首页 > 最新文献

J. Comput. Secur.最新文献

英文 中文
Personal health records sharing scheme based on attribute based signcryption with data integrity verifiable 基于数据完整性可验证的属性签名加密的个人健康记录共享方案
Pub Date : 2021-10-06 DOI: 10.3233/jcs-210045
I. Obiri, Qi Xia, Hu Xia, Eric Affum, Abla Smahi, Jianbin Gao
The distribution of personal health records (PHRs) via a cloud server is a promising platform as it reduces the cost of data maintenance. Nevertheless, the cloud server is semi-trusted and can expose the patients’ PHRs to unauthorized third parties for financial gains or compromise the query result. Therefore, ensuring the integrity of the query results and privacy of PHRs as well as realizing fine-grained access control are critical key issues when PHRs are shared via cloud computing. Hence, we propose new personal health records sharing scheme with verifiable data integrity based on B+ tree data structure and attribute-based signcryption scheme to achieve data privacy, query result integrity, unforgeability, blind keyword search, and fine-grained access control.
通过云服务器分发个人健康记录(phr)是一个很有前途的平台,因为它降低了数据维护成本。然而,云服务器是半可信的,可能会将患者的phrr暴露给未经授权的第三方,以获取经济利益或损害查询结果。因此,保证查询结果的完整性和phrr的私密性,实现细粒度的访问控制,是通过云计算实现phrr共享的关键问题。为此,我们提出了基于B+树数据结构和基于属性的签名加密方案的数据完整性可验证的个人健康记录共享方案,以实现数据保密性、查询结果完整性、不可伪造性、盲关键字搜索和细粒度访问控制。
{"title":"Personal health records sharing scheme based on attribute based signcryption with data integrity verifiable","authors":"I. Obiri, Qi Xia, Hu Xia, Eric Affum, Abla Smahi, Jianbin Gao","doi":"10.3233/jcs-210045","DOIUrl":"https://doi.org/10.3233/jcs-210045","url":null,"abstract":"The distribution of personal health records (PHRs) via a cloud server is a promising platform as it reduces the cost of data maintenance. Nevertheless, the cloud server is semi-trusted and can expose the patients’ PHRs to unauthorized third parties for financial gains or compromise the query result. Therefore, ensuring the integrity of the query results and privacy of PHRs as well as realizing fine-grained access control are critical key issues when PHRs are shared via cloud computing. Hence, we propose new personal health records sharing scheme with verifiable data integrity based on B+ tree data structure and attribute-based signcryption scheme to achieve data privacy, query result integrity, unforgeability, blind keyword search, and fine-grained access control.","PeriodicalId":142580,"journal":{"name":"J. Comput. Secur.","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117104297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Privacy-preserving policy evaluation in multi-party access control 多方访问控制中的隐私保护策略评估
Pub Date : 2021-09-30 DOI: 10.3233/jcs-200007
M. Alishahi, Ischa Stork, Nicola Zannone
Recent years have seen an increasing popularity of online collaborative systems like social networks and web-based collaboration platforms. Collaborative systems typically offer their users a digital environment in which they can work together and share resources and information. These resources and information might be sensitive and, thus, they should be protected from unauthorized accesses. Multi-party access control is emerging as a new paradigm for the protection of co-owned and co-managed resources, where the policies of all users involved in the management of a resource should be accounted for collaborative decision making. Existing approaches, however, only focus on the jointly protection of resources and do not address the protection of the individual user policies themselves, whose disclosure might leak sensitive information. In this work, we propose a privacy-preserving mechanism for the evaluation of multi-party access control policies, which preserves the confidentiality of user policies while remaining capable of making collaborative decisions. To this end, we design secure computation protocols for the evaluation of policies in protected form against an access query and realize such protocols using two privacy-preserving techniques, namely Homomorphic Encryption and Secure Functional Evaluation. We show the practical feasibility of our mechanism in terms of computation and communication costs through an experimental evaluation.
