首页 > 最新文献

Information Security Journal: A Global Perspective最新文献

英文 中文
Code integrity verification using cache memory monitoring 代码完整性验证使用缓存内存监控
Pub Date : 2021-03-24 DOI: 10.1080/19393555.2021.1902592
R. Shrivastava, Varun Natu, C. Hota
ABSTRACT This paper addresses the challenges of building a secure software system to prevent Man-at-the-End attacks. Ensuring the security of systems is challenging due to unfavorable constraints faced by the end-point host system. Constraints such as hostile environments leave the host system at the peril of would-be attackers. In this paper, we verify program integrity through L3 cache by monitoring the security-sensitive code points and verify them in memory. This paper uses a cache-based monitoring program to verify code integrity. In particular, we show that side-channel information can be used to encode the invariant of the program execution state. These invariants can be periodically and externally monitored as a proxy for application integrity. This monitoring system uses a sliding window scheme that can detect the violation of these invariant with high reliability. The proposed solution is transparent to the attacker and utilizes a side-channel technique (Flush + Reload) along with a sliding window scheme to monitor security-sensitive code and detect MATE attacks to prevent malicious manipulation of software.
本文讨论了构建安全软件系统以防止终端人攻击的挑战。由于终端主机系统所面临的不利约束,确保系统的安全性具有挑战性。诸如敌对环境之类的约束使主机系统处于潜在攻击者的危险之中。在本文中,我们通过监视安全敏感代码点并在内存中验证它们,通过L3缓存验证程序的完整性。本文使用基于缓存的监控程序来验证代码的完整性。特别地,我们展示了可以使用侧信道信息对程序执行状态的不变量进行编码。这些不变量可以作为应用程序完整性的代理进行定期和外部监视。该监测系统采用滑动窗口方案,能够检测出这些不变量的违反情况,可靠性高。提出的解决方案对攻击者是透明的,并利用侧信道技术(Flush + Reload)和滑动窗口方案来监视安全敏感代码和检测MATE攻击,以防止恶意操作软件。
{"title":"Code integrity verification using cache memory monitoring","authors":"R. Shrivastava, Varun Natu, C. Hota","doi":"10.1080/19393555.2021.1902592","DOIUrl":"https://doi.org/10.1080/19393555.2021.1902592","url":null,"abstract":"ABSTRACT This paper addresses the challenges of building a secure software system to prevent Man-at-the-End attacks. Ensuring the security of systems is challenging due to unfavorable constraints faced by the end-point host system. Constraints such as hostile environments leave the host system at the peril of would-be attackers. In this paper, we verify program integrity through L3 cache by monitoring the security-sensitive code points and verify them in memory. This paper uses a cache-based monitoring program to verify code integrity. In particular, we show that side-channel information can be used to encode the invariant of the program execution state. These invariants can be periodically and externally monitored as a proxy for application integrity. This monitoring system uses a sliding window scheme that can detect the violation of these invariant with high reliability. The proposed solution is transparent to the attacker and utilizes a side-channel technique (Flush + Reload) along with a sliding window scheme to monitor security-sensitive code and detect MATE attacks to prevent malicious manipulation of software.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115978781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
PCSP: A Protected Cloud Storage Provider employing light weight techniques PCSP:采用轻量级技术的受保护云存储提供商
Pub Date : 2021-03-18 DOI: 10.1080/19393555.2021.1900465
S. Srisakthi, Gufran Ahmad Ansari
