首页 > 最新文献

Information Security Journal: A Global Perspective最新文献

英文 中文
The role risk-management plays in reducing insider threat’s in the federal Government 风险管理在减少联邦政府内部威胁中的作用
Pub Date : 2021-11-18 DOI: 10.1080/19393555.2021.1998735
A. Stone
ABSTRACT Today, organizations face a growing cybersecurity threats to their IT infrastructure. The ever expanding remote-workforce has made the risk of insider-threats even more dangerous. How can organizations be better prepared to handle the risk of the next insider-threat? The Federal Government is no different, as one of the largest employer’s in the world, the growing risk of an insider-threat is always present. In a systematic review, the evidence will identify how Federal agencies can utilize risk-management to be better prepared to combat an insider-threat. Recommendations will be made to help Federal agencies be on the lookout for the next viable insider-threat.
如今,企业面临着IT基础设施日益增长的网络安全威胁。不断扩大的远程劳动力使得内部威胁的风险更加危险。组织如何更好地准备应对下一个内部威胁的风险?联邦政府也不例外,作为世界上最大的雇主之一,内部威胁的风险一直存在。在系统审查中,证据将确定联邦机构如何利用风险管理来更好地准备对抗内部威胁。将提出建议,以帮助联邦机构留意下一个可能的内部威胁。
{"title":"The role risk-management plays in reducing insider threat’s in the federal Government","authors":"A. Stone","doi":"10.1080/19393555.2021.1998735","DOIUrl":"https://doi.org/10.1080/19393555.2021.1998735","url":null,"abstract":"ABSTRACT Today, organizations face a growing cybersecurity threats to their IT infrastructure. The ever expanding remote-workforce has made the risk of insider-threats even more dangerous. How can organizations be better prepared to handle the risk of the next insider-threat? The Federal Government is no different, as one of the largest employer’s in the world, the growing risk of an insider-threat is always present. In a systematic review, the evidence will identify how Federal agencies can utilize risk-management to be better prepared to combat an insider-threat. Recommendations will be made to help Federal agencies be on the lookout for the next viable insider-threat.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131194269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Security and privacy consideration for the deployment of electronic health records: a qualitative study covering Greece and Oman 部署电子健康记录的安全和隐私考虑:一项涉及希腊和阿曼的定性研究
Pub Date : 2021-11-17 DOI: 10.1080/19393555.2021.2003914
O. K. Xanthidou, D. Xanthidis, Christos Manolas, Han-I Wang
ABSTRACT The deployment of an Electronic Health Record (EHR) introduced multiple and obvious benefits. Nevertheless, it also introduced various issues and challenges. Among others, these include considerations regarding the levels of system access, provisions for security and authorization protocols, provisions for backup and recovery mechanisms, and the training of IT staff and their appreciation of the system. The study focused on these areas, and introduced a number of related concepts and observations, based on the opinions of a sample population of EHR system stakeholders across Greece and Oman. The study adopted a qualitative methodology, utilizing field work and visits to the natural settings of medical units in the two countries, where a total of 40 professionals were interviewed. The results indicate that the views of professionals are largely divided in terms of patient access to their personal records. It was also observed that the access of third parties to such records should be both restricted and recorded. In terms of the security level, the ICTs training and the backup and recovery mechanism in place, professionals were generally satisfied, with the majority of the interviewees also confirming that an authorization scheme should be followed in order to access the EHR.
