首页 > 最新文献

Journal of Cybersecurity and Information Management最新文献

英文 中文
I-DMAC: An Intelligent DMA Controller for Utilization - Aware Video Streaming used in AI Applications I-DMAC:用于人工智能应用中使用的利用率感知视频流的智能DMA控制器
Pub Date : 1900-01-01 DOI: 10.54216/jcim.080203
P. Shukla, P. Shukla
The interpretation of large data streams necessitates high-performance repeated transfers, which overload Microprocessor System on Chips (SoC). The effective direct memory access (DMA) controller performs bulk data transfers without the CPU's involvement. The Direct Memory Controller (DMAC) solves this by facilitating bulk data transfer and execution. In this work, we created an intelligent DMAC (I-DMAC) for accessing video processing data without using CPUs. The model includes Bus selection Module, User control signal, Status Register, DMA supported Address, and AXI-PCI subsystems for improved video frame analysis. These modules are experimentally verified in Xilinx FPGA SoC architecture using VHDL code simulation and results compared to the E-DMAC model.
大数据流的解释需要高性能的重复传输,这会使微处理器片上系统(SoC)过载。有效的直接内存访问(DMA)控制器在没有CPU参与的情况下执行批量数据传输。直接内存控制器(DMAC)通过促进批量数据传输和执行来解决这个问题。在这项工作中,我们创建了一个智能DMAC (I-DMAC)来访问视频处理数据,而不使用cpu。该模型包括总线选择模块、用户控制信号、状态寄存器、DMA支持地址和用于改进视频帧分析的axis - pci子系统。这些模块在Xilinx FPGA SoC架构中进行了实验验证,使用VHDL代码进行仿真,结果与E-DMAC模型进行了比较。
{"title":"I-DMAC: An Intelligent DMA Controller for Utilization - Aware Video Streaming used in AI Applications","authors":"P. Shukla, P. Shukla","doi":"10.54216/jcim.080203","DOIUrl":"https://doi.org/10.54216/jcim.080203","url":null,"abstract":"The interpretation of large data streams necessitates high-performance repeated transfers, which overload Microprocessor System on Chips (SoC). The effective direct memory access (DMA) controller performs bulk data transfers without the CPU's involvement. The Direct Memory Controller (DMAC) solves this by facilitating bulk data transfer and execution. In this work, we created an intelligent DMAC (I-DMAC) for accessing video processing data without using CPUs. The model includes Bus selection Module, User control signal, Status Register, DMA supported Address, and AXI-PCI subsystems for improved video frame analysis. These modules are experimentally verified in Xilinx FPGA SoC architecture using VHDL code simulation and results compared to the E-DMAC model.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127901436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An investigation into the effect of cybersecurity on attack prevention strategies 网络安全对攻击防范策略的影响研究
Pub Date : 1900-01-01 DOI: 10.54216/jcim.030203
Mohammed I. Alghamdi
Our economy, infrastructure and societies rely to a large extent on information technology and computer networks solutions. Increasing dependency on information technologies has also multiplied the potential hazards of cyber-attacks. The prime goal of this study is to critically examine how the sufficient knowledge of cyber security threats plays a vital role in detection of any intrusion in simple networks and preventing the attacks. The study has evaluated various literatures and peer reviewed articles to examine the findings obtained by consolidating the outcomes of different studies and present the final findings into a simplified solution.
