首页 > 最新文献

IEEE Transactions on Information Forensics and Security最新文献

英文 中文
ASRL: Adaptive Swarm Reinforcement Learning for Enhanced OSN Intrusion Detection ASRL:用于增强型 OSN 入侵检测的自适应蜂群强化学习
IF 6.3 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-11-01 DOI: 10.1109/TIFS.2024.3488506
Edward Kwadwo Boahen;Rexford Nii Ayitey Sosu;Selasi Kwame Ocansey;Qinbao Xu;Changda Wang
Online Social Networks (OSNs) face escalating security threats that imperil user privacy. Conventional Deep Learning methods, relying predominantly on fixed learning rates, encounter limitations when capturing the nuanced intricacies of OSN traffic that arise from shifting user behaviors, diverse content types, and evolving interaction patterns because of social trending topics changes. To tackle these challenges, our paper delves into the diverse variations and transitions from a uniform approach, where a single method is employed for various types of data, to a multi-variation methodology. This methodology dynamically adapts to the special characteristics of each data type, resulting in more effective data representation while alleviating the limitations associated with fixed-rate calibration. Therefore, we devise the Adaptive Swarm Reinforcement Learning (ASRL) method that leverages adaptive learning to intricately analyze a wide range of user interactions, endowing our proposed method with the capacity to flexibly adjust to the constantly shifting OSN patterns. The experiments show that the proposed ASRL method achieves an accuracy of 98.59% in detecting a range of threat patterns, surpassing other prevalent methods by an average of 5% across the datasets from Facebook, Google+, and Twitter. Meanwhile, ASRL logs suspicious activities to identify the intruder for forensic analysis. The implementation of our proposed method is now publicly accessible at https://github.com/don2c/asrl_Project.
在线社交网络(OSN)面临着不断升级的安全威胁,危及用户隐私。传统的深度学习方法主要依赖于固定的学习率,在捕捉因用户行为变化、内容类型多样化以及社交热门话题变化导致的互动模式演变而产生的细微复杂的 OSN 流量时,会遇到各种限制。为了应对这些挑战,我们的论文深入研究了各种变化,并从针对各种类型数据采用单一方法的统一方法过渡到了多变化方法。这种方法能动态适应每种数据类型的特殊性,从而实现更有效的数据表示,同时缓解与固定速率校准相关的限制。因此,我们设计了自适应蜂群强化学习(ASRL)方法,利用自适应学习对各种用户交互进行复杂分析,使我们提出的方法能够灵活地适应不断变化的 OSN 模式。实验表明,所提出的 ASRL 方法在检测一系列威胁模式方面达到了 98.59% 的准确率,在 Facebook、Google+ 和 Twitter 数据集上平均超出其他流行方法 5%。同时,ASRL 会记录可疑活动,以便识别入侵者,进行取证分析。我们提出的方法的实现现在可以在 https://github.com/don2c/asrl_Project 上公开访问。
{"title":"ASRL: Adaptive Swarm Reinforcement Learning for Enhanced OSN Intrusion Detection","authors":"Edward Kwadwo Boahen;Rexford Nii Ayitey Sosu;Selasi Kwame Ocansey;Qinbao Xu;Changda Wang","doi":"10.1109/TIFS.2024.3488506","DOIUrl":"10.1109/TIFS.2024.3488506","url":null,"abstract":"Online Social Networks (OSNs) face escalating security threats that imperil user privacy. Conventional Deep Learning methods, relying predominantly on fixed learning rates, encounter limitations when capturing the nuanced intricacies of OSN traffic that arise from shifting user behaviors, diverse content types, and evolving interaction patterns because of social trending topics changes. To tackle these challenges, our paper delves into the diverse variations and transitions from a uniform approach, where a single method is employed for various types of data, to a multi-variation methodology. This methodology dynamically adapts to the special characteristics of each data type, resulting in more effective data representation while alleviating the limitations associated with fixed-rate calibration. Therefore, we devise the Adaptive Swarm Reinforcement Learning (ASRL) method that leverages adaptive learning to intricately analyze a wide range of user interactions, endowing our proposed method with the capacity to flexibly adjust to the constantly shifting OSN patterns. The experiments show that the proposed ASRL method achieves an accuracy of 98.59% in detecting a range of threat patterns, surpassing other prevalent methods by an average of 5% across the datasets from Facebook, Google+, and Twitter. Meanwhile, ASRL logs suspicious activities to identify the intruder for forensic analysis. The implementation of our proposed method is now publicly accessible at \u0000<uri>https://github.com/don2c/asrl_Project</uri>\u0000.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"19 ","pages":"10258-10272"},"PeriodicalIF":6.3,"publicationDate":"2024-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142563048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Interpretable Generalization Mechanism for Accurately Detecting Anomaly and Identifying Networking Intrusion Techniques 准确检测异常和识别网络入侵技术的可解释泛化机制
