首页 > 最新文献

2019 International Conference on Cyber Security and Internet of Things (ICSIoT)最新文献

英文 中文
ID-Based Outsourced Plaintext Checkable Encryption in Healthcare Database 医疗保健数据库中基于id的外包明文可校验加密
Pub Date : 2019-05-01 DOI: 10.1109/ICSIoT47925.2019.00016
S. Alornyo, Evans Aidoo, Kingsford Kissi Mireku, Benjamin Kwofie, Xiong Hu, M. Asante
A cryptographic primitive suggested by Carnard et al. in 2012 ensures that on input a plaintext, ciphertext with corresponding public key, it is possible to check if a ciphertext is encryption of a target plaintext with a corresponding public key. This tool enables public plaintext query on ciphertext. We introduce ID-based plaintext checkable encryption (ID-PCE) in outsourced healthcare database. ID-PCE uses receiver's ID as the public key to curtail problems associated with key certificate management in public key encryption. We adopts identity-based cryptography and it achieves a weak-IND-ID-CCA (W-IND-IDCCA). Finally, proof the security of our scheme using random oracle model.
Carnard等人在2012年提出了一种加密原语,它保证了在输入一个明文、具有相应公钥的密文时,可以检查该密文是否为具有相应公钥的目标明文的加密。此工具支持对密文进行公开明文查询。在外包医疗数据库中引入基于id的明文可校验加密(ID-PCE)。ID- pce使用接收者的ID作为公钥,以减少公钥加密中与密钥证书管理相关的问题。我们采用基于身份的加密技术,实现了弱ind - id - cca (W-IND-IDCCA)。最后,利用随机oracle模型证明了该方案的安全性。
{"title":"ID-Based Outsourced Plaintext Checkable Encryption in Healthcare Database","authors":"S. Alornyo, Evans Aidoo, Kingsford Kissi Mireku, Benjamin Kwofie, Xiong Hu, M. Asante","doi":"10.1109/ICSIoT47925.2019.00016","DOIUrl":"https://doi.org/10.1109/ICSIoT47925.2019.00016","url":null,"abstract":"A cryptographic primitive suggested by Carnard et al. in 2012 ensures that on input a plaintext, ciphertext with corresponding public key, it is possible to check if a ciphertext is encryption of a target plaintext with a corresponding public key. This tool enables public plaintext query on ciphertext. We introduce ID-based plaintext checkable encryption (ID-PCE) in outsourced healthcare database. ID-PCE uses receiver's ID as the public key to curtail problems associated with key certificate management in public key encryption. We adopts identity-based cryptography and it achieves a weak-IND-ID-CCA (W-IND-IDCCA). Finally, proof the security of our scheme using random oracle model.","PeriodicalId":226799,"journal":{"name":"2019 International Conference on Cyber Security and Internet of Things (ICSIoT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132197826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Cyber Threat Intelligence for Improving Cyber Supply Chain Security 提高网络供应链安全的网络威胁情报
Pub Date : 2019-05-01 DOI: 10.1109/ICSIoT47925.2019.00012
Abel Yeboah-Ofori, Shareeful Islam, E. Yeboah-Boateng
Cyber supply chain (CSC) systems provide operational efficiency and business continuity due to the integrated nature of various network system nodes. Such integration has made the overall system vulnerable to various cyber attacks and malware propagation is one of the common attacks for CSC. Cyber threat intelligence (CTI) provides an organization the capability to identify, gather, analyze threats and the associated risks so that CSC organization can forecast the existing and future threat trends and manage the cybersecurity risk in a proactive manner. A threat actor may attack the system and propagate a malware. The purpose is to manipulate, alter, or change delivery mechanisms. It is imperative to integrate CTI into the existing cybersecurity practice to detect and understand the threat actor's intents and motive. In our previous paper, we used threat analysis gathering to provide us an understanding of the adversaries' capabilities, actions, and intents. This paper contributes to improving the cybersecurity of CSC by using CTI. In particular, we extend our previous work which identifies and analysis CSC attacks and adopts CTI approach to understand the attack trends so that appropriate control can determine proactively. We use the malware a smart grid case study as CSC context to demonstrate our approach. The result demonstrations how CTI approach is applied to assist in preventing cyberattacks and to disseminate threat information sharing.