近年来,社交网络和基于web的协作平台等在线协作系统越来越受欢迎。协作系统通常为用户提供一个数字环境,在其中他们可以一起工作并共享资源和信息。这些资源和信息可能很敏感,因此应该保护它们,防止未经授权的访问。多方访问控制正在成为保护共同拥有和共同管理的资源的一种新范例,在这种范例中,参与资源管理的所有用户的策略都应考虑到协作决策。然而,现有的方法只关注资源的共同保护,而没有解决个人用户策略本身的保护问题,泄露个人用户策略可能会泄露敏感信息。在这项工作中,我们提出了一种用于评估多方访问控制策略的隐私保护机制,该机制在保留用户策略机密性的同时仍然能够做出协同决策。为此,我们设计了针对访问查询以受保护形式评估策略的安全计算协议,并使用同态加密和安全功能评估两种隐私保护技术来实现该协议。通过实验评估,证明了该机制在计算和通信成本方面的实际可行性。
{"title":"Privacy-preserving policy evaluation in multi-party access control","authors":"M. Alishahi, Ischa Stork, Nicola Zannone","doi":"10.3233/jcs-200007","DOIUrl":"https://doi.org/10.3233/jcs-200007","url":null,"abstract":"Recent years have seen an increasing popularity of online collaborative systems like social networks and web-based collaboration platforms. Collaborative systems typically offer their users a digital environment in which they can work together and share resources and information. These resources and information might be sensitive and, thus, they should be protected from unauthorized accesses. Multi-party access control is emerging as a new paradigm for the protection of co-owned and co-managed resources, where the policies of all users involved in the management of a resource should be accounted for collaborative decision making. Existing approaches, however, only focus on the jointly protection of resources and do not address the protection of the individual user policies themselves, whose disclosure might leak sensitive information. In this work, we propose a privacy-preserving mechanism for the evaluation of multi-party access control policies, which preserves the confidentiality of user policies while remaining capable of making collaborative decisions. To this end, we design secure computation protocols for the evaluation of policies in protected form against an access query and realize such protocols using two privacy-preserving techniques, namely Homomorphic Encryption and Secure Functional Evaluation. We show the practical feasibility of our mechanism in terms of computation and communication costs through an experimental evaluation.","PeriodicalId":142580,"journal":{"name":"J. Comput. Secur.","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134361219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Deep learning for detecting logic-flaw-exploiting network attacks: An end-to-end approach 用于检测逻辑缺陷利用网络攻击的深度学习:端到端方法
Pub Date : 2021-09-29 DOI: 10.3233/jcs-210101
Qingtian Zou, A. Singhal, Xiaoyan Sun, Peng Liu
Network attacks have become a major security concern for organizations worldwide. A category of network attacks that exploit the logic (security) flaws of a few widely-deployed authentication protocols has been commonly observed in recent years. Such logic-flaw-exploiting network attacks often do not have distinguishing signatures, and can thus easily evade the typical signature-based network intrusion detection systems. Recently, researchers have applied neural networks to detect network attacks with network logs. However, public network data sets have major drawbacks such as limited data sample variations and unbalanced data with respect to malicious and benign samples. In this paper, we present a new end-to-end approach based on protocol fuzzing to automatically generate high-quality network data, on which deep learning models can be trained for network attack detection. Our findings show that protocol fuzzing can generate data samples that cover real-world data, and deep learning models trained with fuzzed data can successfully detect the logic-flaw-exploiting network attacks.
网络攻击已经成为全球组织的主要安全问题。近年来,一类利用一些广泛部署的身份验证协议的逻辑(安全)缺陷的网络攻击已经被普遍观察到。这种利用逻辑缺陷的网络攻击通常没有可识别的签名,因此很容易躲过典型的基于签名的网络入侵检测系统。近年来,研究人员将神经网络应用于利用网络日志检测网络攻击。然而,公共网络数据集有很大的缺点,如有限的数据样本变化和不平衡的数据相对于恶意和良性样本。在本文中,我们提出了一种新的基于协议模糊的端到端方法来自动生成高质量的网络数据,并在此基础上训练深度学习模型以进行网络攻击检测。我们的研究结果表明,协议模糊可以生成覆盖真实世界数据的数据样本,使用模糊数据训练的深度学习模型可以成功检测利用逻辑缺陷的网络攻击。
{"title":"Deep learning for detecting logic-flaw-exploiting network attacks: An end-to-end approach","authors":"Qingtian Zou, A. Singhal, Xiaoyan Sun, Peng Liu","doi":"10.3233/jcs-210101","DOIUrl":"https://doi.org/10.3233/jcs-210101","url":null,"abstract":"Network attacks have become a major security concern for organizations worldwide. A category of network attacks that exploit the logic (security) flaws of a few widely-deployed authentication protocols has been commonly observed in recent years. Such logic-flaw-exploiting network attacks often do not have distinguishing signatures, and can thus easily evade the typical signature-based network intrusion detection systems. Recently, researchers have applied neural networks to detect network attacks with network logs. However, public network data sets have major drawbacks such as limited data sample variations and unbalanced data with respect to malicious and benign samples. In this paper, we present a new end-to-end approach based on protocol fuzzing to automatically generate high-quality network data, on which deep learning models can be trained for network attack detection. Our findings show that protocol fuzzing can generate data samples that cover real-world data, and deep learning models trained with fuzzed data can successfully detect the logic-flaw-exploiting network attacks.","PeriodicalId":142580,"journal":{"name":"J. Comput. Secur.","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126606447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ballot secrecy: Security definition, sufficient conditions, and analysis of Helios 选票保密:安全定义、充分条件及太阳神分析
Pub Date : 2021-08-30 DOI: 10.3233/jcs-191415
B. Smyth
We propose a definition of ballot secrecy as an indistinguishability game in the computational model of cryptography. Our definition improves upon earlier definitions to ensure ballot secrecy is preserved in the presence of an adversary that controls ballot collection. We also propose a definition of ballot independence as an adaptation of an indistinguishability game for asymmetric encryption. We prove relations between our definitions. In particular, we prove ballot independence is sufficient for ballot secrecy in voting systems with zero-knowledge tallying proofs. Moreover, we prove that building systems from non-malleable asymmetric encryption schemes suffices for ballot secrecy, thereby eliminating the expense of ballot-secrecy proofs for a class of encryption-based voting systems. We demonstrate applicability of our results by analysing the Helios voting system and its mixnet variant. Our analysis reveals that Helios does not satisfy ballot secrecy in the presence of an adversary that controls ballot collection. The vulnerability cannot be detected by earlier definitions of ballot secrecy, because they do not consider such adversaries. We adopt non-malleable ballots as a fix and prove that the fixed system satisfies ballot secrecy.