电子健康记录(EHR)的部署带来了许多明显的好处。然而,它也带来了各种问题和挑战。其中包括考虑系统访问的级别、安全性和授权协议的规定、备份和恢复机制的规定,以及IT人员的培训和他们对系统的理解。该研究侧重于这些领域,并根据希腊和阿曼电子病历系统利益相关者样本人群的意见,介绍了一些相关概念和观察结果。该研究采用了定性方法,利用实地工作和访问两国医疗单位的自然环境,共采访了40名专业人员。结果表明,专业人员的意见在很大程度上是分歧的病人访问他们的个人记录。还有人指出,第三方查阅这类记录应加以限制和记录。就电子病历的保安水平、资讯及通讯科技培训和备份及恢复机制而言,专业人士普遍感到满意,而大部分受访者亦确认应遵循授权计划才能进入电子病历。
{"title":"Security and privacy consideration for the deployment of electronic health records: a qualitative study covering Greece and Oman","authors":"O. K. Xanthidou, D. Xanthidis, Christos Manolas, Han-I Wang","doi":"10.1080/19393555.2021.2003914","DOIUrl":"https://doi.org/10.1080/19393555.2021.2003914","url":null,"abstract":"ABSTRACT The deployment of an Electronic Health Record (EHR) introduced multiple and obvious benefits. Nevertheless, it also introduced various issues and challenges. Among others, these include considerations regarding the levels of system access, provisions for security and authorization protocols, provisions for backup and recovery mechanisms, and the training of IT staff and their appreciation of the system. The study focused on these areas, and introduced a number of related concepts and observations, based on the opinions of a sample population of EHR system stakeholders across Greece and Oman. The study adopted a qualitative methodology, utilizing field work and visits to the natural settings of medical units in the two countries, where a total of 40 professionals were interviewed. The results indicate that the views of professionals are largely divided in terms of patient access to their personal records. It was also observed that the access of third parties to such records should be both restricted and recorded. In terms of the security level, the ICTs training and the backup and recovery mechanism in place, professionals were generally satisfied, with the majority of the interviewees also confirming that an authorization scheme should be followed in order to access the EHR.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123312498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A tokenization technique for improving the security of EMV contactless cards 一种提高EMV非接触式卡安全性的标记化技术
Pub Date : 2021-11-12 DOI: 10.1080/19393555.2021.2001120
Ossama Al-Maliki, H. Al-Assam
ABSTRACT This paper focuses on the EMV contactless payment cards and their vulnerability of leaking sensitive information such as the cardholder name, Primary Account Number (PAN), and the expiry date of the EMV card. Such data can be sniffed using off-the-shelf hardware or software without the knowledge of the genuine cardholder. The paper proposes a tokenization technique to replace the PAN of the actual EMV contactless card’s with a token to protect the genuine data from being sniffed by an attacker and used in the Card-No-Present (CNP) attack or any other attacks. The proposal was inspired by the implementation of the tokenization in the EMV Mobile payment such as Apple, Google, and Samsung mobile payments. We argue that the proposed tokenization technique is easy to adopt and cost-effective to implement by EMV protocol as it does not require any changes to the infrastructure of existing payment systems. A vital feature of the proposal is that all the changes in the EMV protocol are at the personalization phase of the EMV card. The paper presents a successful implementation of the tokenization approach using a Java contactless card framework to represent EMV contactless cards to demonstrate its effectiveness in improving the security and protecting the privacy of the card’s information.
摘要本文主要研究EMV非接触式支付卡及其存在的持卡人姓名、主账号、有效日期等敏感信息泄露的漏洞。这些数据可以在真正持卡人不知情的情况下使用现成的硬件或软件进行嗅探。本文提出了一种令牌化技术,用令牌代替实际EMV非接触式卡的PAN,以保护真实数据不被攻击者嗅探并用于无卡(CNP)攻击或其他攻击。该提案的灵感来自于苹果、b谷歌和三星移动支付等EMV移动支付中令牌化的实现。我们认为,提议的令牌化技术很容易采用,并且通过EMV协议实现成本效益高,因为它不需要对现有支付系统的基础设施进行任何更改。该提案的一个重要特点是EMV协议的所有更改都在EMV卡的个性化阶段。本文介绍了一个使用Java非接触式卡框架来表示EMV非接触式卡的令牌化方法的成功实现,以证明其在提高安全性和保护卡信息隐私方面的有效性。
{"title":"A tokenization technique for improving the security of EMV contactless cards","authors":"Ossama Al-Maliki, H. Al-Assam","doi":"10.1080/19393555.2021.2001120","DOIUrl":"https://doi.org/10.1080/19393555.2021.2001120","url":null,"abstract":"ABSTRACT This paper focuses on the EMV contactless payment cards and their vulnerability of leaking sensitive information such as the cardholder name, Primary Account Number (PAN), and the expiry date of the EMV card. Such data can be sniffed using off-the-shelf hardware or software without the knowledge of the genuine cardholder. The paper proposes a tokenization technique to replace the PAN of the actual EMV contactless card’s with a token to protect the genuine data from being sniffed by an attacker and used in the Card-No-Present (CNP) attack or any other attacks. The proposal was inspired by the implementation of the tokenization in the EMV Mobile payment such as Apple, Google, and Samsung mobile payments. We argue that the proposed tokenization technique is easy to adopt and cost-effective to implement by EMV protocol as it does not require any changes to the infrastructure of existing payment systems. A vital feature of the proposal is that all the changes in the EMV protocol are at the personalization phase of the EMV card. The paper presents a successful implementation of the tokenization approach using a Java contactless card framework to represent EMV contactless cards to demonstrate its effectiveness in improving the security and protecting the privacy of the card’s information.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126509421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