网络供应链(Cyber supply chain, CSC)系统由于各个网络系统节点的集成特性,提供了运行效率和业务连续性。这种集成使得整个系统容易受到各种网络攻击,恶意软件传播是CSC常见的攻击之一。网络威胁情报(CTI)为组织提供识别、收集、分析威胁和相关风险的能力,使CSC组织能够预测现有和未来的威胁趋势,并以主动的方式管理网络安全风险。威胁参与者可能会攻击系统并传播恶意软件。目的是操纵、改变或改变交付机制。必须将CTI集成到现有的网络安全实践中,以检测和理解威胁行为者的意图和动机。在我们之前的论文中,我们使用威胁分析收集来为我们提供对对手能力、行动和意图的理解。本文为利用CTI技术提高CSC的网络安全做出了贡献。特别是,我们扩展了之前的工作,即识别和分析CSC攻击,并采用CTI方法来了解攻击趋势,以便能够主动确定适当的控制。我们使用恶意软件智能电网案例研究作为CSC上下文来演示我们的方法。结果演示了CTI方法如何应用于协助防止网络攻击和传播威胁信息共享。
{"title":"Cyber Threat Intelligence for Improving Cyber Supply Chain Security","authors":"Abel Yeboah-Ofori, Shareeful Islam, E. Yeboah-Boateng","doi":"10.1109/ICSIoT47925.2019.00012","DOIUrl":"https://doi.org/10.1109/ICSIoT47925.2019.00012","url":null,"abstract":"Cyber supply chain (CSC) systems provide operational efficiency and business continuity due to the integrated nature of various network system nodes. Such integration has made the overall system vulnerable to various cyber attacks and malware propagation is one of the common attacks for CSC. Cyber threat intelligence (CTI) provides an organization the capability to identify, gather, analyze threats and the associated risks so that CSC organization can forecast the existing and future threat trends and manage the cybersecurity risk in a proactive manner. A threat actor may attack the system and propagate a malware. The purpose is to manipulate, alter, or change delivery mechanisms. It is imperative to integrate CTI into the existing cybersecurity practice to detect and understand the threat actor's intents and motive. In our previous paper, we used threat analysis gathering to provide us an understanding of the adversaries' capabilities, actions, and intents. This paper contributes to improving the cybersecurity of CSC by using CTI. In particular, we extend our previous work which identifies and analysis CSC attacks and adopts CTI approach to understand the attack trends so that appropriate control can determine proactively. We use the malware a smart grid case study as CSC context to demonstrate our approach. The result demonstrations how CTI approach is applied to assist in preventing cyberattacks and to disseminate threat information sharing.","PeriodicalId":226799,"journal":{"name":"2019 International Conference on Cyber Security and Internet of Things (ICSIoT)","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128470725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
IoT Node-Node Secure Communication Using RIPEMD-128 and DES 使用RIPEMD-128和DES的物联网节点安全通信
Pub Date : 2019-05-01 DOI: 10.1109/ICSIoT47925.2019.00018
Kester Quist-Aphetsi, B. Asare, Laurent Nana
Internet of things (IoT) is believed to be the greatest thing that came along with the birth of the internet 4.0. IoT security is a growing concern that have received a lot of research interest in recent times. IoT security covers these four critical areas: Device or hardware, Communications, Cloud, and Life cycle management. At each level of these security protocols are breaches that continue to threaten the continuous adoption and use of this pervasive technology that homes, organizations and Governments use towards collecting, analysing and decision making in most cases. The concept of Internet of Things-IoT describes the environment where devices connect with each other to communicate, collect, store sensor data to the cloud. The sensor data is then processed and analyzed towards describing valuable information. IoT solutions support domestic, industrial, and Governmental installations for the monitoring of environmental data, health monitoring, control and management of household appliances, weather recording and forecasting, and the like. Loosely speaking, Internet of Things - IoT concerns itself with the interconnectedness of embedded devices and the internet for the purpose of collecting, recording, analyzing and sharing of sensor data using sensors, actuators, and Radio frequency Identifiers - RFID. The Race Integrity Primitive Evaluation Message Digest (RIPEMD 128) and Data Encryption Standards (DES) were used to achieve the ultimate goal of providing improved security for end-end encryption for secured communications within IoT systems. The authors proposed a combined approach with the use of a cryptographic algorithm and a hash function to increase security for IoT node-node communications.