我们将选票保密定义为密码学计算模型中的不可分辨博弈。我们的定义改进了先前的定义,以确保在控制选票收集的对手存在的情况下保留选票保密性。我们还提出了选票独立性的定义,作为对非对称加密的不可区分博弈的改编。我们证明定义之间的关系。特别是,我们证明了选票独立性足以在具有零知识计数证明的投票系统中实现选票保密。此外,我们证明了从不可延展性非对称加密方案构建系统足以实现投票保密,从而消除了一类基于加密的投票系统的投票保密证明费用。我们通过分析Helios投票系统及其mixnet变体来证明我们的结果的适用性。我们的分析显示,在对手控制选票收集的情况下,赫利俄斯不符合选票保密要求。以前的选票保密定义无法检测到这一漏洞,因为它们没有考虑到这样的对手。我们采用非延展性选票作为固定制度,并证明该固定制度满足选票保密要求。
{"title":"Ballot secrecy: Security definition, sufficient conditions, and analysis of Helios","authors":"B. Smyth","doi":"10.3233/jcs-191415","DOIUrl":"https://doi.org/10.3233/jcs-191415","url":null,"abstract":"We propose a definition of ballot secrecy as an indistinguishability game in the computational model of cryptography. Our definition improves upon earlier definitions to ensure ballot secrecy is preserved in the presence of an adversary that controls ballot collection. We also propose a definition of ballot independence as an adaptation of an indistinguishability game for asymmetric encryption. We prove relations between our definitions. In particular, we prove ballot independence is sufficient for ballot secrecy in voting systems with zero-knowledge tallying proofs. Moreover, we prove that building systems from non-malleable asymmetric encryption schemes suffices for ballot secrecy, thereby eliminating the expense of ballot-secrecy proofs for a class of encryption-based voting systems. We demonstrate applicability of our results by analysing the Helios voting system and its mixnet variant. Our analysis reveals that Helios does not satisfy ballot secrecy in the presence of an adversary that controls ballot collection. The vulnerability cannot be detected by earlier definitions of ballot secrecy, because they do not consider such adversaries. We adopt non-malleable ballots as a fix and prove that the fixed system satisfies ballot secrecy.","PeriodicalId":142580,"journal":{"name":"J. Comput. Secur.","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127652261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A graph-based framework for malicious software detection and classification utilizing temporal-graphs 基于图的恶意软件检测和分类框架
Pub Date : 2021-08-27 DOI: 10.3233/jcs-210057
Helen-Maria Dounavi, Anna Mpanti, Stavros D. Nikolopoulos, Iosif Polenakis
In this paper we present a graph-based framework that, utilizing relations between groups of System-calls, detects whether an unknown software sample is malicious or benign, and classifies a malicious software to one of a set of known malware families. In our approach we propose a novel graph representation of dependency graphs by capturing their structural evolution over time constructing sequential graph instances, the so-called Temporal Graphs. The partitions of the temporal evolution of a graph defined by specific time-slots, results to different types of graphs representations based upon the information we capture across the capturing of its evolution. The proposed graph-based framework utilizes the proposed types of temporal graphs computing similarity metrics over various graph characteristics in order to conduct the malware detection and classification procedures. Finally, we evaluate the detection rates and the classification ability of our proposed graph-based framework conducting a series of experiments over a set of known malware samples pre-classified into malware families.