IF 6.3 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-31 DOI: 10.1109/TIFS.2024.3488967
Hao-Ting Pai;Yu-Hsuan Kang;Wen-Cheng Chung
The increasing complexity of modern network environments presents formidable challenges to Intrusion Detection Systems (IDS) in effectively mitigating cyber-attacks. Recent advancements in IDS research, integrating Explainable AI (XAI) methodologies, have led to notable improvements in system performance via precise feature selection. However, a thorough understanding of cyber-attacks requires inherently explainable decision-making processes within IDS. In this paper, we present the Interpretable Generalization Mechanism (IG), poised to revolutionize IDS capabilities. IG discerns coherent patterns, making it interpretable in distinguishing between normal and anomalous network traffic. Further, the synthesis of coherent patterns sheds light on intricate intrusion pathways, providing essential insights for cybersecurity forensics. By experiments with real-world datasets NSL-KDD, UNSW-NB15, and UKM-IDS20, IG is accurate even at a low ratio of training-to-test. With 10%-to-90%, IG achieves Precision (PRE) =0.93, Recall (REC) =0.94, and Area Under Curve (AUC) =0.94 in NSL-KDD; PRE =0.98, REC =0.99, and AUC =0.99 in UNSW-NB15; and PRE =0.98, REC =0.98, and AUC =0.99 in UKM-IDS20. Notably, in UNSW-NB15, IG achieves REC =1.0 and at least PRE =0.98 since 40%-to-60%; in UKM-IDS20, IG achieves REC =1.0 and at least PRE =0.88 since 20%-to-80%. Importantly, in UKM-IDS20, IG successfully identifies all three anomalous instances without prior exposure, demonstrating its generalization capabilities. These results and inferences are reproducible. In sum, IG showcases superior generalization by consistently performing well across diverse datasets and training-to-test ratios (from 10%-to-90% to 90%-to-10%), and excels in identifying novel anomalies without prior exposure. Its interpretability is enhanced by coherent evidence that accurately distinguishes both normal and anomalous activities, significantly improving detection accuracy and reducing false alarms, thereby strengthening IDS reliability and trustworthiness.
现代网络环境日益复杂,给入侵检测系统(IDS)有效缓解网络攻击带来了严峻挑战。集成了可解释人工智能(XAI)方法的入侵检测系统研究最近取得了进展,通过精确的特征选择显著提高了系统性能。然而,要想彻底了解网络攻击,就需要在 IDS 内部建立可解释的决策过程。在本文中,我们介绍了可解释泛化机制(IG),它将彻底改变 IDS 的能力。IG 能识别连贯的模式,使其在区分正常和异常网络流量时具有可解释性。此外,连贯模式的综合还能揭示错综复杂的入侵路径,为网络安全取证提供重要见解。通过对真实世界数据集 NSL-KDD、UNSW-NB15 和 UKM-IDS20 的实验,IG 即使在训练与测试比例较低的情况下也很准确。在 NSL-KDD 中,10%-90% 的 IG 精度 (PRE) =0.93,召回率 (REC) =0.94,曲线下面积 (AUC) =0.94;在 UNSW-NB15 中,PRE =0.98,REC =0.99,AUC =0.99;在 UKM-IDS20 中,PRE =0.98,REC =0.98,AUC =0.99。值得注意的是,在 UNSW-NB15 中,IG 达到了 REC =1.0 和至少 PRE =0.98(从 40% 到 60%);在 UKM-IDS20 中,IG 达到了 REC =1.0 和至少 PRE =0.88(从 20% 到 80%)。重要的是,在 UKM-IDS20 中,IG 在没有事先暴露的情况下成功识别了所有三个异常实例,这证明了它的泛化能力。这些结果和推论都是可重复的。总之,IG 在不同的数据集和训练与测试比率(从 10% 到 90% 到 90%-10%)中始终表现出色,展示了卓越的泛化能力,并能在没有事先暴露的情况下识别新的异常情况。它的可解释性通过准确区分正常和异常活动的一致性证据而得到增强,从而显著提高了检测准确性并减少了误报,从而增强了 IDS 的可靠性和可信度。
{"title":"An Interpretable Generalization Mechanism for Accurately Detecting Anomaly and Identifying Networking Intrusion Techniques","authors":"Hao-Ting Pai;Yu-Hsuan Kang;Wen-Cheng Chung","doi":"10.1109/TIFS.2024.3488967","DOIUrl":"10.1109/TIFS.2024.3488967","url":null,"abstract":"The increasing complexity of modern network environments presents formidable challenges to Intrusion Detection Systems (IDS) in effectively mitigating cyber-attacks. Recent advancements in IDS research, integrating Explainable AI (XAI) methodologies, have led to notable improvements in system performance via precise feature selection. However, a thorough understanding of cyber-attacks