New chaotic satellite image encryption by using some or all the rounds of the AES algorithm 采用部分或全部AES算法的新型混沌卫星图像加密
Pub Date : 2021-11-10 DOI: 10.1080/19393555.2021.1982082
M. Naim, Ali Pacha, Oran Mohamed Boudiaf, Oran
ABSTRACT This study suggests new satellite chaotic image encryption by using some or all the rounds of the AES algorithm to improve security techniques to protect sensitive data and images during transmission between satellites and ground stations. First, the 7D hyperchaotic system generates the initial key of the pseudo-AES algorithm by using the first and the second variables of the hyperchaotic system. Second, the pseudo-AES algorithm consists of several rounds, where two of them are fixed rounds (the first and the last rounds of the classical AES algorithm), while the number of the remaining rounds depends on the value of the third variable of the hyperchaotic system which considered as a determiner. Third, the permutation operation is applied to the output of the pseudo-AES algorithm by an arrangement permutation on the rows and the columns using the fourth and fifth variables of the hyperchaotic system. Finally, the remaining two variables of the hyperchaotic system are used to generate a mask matrix to be XORed with the output of the previous step to obtain the final cipher image. Moreover, the experimental results show that the proposed technique of encryption for satellite images has extraordinary resistance against well-known attacks.
本研究提出了一种新的卫星混沌图像加密方法,通过使用部分或全部AES算法来改进安全技术,以保护卫星和地面站之间传输过程中的敏感数据和图像。首先,7D超混沌系统利用超混沌系统的第一变量和第二变量生成伪aes算法的初始密钥。其次,伪AES算法由几轮组成,其中两轮是固定的(经典AES算法的第一轮和最后一轮),而剩余的轮数取决于作为决定因素的超混沌系统的第三个变量的值。第三,将置换操作应用于伪aes算法的输出,利用超混沌系统的第四个和第五个变量对行和列进行排列置换。最后,利用超混沌系统剩余的两个变量生成一个掩模矩阵,与前一步的输出进行xor,得到最终的密码图像。此外,实验结果表明,所提出的卫星图像加密技术对众所周知的攻击具有非凡的抵抗能力。
{"title":"New chaotic satellite image encryption by using some or all the rounds of the AES algorithm","authors":"M. Naim, Ali Pacha, Oran Mohamed Boudiaf, Oran","doi":"10.1080/19393555.2021.1982082","DOIUrl":"https://doi.org/10.1080/19393555.2021.1982082","url":null,"abstract":"ABSTRACT This study suggests new satellite chaotic image encryption by using some or all the rounds of the AES algorithm to improve security techniques to protect sensitive data and images during transmission between satellites and ground stations. First, the 7D hyperchaotic system generates the initial key of the pseudo-AES algorithm by using the first and the second variables of the hyperchaotic system. Second, the pseudo-AES algorithm consists of several rounds, where two of them are fixed rounds (the first and the last rounds of the classical AES algorithm), while the number of the remaining rounds depends on the value of the third variable of the hyperchaotic system which considered as a determiner. Third, the permutation operation is applied to the output of the pseudo-AES algorithm by an arrangement permutation on the rows and the columns using the fourth and fifth variables of the hyperchaotic system. Finally, the remaining two variables of the hyperchaotic system are used to generate a mask matrix to be XORed with the output of the previous step to obtain the final cipher image. Moreover, the experimental results show that the proposed technique of encryption for satellite images has extraordinary resistance against well-known attacks.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114972504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A systematic review of detection and prevention techniques of SQL injection attacks 一个系统的审查检测和预防技术的SQL注入攻击
Pub Date : 2021-10-27 DOI: 10.1080/19393555.2021.1995537
Mohammed Nasereddin, Ashaar ALKhamaiseh, Malik Qasaimeh, Raad S. Al-Qassas
ABSTRACT SQL injection is a type of database-targeted attack for data-driven applications. It is performed by inserting malicious code in the SQL query to alter and modify its meaning, enabling the attacker to retrieve sensitive data or to access the database. Many techniques have been improved and proposed to detect and mitigate these types of attacks. This paper provides a systematic review for a pool of 60 papers on web applications’ SQL injection detection methods. The pool was selected using a developed searching and filtering methodology for the existing literature based on scholar databases (IEEE, ScienceDirect, and Springer) with the aim to provide specific answering for several research questions in the area of SQL injection detection. This provides a basis for the design and use of effective SQL injection detection methods.