我们的经济、基础设施和社会在很大程度上依赖于信息技术和计算机网络解决方案。对信息技术的日益依赖也使网络攻击的潜在危险成倍增加。本研究的主要目标是批判性地研究网络安全威胁的充分知识如何在检测简单网络中的任何入侵和防止攻击中发挥重要作用。本研究评估了各种文献和同行评议的文章,通过整合不同研究的结果来检验所获得的结果,并将最终结果呈现为简化的解决方案。
{"title":"An investigation into the effect of cybersecurity on attack prevention strategies","authors":"Mohammed I. Alghamdi","doi":"10.54216/jcim.030203","DOIUrl":"https://doi.org/10.54216/jcim.030203","url":null,"abstract":"Our economy, infrastructure and societies rely to a large extent on information technology and computer networks solutions. Increasing dependency on information technologies has also multiplied the potential hazards of cyber-attacks. The prime goal of this study is to critically examine how the sufficient knowledge of cyber security threats plays a vital role in detection of any intrusion in simple networks and preventing the attacks. The study has evaluated various literatures and peer reviewed articles to examine the findings obtained by consolidating the outcomes of different studies and present the final findings into a simplified solution.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121277770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Energy Efficient Clustering Protocol using Enhanced Rain Optimization Algorithm in Mobile Adhoc Networks 基于增强型Rain优化算法的移动自组网节能聚类协议
Pub Date : 1900-01-01 DOI: 10.54216/jcim.070201
M. Elhoseny, X. Yuan
Energy efficiency is a significant challenge in mobile ad hoc networks (MANETs) design where the nodes move randomly with limited energy, leading to acceptable topology modifications. Clustering is a widely applied technique to accomplish energy efficiency in MANET. Therefore, this paper designs a new energy-efficient clustering protocol using an enhanced rain optimization algorithm (EECP-EROA) for MANET. The EROA technique is derived by integrating the Levy flight concept to the ROA to enhance global exploration abilities. In addition, the EECP-EROA technique intends to proficiently select CHs and the nearby nodes linked to the CH to generate clusters. Moreover, the EECP-EROA technique has derived an objective function with different input parameters. To showcase the superior performance of the EECP-EROA technique, a brief set of simulations takes place, and the results are inspected under varying aspects. The experimental values pointed out the betterment of the EECP-EROA technique over the other methods.
能源效率是移动自组织网络(manet)设计中的一个重大挑战,在这种网络中,节点以有限的能量随机移动,从而导致可接受的拓扑修改。聚类是一种广泛应用于自组网的节能技术。为此,本文采用增强型降雨优化算法(EECP-EROA)为MANET设计了一种新的节能聚类协议。EROA技术是通过将Levy飞行概念与ROA相结合而衍生出来的,以提高全球勘探能力。此外,EECP-EROA技术旨在熟练地选择CHs和连接到CH的附近节点来生成聚类。此外,EECP-EROA技术还推导出了具有不同输入参数的目标函数。为了展示EECP-EROA技术的优越性能,进行了一组简短的仿真,并从各个方面对结果进行了检查。实验结果表明,EECP-EROA技术优于其他方法。
{"title":"An Energy Efficient Clustering Protocol using Enhanced Rain Optimization Algorithm in Mobile Adhoc Networks","authors":"M. Elhoseny, X. Yuan","doi":"10.54216/jcim.070201","DOIUrl":"https://doi.org/10.54216/jcim.070201","url":null,"abstract":"Energy efficiency is a significant challenge in mobile ad hoc networks (MANETs) design where the nodes move randomly with limited energy, leading to acceptable topology modifications. Clustering is a widely applied technique to accomplish energy efficiency in MANET. Therefore, this paper designs a new energy-efficient clustering protocol using an enhanced rain optimization algorithm (EECP-EROA) for MANET. The EROA technique is derived by integrating the Levy flight concept to the ROA to enhance global exploration abilities. In addition, the EECP-EROA technique intends to proficiently select CHs and the nearby nodes linked to the CH to generate clusters. Moreover, the EECP-EROA technique has derived an objective function with different input parameters. To showcase the superior performance of the EECP-EROA technique, a brief set of simulations takes place, and the results are inspected under varying aspects. The experimental values pointed out the betterment of the EECP-EROA technique over the other methods.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115480337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Intrusion Detection Framework (IDF) using Machine Learning Methods 基于机器学习的入侵检测框架(IDF)