requires inherently explainable decision-making processes within IDS. In this paper, we present the Interpretable Generalization Mechanism (IG), poised to revolutionize IDS capabilities. IG discerns coherent patterns, making it interpretable in distinguishing between normal and anomalous network traffic. Further, the synthesis of coherent patterns sheds light on intricate intrusion pathways, providing essential insights for cybersecurity forensics. By experiments with real-world datasets NSL-KDD, UNSW-NB15, and UKM-IDS20, IG is accurate even at a low ratio of training-to-test. With 10%-to-90%, IG achieves Precision (PRE) =0.93, Recall (REC) =0.94, and Area Under Curve (AUC) =0.94 in NSL-KDD; PRE =0.98, REC =0.99, and AUC =0.99 in UNSW-NB15; and PRE =0.98, REC =0.98, and AUC =0.99 in UKM-IDS20. Notably, in UNSW-NB15, IG achieves REC =1.0 and at least PRE =0.98 since 40%-to-60%; in UKM-IDS20, IG achieves REC =1.0 and at least PRE =0.88 since 20%-to-80%. Importantly, in UKM-IDS20, IG successfully identifies all three anomalous instances without prior exposure, demonstrating its generalization capabilities. These results and inferences are reproducible. In sum, IG showcases superior generalization by consistently performing well across diverse datasets and training-to-test ratios (from 10%-to-90% to 90%-to-10%), and excels in identifying novel anomalies without prior exposure. Its interpretability is enhanced by coherent evidence that accurately distinguishes both normal and anomalous activities, significantly improving detection accuracy and reducing false alarms, thereby strengthening IDS reliability and trustworthiness.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"19 ","pages":"10302-10313"},"PeriodicalIF":6.3,"publicationDate":"2024-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10740319","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142561911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LAN: Learning Adaptive Neighbors for Real-Time Insider Threat Detection 局域网:学习自适应邻居,实时检测内部威胁
IF 6.3 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-31 DOI: 10.1109/TIFS.2024.3488527
Xiangrui Cai;Yang Wang;Sihan Xu;Hao Li;Ying Zhang;Zheli Liu;Xiaojie Yuan
Enterprises and organizations are faced with potential threats from insider employees that may lead to serious consequences. Previous studies on insider threat detection (ITD) mainly focus on detecting abnormal users or abnormal time periods (e.g., a week or a day). However, a user may have hundreds of thousands of activities in the log, and even within a day there may exist thousands of activities for a user, requiring a high investigation budget to verify abnormal users or activities given the detection results. On the other hand, existing works are mainly post-hoc methods rather than real-time detection, which can not report insider threats in time before they cause loss. In this paper, we conduct the first study towards real-time ITD at activity level, and present a fine-grained and efficient framework LAN. Specifically, LAN simultaneously learns the temporal dependencies within an activity sequence and the relationships between activities across sequences with graph structure learning. Moreover, to mitigate the data imbalance problem in ITD, we propose a novel hybrid prediction loss, which integrates self-supervision signals from normal activities and supervision signals from abnormal activities into a unified loss for anomaly detection. We evaluate the performance of LAN on two widely used datasets, i.e., CERT r4.2 and CERT r5.2. Extensive and comparative experiments demonstrate the superiority of LAN, outperforming 9 state-of-the-art baselines by at least 8.43% and 6.35% in AUC for real-time ITD on CERT r4.2 and r5.2, respectively. Moreover, LAN can be also applied to post-hoc ITD, surpassing 8 competitive baselines by at least 7.70% and 4.03% in AUC on two datasets. Finally, the ablation study, parameter analysis, and compatibility analysis evaluate the impact of each module and hyper-parameter in LAN. The source code can be obtained from https://github.com/Li1Neo/LAN.