SQL注入是针对数据驱动型应用的一种针对数据库的攻击。它通过在SQL查询中插入恶意代码来改变和修改其含义,从而使攻击者能够检索敏感数据或访问数据库。为了检测和减轻这些类型的攻击,已经改进并提出了许多技术。本文对60篇关于web应用的SQL注入检测方法的论文进行了系统的综述。使用基于学者数据库(IEEE, ScienceDirect和Springer)的现有文献开发的搜索和过滤方法选择该池,旨在为SQL注入检测领域的几个研究问题提供具体答案。这为设计和使用有效的SQL注入检测方法提供了基础。
{"title":"A systematic review of detection and prevention techniques of SQL injection attacks","authors":"Mohammed Nasereddin, Ashaar ALKhamaiseh, Malik Qasaimeh, Raad S. Al-Qassas","doi":"10.1080/19393555.2021.1995537","DOIUrl":"https://doi.org/10.1080/19393555.2021.1995537","url":null,"abstract":"ABSTRACT SQL injection is a type of database-targeted attack for data-driven applications. It is performed by inserting malicious code in the SQL query to alter and modify its meaning, enabling the attacker to retrieve sensitive data or to access the database. Many techniques have been improved and proposed to detect and mitigate these types of attacks. This paper provides a systematic review for a pool of 60 papers on web applications’ SQL injection detection methods. The pool was selected using a developed searching and filtering methodology for the existing literature based on scholar databases (IEEE, ScienceDirect, and Springer) with the aim to provide specific answering for several research questions in the area of SQL injection detection. This provides a basis for the design and use of effective SQL injection detection methods.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134332805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Steganalysis attacks resilient, imperceptible, blind, and keyed image hiding in ultra HD 4K video 隐写分析攻击弹性,难以察觉的,盲目的,以及隐藏在超高清4K视频中的键控图像
Pub Date : 2021-10-19 DOI: 10.1080/19393555.2021.1986178
B. Banik, Abhinandan Banik
ABSTRACT A novel data hiding approach is being proposed in this article, camouflaging secret data within a very high-quality video object. The proposed algorithm utilizes Discrete Wavelet Transform (DWT) and Discrete Cosine Transform (DCT) to hide image data, preprocessed using Arnold Transform. The novelty of this approach lies in the combination of five factors, which are – use of very high-resolution Ultra HD 4 K video as a cover object; Use of DCT coefficient in Scene Change Detection to identify cover frame; Scrambling the secret image by Arnold Transformation; Use of DCT-DWT in embedding and extraction process to that hide data in the blue plane of the RGB frame; and lastly, use of three different keys for data hiding to secure the proposed method against attacks, by adhering the Kerckhoff’s principle of a cryptosystem. Several quality metrics like Structural Content, Peak Signal-to-Noise Ratio, Normalized Cross-Correlation, Average Difference, Maximum Difference, and Normalized Absolute Error have been calculated to validate the imperceptibility. This method has also been validated against different steganalysis attacks like random cropping, rotating, resizing, noise addition, filtering, histogram attack, and lastly, compared with existing data hiding methods to prove superiority.
