合优化生成对抗网络,利用Twitter流进行垃圾邮件检测
Pub Date : 2022-09-03 DOI: 10.1080/19393555.2021.1956024
V. B, V. V.
ABSTRACT The social networks continue to augment their popularity due to the increased usage of the Internet. The people become connected using social media like Facebook and Twitter. This has increased impulsive communication, namely, spam and is utilized in accumulating information of an individual or marketing to cause offense against people. Spam detection in Twitter is a major issue because of small text and elevated language inconsistency in social media. Thus, it is imperative to devise a spam detection model that poses the ability to detect spam messages using Twitter data. This paper devises a novel spam detection model using a stream of Twitter data. Here, the data transformation is done on the input data using Yeo-Jhonson (YJ) transformation for making the data suitable for processing. The feature fusion is performed using Renyi entropy and Deep Belief Network (DBN). Moreover, the spam detection is performed using the Generative Adversial Network (GAN), which is trained by the proposed Conditional Autoregressive Value at Risk-Sail Fish (CAViaR-SF) algorithm. The proposed CAViaR-SF algorithm is devised by integrating Sail Fish optimizer (SFO) and Conditional Autoregressive Value at Risk (CAViaR) algorithm. The proposed CAViaR-SF offered maximal precision of 97.3%, recall of 99.2%, and F-measure of 98.2%.
随着互联网使用的不断增加,社交网络的受欢迎程度也在不断提高。人们通过Facebook和Twitter等社交媒体联系在一起。这增加了冲动通信,即垃圾邮件,并被用于积累个人信息或营销,以引起对人们的冒犯。Twitter中的垃圾邮件检测是一个主要问题,因为社交媒体中的文本较小,语言不一致程度较高。因此,必须设计一个垃圾邮件检测模型,使其能够使用Twitter数据检测垃圾邮件。本文利用Twitter数据流设计了一种新的垃圾邮件检测模型。在这里,使用yeo - johnson (YJ)转换对输入数据进行数据转换,以使数据适合于处理。利用Renyi熵和深度信念网络(Deep Belief Network, DBN)进行特征融合。此外,垃圾邮件检测使用生成式对抗网络(GAN)进行,GAN由提出的条件自回归值风险帆鱼(CAViaR-SF)算法训练。将帆鱼优化器(SFO)和条件自回归风险值(CAViaR)算法相结合,设计了CAViaR- sf算法。CAViaR-SF的最大精密度为97.3%,召回率为99.2%,F-measure为98.2%。
{"title":"Optimized generative adversarial network with fractional calculus based feature fusion using Twitter stream for spam detection","authors":"V. B, V. V.","doi":"10.1080/19393555.2021.1956024","DOIUrl":"https://doi.org/10.1080/19393555.2021.1956024","url":null,"abstract":"ABSTRACT The social networks continue to augment their popularity due to the increased usage of the Internet. The people become connected using social media like Facebook and Twitter. This has increased impulsive communication, namely, spam and is utilized in accumulating information of an individual or marketing to cause offense against people. Spam detection in Twitter is a major issue because of small text and elevated language inconsistency in social media. Thus, it is imperative to devise a spam detection model that poses the ability to detect spam messages using Twitter data. This paper devises a novel spam detection model using a stream of Twitter data. Here, the data transformation is done on the input data using Yeo-Jhonson (YJ) transformation for making the data suitable for processing. The feature fusion is performed using Renyi entropy and Deep Belief Network (DBN). Moreover, the spam detection is performed using the Generative Adversial Network (GAN), which is trained by the proposed Conditional Autoregressive Value at Risk-Sail Fish (CAViaR-SF) algorithm. The proposed CAViaR-SF algorithm is devised by integrating Sail Fish optimizer (SFO) and Conditional Autoregressive Value at Risk (CAViaR) algorithm. The proposed CAViaR-SF offered maximal precision of 97.3%, recall of 99.2%, and F-measure of 98.2%.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114609661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
“We had no homefront”: another piece of the U.S part in the information warfare story “我们没有后方”:美国在信息战中扮演的另一个角色
Pub Date : 2022-08-10 DOI: 10.1080/19393555.2022.2111005
D. Bouhnik, Achia Admoni
ABSTRACT According to popular opinion, evidence of international or military information warfare can be found only toward the end of the 20th century, in the late 1980ʹs or early 1990ʹs. The purpose of this study is to examine the truth of this claim and to ascertain if any earlier evidence of this type of warfare exists. The study focused on two main sources: past research of technological developments during the 1960–1980 period and interviews with past prominent figures in the technological field. We revealed evidence of hostility between the U.S. and the Soviet Union and an awareness of defense and warfare tools. Further investigation revealed hypothetical evidence as to the existence of offensive operations. This study uncovers the beginnings of modern information warfare, which were rooted in technological developments and social changes of the time.