企业和组织面临着来自内部员工的潜在威胁,这些威胁可能会导致严重后果。以往有关内部威胁检测(ITD)的研究主要集中在检测异常用户或异常时间段(如一周或一天)。然而,一个用户在日志中可能有成百上千次活动,甚至在一天之内,一个用户可能存在成千上万次活动,这就需要很高的调查预算来验证检测结果中的异常用户或活动。另一方面,现有的工作主要是事后方法而非实时检测,无法在内部威胁造成损失之前及时报告。在本文中,我们首次对活动级别的实时 ITD 进行了研究,并提出了一种细粒度的高效框架 LAN。具体来说,LAN 可同时学习活动序列内的时间依赖性,并通过图结构学习跨序列活动之间的关系。此外,为了缓解 ITD 中的数据不平衡问题,我们提出了一种新颖的混合预测损失,它将正常活动的自我监督信号和异常活动的监督信号整合到一个统一的损失中,用于异常检测。我们在两个广泛使用的数据集(即 CERT r4.2 和 CERT r5.2)上评估了 LAN 的性能。广泛的对比实验证明了 LAN 的优越性,在 CERT r4.2 和 r5.2 的实时 ITD 中,LAN 的 AUC 分别比 9 个最先进基线高出至少 8.43% 和 6.35%。此外,LAN 还可用于事后 ITD,在两个数据集上的 AUC 比 8 个竞争基线分别高出至少 7.70% 和 4.03%。最后,消融研究、参数分析和兼容性分析评估了 LAN 中每个模块和超参数的影响。源代码可从 https://github.com/Li1Neo/LAN 获取。
{"title":"LAN: Learning Adaptive Neighbors for Real-Time Insider Threat Detection","authors":"Xiangrui Cai;Yang Wang;Sihan Xu;Hao Li;Ying Zhang;Zheli Liu;Xiaojie Yuan","doi":"10.1109/TIFS.2024.3488527","DOIUrl":"10.1109/TIFS.2024.3488527","url":null,"abstract":"Enterprises and organizations are faced with potential threats from insider employees that may lead to serious consequences. Previous studies on insider threat detection (ITD) mainly focus on detecting abnormal users or abnormal time periods (e.g., a week or a day). However, a user may have hundreds of thousands of activities in the log, and even within a day there may exist thousands of activities for a user, requiring a high investigation budget to verify abnormal users or activities given the detection results. On the other hand, existing works are mainly post-hoc methods rather than real-time detection, which can not report insider threats in time before they cause loss. In this paper, we conduct the first study towards real-time ITD at activity level, and present a fine-grained and efficient framework LAN. Specifically, LAN simultaneously learns the temporal dependencies within an activity sequence and the relationships between activities across sequences with graph structure learning. Moreover, to mitigate the data imbalance problem in ITD, we propose a novel hybrid prediction loss, which integrates self-supervision signals from normal activities and supervision signals from abnormal activities into a unified loss for anomaly detection. We evaluate the performance of LAN on two widely used datasets, i.e., CERT r4.2 and CERT r5.2. Extensive and comparative experiments demonstrate the superiority of LAN, outperforming 9 state-of-the-art baselines by at least 8.43% and 6.35% in AUC for real-time ITD on CERT r4.2 and r5.2, respectively. Moreover, LAN can be also applied to post-hoc ITD, surpassing 8 competitive baselines by at least 7.70% and 4.03% in AUC on two datasets. Finally, the ablation study, parameter analysis, and compatibility analysis evaluate the impact of each module and hyper-parameter in LAN. The source code can be obtained from \u0000<uri>https://github.com/Li1Neo/LAN</uri>\u0000.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"19 ","pages":"10157-10172"},"PeriodicalIF":6.3,"publicationDate":"2024-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142561910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ruyi: A Configurable and Efficient Secure Multi-Party Learning Framework with Privileged Parties 如意:可配置且高效的有特权多方安全学习框架
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-30 DOI: 10.1109/tifs.2024.3488507
Lushan Song, Zhexuan Wang, Guopeng Lin, Weili Han
{"title":"Ruyi: A Configurable and Efficient Secure Multi-Party Learning Framework with Privileged Parties","authors":"Lushan Song, Zhexuan Wang, Guopeng Lin, Weili Han","doi":"10.1109/tifs.2024.3488507","DOIUrl":"https://doi.org/10.1109/tifs.2024.3488507","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"1 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2024-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142556172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Rebuttal to ‘On the Unforgeability of “Privacy-Preserving Aggregation-Authentication Scheme for Safety Warning System in Fog-Cloud Based VANET” ’ 反驳 "基于雾云的 VANET 安全预警系统的隐私保护聚合-认证方案 "的不可伪造性 '
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-30 DOI: 10.1109/tifs.2024.3488520
Yafang Yang, Lei Zhang, Yunlei Zhao, Kim-Kwang Raymond Choo, Yan Zhang