在本文中,我们提出了一个基于图的框架,利用系统调用组之间的关系,检测未知的软件样本是恶意的还是良性的,并将恶意软件分类为一组已知的恶意软件家族之一。在我们的方法中,我们提出了一种新的依赖图的图表示,通过捕获它们的结构随时间的演变,构建时序图实例,即所谓的时序图。由特定时隙定义的图的时间演变分区,基于我们在捕获其演变过程中捕获的信息,产生不同类型的图表示。所提出的基于图的框架利用所提出的时间图类型计算各种图特征的相似性度量,以便进行恶意软件检测和分类过程。最后,我们评估了我们提出的基于图的框架的检测率和分类能力,并在一组已知的恶意软件样本上进行了一系列实验,这些样本被预先分类到恶意软件家族中。
{"title":"A graph-based framework for malicious software detection and classification utilizing temporal-graphs","authors":"Helen-Maria Dounavi, Anna Mpanti, Stavros D. Nikolopoulos, Iosif Polenakis","doi":"10.3233/jcs-210057","DOIUrl":"https://doi.org/10.3233/jcs-210057","url":null,"abstract":"In this paper we present a graph-based framework that, utilizing relations between groups of System-calls, detects whether an unknown software sample is malicious or benign, and classifies a malicious software to one of a set of known malware families. In our approach we propose a novel graph representation of dependency graphs by capturing their structural evolution over time constructing sequential graph instances, the so-called Temporal Graphs. The partitions of the temporal evolution of a graph defined by specific time-slots, results to different types of graphs representations based upon the information we capture across the capturing of its evolution. The proposed graph-based framework utilizes the proposed types of temporal graphs computing similarity metrics over various graph characteristics in order to conduct the malware detection and classification procedures. Finally, we evaluate the detection rates and the classification ability of our proposed graph-based framework conducting a series of experiments over a set of known malware samples pre-classified into malware families.","PeriodicalId":142580,"journal":{"name":"J. Comput. Secur.","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121180828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Advances in spam detection for email spam, web spam, social network spam, and review spam: ML-based and nature-inspired-based techniques 电子邮件垃圾邮件、网络垃圾邮件、社交网络垃圾邮件和评论垃圾邮件的垃圾邮件检测进展:基于ml和受自然启发的基于技术
Pub Date : 2021-08-25 DOI: 10.3233/JCS-210022
A. A. Akinyelu
Despite the great advances in spam detection, spam remains a major problem that has affected the global economy enormously. Spam attacks are popularly perpetrated through different digital platforms with a large electronic audience, such as emails, microblogging websites (e.g. Twitter), social networks (e.g. Facebook), and review sites (e.g. Amazon). Different spam detection solutions have been proposed in the literature, however, Machine Learning (ML) based solutions are one of the most effective. Nevertheless, most ML algorithms have computational complexity problem, thus some studies introduced Nature Inspired (NI) algorithms to further improve the speed and generalization performance of ML algorithms. This study presents a survey of recent ML-based and NI-based spam detection techniques to empower the research community with information that is suitable for designing effective spam filtering systems for emails, social networks, microblogging, and review websites. The recent success and prevalence of deep learning show that it can be used to solve spam detection problems. Moreover, the availability of large-scale spam datasets makes deep learning and big data solutions (such as Mahout) very suitable for spam detection. Few studies explored deep learning algorithms and big data solutions for spam detection. Besides, most of the datasets used in the literature are either small or synthetically created. Therefore, future studies can consider exploring big data solutions, big datasets, and deep learning algorithms for building efficient spam detection techniques.