Pub Date : 1900-01-01 DOI: 10.54216/jcim.100103
Shereen H. Ali
An intrusion detection system is a critical security feature that analyses network traffic in order to avoid serious unauthorized access to network resources. For securing networks against potential breaches, effective intrusion detection is critical. In this paper, a novel Intrusion Detection Framework (IDF) is proposed. The three modules that comprise the suggested IDF are: (i) Data Pre-processing Module (DPM), (ii) Feature Selection Module (FSM), and Classification Module (CM). DPM collects and processes network traffic in order to prepare data for training and testing. The FSM seeks to identify the key elements for recognizing DPM intrusion attempts. An Improved Particle Swarm Optimization is used (IPSO). IPSO is a hybrid method that uses both filter and wrapper approaches to generate accurate and relevant information for the classification step that follows. Primary Selection Phase (PSP) and Completed Selection Phase (CSP) are the two consecutive feature selection phases in IPSO. PSP employs a filtering approaches to quickly identify the most significant features for detecting intrusion threats while eliminating those that are redundant or ineffective. In CSP, the next level of IPSO, this behavior reduces the computing cost. For accurate feature selection, CSP uses Binary Particle Swarm Optimization (Bi-PSO) as a wrapper approach. Based on the most effective features identified by FSM, The CM aims to identify intrusion attempts with the minimal processing time. Therefore, a K-Nearest Neighbor KNN classifier has been deployed. As a result, based on the significant features identified by the IPSO technique, KNN can accurately detect intrusion attacks with the least amount of processing time. The experimental results have shown that the proposed IDF outperforms other recent techniques using UNSW_NB-15 dataset. The accuracy, precision, recall, F1score, and processing time of the experimental outcomes of our findings were assessed. Our results were competitive with an accuracy of 99.8%, precision of 99.94%, recall of 99.85%, F1-score of 99.89%, and excursion time of 59.15s when compared to the findings of the current works.
入侵检测系统是一项重要的安全功能,它可以分析网络流量,以避免对网络资源的严重非法访问。为了保护网络免受潜在的破坏,有效的入侵检测至关重要。提出了一种新的入侵检测框架(IDF)。建议的IDF由三个模块组成:(i)数据预处理模块(DPM), (ii)特征选择模块(FSM)和分类模块(CM)。DPM收集和处理网络流量,以便为培训和测试准备数据。FSM试图识别识别DPM入侵企图的关键要素。采用了改进的粒子群优化算法(IPSO)。IPSO是一种混合方法,它使用过滤器和包装器方法为接下来的分类步骤生成准确和相关的信息。初级选择阶段(PSP)和完成选择阶段(CSP)是IPSO中两个连续的特征选择阶段。PSP采用过滤方法快速识别入侵威胁检测中最重要的特征,同时消除冗余或无效的特征。在IPSO的下一级CSP中,这种行为降低了计算成本。为了精确的特征选择,CSP使用二元粒子群优化(Bi-PSO)作为包装方法。基于FSM识别出的最有效的特征,CM旨在以最少的处理时间识别入侵企图。因此,我们部署了一个k近邻KNN分类器。因此,基于IPSO技术识别的重要特征,KNN能够以最少的处理时间准确检测入侵攻击。实验结果表明,所提出的IDF优于最近使用UNSW_NB-15数据集的其他技术。对实验结果的正确率、精密度、查全率、F1score和处理时间进行了评估。与现有研究结果相比,我们的结果具有竞争力,准确率为99.8%,精密度为99.94%,召回率为99.85%,f1分数为99.89%,偏移时间为59.15s。
{"title":"A Novel Intrusion Detection Framework (IDF) using Machine Learning Methods","authors":"Shereen H. Ali","doi":"10.54216/jcim.100103","DOIUrl":"https://doi.org/10.54216/jcim.100103","url":null,"abstract":"An intrusion detection system is a critical security feature that analyses network traffic in order to avoid serious unauthorized access to network resources. For securing networks against potential breaches, effective intrusion detection is critical. In this paper, a novel Intrusion Detection Framework (IDF) is proposed. The three modules that comprise the suggested IDF are: (i) Data Pre-processing Module (DPM), (ii) Feature Selection Module (FSM), and Classification Module (CM). DPM collects and processes network traffic in order to prepare data for training and testing. The FSM seeks to identify the key elements for recognizing DPM intrusion attempts. An Improved Particle Swarm Optimization is used (IPSO). IPSO is a hybrid method that uses both filter and wrapper approaches to generate accurate and relevant information for the classification step that follows. Primary Selection Phase (PSP) and Completed Selection Phase (CSP) are the two consecutive feature selection phases in IPSO. PSP employs a filtering approaches to quickly identify the most significant features for detecting intrusion threats while