{"title":"Multi-agent systems in defense and security: Research projects, systems, and software tools","authors":"I. Monitor","doi":"10.11610/isij.0806","DOIUrl":"https://doi.org/10.11610/isij.0806","url":null,"abstract":"","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124499370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nowadays, almost everywhere, there are a huge number of privately owned telephone exchanges that serve the communication needs of a private or public entity making connections among internal telephones and linking them to other users in the public telephone network. Such communications cover most vital infrastructures, including hospitals, ministries, police, army, banks, public bodies/authorities, companies, industries and so on. The purpose of this paper is to raise awareness in regards to security and privacy threats present in private communications, helping both users and vendors safeguard their systems. This article provides an introduction to private branch exchanges (PBXs) and private communications, and a review of relevant threats and vulnerabilities. Finally, one possible approach to assessment of private communications security is presented, along with appropriate taxonomies. Such approach relies on performing gap analysis and is based on the IMECA technique.
{"title":"Imeca-Based Technique for Security Assessment of Private Communications: Technology and Training","authors":"I. Androulidakis, V. Kharchenko, Andriy Kovalenko","doi":"10.11610/ISIJ.3505","DOIUrl":"https://doi.org/10.11610/ISIJ.3505","url":null,"abstract":"Nowadays, almost everywhere, there are a huge number of privately owned telephone exchanges that serve the communication needs of a private or public entity making connections among internal telephones and linking them to other users in the public telephone network. Such communications cover most vital infrastructures, including hospitals, ministries, police, army, banks, public bodies/authorities, companies, industries and so on. The purpose of this paper is to raise awareness in regards to security and privacy threats present in private communications, helping both users and vendors safeguard their systems. This article provides an introduction to private branch exchanges (PBXs) and private communications, and a review of relevant threats and vulnerabilities. Finally, one possible approach to assessment of private communications security is presented, along with appropriate taxonomies. Such approach relies on performing gap analysis and is based on the IMECA technique.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124061894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Comparative Analysis of Russian and US Views on Information Warfare in the Works of Timothy Thomas","authors":"T. Tagarev","doi":"10.11610/ISIJ.0108","DOIUrl":"https://doi.org/10.11610/ISIJ.0108","url":null,"abstract":"","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128085705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The catchphrase of the “digital divide” has evolved into a central point of reference for policymakers and IT practitioners alike. It provides an imaginative shorthand for the multiple imbalances that characterize the diffusion of novel information and communication technologies (ICTs) along income, gender, age and many other socioeconomic categories. The numbers are well-known and widely published:
{"title":"Internet, Civil Society and Global Governance: The Neglected Political Dimension of the Digital Divide","authors":"D. Zinnbauer","doi":"10.11610/ISIJ.0703","DOIUrl":"https://doi.org/10.11610/ISIJ.0703","url":null,"abstract":"The catchphrase of the “digital divide” has evolved into a central point of reference for policymakers and IT practitioners alike. It provides an imaginative shorthand for the multiple imbalances that characterize the diffusion of novel information and communication technologies (ICTs) along income, gender, age and many other socioeconomic categories. The numbers are well-known and widely published:","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"181 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128170405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This article introduces the network context and reveals some aspects of the hybrid threats, the decision-making process to counter hybrid threats and three possible options to handle that issue. In order to discover possible hybrid actions, we need a methodology that considers national interests along with major trends and threats as well as weaknesses and impacts. The implementation of such methodology will provide sufficient data and information to support decisions, accounting for all instruments of power in an integrated strategic approach.
{"title":"How to Counter Hybrid Threats","authors":"L. Monov, M. Karev","doi":"10.11610/isij.3909","DOIUrl":"https://doi.org/10.11610/isij.3909","url":null,"abstract":"This article introduces the network context and reveals some aspects of the hybrid threats, the decision-making process to counter hybrid threats and three possible options to handle that issue. In order to discover possible hybrid actions, we need a methodology that considers national interests along with major trends and threats as well as weaknesses and impacts. The implementation of such methodology will provide sufficient data and information to support decisions, accounting for all instruments of power in an integrated strategic approach.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125253993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The ongoing e-Government Program in Taiwan started in 1997. It is based on the Government Service Network, which is the backbone infrastructure of the network transaction environment. During the first phase of this program in 1998, Taiwan established its first Certification Authority, namely, the Government Certification Authority (GCA), and this launched the electronic certification services in Taiwan. From 2001 to 2004, the Government Public Key Infrastructure (GPKI) has been established according to the planning set forth in the e-Government Program with the aim of strengthening electronic government infrastructure and establishing electronic certification and security applications for executive administration. Besides GPKI applications, PKI interoperability has become a major issue in Taiwan recently. Several interoperability schemes, such as strict hierarchy and Bridge Certificate Authority (BCA), have been deployed in different PKI domains. To achieve global PKI interoperability in Taiwan, BCA is being adapted as a major CA-CA interoperability engine, which will ensure trusted relationships between the different PKI domains.