尽管在垃圾邮件检测方面取得了巨大的进步,但垃圾邮件仍然是一个严重影响全球经济的主要问题。垃圾邮件攻击通常通过拥有大量电子受众的不同数字平台进行,例如电子邮件、微博客网站(例如Twitter)、社交网络(例如Facebook)和评论网站(例如Amazon)。在文献中已经提出了不同的垃圾邮件检测解决方案,然而,基于机器学习(ML)的解决方案是最有效的解决方案之一。然而,大多数机器学习算法存在计算复杂度问题,因此一些研究引入了自然启发(NI)算法来进一步提高机器学习算法的速度和泛化性能。本研究介绍了最近基于ml和基于ni的垃圾邮件检测技术的调查,以使研究社区能够为电子邮件、社交网络、微博和评论网站设计有效的垃圾邮件过滤系统提供信息。深度学习最近的成功和流行表明,它可以用来解决垃圾邮件检测问题。此外,大规模垃圾邮件数据集的可用性使得深度学习和大数据解决方案(如Mahout)非常适合垃圾邮件检测。很少有研究探索垃圾邮件检测的深度学习算法和大数据解决方案。此外,文献中使用的大多数数据集要么很小,要么是综合创建的。因此,未来的研究可以考虑探索大数据解决方案、大数据集和深度学习算法,以构建高效的垃圾邮件检测技术。
{"title":"Advances in spam detection for email spam, web spam, social network spam, and review spam: ML-based and nature-inspired-based techniques","authors":"A. A. Akinyelu","doi":"10.3233/JCS-210022","DOIUrl":"https://doi.org/10.3233/JCS-210022","url":null,"abstract":"Despite the great advances in spam detection, spam remains a major problem that has affected the global economy enormously. Spam attacks are popularly perpetrated through different digital platforms with a large electronic audience, such as emails, microblogging websites (e.g. Twitter), social networks (e.g. Facebook), and review sites (e.g. Amazon). Different spam detection solutions have been proposed in the literature, however, Machine Learning (ML) based solutions are one of the most effective. Nevertheless, most ML algorithms have computational complexity problem, thus some studies introduced Nature Inspired (NI) algorithms to further improve the speed and generalization performance of ML algorithms. This study presents a survey of recent ML-based and NI-based spam detection techniques to empower the research community with information that is suitable for designing effective spam filtering systems for emails, social networks, microblogging, and review websites. The recent success and prevalence of deep learning show that it can be used to solve spam detection problems. Moreover, the availability of large-scale spam datasets makes deep learning and big data solutions (such as Mahout) very suitable for spam detection. Few studies explored deep learning algorithms and big data solutions for spam detection. Besides, most of the datasets used in the literature are either small or synthetically created. Therefore, future studies can consider exploring big data solutions, big datasets, and deep learning algorithms for building efficient spam detection techniques.","PeriodicalId":142580,"journal":{"name":"J. Comput. Secur.","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129439752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
AntibIoTic: The Fog-enhanced distributed security system to protect the (legacy) Internet of Things 抗生素:雾增强分布式安全系统,以保护(遗留)物联网
Pub Date : 2021-08-11 DOI: 10.3233/jcs-210027
Michele De Donno, Xenofon Fafoutis, N. Dragoni
The Internet of Things (IoT) is evolving our society; however, the growing adoption of IoT devices in many scenarios brings security and privacy implications. Current security solutions are either unsuitable for every IoT scenario or provide only partial security. This paper presents AntibIoTic 2.0, a distributed security system that relies on Fog computing to secure IoT devices, including legacy ones. The system is composed of a backbone, made of core Fog nodes and Cloud server, a Fog node acting at the edge as the gateway of the IoT network, and a lightweight agent running on each IoT device. The proposed system offers fine-grained, host-level security coupled with network-level protection, while its distributed nature makes it scalable, versatile, lightweight, and easy to deploy, also for legacy IoT deployments. AntibIoTic 2.0 can also publish anonymized and aggregated data and statistics on the deployments it secures, to increase awareness and push cooperations in the area of IoT security. This manuscript recaps and largely expands previous works on AntibIoTic, providing an enhanced design of the system, an extended proof-of-concept that proves its feasibility and shows its operation, and an experimental evaluation that reports the low computational overhead it causes.
物联网(IoT)正在改变我们的社会;然而,在许多场景中越来越多地采用物联网设备带来了安全和隐私问题。目前的安全解决方案要么不适合所有物联网场景,要么只能提供部分安全性。本文介绍了抗生素2.0,这是一个分布式安全系统,它依赖于雾计算来保护物联网设备,包括遗留设备。该系统由核心雾节点和云服务器组成的骨干,作为物联网网络网关的边缘雾节点和运行在每个物联网设备上的轻量级代理组成。提议的系统提供细粒度的主机级安全性以及网络级保护,而其分布式特性使其具有可扩展性,通用性,轻量级和易于部署,也适用于传统物联网部署。抗生素2.0还可以发布其所保护的部署的匿名和汇总数据和统计数据,以提高对物联网安全领域的认识并推动合作。本文概述并在很大程度上扩展了以前在抗生素方面的工作,提供了系统的增强设计,证明其可行性并显示其操作的扩展概念验证,以及报告其导致的低计算开销的实验评估。