{"title":"Rebuttal to ‘On the Unforgeability of “Privacy-Preserving Aggregation-Authentication Scheme for Safety Warning System in Fog-Cloud Based VANET” ’","authors":"Yafang Yang, Lei Zhang, Yunlei Zhao, Kim-Kwang Raymond Choo, Yan Zhang","doi":"10.1109/tifs.2024.3488520","DOIUrl":"https://doi.org/10.1109/tifs.2024.3488520","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"37 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2024-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142556169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Eyes on Federated Recommendation: Targeted Poisoning With Competition and Its Mitigation 关注联合推荐:有针对性的竞争中毒及其缓解措施
IF 6.3 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-30 DOI: 10.1109/TIFS.2024.3488500
Yurong Hao;Xihui Chen;Wei Wang;Jiqiang Liu;Tao Li;Junyong Wang;Witold Pedrycz
Federated recommendation (FR) addresses privacy concerns in recommender systems by training a global model without requiring raw user data to leave individual devices. A server, known as the aggregator, integrates users’ local gradients and updates the global model parameters. However, FR is vulnerable to attacks where malicious users manipulate these updates, known as model poisoning attacks. In this work, we propose a new targeted attack called StairClimbing to promote specific items through model poisoning, and a new defence mechanism CrossEU. StairClimbing adopts a new strategy resembling stair climbing to enable target items to beat competitive items and increase their popularity level by level. Compared to prior attacks, StairClimbing guarantees balanced effectiveness, efficiency and stealthiness simultaneously. Our defence mechanism CrossEU leverages two patterns regarding the lists of items updated by benign users between iterative epochs. Extensive experiments on six real-world datasets demonstrate StairClimbing’s superiority across all three desirable attack properties, even with a small proportion of malicious users (1%). In addition, CrossEU effectively delays the impact of all tested attacks and even eliminates their damage entirely.
联合推荐(Federated recommendation,FR)通过训练一个全局模型来解决推荐系统中的隐私问题,而不需要原始用户数据离开个人设备。被称为聚合器的服务器会整合用户的本地梯度并更新全局模型参数。然而,FR 容易受到恶意用户操纵这些更新的攻击,即所谓的模型中毒攻击。在这项工作中,我们提出了一种名为 StairClimbing 的新定向攻击,通过模型中毒来推广特定项目,并提出了一种新的防御机制 CrossEU。StairClimbing 采用一种类似于爬楼梯的新策略,使目标项目能够击败竞争项目,并逐级提高其受欢迎程度。与之前的攻击相比,StairClimbing 同时保证了有效性、效率和隐蔽性的平衡。我们的防御机制 CrossEU 利用了良性用户在迭代周期之间更新项目列表的两种模式。在六个真实数据集上进行的广泛实验证明,即使恶意用户的比例很小(1%),StairClimbing 在所有三种理想的攻击属性方面都具有优势。此外,CrossEU 还能有效延迟所有测试攻击的影响,甚至完全消除其危害。
{"title":"Eyes on Federated Recommendation: Targeted Poisoning With Competition and Its Mitigation","authors":"Yurong Hao;Xihui Chen;Wei Wang;Jiqiang Liu;Tao Li;Junyong Wang;Witold Pedrycz","doi":"10.1109/TIFS.2024.3488500","DOIUrl":"10.1109/TIFS.2024.3488500","url":null,"abstract":"Federated recommendation (FR) addresses privacy concerns in recommender systems by training a global model without requiring raw user data to leave individual devices. A server, known as the aggregator, integrates users’ local gradients and updates the global model parameters. However, FR is vulnerable to attacks where malicious users manipulate these updates, known as model poisoning attacks. In this work, we propose a new targeted attack called \u0000<monospace>StairClimbing</monospace>\u0000 to promote specific items through model poisoning, and a new defence mechanism \u0000<monospace>CrossEU. StairClimbing</monospace>\u0000 adopts a new strategy resembling stair climbing to enable target items to beat competitive items and increase their popularity level by level. Compared to prior attacks, \u0000<monospace>StairClimbing</monospace>\u0000 guarantees balanced effectiveness, efficiency and stealthiness simultaneously. Our defence mechanism \u0000<monospace>CrossEU</monospace>\u0000 leverages two patterns regarding the lists of items updated by benign users between iterative epochs. Extensive experiments on six real-world datasets demonstrate \u0000<monospace>StairClimbing</monospace>\u0000’s superiority across all three desirable attack properties, even with a small proportion of malicious users (1%). In addition, \u0000<monospace>CrossEU</monospace>\u0000 effectively delays the impact of all tested attacks and even eliminates their damage entirely.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"19 ","pages":"10173-10188"},"PeriodicalIF":6.3,"publicationDate":"2024-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142556170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Resource Allocation for STAR-RIS-Assisted MIMO Physical-Layer Key Generation STAR-RIS 辅助 MIMO 物理层密钥生成的资源分配