{"title":"Government PKI Deployment and Usage in Taiwan","authors":"C. Ou, C. Ho, Hwai-Ling Shan","doi":"10.11610/ISIJ.1503","DOIUrl":"https://doi.org/10.11610/ISIJ.1503","url":null,"abstract":"The ongoing e-Government Program in Taiwan started in 1997. It is based on the Government Service Network, which is the backbone infrastructure of the network transaction environment. During the first phase of this program in 1998, Taiwan established its first Certification Authority, namely, the Government Certification Authority (GCA), and this launched the electronic certification services in Taiwan. From 2001 to 2004, the Government Public Key Infrastructure (GPKI) has been established according to the planning set forth in the e-Government Program with the aim of strengthening electronic government infrastructure and establishing electronic certification and security applications for executive administration. Besides GPKI applications, PKI interoperability has become a major issue in Taiwan recently. Several interoperability schemes, such as strict hierarchy and Bridge Certificate Authority (BCA), have been deployed in different PKI domains. To achieve global PKI interoperability in Taiwan, BCA is being adapted as a major CA-CA interoperability engine, which will ensure trusted relationships between the different PKI domains.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125634803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Steganography in audio files usually revolves around well-known concepts and algorithms, least significant bit algorithm to name one. This paper proposes a new, alternative approach where steganographic information is connected with the medium even more – by using the medium itself as the information. The goal of this paper is to present a new aspect of steganography, which utilizes machine learning. This form of steganography may produce statistically indeterminable steganographic files which are immune to brute force attempts at trying to retrieve the hidden messages. Then the proposed solution is verified against statistical analysis and brute force attacks with promising results. A R T I C L E I N F O : RECEIVED: 04 JUNE 2020 REVISED: 24 AUG 2020 ONLINE: 22 SEP 2020 K E Y W O R D S : steganography, audio, MIDI format, machine learning Creative Commons BY-NC 4.0
音频文件中的隐写术通常围绕着众所周知的概念和算法,最低有效位算法就是其中之一。本文提出了一种新的替代方法,通过使用媒介本身作为信息,将隐写信息与媒介联系得更加紧密。本文的目标是介绍利用机器学习的隐写术的一个新方面。这种形式的隐写可能产生统计上无法确定的隐写文件,这些文件在试图检索隐藏信息时不受暴力破解的影响。通过统计分析和蛮力攻击验证了该方案的有效性。A R T I C L EI N F O:收稿日期:2020年6月4日修正值:2020年8月24日在线日期:2020年9月22日K E Y W O R D S:隐写,音频,MIDI格式,机器学习创作共用BY-NC 4.0
{"title":"A New Steganographic Algorithm for Hiding Messages in Music","authors":"M. Bajor, M. Niemiec","doi":"10.11610/isij.4718","DOIUrl":"https://doi.org/10.11610/isij.4718","url":null,"abstract":"Steganography in audio files usually revolves around well-known concepts and algorithms, least significant bit algorithm to name one. This paper proposes a new, alternative approach where steganographic information is connected with the medium even more – by using the medium itself as the information. The goal of this paper is to present a new aspect of steganography, which utilizes machine learning. This form of steganography may produce statistically indeterminable steganographic files which are immune to brute force attempts at trying to retrieve the hidden messages. Then the proposed solution is verified against statistical analysis and brute force attacks with promising results. A R T I C L E I N F O : RECEIVED: 04 JUNE 2020 REVISED: 24 AUG 2020 ONLINE: 22 SEP 2020 K E Y W O R D S : steganography, audio, MIDI format, machine learning Creative Commons BY-NC 4.0","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134515668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jugoslav Achkoski, Metodija Dojchinovski, V. Trajkovik
Security is an important requirement for a service-oriented architecture (SOA), since SOA in principle considers services spread widely on different locations and diverse operational platforms. The main challenge for SOA security still drifts around ‘clouds’ and there is still a lack of suitable frameworks for security models based on consistent and convenient methods. In this paper, we propose security solutions for an Intelligence Information System completely based on SOA. Contemporary security architectures and security protocols are still evolving. SOA-based systems are characterized with differences in security implementation as encryption, access control, security monitoring, security management through disparate domains etc. Domains have services as endpoints in the information systems, which usually form composite services. The workflow which is established through composite services is extending on different endpoints in different domains. The paper’s main aim is to provide a contribution in developing suitable security solutions to Intelligence Information Systems using web service security standards in order to reach appropriate level of information security considering authentication, authorization, privacy, integrity, trust, federated identities, confidentiality and more. The paper reflects an approach in which useful information provided by the services is sent out directly from the creators of information to the consumers of information. We introduce security and logging system that can be used as verification and validation middleware