人们普遍认为,只有在20世纪末,即20世纪80年代末或90年代初,才能找到国际或军事信息战的证据。本研究的目的是检验这一说法的真实性,并确定是否存在这种类型战争的任何早期证据。这项研究集中于两个主要来源:过去对1960-1980年期间技术发展的研究和对过去技术领域杰出人物的采访。我们揭露了美国和苏联之间敌对的证据,以及对防御和战争工具的认识。进一步的调查显示存在进攻行动的假设性证据。这项研究揭示了现代信息战的起源,它植根于当时的技术发展和社会变革。
{"title":"“We had no homefront”: another piece of the U.S part in the information warfare story","authors":"D. Bouhnik, Achia Admoni","doi":"10.1080/19393555.2022.2111005","DOIUrl":"https://doi.org/10.1080/19393555.2022.2111005","url":null,"abstract":"ABSTRACT According to popular opinion, evidence of international or military information warfare can be found only toward the end of the 20th century, in the late 1980ʹs or early 1990ʹs. The purpose of this study is to examine the truth of this claim and to ascertain if any earlier evidence of this type of warfare exists. The study focused on two main sources: past research of technological developments during the 1960–1980 period and interviews with past prominent figures in the technological field. We revealed evidence of hostility between the U.S. and the Soviet Union and an awareness of defense and warfare tools. Further investigation revealed hypothetical evidence as to the existence of offensive operations. This study uncovers the beginnings of modern information warfare, which were rooted in technological developments and social changes of the time.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132750534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling an efficient authentic provable data possession model using legacy filter model for IOT and cloud environment 利用物联网和云环境的遗留过滤模型,建立了一个高效、可信、可证明的数据占有模型
Pub Date : 2022-08-09 DOI: 10.1080/19393555.2022.2107584
P. Nagesh, N. Srinivasu
ABSTRACT Internet of Things (IoT) is extensively adopted to manage everyday life. Data is gathered from IoT devices cloud computing is inevitable to store and analyze the data. The storage over the cloud is also not owned by the end-user. Thus, it is not so feasible. Therefore, two diverse issues are directly connected with the verification of data integrity, i.e. the incoming data should be verified and the verification process is performed. Various prevailing approaches are used for performing data integrity verification over the trusted party and nodes with proper resources. Moreover, it is highly complex to apply different prevalent research methods to IoT devices with constrained resources. This work concentrates on performing secure cloud-based storage over an IoT environment using authentic provable data possession (APDP) using the Legacy filtering model (APDP-LFM). The major contribution is the data possession and filter process to reduce the computational complexity. The experimentation is performed using a MATLAB environment, and the outcomes demonstrate that the proposed model preserves computational time and no complexity over the verification process. This model helps avoid False Positives and efficiently works for the enormous amount of incoming data over the IoT environment.
物联网(IoT)被广泛应用于日常生活的管理。数据从物联网设备中收集,云计算是存储和分析数据的必然选择。云上的存储也不属于最终用户。因此,它不太可行。因此,两个不同的问题与数据完整性的验证直接相关,即对传入的数据进行验证,并执行验证过程。各种流行的方法用于对具有适当资源的受信任方和节点执行数据完整性验证。此外,将不同的流行研究方法应用于资源受限的物联网设备是非常复杂的。这项工作的重点是在物联网环境中使用可靠的可证明数据占有(APDP),使用遗留过滤模型(APDP- lfm)执行安全的基于云的存储。其主要贡献在于数据占有和过滤过程,降低了计算复杂度。在MATLAB环境下进行了实验,结果表明所提出的模型节省了计算时间,并且在验证过程中没有复杂性。该模型有助于避免误报,并有效地处理物联网环境中的大量传入数据。
{"title":"Modeling an efficient authentic provable data possession model using legacy filter model for IOT and cloud environment","authors":"P. Nagesh, N. Srinivasu","doi":"10.1080/19393555.2022.2107584","DOIUrl":"https://doi.org/10.1080/19393555.2022.2107584","url":null,"abstract":"ABSTRACT Internet of Things (IoT) is extensively adopted to manage everyday life. Data is gathered from IoT devices cloud computing is inevitable to store and analyze the data. The storage over the cloud is also not owned by the end-user. Thus, it is not so feasible. Therefore, two diverse issues are directly connected with the verification of data integrity, i.e. the incoming data should be verified and the verification process is performed. Various prevailing approaches are used for performing data integrity verification over the trusted party and nodes with proper resources. Moreover, it is highly complex to apply different prevalent research methods to IoT devices with constrained resources. This work concentrates on performing secure cloud-based storage over an IoT environment using authentic provable data possession (APDP) using the Legacy filtering model (APDP-LFM). The major contribution is the data possession and filter process to reduce the computational complexity. The experimentation is performed using a MATLAB environment, and the outcomes demonstrate that the proposed model preserves computational time and no complexity over the verification process. This model helps avoid False Positives and efficiently works for the enormous amount of incoming data over the IoT environment.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126382957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Translation of AADL model to security attack tree (TAMSAT) to SMART evaluation of monetary security risk 从AADL模型到安全攻击树(TAMSAT)再到货币安全风险的SMART评估
Pub Date : 2022-08-04 DOI: 10.1080/19393555.2022.2106909
Paul A. Wortman, J. Chandy
ABSTRACT Designing secure architectures for IT infrastructure is a difficult process that needs mechanisms to provide security risk metrics that can help guide the system design process. It is through this evaluation process that a designer can ensure that implementations of a model meet the necessary security-based requirements. This work presents a scheme called TAMSAT for translating early-stage system architecture design models into security-based attack trees, which are evaluated for security risk. These attack trees can be evaluated around a set of assets of importance, whose security risk is classified by a monetary value. This security risk value can inform the system designer and provide input into an iterative design process, as well as illuminate unexpected sources of potential future security issues.