IF 6.3 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-30 DOI: 10.1109/TIFS.2024.3488509
Zheng Wan;Kexin Liu;Yajun Chen;Kaizhi Huang;Hui-Ming Wang;Zheng Chu;Ming Yi;Liang Jin
Due to the limited coverage of reflecting-only reconfigurable intelligent surfaces (RIS), the existing RIS-assisted physical-layer key generation (PKG) scheme limits its overall performance in the full space. This paper proposes a novel simultaneously transmitting and reflecting (STAR)-RIS-assisted PKG protocol for multiple-input multiple-output (MIMO) systems, where the closed-form sum secret key rate is derived in the presence of full-space eavesdroppers. Two optimization problems are formulated to maximize the sum secret key rate by designing the transmit beamforming (TBF) and transmitting and reflecting coefficients (TRCs) for energy splitting (ES) with coupled phase-shift and mode switching (MS) mode. For ES mode with coupled phase-shift, a penalty-based alternating optimization (AO) algorithm is proposed to address its non-convexity. For MS mode, the semidefinite relaxation-successive convex approximation-based AO algorithm is utilized to achieve continuous solutions and then quantize to binary value for the MS mode. Simulation results demonstrate that the coupled phase-shift STAR-RIS incurs a slight KGR loss in comparison to the independent phase-shift STAR-RIS. Additionally, the ES mode outperforms the MS mode in terms of KGR performance. Finally, STAR-RIS can achieve a higher sum secret key rate than traditional reflecting-only RIS.
由于仅反射可重构智能表面(RIS)的覆盖范围有限,现有的 RIS 辅助物理层密钥生成(PKG)方案限制了其在全空间的整体性能。本文为多输入多输出(MIMO)系统提出了一种新颖的同时发射和反射(STAR)-RIS 辅助 PKG 协议,在存在全空间窃听者的情况下,得出了闭式和密钥率。本文提出了两个优化问题,通过设计具有耦合相移的能量分割(ES)模式和模式切换(MS)模式下的发射波束成形(TBF)和发射与反射系数(TRCs)来最大化总秘钥率。针对具有耦合相移的 ES 模式,提出了一种基于惩罚的交替优化 (AO) 算法,以解决其非凸性问题。对于 MS 模式,利用基于半无限松弛-后继凸近似的 AO 算法实现连续解,然后将 MS 模式量化为二进制值。仿真结果表明,与独立移相 STAR-RIS 相比,耦合移相 STAR-RIS 会产生轻微的 KGR 损失。此外,ES 模式的 KGR 性能优于 MS 模式。最后,STAR-RIS 比传统的纯反射 RIS 能获得更高的密钥总和率。
{"title":"Resource Allocation for STAR-RIS-Assisted MIMO Physical-Layer Key Generation","authors":"Zheng Wan;Kexin Liu;Yajun Chen;Kaizhi Huang;Hui-Ming Wang;Zheng Chu;Ming Yi;Liang Jin","doi":"10.1109/TIFS.2024.3488509","DOIUrl":"10.1109/TIFS.2024.3488509","url":null,"abstract":"Due to the limited coverage of reflecting-only reconfigurable intelligent surfaces (RIS), the existing RIS-assisted physical-layer key generation (PKG) scheme limits its overall performance in the full space. This paper proposes a novel simultaneously transmitting and reflecting (STAR)-RIS-assisted PKG protocol for multiple-input multiple-output (MIMO) systems, where the closed-form sum secret key rate is derived in the presence of full-space eavesdroppers. Two optimization problems are formulated to maximize the sum secret key rate by designing the transmit beamforming (TBF) and transmitting and reflecting coefficients (TRCs) for energy splitting (ES) with coupled phase-shift and mode switching (MS) mode. For ES mode with coupled phase-shift, a penalty-based alternating optimization (AO) algorithm is proposed to address its non-convexity. For MS mode, the semidefinite relaxation-successive convex approximation-based AO algorithm is utilized to achieve continuous solutions and then quantize to binary value for the MS mode. Simulation results demonstrate that the coupled phase-shift STAR-RIS incurs a slight KGR loss in comparison to the independent phase-shift STAR-RIS. Additionally, the ES mode outperforms the MS mode in terms of KGR performance. Finally, STAR-RIS can achieve a higher sum secret key rate than traditional reflecting-only RIS.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"19 ","pages":"10328-10338"},"PeriodicalIF":6.3,"publicationDate":"2024-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142556173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust Tracking-Based PHY-Authentication in mmWave MIMO Systems 毫米波多输入多输出系统中基于鲁棒跟踪的物理层验证
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-30 DOI: 10.1109/tifs.2024.3488362
Liza Afeef, Haji M. Furqan, Hüseyin Arslan
{"title":"Robust Tracking-Based PHY-Authentication in mmWave MIMO Systems","authors":"Liza Afeef, Haji M. Furqan, Hüseyin Arslan","doi":"10.1109/tifs.2024.3488362","DOIUrl":"https://doi.org/10.1109/tifs.2024.3488362","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"6 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2024-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142556171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TriAssetRank: Ranking Vulnerabilities, Exploits, and Privileges for Countermeasures Prioritization TriAssetRank:对漏洞、漏洞利用和权限进行排序以确定对策优先级