ABSTRACT One of the major practices of cloud computing is the storage service that it offers. In spite of its many creditable advantages, it also has some disadvantages like data security and data availability. These two are the main issues that a user face. Many models have been proposed to solve these issues. These models use cryptographic methods to secure the data and data redundancy method to ensure data availability. Both these methods solved the issues at the cost of extra storage space and increased time consumption both at the user and at the server side. This paper recommends a model PCSP (Protected Cloud Service Provider) which solves these issues in a novel way. The model uses light weight techniques which does not employ cryptographic methods. PCSP uses a layered approach, with three entities – the user, the PCSP, and the vendor. Due to the use of light weight techniques, the execution time is reduced by 80% and the storage needed is also reduced by 60%. Thus, there is still more reduction in the storage space. The implementation and analysis serve as the proof of concept
云计算的主要实践之一是它提供的存储服务。尽管它有许多值得称道的优点,但它也有一些缺点,如数据安全性和数据可用性。这两个是用户面临的主要问题。人们提出了许多模型来解决这些问题。这些模型采用加密方法来保护数据,采用数据冗余方法来保证数据的可用性。这两种方法都以额外的存储空间为代价解决了问题,并增加了用户和服务器端的时间消耗。本文提出了一种新型的PCSP (Protected Cloud Service Provider)模型,以一种新颖的方式解决了这些问题。该模型使用轻量级技术,不使用加密方法。PCSP使用分层的方法,有三个实体——用户、PCSP和供应商。由于使用了轻量级技术,执行时间减少了80%,所需的存储也减少了60%。因此,存储空间的减少幅度更大。实现和分析作为概念的证明
{"title":"PCSP: A Protected Cloud Storage Provider employing light weight techniques","authors":"S. Srisakthi, Gufran Ahmad Ansari","doi":"10.1080/19393555.2021.1900465","DOIUrl":"https://doi.org/10.1080/19393555.2021.1900465","url":null,"abstract":"ABSTRACT One of the major practices of cloud computing is the storage service that it offers. In spite of its many creditable advantages, it also has some disadvantages like data security and data availability. These two are the main issues that a user face. Many models have been proposed to solve these issues. These models use cryptographic methods to secure the data and data redundancy method to ensure data availability. Both these methods solved the issues at the cost of extra storage space and increased time consumption both at the user and at the server side. This paper recommends a model PCSP (Protected Cloud Service Provider) which solves these issues in a novel way. The model uses light weight techniques which does not employ cryptographic methods. PCSP uses a layered approach, with three entities – the user, the PCSP, and the vendor. Due to the use of light weight techniques, the execution time is reduced by 80% and the storage needed is also reduced by 60%. Thus, there is still more reduction in the storage space. The implementation and analysis serve as the proof of concept","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116911427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A secure video steganography scheme using DWT based on object tracking 一种基于目标跟踪的小波变换安全视频隐写方案
Pub Date : 2021-03-12 DOI: 10.1080/19393555.2021.1896055
Mukesh Dalal, Mamta Juneja
ABSTRACT Videos are nowadays the most frequent and easy mode of communication over the internet; the reason behind the growth is the accessibility to video processing software available on the internet. Video steganography is a field where the data is embedded in video keeping the visual quality of the video intact. This study presents a new video steganography scheme with a stable trade-off between robustness and imperceptibility using 2D-DWT (Discrete Wavelet Transform) based on object detection and tracking. The main contribution of this paper includes embedding of secret data in the moving objects after applying object detection for the video frames where the secret bits are embedded in middle frequency sub-bands after applying 2D-DWT. To highlight the effectiveness of the proposed scheme, experimental results are carried out both quantitatively and qualitatively where quantitative analysis is done using different metrics such as PSNR, SSIM, BER and qualitative analysis is done using visual results of the frames. The experimental results illustrated that the proposed approach outperforms existing techniques in terms of qualitative and quantitative evaluation with high imperceptibility and robustness against noise attack. Eventually, the scheme has also been tested against existing steganalysis techniques to ensure the security of the proposed scheme.