为IT基础设施设计安全架构是一个困难的过程,需要提供安全风险度量的机制来帮助指导系统设计过程。通过这个评估过程,设计人员可以确保模型的实现满足必要的基于安全性的需求。这项工作提出了一个名为TAMSAT的方案,用于将早期系统架构设计模型转换为基于安全的攻击树,并对其进行安全风险评估。这些攻击树可以围绕一组重要资产进行评估,这些资产的安全风险通过货币价值进行分类。此安全风险值可以告知系统设计人员,并为迭代设计过程提供输入,以及阐明未来潜在安全问题的意外来源。
{"title":"Translation of AADL model to security attack tree (TAMSAT) to SMART evaluation of monetary security risk","authors":"Paul A. Wortman, J. Chandy","doi":"10.1080/19393555.2022.2106909","DOIUrl":"https://doi.org/10.1080/19393555.2022.2106909","url":null,"abstract":"ABSTRACT Designing secure architectures for IT infrastructure is a difficult process that needs mechanisms to provide security risk metrics that can help guide the system design process. It is through this evaluation process that a designer can ensure that implementations of a model meet the necessary security-based requirements. This work presents a scheme called TAMSAT for translating early-stage system architecture design models into security-based attack trees, which are evaluated for security risk. These attack trees can be evaluated around a set of assets of importance, whose security risk is classified by a monetary value. This security risk value can inform the system designer and provide input into an iterative design process, as well as illuminate unexpected sources of potential future security issues.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"147 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124608432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cyber threat modeling for protecting the crown jewels in the Financial Services Sector (FSS) 网络威胁建模用于保护金融服务部门(FSS)的核心业务
Pub Date : 2022-07-29 DOI: 10.1080/19393555.2022.2104766
Lampis Alevizos, Eliana Stavrou
ABSTRACT Financial institutions are undergoing the so-called “de-perimeterization.” The security model up to today is heavily dependent on ”border patrols” focusing mostly on providing a secure perimeter while the internal network is inherently trusted. In the upcoming borderless networks, the focus is shifting to protection of the data itself, considering the full lifecycle or switching toward context-aware defensive strategies also known as zero trust networks. The focus of this work is to critically discuss existing threat modeling methodologies, available and used in the financial services sector (FSS). The objective is to investigate the extent at which existing methodologies cover the different threat actors & events and if they reflect the current threat landscape in the FSS. The investigations are supported by a real-world case study to uncover if any process can reflect the current threat landscape without any customizations or special know-how, and whether the final outcome helps in reaching a secure or compliance state. Through the case study, it is evidenced that by utilizing the IRAM2 methodology resulted in a high ratio of compliance, however, considering the Crown Jewels of a Financial Institution (FI), a secure, as much as possible, state should be the desired outcome.