IF 6.3 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-30 DOI: 10.1109/TIFS.2024.3488533
Aymar Le Père Tchimwa Bouom;Jean-Pierre Lienou;Wilson Ejuh Geh;Frederica Free Nelson;Sachin Shetty;Charles Kamhoua
Network defence practices have no standardized mechanism for determining the priority of threat events. Prioritization of cyber vulnerabilities intends to make network administrators focus on the most critical points within the system to mitigate potential damages produced by attackers. More likely, in managing vulnerabilities, current approaches always focus on the common vulnerability exposures (CVE), which are not the only existing vulnerabilities in a network. Also, while the Common Vulnerability Scoring System (CVSS) effectively scores individual vulnerabilities, it fails to consider the relationships between them but considers each vulnerability in isolation. Existing research, such as the ‘AssetRank’ algorithm, has made progress in exploring these relationships. Building on this foundation, in this paper we propose TriAssetRank, a tripartite ranking algorithm that evaluates three key elements within a logical attack graph: vulnerabilities, privileges, and potential attack exploits. Since each node type has its unique characteristics and potential impact on the system’s security, we rank them in concert, taking into account the dependencies between nodes in the attack graph. The proposed ranking scheme computes a numerical value for each node based on its type, which is a clear indication of how valuable it is to a potential attacker. Several tests on various model networks have empirically validated the effectiveness of the algorithm, which enables organizations to prioritize countermeasures by identifying the most critical vulnerabilities, exploits, and privilege escalation risks, allowing efficient allocation of resources to mitigate high-impact threats and reduce overall risk exposure effectively.
网络防御实践中没有确定威胁事件优先级的标准化机制。确定网络漏洞的优先级是为了让网络管理员关注系统中最关键的点,以减轻攻击者可能造成的破坏。更有可能的是,在管理漏洞时,当前的方法总是关注常见漏洞暴露(CVE),而这并不是网络中唯一存在的漏洞。此外,虽然通用漏洞评分系统(CVSS)能有效地对单个漏洞进行评分,但它没有考虑到它们之间的关系,而是孤立地考虑每个漏洞。现有的研究,如 "AssetRank "算法,已经在探索这些关系方面取得了进展。在此基础上,我们在本文中提出了 TriAssetRank,这是一种三方排名算法,可评估逻辑攻击图中的三个关键要素:漏洞、权限和潜在攻击漏洞。由于每种节点类型都有其独特的特性和对系统安全的潜在影响,我们在考虑到攻击图中节点之间的依赖关系的同时,对它们进行协同排序。所提出的排序方案会根据每个节点的类型为其计算一个数值,从而清楚地表明该节点对潜在攻击者的价值。在各种模型网络上进行的多次测试从经验上验证了该算法的有效性,它使企业能够通过识别最关键的漏洞、漏洞利用和权限升级风险来确定应对措施的优先次序,从而有效地分配资源以缓解高影响威胁,并有效降低整体风险敞口。
{"title":"TriAssetRank: Ranking Vulnerabilities, Exploits, and Privileges for Countermeasures Prioritization","authors":"Aymar Le Père Tchimwa Bouom;Jean-Pierre Lienou;Wilson Ejuh Geh;Frederica Free Nelson;Sachin Shetty;Charles Kamhoua","doi":"10.1109/TIFS.2024.3488533","DOIUrl":"10.1109/TIFS.2024.3488533","url":null,"abstract":"Network defence practices have no standardized mechanism for determining the priority of threat events. Prioritization of cyber vulnerabilities intends to make network administrators focus on the most critical points within the system to mitigate potential damages produced by attackers. More likely, in managing vulnerabilities, current approaches always focus on the common vulnerability exposures (CVE), which are not the only existing vulnerabilities in a network. Also, while the Common Vulnerability Scoring System (CVSS) effectively scores individual vulnerabilities, it fails to consider the relationships between them but considers each vulnerability in isolation. Existing research, such as the ‘AssetRank’ algorithm, has made progress in exploring these relationships. Building on this foundation, in this paper we propose TriAssetRank, a tripartite ranking algorithm that evaluates three key elements within a logical attack graph: vulnerabilities, privileges, and potential attack exploits. Since each node type has its unique characteristics and potential impact on the system’s security, we rank them in concert, taking into account the dependencies between nodes in the attack graph. The proposed ranking scheme computes a numerical value for each node based on its type, which is a clear indication of how valuable it is to a potential attacker. Several tests on various model networks have empirically validated the effectiveness of the algorithm, which enables organizations to prioritize countermeasures by identifying the most critical vulnerabilities, exploits, and privilege escalation risks, allowing efficient allocation of resources to mitigate high-impact threats and reduce overall risk exposure effectively.