eliminating those that are redundant or ineffective. In CSP, the next level of IPSO, this behavior reduces the computing cost. For accurate feature selection, CSP uses Binary Particle Swarm Optimization (Bi-PSO) as a wrapper approach. Based on the most effective features identified by FSM, The CM aims to identify intrusion attempts with the minimal processing time. Therefore, a K-Nearest Neighbor KNN classifier has been deployed. As a result, based on the significant features identified by the IPSO technique, KNN can accurately detect intrusion attacks with the least amount of processing time. The experimental results have shown that the proposed IDF outperforms other recent techniques using UNSW_NB-15 dataset. The accuracy, precision, recall, F1score, and processing time of the experimental outcomes of our findings were assessed. Our results were competitive with an accuracy of 99.8%, precision of 99.94%, recall of 99.85%, F1-score of 99.89%, and excursion time of 59.15s when compared to the findings of the current works.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129562929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Optimal Teaching and Learning based Optimization with Multi-Key Homomorphic Encryption for Image Security 基于最优教与学的图像安全多密钥同态加密优化
Pub Date : 1900-01-01 DOI: 10.54216/jcim.070203
M. Khalifa, A. N. Al-Masri
Due to the drastic rise in multimedia content, digital images have become a major carrier of data. Generally, images are communicated or archived via wireless communication changes, and the significance of data security gets increased. In order to accomplish security, encryption is an effective technique which is used to encrypt the images using secret keys in such a way that it is not readable by the hacker. In this view, this study focuses on the design of Teaching and Learning based Optimization (TLBO) with Multi-Key Homomorphic Encryption (MHE) technique, called MHE-TLBO algorithm. The goal of the MHE-TLBO algorithm is to optimally select multiple keys using TLBO algorithm for encryption and decryption processes. In addition, the MHE-TLBO algorithm has derived a fitness function involving peak signal to noise ratio (PSNR) and thereby ensures the superior quality of the reconstructed image. For validating the security performance of the MHE-TLBO algorithm, a comprehensive result analysis is made and the simulation results ensured the betterment of the MHE-TLBO algorithm interms of different aspects.
由于多媒体内容的急剧增加,数字图像已经成为数据的主要载体。一般来说,图像的传输或存档都是通过无线通信方式进行的,数据安全的重要性也随之增加。为了实现安全,加密是一种有效的技术,它使用密钥对图像进行加密,使其无法被黑客读取。在此基础上,本研究重点研究了基于多密钥同态加密(MHE)技术的基于教与学的优化(TLBO)设计,称为MHE-TLBO算法。MHE-TLBO算法的目标是使用TLBO算法优化选择多个密钥进行加密和解密过程。此外,MHE-TLBO算法导出了一个包含峰值信噪比(PSNR)的适应度函数,从而保证了重构图像的高质量。为了验证MHE-TLBO算法的安全性能,对结果进行了综合分析,仿真结果保证了MHE-TLBO算法在不同方面的改进。
{"title":"An Optimal Teaching and Learning based Optimization with Multi-Key Homomorphic Encryption for Image Security","authors":"M. Khalifa, A. N. Al-Masri","doi":"10.54216/jcim.070203","DOIUrl":"https://doi.org/10.54216/jcim.070203","url":null,"abstract":"Due to the drastic rise in multimedia content, digital images have become a major carrier of data. Generally, images are communicated or archived via wireless communication changes, and the significance of data security gets increased. In order to accomplish security, encryption is an effective technique which is used to encrypt the images using secret keys in such a way that it is not readable by the hacker. In this view, this study focuses on the design of Teaching and Learning based Optimization (TLBO) with Multi-Key Homomorphic Encryption (MHE) technique, called MHE-TLBO algorithm. The goal of the MHE-TLBO algorithm is to optimally select multiple keys using TLBO algorithm for encryption and decryption processes. In addition, the MHE-TLBO algorithm has derived a fitness function involving peak signal to noise ratio (PSNR) and thereby ensures the superior quality of the reconstructed image. For validating the security performance of the MHE-TLBO algorithm, a comprehensive result analysis is made and the simulation results ensured the betterment of the MHE-TLBO algorithm interms of different aspects.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117040278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Machine Learning framework for Information Security Management in Big Data Applications 大数据应用中信息安全管理的机器学习框架