物联网(IoT)被认为是伴随着互联网4.0诞生而来的最伟大的东西。物联网安全是一个日益受到关注的问题,近年来引起了很多研究兴趣。物联网安全涵盖以下四个关键领域:设备或硬件、通信、云和生命周期管理。在这些安全协议的每一级都存在破坏,这些破坏继续威胁到家庭、组织和政府在大多数情况下用于收集、分析和决策的这种普遍技术的持续采用和使用。物联网(iot)的概念描述了设备相互连接以通信,收集和存储传感器数据到云的环境。然后对传感器数据进行处理和分析,以描述有价值的信息。物联网解决方案支持家庭、工业和政府设施,用于环境数据监测、健康监测、家用电器控制和管理、天气记录和预报等。宽泛地说,物联网(IoT)关注的是嵌入式设备和互联网的互联性,目的是使用传感器、执行器和射频标识符(RFID)收集、记录、分析和共享传感器数据。竞赛完整性原语评估消息摘要(RIPEMD 128)和数据加密标准(DES)用于实现为物联网系统内的安全通信提供改进的端到端加密安全性的最终目标。作者提出了一种结合使用加密算法和哈希函数的方法来提高物联网节点间通信的安全性。
{"title":"IoT Node-Node Secure Communication Using RIPEMD-128 and DES","authors":"Kester Quist-Aphetsi, B. Asare, Laurent Nana","doi":"10.1109/ICSIoT47925.2019.00018","DOIUrl":"https://doi.org/10.1109/ICSIoT47925.2019.00018","url":null,"abstract":"Internet of things (IoT) is believed to be the greatest thing that came along with the birth of the internet 4.0. IoT security is a growing concern that have received a lot of research interest in recent times. IoT security covers these four critical areas: Device or hardware, Communications, Cloud, and Life cycle management. At each level of these security protocols are breaches that continue to threaten the continuous adoption and use of this pervasive technology that homes, organizations and Governments use towards collecting, analysing and decision making in most cases. The concept of Internet of Things-IoT describes the environment where devices connect with each other to communicate, collect, store sensor data to the cloud. The sensor data is then processed and analyzed towards describing valuable information. IoT solutions support domestic, industrial, and Governmental installations for the monitoring of environmental data, health monitoring, control and management of household appliances, weather recording and forecasting, and the like. Loosely speaking, Internet of Things - IoT concerns itself with the interconnectedness of embedded devices and the internet for the purpose of collecting, recording, analyzing and sharing of sensor data using sensors, actuators, and Radio frequency Identifiers - RFID. The Race Integrity Primitive Evaluation Message Digest (RIPEMD 128) and Data Encryption Standards (DES) were used to achieve the ultimate goal of providing improved security for end-end encryption for secured communications within IoT systems. The authors proposed a combined approach with the use of a cryptographic algorithm and a hash function to increase security for IoT node-node communications.","PeriodicalId":226799,"journal":{"name":"2019 International Conference on Cyber Security and Internet of Things (ICSIoT)","volume":"159 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128891756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Factors Influencing Information Security Policy Compliance Behavior 影响信息安全策略遵从行为的因素
Pub Date : 2019-05-01 DOI: 10.1109/ICSIoT47925.2019.00015
John Agyekum Addae, Grace Simpson, George Oppong Appiagyei Ampong
Globally, banks are deploying reliant data protection technologies to secure business continuity. However, information security attackers leverage on employees seldom predisposition to compromise firms' assets. The study therefore examines attributing factors influencing information security compliance behavior in the Ghanaian banking sector. A survey design approach was adopted to validate the research model. Partial Least Square Structural Equation Modeling (PLS-SEM) were used to analyze 329 valid data. The model results showed that perceived threat, vulnerability, response cost, and efficiency had a significant effect on compliance but interestingly not for Self-Efficacy. Perceived threat severity had the most significant effect on IS compliance behavior. Overall, our model accounted for 60% of the variation in IS compliance
在全球范围内,银行正在部署可靠的数据保护技术,以确保业务连续性。然而,信息安全攻击者利用员工很少倾向于损害公司的资产。因此,本研究考察了影响加纳银行业信息安全合规行为的归因因素。采用调查设计方法对研究模型进行验证。采用偏最小二乘结构方程模型(PLS-SEM)对329份有效数据进行分析。模型结果显示,感知威胁、脆弱性、反应成本和效率对依从性有显著影响,但对自我效能感没有显著影响。感知到的威胁严重程度对IS合规行为的影响最为显著。总体而言,我们的模型占IS依从性变化的60%