本文提出了一种新的数据隐藏方法,将秘密数据隐藏在高质量的视频对象中。该算法利用离散小波变换(DWT)和离散余弦变换(DCT)对图像数据进行隐藏,并进行阿诺德变换预处理。这种方法的新颖之处在于五个因素的结合,这是-使用非常高分辨率的超高清4k视频作为覆盖对象;利用DCT系数在场景变化检测中识别覆盖帧阿诺德变换对秘密图像的干扰在嵌入和提取过程中使用DCT-DWT将数据隐藏在RGB帧的蓝色平面中;最后,通过遵守密码系统的Kerckhoff原理,使用三种不同的密钥进行数据隐藏,以确保所提出的方法免受攻击。几个质量指标,如结构含量,峰值信噪比,归一化相互关系,平均差,最大差,和归一化绝对误差已经计算验证不可感知性。该方法还针对随机裁剪、旋转、调整大小、噪声添加、滤波、直方图攻击等不同的隐写攻击进行了验证,最后与现有的数据隐藏方法进行了比较,证明了其优越性。
{"title":"Steganalysis attacks resilient, imperceptible, blind, and keyed image hiding in ultra HD 4K video","authors":"B. Banik, Abhinandan Banik","doi":"10.1080/19393555.2021.1986178","DOIUrl":"https://doi.org/10.1080/19393555.2021.1986178","url":null,"abstract":"ABSTRACT A novel data hiding approach is being proposed in this article, camouflaging secret data within a very high-quality video object. The proposed algorithm utilizes Discrete Wavelet Transform (DWT) and Discrete Cosine Transform (DCT) to hide image data, preprocessed using Arnold Transform. The novelty of this approach lies in the combination of five factors, which are – use of very high-resolution Ultra HD 4 K video as a cover object; Use of DCT coefficient in Scene Change Detection to identify cover frame; Scrambling the secret image by Arnold Transformation; Use of DCT-DWT in embedding and extraction process to that hide data in the blue plane of the RGB frame; and lastly, use of three different keys for data hiding to secure the proposed method against attacks, by adhering the Kerckhoff’s principle of a cryptosystem. Several quality metrics like Structural Content, Peak Signal-to-Noise Ratio, Normalized Cross-Correlation, Average Difference, Maximum Difference, and Normalized Absolute Error have been calculated to validate the imperceptibility. This method has also been validated against different steganalysis attacks like random cropping, rotating, resizing, noise addition, filtering, histogram attack, and lastly, compared with existing data hiding methods to prove superiority.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129399085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Benchmarking full version of GureKDDCup, UNSW-NB15, and CIDDS-001 NIDS datasets using rolling-origin resampling 使用滚动原点重采样对完整版的GureKDDCup、UNSW-NB15和CIDDS-001 NIDS数据集进行基准测试
Pub Date : 2021-10-19 DOI: 10.1080/19393555.2021.1985191
Yee Jian Chew, Nicholas Lee, S. Ooi, Kok-Seng Wong, Y. Pang
ABSTRACT Network intrusion detection system (NIDS) is a system that analyses network traffic to flag malicious traffic or suspicious activities. Several recent NIDS datasets have been published, however, the lack of baseline experimental results on the full version of datasets had made it difficult for researchers to perform benchmarking. As the train-test distribution of the datasets has yet to be pre-defined by the creators, this further obstruct the researchers to compare the performance unbiasedly across each of the machine classifiers. Moreover, cross-validation resampling scheme have also been addressed in the literatures to be inappropriate in the domain of NIDS. Thus, rolling-origin – a standard resampling technique which is also known as a common cross-validation scheme in the forecasting domain is employed to allocate the training and testing distributions. In this paper, rigorous experiments are conducted on the full version of the three recent NIDS datasets: GureKDDCup, UNSW-NB15, and CIDDS-001. While the datasets chosen might not be the latest available datasets, we have selected them as they include the essential IP address fields which are usually missing or removed due to some sort of privacy concerns. To deliver the baseline empirical results, 10 well-known classifiers from Weka are utilized.