金融机构正在经历所谓的“去边界化”。到目前为止,安全模式严重依赖于“边境巡逻”,主要侧重于提供安全的边界,而内部网络本身是可信的。在即将到来的无边界网络中,重点将转移到数据本身的保护上,考虑到整个生命周期,或者转向上下文感知的防御策略,也称为零信任网络。这项工作的重点是批判性地讨论现有的威胁建模方法,可用于金融服务部门(FSS)。目的是调查现有方法在多大程度上涵盖了不同的威胁行为者和事件,以及它们是否反映了FSS当前的威胁状况。这些调查得到了真实案例研究的支持,以揭示是否有任何流程可以在没有任何定制或特殊技术的情况下反映当前的威胁情况,以及最终结果是否有助于达到安全或合规状态。通过案例研究,可以证明,通过使用IRAM2方法可以提高合规率,然而,考虑到金融机构(FI)的皇冠珠宝,尽可能安全的状态应该是期望的结果。
{"title":"Cyber threat modeling for protecting the crown jewels in the Financial Services Sector (FSS)","authors":"Lampis Alevizos, Eliana Stavrou","doi":"10.1080/19393555.2022.2104766","DOIUrl":"https://doi.org/10.1080/19393555.2022.2104766","url":null,"abstract":"ABSTRACT Financial institutions are undergoing the so-called “de-perimeterization.” The security model up to today is heavily dependent on ”border patrols” focusing mostly on providing a secure perimeter while the internal network is inherently trusted. In the upcoming borderless networks, the focus is shifting to protection of the data itself, considering the full lifecycle or switching toward context-aware defensive strategies also known as zero trust networks. The focus of this work is to critically discuss existing threat modeling methodologies, available and used in the financial services sector (FSS). The objective is to investigate the extent at which existing methodologies cover the different threat actors & events and if they reflect the current threat landscape in the FSS. The investigations are supported by a real-world case study to uncover if any process can reflect the current threat landscape without any customizations or special know-how, and whether the final outcome helps in reaching a secure or compliance state. Through the case study, it is evidenced that by utilizing the IRAM2 methodology resulted in a high ratio of compliance, however, considering the Crown Jewels of a Financial Institution (FI), a secure, as much as possible, state should be the desired outcome.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123794463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Transactions privacy on blockchain using web of trust concept 基于信任网络的b区块链交易隐私保护
Pub Date : 2022-07-18 DOI: 10.1080/19393555.2022.2100844
R. Dervishi, Vehbi Neziri, Blerim Rexha
ABSTRACT Exchange of information through the web took place inside a trusted environment and thus user privacy was assured by default. Nowadays, ensuring user privacy is becoming one of the most desirable features of new technology, and Blockchain is not an exception. The Blockchain is a decentralized technology, open, and public platform where all transactions are stored and viewed from nodes, an approach known as “Web of Trust.” Although these transactions tend to be anonymous but in the case of the banking sector, user privacy requires special attention. In centralized systems, the implementation of privacy is no longer a challenge, using a hierarchical approach such as Public Key Infrastructure. This paper presents a broad landscape and state of art of user transaction privacy in Blockchain technology using the Web of Trust approach. Furthermore, we present a novel approach using the Public Key Infrastructure for assuring user privacy adding an optionally encrypted field in blocks in transactions. We have used Bithomp, as a free and open-source tool with the Testnet platform, and Ripple as the best known in the implementation of the payment system to implement the proposed approach. The paper concludes with the strengths and limitations of the proposed approach.
通过网络进行的信息交换发生在一个可信的环境中,因此默认情况下用户的隐私得到了保证。如今,确保用户隐私正成为新技术最理想的特征之一,区块链也不例外。区块链是一种分散的技术,开放的公共平台,所有交易都存储在节点上并从节点查看,这种方法被称为“信任网络”。虽然这些交易往往是匿名的,但在银行部门的情况下,用户隐私需要特别注意。在集中式系统中,使用诸如公钥基础设施之类的分层方法,隐私的实现不再是一个挑战。本文介绍了使用Web of Trust方法的区块链技术中用户交易隐私的广泛前景和现状。此外,我们提出了一种使用公钥基础设施来确保用户隐私的新方法,在交易块中添加可选的加密字段。我们使用Bithomp作为一个免费和开源的测试网平台工具,Ripple作为支付系统实施中最知名的工具来实施所提出的方法。最后,本文总结了该方法的优点和局限性。
{"title":"Transactions privacy on blockchain using web of trust concept","authors":"R. Dervishi, Vehbi Neziri, Blerim Rexha","doi":"10.1080/19393555.2022.2100844","DOIUrl":"https://doi.org/10.1080/19393555.2022.2100844","url":null,"abstract":"ABSTRACT Exchange of information through the web took place inside a trusted environment and thus user privacy was assured by default. Nowadays, ensuring user privacy is becoming one of the most desirable features of new technology, and Blockchain is not an exception. The Blockchain is a decentralized technology, open, and public platform where all transactions are stored and viewed from nodes, an approach known as “Web of Trust.” Although these transactions tend to be anonymous but in the case of the banking sector, user privacy requires special attention. In centralized systems, the implementation of privacy is no longer a challenge, using a hierarchical approach such as Public Key Infrastructure. This paper presents a broad landscape and state of art of user transaction privacy in Blockchain technology using the Web of Trust approach. Furthermore, we present a novel approach using the Public Key Infrastructure for assuring user privacy adding an optionally encrypted field in blocks in transactions. We have used Bithomp, as a free and open-source tool with the Testnet platform, and Ripple as the best known in the implementation of the payment system to implement the proposed approach. The paper concludes with the strengths and limitations of the proposed approach.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130551137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Information Security Journal: A Global Perspective
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1