{"title":"An Intelligence Information System based on Service-Oriented Architecture: A Survey of Security Issues","authors":"Jugoslav Achkoski, Metodija Dojchinovski, V. Trajkovik","doi":"10.11610/ISIJ.2710","DOIUrl":"https://doi.org/10.11610/ISIJ.2710","url":null,"abstract":"Security is an important requirement for a service-oriented architecture (SOA), since SOA in principle considers services spread widely on different locations and diverse operational platforms. The main challenge for SOA security still drifts around ‘clouds’ and there is still a lack of suitable frameworks for security models based on consistent and convenient methods. In this paper, we propose security solutions for an Intelligence Information System completely based on SOA. Contemporary security architectures and security protocols are still evolving. SOA-based systems are characterized with differences in security implementation as encryption, access control, security monitoring, security management through disparate domains etc. Domains have services as endpoints in the information systems, which usually form composite services. The workflow which is established through composite services is extending on different endpoints in different domains. The paper’s main aim is to provide a contribution in developing suitable security solutions to Intelligence Information Systems using web service security standards in order to reach appropriate level of information security considering authentication, authorization, privacy, integrity, trust, federated identities, confidentiality and more. The paper reflects an approach in which useful information provided by the services is sent out directly from the creators of information to the consumers of information. We introduce security and logging system that can be used as verification and validation middleware","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134300288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ransomware is a type of malicious activity aiming to prevent users from accessing their data by encrypting it. For the purposes of analysis of the behaviour of the crypto viruses, objectively collected data is required. Getting metrics from a virtual machine would be resembling the original behaviour of the ransomware on a physical device. Observing, measuring, collecting and extracting data on a physical device during and after encryption is challenging, since all the data would be corrupted once the encryption process is complete. By utilizing two user profiles, members of the local admin group and custom access control lists on certain recourse, a lab laptop is infected with five different samples of ransomware crypto viruses that do not require connection to the command and control server in order to function as intended. A data set of HDD metrics is successfully collected and extracted. A R T I C L E I N F O : RECEIVED: 28 APR 2020 REVISED: 16 MAY 2020 ONLINE: 18 MAY 2020 K E Y W O R D S : measurement, extraction, ransomware, encryption, malware, malicious, cybersecurity Creative Commons BY-NC 4.0
勒索软件是一种恶意活动,旨在通过加密来阻止用户访问他们的数据。为了分析加密病毒的行为,需要客观地收集数据。从虚拟机获取指标将类似于勒索软件在物理设备上的原始行为。在加密期间和之后,在物理设备上观察、测量、收集和提取数据是具有挑战性的,因为一旦加密过程完成,所有数据都会损坏。通过使用两个用户配置文件、本地管理组成员和特定资源上的自定义访问控制列表,一台实验室笔记本电脑感染了五种不同的勒索软件加密病毒样本,这些病毒不需要连接到命令和控制服务器就可以按预期运行。成功地收集并提取了HDD指标的数据集。A R T I C L EI N F O:收稿日期:2020年4月28日修订日期:2020年5月16日在线日期:2020年5月18日K E Y O O R D S:测量、提取、勒索软件、加密、恶意软件、恶意软件、网络安全Creative Commons BY-NC 4.0
{"title":"Observing, Measuring and Collecting HDD Performance Metrics on a Physical Machine During Ransomware Attack","authors":"Dimo Dimov, Yuliyan Tsonev","doi":"10.11610/isij.4723","DOIUrl":"https://doi.org/10.11610/isij.4723","url":null,"abstract":"Ransomware is a type of malicious activity aiming to prevent users from accessing their data by encrypting it. For the purposes of analysis of the behaviour of the crypto viruses, objectively collected data is required. Getting metrics from a virtual machine would be resembling the original behaviour of the ransomware on a physical device. Observing, measuring, collecting and extracting data on a physical device during and after encryption is challenging, since all the data would be corrupted once the encryption process is complete. By utilizing two user profiles, members of the local admin group and custom access control lists on certain recourse, a lab laptop is infected with five different samples of ransomware crypto viruses that do not require connection to the command and control server in order to function as intended. A data set of HDD metrics is successfully collected and extracted. A R T I C L E I N F O : RECEIVED: 28 APR 2020 REVISED: 16 MAY 2020 ONLINE: 18 MAY 2020 K E Y W O R D S : measurement, extraction, ransomware, encryption, malware, malicious, cybersecurity Creative Commons BY-NC 4.0","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131015208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Distributed simulation is an approach to building large-scale simulation models from a set of independent simulator nodes communicating via a network. The simulator nodes each independently simulate the activities of one or more entities in the simulated world and report the attributes (e.g., location and velocity) and actions (e.g., weapons firing) of those entities via the network to the other simulator nodes using a pre-defined communications protocol. In a typical distributed simulation, the simulated entities coexist in a common simulated environment and can interact with each other; their interactions are realized via the exchange of messages in the protocol.
{"title":"A Terrain Reasoning Algorithm for Defending a Fire Zone","authors":"Mikel D. Petty, R. Franceschini, A. Mukherjee","doi":"10.11610/ISIJ.0304","DOIUrl":"https://doi.org/10.11610/ISIJ.0304","url":null,"abstract":"Distributed simulation is an approach to building large-scale simulation models from a set of independent simulator nodes communicating via a network. The simulator nodes each independently simulate the activities of one or more entities in the simulated world and report the attributes (e.g., location and velocity) and actions (e.g., weapons firing) of those entities via the network to the other simulator nodes using a pre-defined communications protocol. In a typical distributed simulation, the simulated entities coexist in a common simulated environment and can interact with each other; their interactions are realized via the exchange of messages in the protocol.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131143312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}