Pub Date : 1900-01-01 DOI: 10.54216/jcim.110106
Othman Al Basheer, Murat Ozcek
Big data has become an integral part of modern businesses, but its management and protection present numerous challenges, such as securing sensitive information from unauthorized access, preventing data breaches, and ensuring data integrity. This work investigated applying a machine learning (ML) approach to tackling the challenges of information security and management in big data environments. We present an ML framework that leverages a supervised learning strategy to detect anomalies, classify big data, and predict potential security threats. We also investigate the implementation of this framework and its potential benefits, such as reducing false positives and improving detection rates. Our experimental analysis in public datasets demonstrates the effectiveness of our approach in improving information security and management in big data environments.
大数据已成为现代企业不可或缺的一部分,但其管理和保护面临着许多挑战,例如保护敏感信息不受未经授权的访问,防止数据泄露,确保数据完整性。这项工作研究了应用机器学习(ML)方法来应对大数据环境中信息安全和管理的挑战。我们提出了一个机器学习框架,利用监督学习策略来检测异常,对大数据进行分类,并预测潜在的安全威胁。我们还研究了该框架的实施及其潜在的好处,如减少误报和提高检出率。我们对公共数据集的实验分析表明,我们的方法在提高大数据环境下的信息安全和管理方面是有效的。
{"title":"Machine Learning framework for Information Security Management in Big Data Applications","authors":"Othman Al Basheer, Murat Ozcek","doi":"10.54216/jcim.110106","DOIUrl":"https://doi.org/10.54216/jcim.110106","url":null,"abstract":"Big data has become an integral part of modern businesses, but its management and protection present numerous challenges, such as securing sensitive information from unauthorized access, preventing data breaches, and ensuring data integrity. This work investigated applying a machine learning (ML) approach to tackling the challenges of information security and management in big data environments. We present an ML framework that leverages a supervised learning strategy to detect anomalies, classify big data, and predict potential security threats. We also investigate the implementation of this framework and its potential benefits, such as reducing false positives and improving detection rates. Our experimental analysis in public datasets demonstrates the effectiveness of our approach in improving information security and management in big data environments.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134565304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
HomeTec Software for Security Aspects of Smart Home Devices Based on IoT 基于物联网的智能家居设备安全方面的HomeTec软件
Pub Date : 1900-01-01 DOI: 10.54216/jcim.050101
Parth Rustagi, Rohit Sroa, Priyanshu Sinha, Ashish Sharma4, S. Tayal
As useful as it gets to connect devices to the internet to make life easier and more comfortable, it also opens the gates to various cyber threats. The connection of Smart Home devices to the internet makes them vulnerable to malicious hackers that infiltrate the system. Hackers can penetrate these systems and have full control over devices. This can lead to denial of service, data leakage, invasion of privacy, etc. Thus security is a major aspect of Smart home devices. However, many companies manufacturing these Smart Home devices have little to no security protocols in their devices. In the process of making the IoT devices cheaper, various cost-cutting is done on the security protocols in IoT devices. In some way, many manufactures of the devices don’t even consider this as a factor to build upon. This leaves the devices vulnerable to attacks. Various authorities have worked upon to standardize the security aspects for the IoT and listed out guidelines for manufactures to follow, but many fail to abide by them. This paper introduces and talks about the various threats, various Security threats to Smart Home devices. It takes a deep dive into the solutions for the discussed threats. It also discusses their prevention. Lastly, it discusses various preventive measures and good practices to be incorporated to protect devices from any future attacks.