视频是当今互联网上最常见、最便捷的交流方式;增长背后的原因是互联网上视频处理软件的可访问性。视频隐写术是将数据嵌入视频中以保持视频视觉质量完整的一个领域。本文提出了一种新的视频隐写方案,该方案利用基于目标检测和跟踪的2D-DWT(离散小波变换)在鲁棒性和不可感知性之间取得了稳定的平衡。本文的主要贡献包括对视频帧进行目标检测后将秘密数据嵌入到运动物体中,其中秘密比特在应用2D-DWT后嵌入到中频子带中。为了突出所提出方案的有效性,实验结果进行了定量和定性,其中定量分析使用不同的指标,如PSNR, SSIM, BER和定性分析使用帧的视觉结果。实验结果表明,该方法在定性和定量评价方面都优于现有的方法,具有较高的不可感知性和抗噪声的鲁棒性。最后,该方案还针对现有的隐写分析技术进行了测试,以确保所提出方案的安全性。
{"title":"A secure video steganography scheme using DWT based on object tracking","authors":"Mukesh Dalal, Mamta Juneja","doi":"10.1080/19393555.2021.1896055","DOIUrl":"https://doi.org/10.1080/19393555.2021.1896055","url":null,"abstract":"ABSTRACT Videos are nowadays the most frequent and easy mode of communication over the internet; the reason behind the growth is the accessibility to video processing software available on the internet. Video steganography is a field where the data is embedded in video keeping the visual quality of the video intact. This study presents a new video steganography scheme with a stable trade-off between robustness and imperceptibility using 2D-DWT (Discrete Wavelet Transform) based on object detection and tracking. The main contribution of this paper includes embedding of secret data in the moving objects after applying object detection for the video frames where the secret bits are embedded in middle frequency sub-bands after applying 2D-DWT. To highlight the effectiveness of the proposed scheme, experimental results are carried out both quantitatively and qualitatively where quantitative analysis is done using different metrics such as PSNR, SSIM, BER and qualitative analysis is done using visual results of the frames. The experimental results illustrated that the proposed approach outperforms existing techniques in terms of qualitative and quantitative evaluation with high imperceptibility and robustness against noise attack. Eventually, the scheme has also been tested against existing steganalysis techniques to ensure the security of the proposed scheme.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132893638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Novel adaptive cyberattack prediction model using an enhanced genetic algorithm and deep learning (AdacDeep) 基于增强型遗传算法和深度学习的自适应网络攻击预测模型(AdacDeep)
Pub Date : 2021-03-04 DOI: 10.1080/19393555.2021.1883777
Ayei E. Ibor, F. Oladeji, O. Okunoye, C. Uwadia
ABSTRACT Some of the problems of extant cyberattack prediction approaches are low prediction accuracy, high false positive rate, very long training time, and the choice of hyperparameters to overcome overfitting or under fitting the model on the training data. These problems have culminated in the escalation of cyberattacks in recent times and as such significant improvement to the performance of extant models is crucial. Some deep learning architectures such as Recurrent Neural Networks (RNN) have been applied to cyberattack prediction. However, Recurrent Neural Networks (RNN) suffer from the vanishing and exploding gradient problem, and are difficult to train. Also, determining the different states and hyperparameters of the network for optimal prediction performance is difficult. Therefore, this paper proposes a novel approach called AdacDeep that uses an Enhanced Genetic Algorithm (EGA), Deep Autoencoder and a Deep Feedforward Neural Network (DFFNN) with backpropagation learning to accurately predict different attack types. The performance of AdacDeep is evaluated using two well-known datasets, namely, the CICIDS2017 and UNSW_NB15 datasets as the benchmark. The experimental results show that AdacDeep outperforms other state-of-the-art comparative models in terms of prediction accuracy with 0.22–35% improvement, F-Score with 0.1–34.7% improvement and very low false positive rate.
现有的网络攻击预测方法存在预测精度低、假阳性率高、训练时间过长、选择超参数来克服模型对训练数据的过拟合或欠拟合等问题。这些问题在最近的网络攻击升级中达到顶峰,因此对现有模型的性能进行重大改进至关重要。一些深度学习架构如递归神经网络(RNN)已经被应用于网络攻击预测。然而,递归神经网络(RNN)存在梯度消失和爆炸的问题,难以训练。此外,确定网络的不同状态和超参数以获得最佳预测性能也很困难。因此,本文提出了一种名为AdacDeep的新方法,该方法使用增强型遗传算法(EGA),深度自编码器和具有反向传播学习的深度前馈神经网络(DFFNN)来准确预测不同的攻击类型。使用两个众所周知的数据集,即CICIDS2017和UNSW_NB15数据集作为基准,评估AdacDeep的性能。实验结果表明,AdacDeep的预测精度提高了0.22-35%,F-Score提高了0.1-34.7%,假阳性率极低,优于其他最先进的比较模型。