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"19 ","pages":"10189-10205"},"PeriodicalIF":6.3,"publicationDate":"2024-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142556167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Shift-Add Secret Sharing Scheme for Partial Data Protection With Parallel Zigzag Decoding 利用并行之字形解码实现部分数据保护的新型移位-添加秘密共享方案
IF 6.3 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-30 DOI: 10.1109/TIFS.2024.3488498
Jiajun Chen;Yichen Shen;Chi Wan Sung
This paper studies distributed storage for protecting the confidentiality of partial data in the presence of storage node failures. It is required that not only the original data can be reconstructed from the remaining surviving nodes, but also the data lost by a failed node can be repaired from as few nodes as possible. The minimum number of surviving nodes required to repair a failed node is called the repair degree. Inspired by the zigzag-decodable secret sharing scheme, we propose a new shift-add secret sharing scheme based on the XOR and bitwise-shift operations, in which confidential data is protected by using random keys generated from non-confidential data. The reliability and repairability of the proposed scheme are measured by the message loss probability and the maximum repair degree among all nodes, respectively, and then compared with three benchmark schemes. In contrast to conventional zigzag-decodable codes, the special structure of our proposed scheme allows the design of fast parallel algorithms for modern devices with multi-core processors, which have a linear speedup in decoding time compared with various versions of serial zigzag decoding. Experiments are implemented on a multi-core computer, and the empirical results on decoding time are consistent with our theoretical observations.
本文研究了分布式存储如何在存储节点发生故障时保护部分数据的机密性。要求不仅能从剩余的幸存节点重建原始数据,而且能从尽可能少的节点修复故障节点丢失的数据。修复故障节点所需的最少存活节点数称为修复度。受 "之 "字形可解码秘密共享方案的启发,我们提出了一种基于 XOR 和比特移位操作的新型移位-添加秘密共享方案,该方案使用从非机密数据中生成的随机密钥来保护机密数据。我们分别用信息丢失概率和所有节点间的最大修复度来衡量所提方案的可靠性和可修复性,然后将其与三种基准方案进行比较。与传统的人字形解码相比,我们提出的方案的特殊结构允许为配备多核处理器的现代设备设计快速的并行算法,与各种版本的串行人字形解码相比,其解码时间呈线性加速。我们在多核计算机上进行了实验,关于解码时间的经验结果与我们的理论观察结果一致。
{"title":"A New Shift-Add Secret Sharing Scheme for Partial Data Protection With Parallel Zigzag Decoding","authors":"Jiajun Chen;Yichen Shen;Chi Wan Sung","doi":"10.1109/TIFS.2024.3488498","DOIUrl":"10.1109/TIFS.2024.3488498","url":null,"abstract":"This paper studies distributed storage for protecting the confidentiality of partial data in the presence of storage node failures. It is required that not only the original data can be reconstructed from the remaining surviving nodes, but also the data lost by a failed node can be repaired from as few nodes as possible. The minimum number of surviving nodes required to repair a failed node is called the repair degree. Inspired by the zigzag-decodable secret sharing scheme, we propose a new shift-add secret sharing scheme based on the XOR and bitwise-shift operations, in which confidential data is protected by using random keys generated from non-confidential data. The reliability and repairability of the proposed scheme are measured by the message loss probability and the maximum repair degree among all nodes, respectively, and then compared with three benchmark schemes. In contrast to conventional zigzag-decodable codes, the special structure of our proposed scheme allows the design of fast parallel algorithms for modern devices with multi-core processors, which have a linear speedup in decoding time compared with various versions of serial zigzag decoding. Experiments are implemented on a multi-core computer, and the empirical results on decoding time are consistent with our theoretical observations.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"19 ","pages":"10221-10232"},"PeriodicalIF":6.3,"publicationDate":"2024-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142556168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Information Forensics and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1