它可以将设备连接到互联网,让生活更轻松、更舒适,但它也为各种网络威胁打开了大门。智能家居设备与互联网的连接使它们容易受到渗透系统的恶意黑客的攻击。黑客可以渗透这些系统并完全控制设备。这可能导致拒绝服务、数据泄露、侵犯隐私等。因此,安全是智能家居设备的一个主要方面。然而,许多制造这些智能家居设备的公司在他们的设备中几乎没有安全协议。在使物联网设备更便宜的过程中,对物联网设备中的安全协议进行了各种成本削减。在某种程度上,许多设备制造商甚至不认为这是一个因素。这使得设备容易受到攻击。各种权威机构已经致力于物联网安全方面的标准化,并列出了制造商遵循的指导方针,但许多人未能遵守这些指导方针。本文介绍并讨论了智能家居设备面临的各种威胁,各种安全威胁。它深入探讨了所讨论的威胁的解决方案。它还讨论了预防措施。最后,它讨论了各种预防措施和良好实践,以保护设备免受任何未来的攻击。
{"title":"HomeTec Software for Security Aspects of Smart Home Devices Based on IoT","authors":"Parth Rustagi, Rohit Sroa, Priyanshu Sinha, Ashish Sharma4, S. Tayal","doi":"10.54216/jcim.050101","DOIUrl":"https://doi.org/10.54216/jcim.050101","url":null,"abstract":"As useful as it gets to connect devices to the internet to make life easier and more comfortable, it also opens the gates to various cyber threats. The connection of Smart Home devices to the internet makes them vulnerable to malicious hackers that infiltrate the system. Hackers can penetrate these systems and have full control over devices. This can lead to denial of service, data leakage, invasion of privacy, etc. Thus security is a major aspect of Smart home devices. However, many companies manufacturing these Smart Home devices have little to no security protocols in their devices. In the process of making the IoT devices cheaper, various cost-cutting is done on the security protocols in IoT devices. In some way, many manufactures of the devices don’t even consider this as a factor to build upon. This leaves the devices vulnerable to attacks. Various authorities have worked upon to standardize the security aspects for the IoT and listed out guidelines for manufactures to follow, but many fail to abide by them. This paper introduces and talks about the various threats, various Security threats to Smart Home devices. It takes a deep dive into the solutions for the discussed threats. It also discusses their prevention. Lastly, it discusses various preventive measures and good practices to be incorporated to protect devices from any future attacks.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124459178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Framework for creating a Safety and Security Management System (SSMS) 建立安全及保安管理系统的架构
Pub Date : 1900-01-01 DOI: 10.54216/jcim.090201
R. Kemp, Richard Smith
Safety and security risks to critical infrastructure organizations are well known, and incidents in both fields have taken place. To help critical infrastructure organizations manage these areas, safety and security standards have been created. The main aim of this paper is to present a framework that has been created to manage both safety and security by providing guidance on how to create a Safety and Security Management System (SSMS). The framework identifies and remediates conflicts and issues between IT, OT, safety, and security. While also creating processes that can combine safety and security compliance to standards to reduce duplication of work and allow one process to manage both areas. A survey was carried out to understand if the framework would be of use to organizations and to better understand the issues users have with managing safety and security and how they manage conflicts that can occur. The survey showed key areas of concern for organizations and how the framework can be of use to them. It identified six themes from the research and identified improvements opportunities for the framework that can be implemented.