{"title":"Factors Influencing Information Security Policy Compliance Behavior","authors":"John Agyekum Addae, Grace Simpson, George Oppong Appiagyei Ampong","doi":"10.1109/ICSIoT47925.2019.00015","DOIUrl":"https://doi.org/10.1109/ICSIoT47925.2019.00015","url":null,"abstract":"Globally, banks are deploying reliant data protection technologies to secure business continuity. However, information security attackers leverage on employees seldom predisposition to compromise firms' assets. The study therefore examines attributing factors influencing information security compliance behavior in the Ghanaian banking sector. A survey design approach was adopted to validate the research model. Partial Least Square Structural Equation Modeling (PLS-SEM) were used to analyze 329 valid data. The model results showed that perceived threat, vulnerability, response cost, and efficiency had a significant effect on compliance but interestingly not for Self-Efficacy. Perceived threat severity had the most significant effect on IS compliance behavior. Overall, our model accounted for 60% of the variation in IS compliance","PeriodicalId":226799,"journal":{"name":"2019 International Conference on Cyber Security and Internet of Things (ICSIoT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131733331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Validating of Digital Forensic Images Using SHA-256 使用SHA-256的数字取证图像验证
Pub Date : 2019-05-01 DOI: 10.1109/ICSIoT47925.2019.00028
Kester Quist-Aphetsi, Isaac Baffour Senkyire
Volumes of digital images are produced per time, whiles these digital images may be for friendly and or social activities they can be manipulated for illegal purposes. Sensitive digital images have been a core part of security correspondences between sensitive institutions. Such sensitive digital images security has been a prime concern. The advancement in technology has made it easy for unauthorized persons to manipulate and illegally use sensitive digital images that are been acquired, processed, compressed, stored, broadcasted, and reproduced. This has necessitated the authentication of digital images. In this paper we propose SHA - 256 to validate digital forensic images.
每次产生大量的数字图像,虽然这些数字图像可能用于友好和或社会活动,但它们可能被操纵用于非法目的。敏感的数字图像已经成为敏感机构之间安全通信的核心部分。如此敏感的数字图像的安全性一直是人们最关心的问题。技术的进步使得未经授权的人很容易操纵和非法使用被获取、处理、压缩、存储、广播和复制的敏感数字图像。这就需要对数字图像进行认证。在本文中,我们提出了SHA - 256来验证数字法医图像。
{"title":"Validating of Digital Forensic Images Using SHA-256","authors":"Kester Quist-Aphetsi, Isaac Baffour Senkyire","doi":"10.1109/ICSIoT47925.2019.00028","DOIUrl":"https://doi.org/10.1109/ICSIoT47925.2019.00028","url":null,"abstract":"Volumes of digital images are produced per time, whiles these digital images may be for friendly and or social activities they can be manipulated for illegal purposes. Sensitive digital images have been a core part of security correspondences between sensitive institutions. Such sensitive digital images security has been a prime concern. The advancement in technology has made it easy for unauthorized persons to manipulate and illegally use sensitive digital images that are been acquired, processed, compressed, stored, broadcasted, and reproduced. This has necessitated the authentication of digital images. In this paper we propose SHA - 256 to validate digital forensic images.","PeriodicalId":226799,"journal":{"name":"2019 International Conference on Cyber Security and Internet of Things (ICSIoT)","volume":"145 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128123643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Mobile Money Wallet Security against Insider Attack Using ID-Based Cryptographic Primitive with Equality Test 基于id密码原语的手机钱包防内部攻击安全性及等式检验
Pub Date : 2019-05-01 DOI: 10.1109/ICSIoT47925.2019.00021
S. Alornyo, Kingsford Kissi Mireku, Abraham Tonny-Hagan, Xiong Hu
An attack continuum perpetuated by an insider (Mobile Money Wallet Service Provider) is paramount in this era of data intelligent and analytics. Mobile Money Wallet Service Providers (MMWSP) are entrusted to keep our sensitive information such as tokens and other mobile financial transactions secured for users to query and exchange token information. However, it is possible for the mobile money wallet service provider (insider) to peddle with user's data stored on it's server for economic gains. we put forward a novel mobile money wallet security against insider attack using identity based cryptography. Our novel scheme resist an insider from peddling user's data for economic gains. The scheme adopts the witness based cryptographic primitive. Finally, The security of our scheme is demonstrated by the use of random oracle model.