{"title":"Novel adaptive cyberattack prediction model using an enhanced genetic algorithm and deep learning (AdacDeep)","authors":"Ayei E. Ibor, F. Oladeji, O. Okunoye, C. Uwadia","doi":"10.1080/19393555.2021.1883777","DOIUrl":"https://doi.org/10.1080/19393555.2021.1883777","url":null,"abstract":"ABSTRACT Some of the problems of extant cyberattack prediction approaches are low prediction accuracy, high false positive rate, very long training time, and the choice of hyperparameters to overcome overfitting or under fitting the model on the training data. These problems have culminated in the escalation of cyberattacks in recent times and as such significant improvement to the performance of extant models is crucial. Some deep learning architectures such as Recurrent Neural Networks (RNN) have been applied to cyberattack prediction. However, Recurrent Neural Networks (RNN) suffer from the vanishing and exploding gradient problem, and are difficult to train. Also, determining the different states and hyperparameters of the network for optimal prediction performance is difficult. Therefore, this paper proposes a novel approach called AdacDeep that uses an Enhanced Genetic Algorithm (EGA), Deep Autoencoder and a Deep Feedforward Neural Network (DFFNN) with backpropagation learning to accurately predict different attack types. The performance of AdacDeep is evaluated using two well-known datasets, namely, the CICIDS2017 and UNSW_NB15 datasets as the benchmark. The experimental results show that AdacDeep outperforms other state-of-the-art comparative models in terms of prediction accuracy with 0.22–35% improvement, F-Score with 0.1–34.7% improvement and very low false positive rate.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130231033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Security of electronic personal health information in a public hospital in South Africa 南非一家公立医院的电子个人健康信息安全
Pub Date : 2021-03-01 DOI: 10.1080/19393555.2021.1893410
K. Chuma, M. Ngoepe
ABSTRACT Digital health technologies have changed the healthcare sector landscape and thus generated new opportunities for collecting, storing and accessing electronic personal health information (ePHI). However, this has also caused ePHI to be exposed to a variety of new security threats, attacks and vulnerabilities. This qualitative study explored the security of ePHI in a public hospital in South Africa. Data were collected through semi-structured interviews with purposively selected network controllers, IT technicians, administrative and records clerks and triangulated through document analysis. Data were coded and analyzed using ATLAS.ti, version 8. The findings showed that the public hospital is witnessing a deluge of cyber threats such as Worms, Trojan horses, and shortcut viruses. This is compounded by technological vulnerabilities such as power and system failure, obsolete computers, and systems. Security measures such as username-password, encryption, firewall, and antivirus and security audit log exist in the hospital to protect ePHI. The study recommends the need to implement an intrusion protection system and constantly update the firewall and antivirus. It is concluded that without proper security protocols, ePHI could be exposed to threats and cyber attacks. The public hospital is urged to use blockchain technology to strengthen the security of ePHI.
数字健康技术已经改变了医疗保健行业的格局,从而产生了收集、存储和访问电子个人健康信息(ePHI)的新机会。然而,这也导致ePHI暴露在各种新的安全威胁、攻击和漏洞之下。本定性研究探讨了南非一家公立医院ePHI的安全性。数据是通过半结构化访谈收集的,访谈对象是有目的地选择的网络控制员、IT技术人员、行政和记录员,并通过文件分析进行三角测量。使用ATLAS对数据进行编码和分析。Ti,版本8。调查结果显示,公立医院的蠕虫、特洛伊木马、快捷病毒等网络威胁正在泛滥。这与技术漏洞(如电源和系统故障、过时的计算机和系统)相结合。医院有用户密码、加密、防火墙、防病毒和安全审计日志等安全措施来保护ePHI。该研究建议有必要实施入侵保护系统,并不断更新防火墙和防病毒软件。结论是,如果没有适当的安全协议,ePHI可能会受到威胁和网络攻击。敦促公立医院使用区块链技术来加强ePHI的安全性。
{"title":"Security of electronic personal health information in a public hospital in South Africa","authors":"K. Chuma, M. Ngoepe","doi":"10.1080/19393555.2021.1893410","DOIUrl":"https://doi.org/10.1080/19393555.2021.1893410","url":null,"abstract":"ABSTRACT Digital health technologies have changed the healthcare sector landscape and thus generated new opportunities for collecting, storing and accessing electronic personal health information (ePHI). However, this has also caused ePHI to be exposed to a variety of new security threats, attacks and vulnerabilities. This qualitative study explored the security of ePHI in a public hospital in South Africa. Data were collected through semi-structured interviews with purposively selected network controllers, IT technicians, administrative and records clerks and triangulated through document analysis. Data were coded and analyzed using ATLAS.ti, version 8. The findings showed that the public hospital is witnessing a deluge of cyber threats such as Worms, Trojan horses, and shortcut viruses. This is compounded by technological vulnerabilities such as power and system failure, obsolete computers, and systems. Security measures such as username-password, encryption, firewall, and antivirus and security audit log exist in the hospital to protect ePHI. The study recommends the need to implement an intrusion protection system and constantly update the firewall and antivirus. It is concluded that without proper security protocols, ePHI could be exposed to threats and cyber attacks. The public hospital is urged to use blockchain technology to strengthen the security of ePHI.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116317684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