{"title":"AntibIoTic: The Fog-enhanced distributed security system to protect the (legacy) Internet of Things","authors":"Michele De Donno, Xenofon Fafoutis, N. Dragoni","doi":"10.3233/jcs-210027","DOIUrl":"https://doi.org/10.3233/jcs-210027","url":null,"abstract":"The Internet of Things (IoT) is evolving our society; however, the growing adoption of IoT devices in many scenarios brings security and privacy implications. Current security solutions are either unsuitable for every IoT scenario or provide only partial security. This paper presents AntibIoTic 2.0, a distributed security system that relies on Fog computing to secure IoT devices, including legacy ones. The system is composed of a backbone, made of core Fog nodes and Cloud server, a Fog node acting at the edge as the gateway of the IoT network, and a lightweight agent running on each IoT device. The proposed system offers fine-grained, host-level security coupled with network-level protection, while its distributed nature makes it scalable, versatile, lightweight, and easy to deploy, also for legacy IoT deployments. AntibIoTic 2.0 can also publish anonymized and aggregated data and statistics on the deployments it secures, to increase awareness and push cooperations in the area of IoT security. This manuscript recaps and largely expands previous works on AntibIoTic, providing an enhanced design of the system, an extended proof-of-concept that proves its feasibility and shows its operation, and an experimental evaluation that reports the low computational overhead it causes.","PeriodicalId":142580,"journal":{"name":"J. Comput. Secur.","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128742217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancement of email spam detection using improved deep learning algorithms for cyber security 利用改进的网络安全深度学习算法增强垃圾邮件检测
Pub Date : 2021-08-02 DOI: 10.3233/jcs-200111
Kadam Vikas Samarthrao, Vandana Milind Rohokale
Email has sustained to be an essential part of our lives and as a means for better communication on the internet. The challenge pertains to the spam emails residing a large amount of space and bandwidth. The defect of state-of-the-art spam filtering methods like misclassification of genuine emails as spam (false positives) is the rising challenge to the internet world. Depending on the classification techniques, literature provides various algorithms for the classification of email spam. This paper tactics to develop a novel spam detection model for improved cybersecurity. The proposed model involves several phases like dataset acquisition, feature extraction, optimal feature selection, and detection. Initially, the benchmark dataset of email is collected that involves both text and image datasets. Next, the feature extraction is performed using two sets of features like text features and visual features. In the text features, Term Frequency-Inverse Document Frequency (TF-IDF) is extracted. For the visual features, color correlogram and Gray-Level Co-occurrence Matrix (GLCM) are determined. Since the length of the extracted feature vector seems to the long, the optimal feature selection process is done. The optimal feature selection is performed by a new meta-heuristic algorithm called Fitness Oriented Levy Improvement-based Dragonfly Algorithm (FLI-DA). Once the optimal features are selected, the detection is performed by the hybrid learning technique that is composed of two deep learning approaches named Recurrent Neural Network (RNN) and Convolutional Neural Network (CNN). For improving the performance of existing deep learning approaches, the number of hidden neurons of RNN and CNN is optimized by the same FLI-DA. Finally, the optimized hybrid learning technique having CNN and RNN classifies the data into spam and ham. The experimental outcomes show the ability of the proposed method to perform the spam email classification based on improved deep learning.
电子邮件一直是我们生活中必不可少的一部分,也是在互联网上更好地沟通的一种手段。问题在于垃圾邮件占用了大量的空间和带宽。最先进的垃圾邮件过滤方法的缺陷,如将真实电子邮件错误地分类为垃圾邮件(误报),是互联网世界面临的日益严峻的挑战。根据分类技术的不同,文献提供了各种分类电子邮件垃圾邮件的算法。本文提出了一种新的垃圾邮件检测模型,以提高网络安全。该模型包括数据集采集、特征提取、最优特征选择和检测等几个阶段。首先,收集电子邮件的基准数据集,其中包括文本和图像数据集。接下来,使用文本特征和视觉特征两组特征进行特征提取。在文本特征中,提取词频率-逆文档频率(TF-IDF)。对于视觉特征,确定颜色相关图和灰度共生矩阵。由于提取的特征向量的长度似乎较长,因此进行了最优特征选择过程。最优特征选择采用一种新的元启发式算法——基于适应度的Levy改进蜻蜓算法(FLI-DA)。一旦选择了最优特征,就通过混合学习技术进行检测,该技术由两种深度学习方法组成,即循环神经网络(RNN)和卷积神经网络(CNN)。为了提高现有深度学习方法的性能,RNN和CNN的隐藏神经元数量通过相同的fl - da进行优化。最后,利用优化后的CNN和RNN混合学习技术,将数据分为spam和ham两类。实验结果表明,该方法能够基于改进的深度学习对垃圾邮件进行分类。