在这个数据智能和分析的时代,由内部人员(移动钱包服务提供商)持续进行的攻击是至关重要的。移动钱包服务提供商(MMWSP)被委托保护我们的敏感信息,如令牌和其他移动金融交易,以供用户查询和交换令牌信息。然而,移动钱包服务提供商(内部人士)可能会为了经济利益而兜售存储在其服务器上的用户数据。利用身份加密技术,提出了一种新型的防内部攻击的移动钱包安全方案。我们的新方案可以防止内部人员为了经济利益而兜售用户数据。该方案采用基于见证的密码原语。最后,利用随机oracle模型验证了该方案的安全性。
{"title":"Mobile Money Wallet Security against Insider Attack Using ID-Based Cryptographic Primitive with Equality Test","authors":"S. Alornyo, Kingsford Kissi Mireku, Abraham Tonny-Hagan, Xiong Hu","doi":"10.1109/ICSIoT47925.2019.00021","DOIUrl":"https://doi.org/10.1109/ICSIoT47925.2019.00021","url":null,"abstract":"An attack continuum perpetuated by an insider (Mobile Money Wallet Service Provider) is paramount in this era of data intelligent and analytics. Mobile Money Wallet Service Providers (MMWSP) are entrusted to keep our sensitive information such as tokens and other mobile financial transactions secured for users to query and exchange token information. However, it is possible for the mobile money wallet service provider (insider) to peddle with user's data stored on it's server for economic gains. we put forward a novel mobile money wallet security against insider attack using identity based cryptography. Our novel scheme resist an insider from peddling user's data for economic gains. The scheme adopts the witness based cryptographic primitive. Finally, The security of our scheme is demonstrated by the use of random oracle model.","PeriodicalId":226799,"journal":{"name":"2019 International Conference on Cyber Security and Internet of Things (ICSIoT)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121581653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Malware Attack Predictive Analytics in a Cyber Supply Chain Context Using Machine Learning 基于机器学习的网络供应链恶意软件攻击预测分析
Pub Date : 2019-05-01 DOI: 10.1109/ICSIoT47925.2019.00019
Abel Yeboah-Ofori, C. Boachie
Due to the invincibility nature of cyber attacks onthe cyber supply chain (CSC), and the cascading effects ofmalware infections, we use machine learning to predictattacks. As organizations have become more reliant on CSCsystems for business continuity, so are the increase invulnerabilities and the threat landscapes. Some traditionalapproach to detecting and defending malware attack haslargely been antimalware or antivirus software such asspam filters, firewall, and IDS/IPS. These tools largelysucceed, however, as threat actors get more intelligent, theyare able to circumvent and affect nodes on systems whichthen propagates. In our previous work, we characterizedthreat actor activities, including presumed intent andhistorically observed behaviour, for the purpose ofascertaining the current threats that could be exploited. Inthis paper, we use ML techniques to learn dataset andpredict which CSC nodes have detection or no detection. The purpose is to predict which modes are venerable tocyberattacks and for predicting future trends. Todemonstrate the applicability of our approach, we used adataset from Microsoft Malware Prediction website. Further, an ensemble is used to link Logistic Regression, and Decision Tree and SVM algorithms in Majority Votingand run on the training data and then use 10-fold crossvalidation to test the parameter estimation, accurate resultsand predictions. The results show that ML algorithms inDecision Trees methods can be used in cyber supply chainpredict analytics to detect and predict future cyber attacktrends.