网络入侵检测系统(NIDS)是一种通过分析网络流量来标记恶意流量或可疑活动的系统。最近已经发表了几个NIDS数据集,但是,由于缺乏完整版本数据集的基线实验结果,使得研究人员难以进行基准测试。由于数据集的训练测试分布尚未由创建者预先定义,这进一步阻碍了研究人员在每个机器分类器之间公正地比较性能。此外,交叉验证重采样方案也在文献中被认为不适合NIDS领域。因此,采用滚动原点-一种标准重采样技术,也称为预测领域的常见交叉验证方案来分配训练和测试分布。本文在三个最新的NIDS数据集:GureKDDCup、UNSW-NB15和CIDDS-001的完整版本上进行了严格的实验。虽然所选择的数据集可能不是最新的可用数据集,但我们选择它们是因为它们包含了基本的IP地址字段,这些字段通常由于某种隐私问题而丢失或删除。为了提供基线经验结果,使用了来自Weka的10个知名分类器。
{"title":"Benchmarking full version of GureKDDCup, UNSW-NB15, and CIDDS-001 NIDS datasets using rolling-origin resampling","authors":"Yee Jian Chew, Nicholas Lee, S. Ooi, Kok-Seng Wong, Y. Pang","doi":"10.1080/19393555.2021.1985191","DOIUrl":"https://doi.org/10.1080/19393555.2021.1985191","url":null,"abstract":"ABSTRACT Network intrusion detection system (NIDS) is a system that analyses network traffic to flag malicious traffic or suspicious activities. Several recent NIDS datasets have been published, however, the lack of baseline experimental results on the full version of datasets had made it difficult for researchers to perform benchmarking. As the train-test distribution of the datasets has yet to be pre-defined by the creators, this further obstruct the researchers to compare the performance unbiasedly across each of the machine classifiers. Moreover, cross-validation resampling scheme have also been addressed in the literatures to be inappropriate in the domain of NIDS. Thus, rolling-origin – a standard resampling technique which is also known as a common cross-validation scheme in the forecasting domain is employed to allocate the training and testing distributions. In this paper, rigorous experiments are conducted on the full version of the three recent NIDS datasets: GureKDDCup, UNSW-NB15, and CIDDS-001. While the datasets chosen might not be the latest available datasets, we have selected them as they include the essential IP address fields which are usually missing or removed due to some sort of privacy concerns. To deliver the baseline empirical results, 10 well-known classifiers from Weka are utilized.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127159713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Variables influencing the effectiveness of signature-based network intrusion detection systems 影响基于签名的网络入侵检测系统有效性的变量
Pub Date : 2021-09-20 DOI: 10.1080/19393555.2021.1975853
T. Sommestad, Hannes Holm, Daniel Steinvall
ABSTRACT Contemporary organizations often employ signature-based network intrusion detection systems to increase the security of their computer networks. The effectiveness of a signature-based system primarily depends on the quality of the rules used to associate system events to known malicious behavior. However, the variables that determine the quality of rulesets is relatively unknown. This paper empirically analyzes the detection probability in a test involving Snort for 1143 exploitation attempts and 12 Snort rulesets created by the Emerging Threats Labs and the Sourcefire Vulnerability Research Team. The default rulesets from Emerging Threats raised priority-1-alerts for 39% of the exploit attempts compared to 31% for rulesets from the Vulnerability Research Team. The following features predict detection probability: if the exploit is publicly known, if the ruleset references the exploited vulnerability, the payload, the type of software targeted, and the operating system of the targeted software. The importance of these variables depends on the ruleset used and whether default rules are used. A logistic regression model with these variables classifies 69–92% of the cases correctly for the different rulesets.