{"title":"Enhancement of email spam detection using improved deep learning algorithms for cyber security","authors":"Kadam Vikas Samarthrao, Vandana Milind Rohokale","doi":"10.3233/jcs-200111","DOIUrl":"https://doi.org/10.3233/jcs-200111","url":null,"abstract":"Email has sustained to be an essential part of our lives and as a means for better communication on the internet. The challenge pertains to the spam emails residing a large amount of space and bandwidth. The defect of state-of-the-art spam filtering methods like misclassification of genuine emails as spam (false positives) is the rising challenge to the internet world. Depending on the classification techniques, literature provides various algorithms for the classification of email spam. This paper tactics to develop a novel spam detection model for improved cybersecurity. The proposed model involves several phases like dataset acquisition, feature extraction, optimal feature selection, and detection. Initially, the benchmark dataset of email is collected that involves both text and image datasets. Next, the feature extraction is performed using two sets of features like text features and visual features. In the text features, Term Frequency-Inverse Document Frequency (TF-IDF) is extracted. For the visual features, color correlogram and Gray-Level Co-occurrence Matrix (GLCM) are determined. Since the length of the extracted feature vector seems to the long, the optimal feature selection process is done. The optimal feature selection is performed by a new meta-heuristic algorithm called Fitness Oriented Levy Improvement-based Dragonfly Algorithm (FLI-DA). Once the optimal features are selected, the detection is performed by the hybrid learning technique that is composed of two deep learning approaches named Recurrent Neural Network (RNN) and Convolutional Neural Network (CNN). For improving the performance of existing deep learning approaches, the number of hidden neurons of RNN and CNN is optimized by the same FLI-DA. Finally, the optimized hybrid learning technique having CNN and RNN classifies the data into spam and ham. The experimental outcomes show the ability of the proposed method to perform the spam email classification based on improved deep learning.","PeriodicalId":142580,"journal":{"name":"J. Comput. Secur.","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117237344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
FakeFilter: A cross-distribution Deepfake detection system with domain adaptation FakeFilter:一种具有域自适应的交叉分布深度假检测系统
Pub Date : 2021-06-18 DOI: 10.3233/JCS-200124
Jianguo Jiang, Boquan Li, Baole Wei, Gang Li, Chao Liu, Wei-qing Huang, Meimei Li, Min Yu
Abuse of face swap techniques poses serious threats to the integrity and authenticity of digital visual media. More alarmingly, fake images or videos created by deep learning technologies, also known as Deepfakes, are more realistic, high-quality, and reveal few tampering traces, which attracts great attention in digital multimedia forensics research. To address those threats imposed by Deepfakes, previous work attempted to classify real and fake faces by discriminative visual features, which is subjected to various objective conditions such as the angle or posture of a face. Differently, some research devises deep neural networks to discriminate Deepfakes at the microscopic-level semantics of images, which achieves promising results. Nevertheless, such methods show limited success as encountering unseen Deepfakes created with different methods from the training sets. Therefore, we propose a novel Deepfake detection system, named FakeFilter, in which we formulate the challenge of unseen Deepfake detection into a problem of cross-distribution data classification, and address the issue with a strategy of domain adaptation. By mapping different distributions of Deepfakes into similar features in a certain space, the detection system achieves comparable performance on both seen and unseen Deepfakes. Further evaluation and comparison results indicate that the challenge has been successfully addressed by FakeFilter.
人脸交换技术的滥用对数字视觉媒体的完整性和真实性构成了严重威胁。更令人担忧的是,通过深度学习技术(也称为Deepfakes)制作的假图像或视频更加逼真,质量更高,并且几乎没有显示篡改痕迹,这在数字多媒体取证研究中备受关注。为了解决Deepfakes带来的威胁,之前的工作试图通过区分视觉特征来分类真实和虚假的人脸,这受到各种客观条件的影响,如面部的角度或姿势。不同的是,一些研究设计了深度神经网络,在图像的微观语义上区分Deepfakes,取得了很好的效果。然而,这些方法在遇到用不同方法从训练集创建的看不见的Deepfakes时显示出有限的成功。因此,我们提出了一种新的深度伪造检测系统FakeFilter,该系统将不可见深度伪造检测的挑战转化为交叉分布数据分类问题,并采用域自适应策略解决该问题。通过将Deepfakes的不同分布映射到特定空间中的相似特征,检测系统在可见和未见Deepfakes上都实现了相当的性能。进一步的评估和比较结果表明,FakeFilter已经成功地解决了这个挑战。
{"title":"FakeFilter: A cross-distribution Deepfake detection system with domain adaptation","authors":"Jianguo Jiang, Boquan Li, Baole Wei, Gang Li, Chao Liu, Wei-qing Huang, Meimei Li, Min Yu","doi":"10.3233/JCS-200124","DOIUrl":"https://doi.org/10.3233/JCS-200124","url":null,"abstract":"Abuse of face swap techniques poses serious threats to the integrity and authenticity of digital visual media. More alarmingly, fake images or videos created by deep learning technologies, also known as Deepfakes, are more realistic, high-quality, and reveal few tampering traces, which attracts great attention in digital multimedia forensics research. To address those threats imposed by Deepfakes, previous work attempted to classify real and fake faces