由于网络供应链(CSC)上网络攻击的不可战胜性,以及恶意软件感染的级联效应,我们使用机器学习来预测攻击。随着企业越来越依赖于csc系统来实现业务连续性,越来越多的漏洞和威胁也随之增加。一些传统的检测和防御恶意软件攻击的方法主要是反恶意软件或防病毒软件,如垃圾邮件过滤器,防火墙和IDS/IPS。这些工具在很大程度上是成功的,然而,随着威胁行为者变得越来越聪明,他们能够绕过并影响系统上的节点,然后传播。在我们之前的工作中,我们描述了威胁行为者的活动,包括假定的意图和历史上观察到的行为,目的是确定当前可能被利用的威胁。在本文中,我们使用ML技术来学习数据集,并预测哪些CSC节点有检测或没有检测。目的是预测哪些模式是值得尊敬的网络攻击和预测未来的趋势。为了证明我们方法的适用性,我们使用了来自微软恶意软件预测网站的数据集。此外,在Majority voting中,使用集成将逻辑回归、决策树和支持向量机算法连接起来,并在训练数据上运行,然后使用10倍交叉验证来测试参数估计、准确的结果和预测。结果表明,决策树方法中的机器学习算法可用于网络供应链预测分析,以检测和预测未来的网络攻击趋势。
{"title":"Malware Attack Predictive Analytics in a Cyber Supply Chain Context Using Machine Learning","authors":"Abel Yeboah-Ofori, C. Boachie","doi":"10.1109/ICSIoT47925.2019.00019","DOIUrl":"https://doi.org/10.1109/ICSIoT47925.2019.00019","url":null,"abstract":"Due to the invincibility nature of cyber attacks onthe cyber supply chain (CSC), and the cascading effects ofmalware infections, we use machine learning to predictattacks. As organizations have become more reliant on CSCsystems for business continuity, so are the increase invulnerabilities and the threat landscapes. Some traditionalapproach to detecting and defending malware attack haslargely been antimalware or antivirus software such asspam filters, firewall, and IDS/IPS. These tools largelysucceed, however, as threat actors get more intelligent, theyare able to circumvent and affect nodes on systems whichthen propagates. In our previous work, we characterizedthreat actor activities, including presumed intent andhistorically observed behaviour, for the purpose ofascertaining the current threats that could be exploited. Inthis paper, we use ML techniques to learn dataset andpredict which CSC nodes have detection or no detection. The purpose is to predict which modes are venerable tocyberattacks and for predicting future trends. Todemonstrate the applicability of our approach, we used adataset from Microsoft Malware Prediction website. Further, an ensemble is used to link Logistic Regression, and Decision Tree and SVM algorithms in Majority Votingand run on the training data and then use 10-fold crossvalidation to test the parameter estimation, accurate resultsand predictions. The results show that ML algorithms inDecision Trees methods can be used in cyber supply chainpredict analytics to detect and predict future cyber attacktrends.","PeriodicalId":226799,"journal":{"name":"2019 International Conference on Cyber Security and Internet of Things (ICSIoT)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123915575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A Hybrid Data Logging System Using Cryptographic Hash Blocks Based on SHA-256 and MD5 for Water Treatment Plant and Distribution Line 一种基于SHA-256和MD5加密哈希块的混合数据记录系统
Pub Date : 2019-05-01 DOI: 10.1109/ICSIoT47925.2019.00009
Kester Quist-Aphetsi, Henry Blankson
To maintain and ensure that the quality of water produced from the water treatment plant and the same quality is delivered to customers, there is the need to create a mechanism called the Data Logging System, where data will be collected from strategic points along the distribution pipe line, using sensors planted on the distribution line and if there is any change in one of the characteristics of the quality of the water, it could quickly be detected remotely using a distributed system. The purpose of this paper is to propose a hybrid data logging system by using cryptographic hash blocks based on Secure Hash Function 256 (SHA-256) and Message Digest 5 (MD5) to monitor the quality of water produced from the water treatment plant to the customers. The hash functions generated at the data logging centre using cryptographic hash blocks based on SHA-256 and MD5 (Hybrid) will be secured and very difficult to attack because it was stored using the Blockchain technology.