PCC-RPL: An efficient trust-based security extension for RPL PCC-RPL:一个高效的基于信任的RPL安全扩展
Pub Date : 2021-02-12 DOI: 10.1080/19393555.2021.1887413
M. Pishdar, Y. Seifi, M. Nasiri, M. Bag-Mohammadi
ABSTRACT RPL is a de facto routing protocol for IoT (Internet of Things). In this paper, an efficient IDS (intrusion detection system) is proposed to solve a major security vulnerability of RPL, which is called fabricated parent change. We show that many well-known attacks and security breaches are carried out via this vulnerability. The proposed method, which is called PCC-RPL (Parental Change Control RPL), prevents unsolicited parent changes by utilizing the trust concept. In PCC-RPL, all parents monitor their children behavior continuously. When a malicious activity is detected by the parent, it decreases the child's trust level and informs the root by sending a suspicion message. Our simulation results indicate that PCC-RPL can detect almost all common RPL attacks with an acceptable accuracy compared to a well-known method. Low control overhead, low energy consumption, short attack detection delay, and high precision are the main features of the proposed scheme.
RPL是IoT(物联网)事实上的路由协议。本文提出了一种高效的入侵检测系统(IDS)来解决RPL的一个主要安全漏洞,即伪造父更改。我们展示了许多众所周知的攻击和安全漏洞都是通过这个漏洞进行的。所提出的方法被称为PCC-RPL(亲代变更控制RPL),通过利用信任概念来防止未经请求的亲代变更。在PCC-RPL中,所有家长都持续监控孩子的行为。当父节点检测到恶意活动时,它会降低子节点的信任级别,并通过发送怀疑消息通知根节点。我们的仿真结果表明,与已知的方法相比,PCC-RPL可以以可接受的精度检测几乎所有常见的RPL攻击。该方案具有控制开销小、能耗低、攻击检测延迟短、检测精度高等特点。
{"title":"PCC-RPL: An efficient trust-based security extension for RPL","authors":"M. Pishdar, Y. Seifi, M. Nasiri, M. Bag-Mohammadi","doi":"10.1080/19393555.2021.1887413","DOIUrl":"https://doi.org/10.1080/19393555.2021.1887413","url":null,"abstract":"ABSTRACT RPL is a de facto routing protocol for IoT (Internet of Things). In this paper, an efficient IDS (intrusion detection system) is proposed to solve a major security vulnerability of RPL, which is called fabricated parent change. We show that many well-known attacks and security breaches are carried out via this vulnerability. The proposed method, which is called PCC-RPL (Parental Change Control RPL), prevents unsolicited parent changes by utilizing the trust concept. In PCC-RPL, all parents monitor their children behavior continuously. When a malicious activity is detected by the parent, it decreases the child's trust level and informs the root by sending a suspicion message. Our simulation results indicate that PCC-RPL can detect almost all common RPL attacks with an acceptable accuracy compared to a well-known method. Low control overhead, low energy consumption, short attack detection delay, and high precision are the main features of the proposed scheme.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114685253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Challenges and opportunities in biometric security: A survey 生物识别安全的挑战与机遇:调查
Pub Date : 2021-01-14 DOI: 10.1080/19393555.2021.1873464
Shefali Arora, M. Bhatia
ABSTRACT Biometric systems identify individuals based on unique traits such as the face, fingerprints, iris etc. The main objective of the study is to understand the role of deep learning in the process of authentication as well as its application in the enhancement of security of biometric systems. We highlight the studies using deep learning approaches to authenticate enrolled users under ideal and non-ideal environmental conditions. We summarize these approaches and explore the challenges that continue to restrict the full potential of biometric systems. The foremost are: building robust algorithms for authentication, ensuring the security of enrolled templates and protecting systems against spoofing attacks. In this paper, we review the performance achieved by various studies in overcoming the aforesaid challenges, along with the potential improvements and future directions in this domain.