by discriminative visual features, which is subjected to various objective conditions such as the angle or posture of a face. Differently, some research devises deep neural networks to discriminate Deepfakes at the microscopic-level semantics of images, which achieves promising results. Nevertheless, such methods show limited success as encountering unseen Deepfakes created with different methods from the training sets. Therefore, we propose a novel Deepfake detection system, named FakeFilter, in which we formulate the challenge of unseen Deepfake detection into a problem of cross-distribution data classification, and address the issue with a strategy of domain adaptation. By mapping different distributions of Deepfakes into similar features in a certain space, the detection system achieves comparable performance on both seen and unseen Deepfakes. Further evaluation and comparison results indicate that the challenge has been successfully addressed by FakeFilter.","PeriodicalId":142580,"journal":{"name":"J. Comput. Secur.","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123844621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A new approach for detecting violation of data plane integrity in Software Defined Networks 软件定义网络中数据平面完整性破坏检测的新方法
Pub Date : 2021-04-20 DOI: 10.3233/JCS-200094
Ghandi Hessam, Ghassan Saba, M. Alkhayat
The scale of Software Defined Networks (SDN) is expanding rapidly and the demands for security reinforcement are increasing. SDN creates new targets for potential security threats such as the SDN controller and networking devices in the data plane. Violation of data plane integrity might lead to abnormal behaviors of the overall network. In this paper, we propose a new security approach for OpenFlow-based SDN in order to detect violation of switches flow tables integrity and successfully locate the compromised switches online. We cover all aspects of integrity violation including flow rule adding, modifying and removing by an unauthorized entity. We achieve this by using the cookie field in the OpenFlow protocol to put in a suitable digest (hash) value for each flow entry. Moreover, we optimize our method performance by calculating a global digest value for the entire switch’s flow table that decides whether a switch is suspected of being compromised. Our method is also able to determine and handle false alarms that affect the coherence of a corresponding table digest. The implementation is a reactive java module integrated with the Floodlight controller. In addition, we introduce a performance evaluation for three different SDN topologies.
软件定义网络(SDN)的规模正在迅速扩大,对安全加固的需求也在不断增加。SDN为潜在的安全威胁提供了新的目标,例如SDN控制器和数据平面的网络设备。破坏数据平面的完整性可能会导致整个网络的异常行为。在本文中,我们为基于openflow的SDN提出了一种新的安全方法,以检测交换机流表完整性的破坏,并成功地在线定位受损的交换机。我们涵盖了完整性违反的所有方面,包括未经授权的实体添加、修改和删除流规则。我们通过使用OpenFlow协议中的cookie字段为每个流条目放入合适的摘要(哈希)值来实现这一点。此外,我们通过计算整个交换机流表的全局摘要值来优化我们的方法性能,该值决定是否怀疑交换机被破坏。我们的方法还能够确定和处理影响相应表摘要一致性的假警报。实现是一个与泛光灯控制器集成的响应式java模块。此外,我们还介绍了三种不同SDN拓扑的性能评估。
{"title":"A new approach for detecting violation of data plane integrity in Software Defined Networks","authors":"Ghandi Hessam, Ghassan Saba, M. Alkhayat","doi":"10.3233/JCS-200094","DOIUrl":"https://doi.org/10.3233/JCS-200094","url":null,"abstract":"The scale of Software Defined Networks (SDN) is expanding rapidly and the demands for security reinforcement are increasing. SDN creates new targets for potential security threats such as the SDN controller and networking devices in the data plane. Violation of data plane integrity might lead to abnormal behaviors of the overall network. In this paper, we propose a new security approach for OpenFlow-based SDN in order to detect violation of switches flow tables integrity and successfully locate the compromised switches online. We cover all aspects of integrity violation including flow rule adding, modifying and removing by an unauthorized entity. We achieve this by using the cookie field in the OpenFlow protocol to put in a suitable digest (hash) value for each flow entry. Moreover, we optimize our method performance by calculating a global digest value for the entire switch’s flow table that decides whether a switch is suspected of being compromised. Our method is also able to determine and handle false alarms that affect the coherence of a corresponding table digest. The implementation is a reactive java module integrated with the Floodlight controller. In addition, we introduce a performance evaluation for three different SDN topologies.","PeriodicalId":142580,"journal":{"name":"J. Comput. Secur.","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126848509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
J. Comput. Secur.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1