维护和确保水的质量产生水处理厂和相同质量的交付给客户,有需要创建一个机制叫做数据记录系统,数据将被收集从战略点沿管道分布,使用传感器种植分布线,如果有任何变化的水的质量的特点,它可能很快被远程检测使用一个分布式系统。本文的目的是提出一种混合数据记录系统,通过使用基于安全哈希函数256 (SHA-256)和消息摘要5 (MD5)的加密哈希块来监控从水处理厂生产到客户的水的质量。在数据记录中心使用基于SHA-256和MD5(混合)的加密哈希块生成的哈希函数将是安全的,并且很难被攻击,因为它是使用区块链技术存储的。
{"title":"A Hybrid Data Logging System Using Cryptographic Hash Blocks Based on SHA-256 and MD5 for Water Treatment Plant and Distribution Line","authors":"Kester Quist-Aphetsi, Henry Blankson","doi":"10.1109/ICSIoT47925.2019.00009","DOIUrl":"https://doi.org/10.1109/ICSIoT47925.2019.00009","url":null,"abstract":"To maintain and ensure that the quality of water produced from the water treatment plant and the same quality is delivered to customers, there is the need to create a mechanism called the Data Logging System, where data will be collected from strategic points along the distribution pipe line, using sensors planted on the distribution line and if there is any change in one of the characteristics of the quality of the water, it could quickly be detected remotely using a distributed system. The purpose of this paper is to propose a hybrid data logging system by using cryptographic hash blocks based on Secure Hash Function 256 (SHA-256) and Message Digest 5 (MD5) to monitor the quality of water produced from the water treatment plant to the customers. The hash functions generated at the data logging centre using cryptographic hash blocks based on SHA-256 and MD5 (Hybrid) will be secured and very difficult to attack because it was stored using the Blockchain technology.","PeriodicalId":226799,"journal":{"name":"2019 International Conference on Cyber Security and Internet of Things (ICSIoT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124885947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Relativism Digital Forensics Investigations Model: A Case for the Emerging Economies 相对主义数字取证调查模式:以新兴经济体为例
Pub Date : 2019-05-01 DOI: 10.1109/ICSIoT47925.2019.00023
Abel Yeboah-Ofori, E. Yeboah-Boateng, Herbert Gustav Yankson
Digital forensic investigations (DFI) is a process of investigating computers and its associated media to determine whether it has been used to commit a crime or gain unauthorized access. cyberattacks and cybercrimes can be committed globally but reported locally. However, DFI processes vary relative to a particular jurisdiction. Relativism is the perception of universal norms of what is right and wrong or legal and illegal. Although cybercrimes are illegal, what constitutes illegal is relative to a jurisdiction. Cyber espionage attacks may be considered legal or illegal based on economic advantage for someone or as target for attack based on motive and intent. Further, following legal procedures in evidence gathering at a digital crime scene is critical for prosecution. However, there are challenges in gathering evidence using the existing DFI models on all attacks. UNODC, report on the globalization of cybercrimes highlighted the challenges of cybercrime and ranked some emerging economies among the first 10 offending nations globally. There are existing models that are specific to certain jurisdictions and assist the judiciary, law enforcement agencies, and forensic experts. Consequently, presenting digital forensic evidence in court has proved to be challenging, due to a lack of procedures and DFI models specific to emerging economies. In this paper, we identify the phase that is relevant and could facilitate DFI processes from emerging economies' perspective. Further, we review some existing models to determine their relative procedures. This paper does not negate existing models, rather derives a relative model from existing models. We propose a model that will improve the DFI process from the result of the evaluation with inference from international standards.
数字取证调查(DFI)是对计算机及其相关媒体进行调查,以确定其是否被用于犯罪或获得未经授权的访问的过程。网络攻击和网络犯罪可以在全球范围内实施,但可以在当地报告。然而,DFI流程相对于特定的司法管辖区有所不同。相对主义是对对错或合法与非法的普遍规范的感知。尽管网络犯罪是非法的,但什么构成非法是相对于司法管辖区而言的。网络间谍攻击可以根据某人的经济利益被视为合法或非法,也可以根据动机和意图被视为攻击目标。此外,在数字犯罪现场收集证据时遵循法律程序对起诉至关重要。然而,在使用现有的DFI模型收集所有攻击的证据方面存在挑战。联合国毒品和犯罪问题办公室关于网络犯罪全球化的报告强调了网络犯罪的挑战,并将一些新兴经济体列入全球十大犯罪国家之列。现有的模式是针对某些司法管辖区的,可以帮助司法机构、执法机构和法医专家。因此,由于缺乏针对新兴经济体的程序和DFI模式,在法庭上提供数字法医证据被证明是具有挑战性的。在本文中,我们从新兴经济体的角度确定了相关的、可以促进DFI进程的阶段。此外,我们回顾了一些现有的模型,以确定它们的相关程序。本文不是否定已有的模型,而是从已有的模型中推导出一个相对的模型。我们提出了一个模型,该模型将根据评估结果与国际标准的推断来改进DFI过程。