生物特征识别系统根据人脸、指纹、虹膜等独特特征来识别个体。本研究的主要目的是了解深度学习在身份验证过程中的作用,以及它在增强生物识别系统安全性方面的应用。我们重点介绍了在理想和非理想环境条件下使用深度学习方法验证注册用户的研究。我们总结了这些方法,并探讨了继续限制生物识别系统充分发挥潜力的挑战。最重要的是:为身份验证构建健壮的算法,确保注册模板的安全性,并保护系统免受欺骗攻击。在本文中,我们回顾了各种研究在克服上述挑战方面取得的成绩,以及该领域的潜在改进和未来方向。
{"title":"Challenges and opportunities in biometric security: A survey","authors":"Shefali Arora, M. Bhatia","doi":"10.1080/19393555.2021.1873464","DOIUrl":"https://doi.org/10.1080/19393555.2021.1873464","url":null,"abstract":"ABSTRACT Biometric systems identify individuals based on unique traits such as the face, fingerprints, iris etc. The main objective of the study is to understand the role of deep learning in the process of authentication as well as its application in the enhancement of security of biometric systems. We highlight the studies using deep learning approaches to authenticate enrolled users under ideal and non-ideal environmental conditions. We summarize these approaches and explore the challenges that continue to restrict the full potential of biometric systems. The foremost are: building robust algorithms for authentication, ensuring the security of enrolled templates and protecting systems against spoofing attacks. In this paper, we review the performance achieved by various studies in overcoming the aforesaid challenges, along with the potential improvements and future directions in this domain.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123727693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
New method for improving add round key in the advanced encryption standard algorithm 改进高级加密标准算法中添加圆密钥的新方法
Pub Date : 2021-01-05 DOI: 10.1080/19393555.2020.1859654
S. M. Kareem, A. M. Rahma
ABSTRACT This paper proposes a new modification to the AES in order to ensure a high-level security. This is accomplished by replacing the binary Exclusive OR (XOR) operation in each add-round-key stage of the AES with a new (#) operation. The (#) operation requires an additional and randomly generated control key to determine the state table (among 256 optional state tables) needed to apply the (#) operation. The 256 states tables are formed based on the addition operation in the Galois Field GF (28) to increase the randomness of the algorithm. The modified AES algorithm has been evaluated based on several security metrics. In our proposed algorithm, an attacker needs, at minimum, up to (2431)10 probabilities of keys to decrypt an encrypted message; thus, the proposed AES algorithm increases the complexity of the original AES against the differential cryptanalysis. Moreover, compared to the original AES, applying the (#) operation in our modified algorithm also improves the performance in other security metrics, such as NIST and histogram. Consequently, this replacement by using two keys in both the encryption and decryption process adds a new level of “protection and a greater degree of robustness against breaking methods.