关键基础设施组织面临的安全和安保风险是众所周知的,在这两个领域都发生过事故。为了帮助关键基础设施组织管理这些领域,已经创建了安全和安保标准。本文的主要目的是通过提供如何创建安全与安保管理系统(SSMS)的指导,提出一个已经创建的管理安全和安保的框架。该框架识别并修复IT、OT、安全和保障之间的冲突和问题。同时还创建可以将安全性和安全性遵从性与标准结合起来的流程,以减少重复工作,并允许一个流程管理两个领域。进行了一项调查,以了解该框架是否对组织有用,并更好地了解用户在管理安全和保障方面遇到的问题,以及他们如何管理可能发生的冲突。调查显示了组织关注的关键领域,以及该框架如何对他们有用。它从研究中确定了六个主题,并确定了可以实施的框架改进机会。
{"title":"A Framework for creating a Safety and Security Management System (SSMS)","authors":"R. Kemp, Richard Smith","doi":"10.54216/jcim.090201","DOIUrl":"https://doi.org/10.54216/jcim.090201","url":null,"abstract":"Safety and security risks to critical infrastructure organizations are well known, and incidents in both fields have taken place. To help critical infrastructure organizations manage these areas, safety and security standards have been created. The main aim of this paper is to present a framework that has been created to manage both safety and security by providing guidance on how to create a Safety and Security Management System (SSMS). The framework identifies and remediates conflicts and issues between IT, OT, safety, and security. While also creating processes that can combine safety and security compliance to standards to reduce duplication of work and allow one process to manage both areas. A survey was carried out to understand if the framework would be of use to organizations and to better understand the issues users have with managing safety and security and how they manage conflicts that can occur. The survey showed key areas of concern for organizations and how the framework can be of use to them. It identified six themes from the research and identified improvements opportunities for the framework that can be implemented.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114451856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Deep Learning Framework for Securing IoT Against Malwares 保护物联网免受恶意软件侵害的深度学习框架
Pub Date : 1900-01-01 DOI: 10.54216/jcim.110104
Mustafa El .., Aaras Y Y.kraidi
The proliferation of Internet of Things (IoT) devices has led to an increase in the number of malware attacks targeting these devices. Traditional security mechanisms such as firewalls and antivirus software are often inadequate in protecting IoT devices from malware attacks due to their limited resources and the heterogeneity of IoT networks. In this paper, we propose DeepSecureIoT, a deep learning-based framework for securing IoT against malware attacks. Our proposed framework uses a deep convolutional neural network (CNN) to extract features from network traffic and classify it as normal or malicious. The CNN is trained using a large dataset of network traffic to accurately identify malware attacks and reduce false positives. We evaluate the performance of DeepSecureIoT using a benchmark dataset of real-world IoT malware attacks. The results show that our proposed framework achieves an accuracy of 0.961 in detecting and classifying malware attacks, outperforming state-of-the-art intrusion detection systems. Moreover, DeepSecureIoT has low computational overhead and can be deployed on resource-constrained IoT devices.
物联网(IoT)设备的激增导致针对这些设备的恶意软件攻击数量增加。传统的安全机制,如防火墙和防病毒软件,由于其有限的资源和物联网网络的异质性,往往不足以保护物联网设备免受恶意软件攻击。在本文中,我们提出了DeepSecureIoT,这是一个基于深度学习的框架,用于保护物联网免受恶意软件攻击。我们提出的框架使用深度卷积神经网络(CNN)从网络流量中提取特征并将其分类为正常或恶意。CNN使用大型网络流量数据集进行训练,以准确识别恶意软件攻击并减少误报。我们使用真实IoT恶意软件攻击的基准数据集来评估DeepSecureIoT的性能。结果表明,我们提出的框架在检测和分类恶意软件攻击方面达到了0.961的准确率,优于最先进的入侵检测系统。此外,DeepSecureIoT的计算开销很低,可以部署在资源受限的物联网设备上。
{"title":"A Deep Learning Framework for Securing IoT Against Malwares","authors":"Mustafa El .., Aaras Y Y.kraidi","doi":"10.54216/jcim.110104","DOIUrl":"https://doi.org/10.54216/jcim.110104","url":null,"abstract":"The proliferation of Internet of Things (IoT) devices has led to an increase in the number of malware attacks targeting these devices. Traditional security mechanisms such as firewalls and antivirus software are often inadequate in protecting IoT devices from malware attacks due to their limited resources and the heterogeneity of IoT networks. In this paper, we propose DeepSecureIoT, a deep learning-based framework for securing IoT against malware