现代组织经常采用基于签名的网络入侵检测系统来增加其计算机网络的安全性。基于签名的系统的有效性主要取决于用于将系统事件与已知恶意行为关联的规则的质量。然而,决定规则集质量的变量是相对未知的。本文对新兴威胁实验室和Sourcefire漏洞研究团队创建的1143次利用尝试和12个Snort规则集的Snort测试检测概率进行了实证分析。新兴威胁的默认规则集对39%的攻击尝试发出了优先级1警报,而漏洞研究团队的规则集则为31%。以下特征预测检测概率:如果漏洞是公开的,如果规则集引用了被利用的漏洞,有效载荷,目标软件的类型以及目标软件的操作系统。这些变量的重要性取决于所使用的规则集以及是否使用默认规则。具有这些变量的逻辑回归模型对不同规则集的69-92%的情况进行了正确分类。
{"title":"Variables influencing the effectiveness of signature-based network intrusion detection systems","authors":"T. Sommestad, Hannes Holm, Daniel Steinvall","doi":"10.1080/19393555.2021.1975853","DOIUrl":"https://doi.org/10.1080/19393555.2021.1975853","url":null,"abstract":"ABSTRACT Contemporary organizations often employ signature-based network intrusion detection systems to increase the security of their computer networks. The effectiveness of a signature-based system primarily depends on the quality of the rules used to associate system events to known malicious behavior. However, the variables that determine the quality of rulesets is relatively unknown. This paper empirically analyzes the detection probability in a test involving Snort for 1143 exploitation attempts and 12 Snort rulesets created by the Emerging Threats Labs and the Sourcefire Vulnerability Research Team. The default rulesets from Emerging Threats raised priority-1-alerts for 39% of the exploit attempts compared to 31% for rulesets from the Vulnerability Research Team. The following features predict detection probability: if the exploit is publicly known, if the ruleset references the exploited vulnerability, the payload, the type of software targeted, and the operating system of the targeted software. The importance of these variables depends on the ruleset used and whether default rules are used. A logistic regression model with these variables classifies 69–92% of the cases correctly for the different rulesets.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126885534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Security analysis and enhancements of UAS architecture UAS体系结构的安全性分析和增强
Pub Date : 2021-09-17 DOI: 10.1080/19393555.2021.1977873
Bilal Akhtar, A. Masood
ABSTRACT Unmanned Aerial Vehicles, known as UAVs, are controlled by the autopilot system remotely and autonomously. It is a component of Unmanned Aerial System (UAS) which contains a UAV, a Ground Control System (GCS), and Air link. They are used vastly in all applications; however, over a period of time, a number of security flaws have surfaced in UASs. While considerable research has been undertaken to propose secure solutions for UAS, the prior work on the subject fails to consider a holistic treatment of the security issues. Thereby, keeping in view the lack of a structured approach for UAS security, we have proposed an ISO 18028 standard-based framework for defining security architecture of UAS. ISO standard provides generic guidelines for the security architecture of a network; yet, the same has been extended in this work to propose a holistic security architecture for UASs, which effectively mitigates all the associated risks. Furthermore, the architecture has been used to evaluate two case studies: Commercial UAS based on Cube and Commercial UAS based on DJI A3. The appraisal undertaken in the case studies indicated a number of security limitations in the considered commercial solutions, thus leading to corresponding recommendations for security enhancements.