{"title":"Relativism Digital Forensics Investigations Model: A Case for the Emerging Economies","authors":"Abel Yeboah-Ofori, E. Yeboah-Boateng, Herbert Gustav Yankson","doi":"10.1109/ICSIoT47925.2019.00023","DOIUrl":"https://doi.org/10.1109/ICSIoT47925.2019.00023","url":null,"abstract":"Digital forensic investigations (DFI) is a process of investigating computers and its associated media to determine whether it has been used to commit a crime or gain unauthorized access. cyberattacks and cybercrimes can be committed globally but reported locally. However, DFI processes vary relative to a particular jurisdiction. Relativism is the perception of universal norms of what is right and wrong or legal and illegal. Although cybercrimes are illegal, what constitutes illegal is relative to a jurisdiction. Cyber espionage attacks may be considered legal or illegal based on economic advantage for someone or as target for attack based on motive and intent. Further, following legal procedures in evidence gathering at a digital crime scene is critical for prosecution. However, there are challenges in gathering evidence using the existing DFI models on all attacks. UNODC, report on the globalization of cybercrimes highlighted the challenges of cybercrime and ranked some emerging economies among the first 10 offending nations globally. There are existing models that are specific to certain jurisdictions and assist the judiciary, law enforcement agencies, and forensic experts. Consequently, presenting digital forensic evidence in court has proved to be challenging, due to a lack of procedures and DFI models specific to emerging economies. In this paper, we identify the phase that is relevant and could facilitate DFI processes from emerging economies' perspective. Further, we review some existing models to determine their relative procedures. This paper does not negate existing models, rather derives a relative model from existing models. We propose a model that will improve the DFI process from the result of the evaluation with inference from international standards.","PeriodicalId":226799,"journal":{"name":"2019 International Conference on Cyber Security and Internet of Things (ICSIoT)","volume":"245 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132649301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Decentralized Distributed Blockchain Ledger for Financial Transaction Backup Data 分布式区块链账本,用于金融交易备份数据
Pub Date : 2019-05-01 DOI: 10.1109/ICSIoT47925.2019.00013
Michael Christopher Xenya, Kester Quist-Aphetsi
Due to the fact that financial data stands a great risk of attack, several schemes are being deployed to ensure security and integrity of financial data. In considering the security of the financial transaction data, it is essential to consider a network that ensure that processing nodes would have copies of the financial accounting ledger so as to prevent complete when a section of the network fails. In this article we propose an application of a blockchain to financial transaction data backup mechanism over a decentralized network. By using a decentralized distributed blockchain ledger, each node can have a copy of the transaction data such that, failure in one node does not engender a total failure in transaction data. The system have been described and simulated using the element of account ledger which consist of credit and debit transaction accompanied by timestamps and transaction ID. To secure this information in the chain each block contains in addition to the account ledger information a hash of the previous block as well as the hash of the current block.
由于金融数据存在很大的被攻击风险,为了保证金融数据的安全性和完整性,人们采用了多种方案。在考虑金融交易数据的安全性时,必须考虑一个确保处理节点具有财务会计分类账副本的网络,以防止在网络的一部分故障时完成。在本文中,我们提出了一种区块链在分散网络上金融交易数据备份机制中的应用。通过使用分散的分布式区块链分类帐,每个节点都可以拥有事务数据的副本,这样,一个节点的故障不会导致事务数据的全部故障。该系统采用账户分类账的元素进行描述和模拟,该分类账由借贷交易组成,并附有时间戳和交易ID。为了在链中保护这些信息,每个块除了包含帐户分类信息外,还包含前一个块的哈希值以及当前块的哈希值。
{"title":"Decentralized Distributed Blockchain Ledger for Financial Transaction Backup Data","authors":"Michael Christopher Xenya, Kester Quist-Aphetsi","doi":"10.1109/ICSIoT47925.2019.00013","DOIUrl":"https://doi.org/10.1109/ICSIoT47925.2019.00013","url":null,"abstract":"Due to the fact that financial data stands a great risk of attack, several schemes are being deployed to ensure security and integrity of financial data. In considering the security of the financial transaction data, it is essential to consider a network that ensure that processing nodes would have copies of the financial accounting ledger so as to prevent complete when a section of the network fails. In this article we propose an application of a blockchain to financial transaction data backup mechanism over a decentralized network. By using a decentralized distributed blockchain ledger, each node can have a copy of the transaction data such that, failure in one node does not engender a total failure in transaction data. The system have been described and simulated using the element of account ledger which consist of credit and debit transaction accompanied by timestamps and transaction ID. To secure this information in the chain each block contains in addition to the account ledger information a hash of the previous block as well as the hash of the current block.","PeriodicalId":226799,"journal":{"name":"2019 International Conference on Cyber Security and Internet of Things (ICSIoT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133132070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2019 International Conference on Cyber Security and Internet of Things (ICSIoT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1