attacks. Our proposed framework uses a deep convolutional neural network (CNN) to extract features from network traffic and classify it as normal or malicious. The CNN is trained using a large dataset of network traffic to accurately identify malware attacks and reduce false positives. We evaluate the performance of DeepSecureIoT using a benchmark dataset of real-world IoT malware attacks. The results show that our proposed framework achieves an accuracy of 0.961 in detecting and classifying malware attacks, outperforming state-of-the-art intrusion detection systems. Moreover, DeepSecureIoT has low computational overhead and can be deployed on resource-constrained IoT devices.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126451157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Managing Information Security Risks in the Age of IoT 管理物联网时代的信息安全风险
Pub Date : 1900-01-01 DOI: 10.54216/jcim.110103
A. .., R. Almajed
The advent of the Internet of Things (IoT) has led to the proliferation of connected devices, creating numerous security challenges. With billions of devices generating vast amounts of data, managing information security risks in the age of IoT has become increasingly complex. Traditional security approaches are not sufficient to mitigate the risks posed by IoT devices. Machine learning (ML) provides a promising approach to enhance the security of IoT systems. This paper proposes a machine learning approach for managing information security risks in the age of IoT. The proposed approach utilizes ML algorithms to identify and mitigate security threats in IoT systems. The approach involves collecting and analyzing data from IoT devices, and applying ML algorithms to detect patterns and anomalies that may indicate security threats. The ML algorithms are trained using both supervised and unsupervised learning techniques to enable them to identify known and unknown threats. The paper describes a case study in which the proposed approach is applied to an IoT system for home security. The results demonstrate that the ML approach can effectively detect security threats in the IoT system and mitigate them in real-time.
物联网(IoT)的出现导致了连接设备的激增,带来了许多安全挑战。随着数十亿设备产生大量数据,物联网时代的信息安全风险管理变得越来越复杂。传统的安全方法不足以减轻物联网设备带来的风险。机器学习(ML)为增强物联网系统的安全性提供了一种有前途的方法。本文提出了一种物联网时代管理信息安全风险的机器学习方法。该方法利用机器学习算法来识别和减轻物联网系统中的安全威胁。该方法包括从物联网设备收集和分析数据,并应用机器学习算法来检测可能表明安全威胁的模式和异常。机器学习算法使用监督和无监督学习技术进行训练,使其能够识别已知和未知的威胁。本文描述了一个案例研究,其中所提出的方法应用于家庭安全的物联网系统。结果表明,机器学习方法可以有效地检测物联网系统中的安全威胁,并实时缓解这些威胁。
{"title":"Managing Information Security Risks in the Age of IoT","authors":"A. .., R. Almajed","doi":"10.54216/jcim.110103","DOIUrl":"https://doi.org/10.54216/jcim.110103","url":null,"abstract":"The advent of the Internet of Things (IoT) has led to the proliferation of connected devices, creating numerous security challenges. With billions of devices generating vast amounts of data, managing information security risks in the age of IoT has become increasingly complex. Traditional security approaches are not sufficient to mitigate the risks posed by IoT devices. Machine learning (ML) provides a promising approach to enhance the security of IoT systems. This paper proposes a machine learning approach for managing information security risks in the age of IoT. The proposed approach utilizes ML algorithms to identify and mitigate security threats in IoT systems. The approach involves collecting and analyzing data from IoT devices, and applying ML algorithms to detect patterns and anomalies that may indicate security threats. The ML algorithms are trained using both supervised and unsupervised learning techniques to enable them to identify known and unknown threats. The paper describes a case study in which the proposed approach is applied to an IoT system for home security. The results demonstrate that the ML approach can effectively detect security threats in the IoT system and mitigate them in real-time.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124875677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Cybersecurity and Information Management
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1