为了保证AES的高安全性,本文提出了一种新的AES修改方案。这是通过用一个新的(#)操作替换AES的每个添加循环密钥阶段中的二进制异或(XOR)操作来实现的。(#)操作需要一个额外的随机生成的控制键来确定应用(#)操作所需的状态表(在256个可选状态表中)。基于伽罗瓦域GF(28)中的加法运算形成256个状态表,以增加算法的随机性。改进后的AES算法基于几个安全指标进行了评估。在我们提出的算法中,攻击者至少需要多达(2431)10个密钥概率来解密加密消息;因此,提出的AES算法提高了原始AES对差分密码分析的复杂度。此外,与原始AES相比,在我们修改的算法中应用(#)操作也提高了其他安全指标(如NIST和直方图)的性能。因此,这种在加密和解密过程中使用两个密钥的替代增加了一个新级别的“保护”和更大程度的健壮性,以防止破坏方法。
{"title":"New method for improving add round key in the advanced encryption standard algorithm","authors":"S. M. Kareem, A. M. Rahma","doi":"10.1080/19393555.2020.1859654","DOIUrl":"https://doi.org/10.1080/19393555.2020.1859654","url":null,"abstract":"ABSTRACT This paper proposes a new modification to the AES in order to ensure a high-level security. This is accomplished by replacing the binary Exclusive OR (XOR) operation in each add-round-key stage of the AES with a new (#) operation. The (#) operation requires an additional and randomly generated control key to determine the state table (among 256 optional state tables) needed to apply the (#) operation. The 256 states tables are formed based on the addition operation in the Galois Field GF (28) to increase the randomness of the algorithm. The modified AES algorithm has been evaluated based on several security metrics. In our proposed algorithm, an attacker needs, at minimum, up to (2431)10 probabilities of keys to decrypt an encrypted message; thus, the proposed AES algorithm increases the complexity of the original AES against the differential cryptanalysis. Moreover, compared to the original AES, applying the (#) operation in our modified algorithm also improves the performance in other security metrics, such as NIST and histogram. Consequently, this replacement by using two keys in both the encryption and decryption process adds a new level of “protection and a greater degree of robustness against breaking methods.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133065003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Creating a sense of digital privacy in the private sector 在私营部门建立数字隐私意识
Pub Date : 2021-01-02 DOI: 10.1080/19393555.2020.1797948
Richard Charles Hornberger
ABSTRACT The research question explores factors that create a feeling of privacy violation and discusses steps organizations can take to improve the perception of digital privacy for employees answering, “What intrusion, interference, and information access factors can be implemented by organizations to create a sense of digital privacy for employees in for-profit organizations?” Moor’s Theory of Privacy guides the research examining three components of normative privacy in a digital age: intrusion protection, interference protection, and information access protection. The method of inquiry is a systematic review of twenty-one articles containing published in peer-reviewed academic journals over the last five years. Intrusion protection recommendations include monitoring and compliance with existing legislation, exhibition of transparency on policies and procedures, creating or revisiting existing organizational policies, and providing or enhancing training practices. Interference protection recommendations include gaining consent on policies, and encouraging systems that allow self-control of privacy. Information access protection recommendations involve weighing benefits and costs of security controls, limiting excessive data collection, anonymizing or obfuscating data collection, deleting data when use is complete, creating sanctions for information security misbehavior, and reviewing mobile device management environments. This discovered framework can decrease levels of stress, improve task performance, and decrease bad behavior will improving levels of job satisfaction and organizational commitment.
本研究探讨了造成隐私侵犯感的因素,并讨论了组织可以采取哪些步骤来改善员工的数字隐私感,回答“在营利性组织中,组织可以实施哪些入侵、干扰和信息访问因素来为员工创造数字隐私感?”摩尔的隐私理论指导了对数字时代规范隐私的三个组成部分的研究:入侵保护、干扰保护和信息访问保护。调查方法是对过去五年中发表在同行评议学术期刊上的21篇文章进行系统回顾。入侵保护建议包括监控和遵守现有立法,展示政策和程序的透明度,创建或重新审视现有的组织政策,以及提供或加强培训实践。干扰保护建议包括获得对政策的同意,以及鼓励允许自我控制隐私的系统。信息访问保护建议包括权衡安全控制的收益和成本、限制过度的数据收集、匿名化或模糊化数据收集、在使用完成时删除数据、创建对信息安全不当行为的制裁,以及审查移动设备管理环境。这个发现的框架可以降低压力水平,提高任务绩效,减少不良行为,从而提高工作满意度和组织承诺水平。
{"title":"Creating a sense of digital privacy in the private sector","authors":"Richard Charles Hornberger","doi":"10.1080/19393555.2020.1797948","DOIUrl":"https://doi.org/10.1080/19393555.2020.1797948","url":null,"abstract":"ABSTRACT The research question explores factors that create a feeling of privacy violation and discusses steps organizations can take to improve the perception of digital privacy for employees answering, “What intrusion, interference, and information access factors can be implemented by organizations to create a sense of digital privacy for employees in for-profit organizations?” Moor’s Theory of Privacy guides the research examining three components of normative privacy in a digital age: intrusion protection, interference