无人驾驶飞行器(uav)是一种由自动驾驶系统远程自主控制的飞行器。它是无人机系统(UAS)的一个组成部分,该系统包含无人机、地面控制系统(GCS)和空中链路。它们在所有应用中被广泛使用;然而,在一段时间内,UASs出现了一些安全漏洞。虽然已经进行了相当多的研究,以提出安全的解决方案的无人机,在这个问题上的先前工作未能考虑安全问题的整体处理。因此,考虑到无人机系统安全缺乏结构化的方法,我们提出了一个基于ISO 18028标准的框架来定义无人机系统的安全架构。ISO标准为网络的安全体系结构提供了通用准则;然而,在这项工作中,同样的内容得到了扩展,为UASs提出了一个整体的安全架构,有效地减轻了所有相关的风险。此外,该体系结构还用于评估两个案例研究:基于Cube的商业UAS和基于DJI A3的商业UAS。在案例研究中进行的评估表明,所考虑的商业解决办法存在一些安全限制,因此提出了相应的加强安全的建议。
{"title":"Security analysis and enhancements of UAS architecture","authors":"Bilal Akhtar, A. Masood","doi":"10.1080/19393555.2021.1977873","DOIUrl":"https://doi.org/10.1080/19393555.2021.1977873","url":null,"abstract":"ABSTRACT Unmanned Aerial Vehicles, known as UAVs, are controlled by the autopilot system remotely and autonomously. It is a component of Unmanned Aerial System (UAS) which contains a UAV, a Ground Control System (GCS), and Air link. They are used vastly in all applications; however, over a period of time, a number of security flaws have surfaced in UASs. While considerable research has been undertaken to propose secure solutions for UAS, the prior work on the subject fails to consider a holistic treatment of the security issues. Thereby, keeping in view the lack of a structured approach for UAS security, we have proposed an ISO 18028 standard-based framework for defining security architecture of UAS. ISO standard provides generic guidelines for the security architecture of a network; yet, the same has been extended in this work to propose a holistic security architecture for UASs, which effectively mitigates all the associated risks. Furthermore, the architecture has been used to evaluate two case studies: Commercial UAS based on Cube and Commercial UAS based on DJI A3. The appraisal undertaken in the case studies indicated a number of security limitations in the considered commercial solutions, thus leading to corresponding recommendations for security enhancements.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121929238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comprehensive Survey of Phishing Email Detection and Protection Techniques 网络钓鱼电子邮件检测与防护技术综述
Pub Date : 2021-09-15 DOI: 10.1080/19393555.2021.1959678
Santosh Kumar Birthriya, A. Jain
ABSTRACT E-Mails are commonly used as a medium of communication for personal and pro- fessional purposes. Information shared via mail is also sensitive and private, such as financial information, credit records, login data, and so on. This makes them useful to cyber attackers who can exploit this knowledge for illegal purposes. Phishing is a technique used by fraudsters to gain confidential data from users by alleging to be from known sources. In a phished e-mail, the sender can encourage users to provide private in- formation under false premises. Phishing e-mails have also been frequently used in financial institutions and consumer fraud. This paper discusses an overview of dif- ferent techniques for phishing e-mail detection and protection currently used in e-mail filtering. A comparative analysis and review of these techniques are carried out. This survey provides an understanding of the phishing detection issue, its present space for a solution, and its future directions for study.
电子邮件通常被用作个人和专业目的的沟通媒介。通过邮件共享的信息也是敏感和私有的,例如财务信息、信用记录、登录数据等等。这使得它们对网络攻击者很有用,他们可以利用这些知识达到非法目的。网络钓鱼是欺诈者使用的一种技术,通过声称来自已知来源来获取用户的机密数据。在网络钓鱼电子邮件中,发件人可以在虚假的前提下鼓励用户提供私人信息。网络钓鱼电子邮件也经常被用于金融机构和消费者欺诈。本文综述了目前在电子邮件过滤中使用的各种网络钓鱼电子邮件检测和保护技术。对这些技术进行了比较分析和综述。本调查提供了对网络钓鱼检测问题的理解,其目前的解决方案空间,以及其未来的研究方向。
{"title":"A Comprehensive Survey of Phishing Email Detection and Protection Techniques","authors":"Santosh Kumar Birthriya, A. Jain","doi":"10.1080/19393555.2021.1959678","DOIUrl":"https://doi.org/10.1080/19393555.2021.1959678","url":null,"abstract":"ABSTRACT E-Mails are commonly used as a medium of communication for personal and pro- fessional purposes. Information shared via mail is also sensitive and private, such as financial information, credit records, login data, and so on. This makes them useful to cyber attackers who can exploit this knowledge for illegal purposes. Phishing is a technique used by fraudsters to gain confidential data from users by alleging to be from known sources. In a phished e-mail, the sender can encourage users to provide private in- formation under false premises. Phishing e-mails have also been frequently used in financial institutions and consumer fraud. This paper discusses an overview of dif- ferent techniques for phishing e-mail detection and protection currently used in e-mail filtering. A comparative analysis and review of these techniques are carried out. This survey provides an understanding of the phishing detection issue, its present space for a solution, and its future directions for study.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115338930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
Information Security Journal: A Global Perspective
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1