protection, and information access protection. The method of inquiry is a systematic review of twenty-one articles containing published in peer-reviewed academic journals over the last five years. Intrusion protection recommendations include monitoring and compliance with existing legislation, exhibition of transparency on policies and procedures, creating or revisiting existing organizational policies, and providing or enhancing training practices. Interference protection recommendations include gaining consent on policies, and encouraging systems that allow self-control of privacy. Information access protection recommendations involve weighing benefits and costs of security controls, limiting excessive data collection, anonymizing or obfuscating data collection, deleting data when use is complete, creating sanctions for information security misbehavior, and reviewing mobile device management environments. This discovered framework can decrease levels of stress, improve task performance, and decrease bad behavior will improving levels of job satisfaction and organizational commitment.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130832413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enhancing the blockchain voting process in IoT using a novel blockchain Weighted Majority Consensus Algorithm (WMCA) 使用新的区块链加权多数共识算法(WMCA)增强物联网中的区块链投票过程
Pub Date : 2021-01-01 DOI: 10.1080/19393555.2020.1869356
Manal Mohamed Alhejazi, R. Mohammad
ABSTRACT Internet of Things (IoT) is expected to improve our lifestyle in a noticeable way. However, although the IoT holds a lot of chances, it contains a lot of serious risks. This leads to a focus on developing security techniques that can increase the security level of IoT. Blockchain is considered as an innovative technique for securing IoT and sharing data in a secure and tamperproof way. The blockchain is a peer-to-peer connection system that performs transactions securely by using consensus algorithms with no need for a trusted third party. Blockchain proved its applicability in securing IoT networks, and the research in this area is still enticing researchers to delve deeper and deeper. Decentralized voting is considered the fundamental principle that blockchain relies on for making the appropriate decision that would offer a proper security level for IoT. In this research a novel decentralized blockchain Weighted Majority Consensus Algorithm is proposed. The algorithm is inspired by the well-known weighted majority voting algorithm in the ensemble data mining learning approach. A java implementation of WMCA has been created for testing several scenarios with the aim of confirming the applicability of the proposed WMCA and the results were very promising.
物联网(IoT)有望显著改善我们的生活方式。然而,尽管物联网拥有很多机会,但它也包含了很多严重的风险。这导致人们将重点放在开发可以提高物联网安全级别的安全技术上。区块链被认为是以安全防篡改的方式保护物联网和共享数据的创新技术。区块链是一个点对点连接系统,通过使用共识算法安全地执行交易,而不需要可信的第三方。区块链证明了其在物联网网络安全方面的适用性,这一领域的研究仍在吸引着研究人员越来越深入地研究。去中心化投票被认为是区块链所依赖的基本原则,它可以做出适当的决定,为物联网提供适当的安全级别。本文提出了一种新的去中心化区块链加权多数共识算法。该算法的灵感来自于集成数据挖掘学习方法中著名的加权多数投票算法。已经创建了一个WMCA的java实现,用于测试几个场景,目的是确认所提议的WMCA的适用性,结果非常有希望。
{"title":"Enhancing the blockchain voting process in IoT using a novel blockchain Weighted Majority Consensus Algorithm (WMCA)","authors":"Manal Mohamed Alhejazi, R. Mohammad","doi":"10.1080/19393555.2020.1869356","DOIUrl":"https://doi.org/10.1080/19393555.2020.1869356","url":null,"abstract":"ABSTRACT Internet of Things (IoT) is expected to improve our lifestyle in a noticeable way. However, although the IoT holds a lot of chances, it contains a lot of serious risks. This leads to a focus on developing security techniques that can increase the security level of IoT. Blockchain is considered as an innovative technique for securing IoT and sharing data in a secure and tamperproof way. The blockchain is a peer-to-peer connection system that performs transactions securely by using consensus algorithms with no need for a trusted third party. Blockchain proved its applicability in securing IoT networks, and the research in this area is still enticing researchers to delve deeper and deeper. Decentralized voting is considered the fundamental principle that blockchain relies on for making the appropriate decision that would offer a proper security level for IoT. In this research a novel decentralized blockchain Weighted Majority Consensus Algorithm is proposed. The algorithm is inspired by the well-known weighted majority voting algorithm in the ensemble data mining learning approach. A java implementation of WMCA has been created for testing several scenarios with the aim of confirming the applicability of the proposed WMCA and the results were very promising.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122594086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
期刊
Information Security Journal: A Global Perspective
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1