首页 > 最新文献

Journal of Cyber Security and Mobility最新文献

英文 中文
An Enhanced Sybil Guard to Detect Bots in Online Social Networks 一种增强的Sybil保护来检测在线社交网络中的机器人
Q3 Computer Science Pub Date : 2021-11-20 DOI: 10.13052/jcsm2245-1439.1115
Nisha P. Shetty, Balachandra Muniyal, Arshia Anand, Sushant Kumar
Sybil accounts are swelling in popular social networking sites such as Twitter, Facebook etc. owing to cheap subscription and easy access to large masses. A malicious person creates multiple fake identities to outreach and outgrow his network. People blindly trust their online connections and fall into trap set up by these fake perpetrators. Sybil nodes exploit OSN’s ready-made connectivity to spread fake news, spamming, influencing polls, recommendations and advertisements, masquerading to get critical information, launching phishing attacks etc. Such accounts are surging in wide scale and so it has become very vital to effectively detect such nodes. In this research a new classifier (combination of Sybil Guard, Twitter engagement rate and Profile statistics analyser) is developed to combat such Sybil nodes. The proposed classifier overcomes the limitations of structure based, machine learning based and behaviour-based classifiers and is proven to be more accurate and robust than the base Sybil guard algorithm.
在Twitter、Facebook等流行的社交网站上,Sybil账户越来越多,因为它们的订阅费用便宜,而且容易接触到大量用户。恶意的人会创建多个假身份来扩展和超越他的网络。人们盲目地相信他们的网络关系,并落入这些冒牌犯罪者设置的陷阱。Sybil节点利用OSN现成的连接性传播假新闻、垃圾邮件、影响民意调查、推荐和广告、伪装以获取关键信息、发起网络钓鱼攻击等。由于此类账户规模庞大,因此有效检测此类节点变得至关重要。在本研究中,开发了一种新的分类器(结合Sybil Guard, Twitter参与率和Profile统计分析器)来对抗这种Sybil节点。该分类器克服了基于结构、基于机器学习和基于行为的分类器的局限性,并被证明比基本的Sybil保护算法更准确和鲁棒。
{"title":"An Enhanced Sybil Guard to Detect Bots in Online Social Networks","authors":"Nisha P. Shetty, Balachandra Muniyal, Arshia Anand, Sushant Kumar","doi":"10.13052/jcsm2245-1439.1115","DOIUrl":"https://doi.org/10.13052/jcsm2245-1439.1115","url":null,"abstract":"Sybil accounts are swelling in popular social networking sites such as Twitter, Facebook etc. owing to cheap subscription and easy access to large masses. A malicious person creates multiple fake identities to outreach and outgrow his network. People blindly trust their online connections and fall into trap set up by these fake perpetrators. Sybil nodes exploit OSN’s ready-made connectivity to spread fake news, spamming, influencing polls, recommendations and advertisements, masquerading to get critical information, launching phishing attacks etc. Such accounts are surging in wide scale and so it has become very vital to effectively detect such nodes. In this research a new classifier (combination of Sybil Guard, Twitter engagement rate and Profile statistics analyser) is developed to combat such Sybil nodes. The proposed classifier overcomes the limitations of structure based, machine learning based and behaviour-based classifiers and is proven to be more accurate and robust than the base Sybil guard algorithm.","PeriodicalId":37820,"journal":{"name":"Journal of Cyber Security and Mobility","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45175764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Effects of ‘Digital’ Country’s Information Security on Political Stability “数字”国家信息安全对政治稳定的影响
Q3 Computer Science Pub Date : 2021-11-20 DOI: 10.13052/jcsm2245-1439.1112
T. Nguyen, K. Koblandin, S. Suleymanova, V. Volokh
In this day and age, information security is becoming a priority not only in the system of international economic relations but also at the state level. This study aims to study the effect of a ‘digital’ country’s information security on its political stability through quantitative analysis. The study is a mixed research design with a focus on the Russian Federation and the Republic of Kazakhstan. Its methodological basis is represented by the collection and analysis of data on the level and nature of cybersecurity threats (Global Cybersecurity Index, the number of cyber incidents) and on the level of political stability (Political Stability and Absence of Violence/Terrorism indicator of the Worldwide Governance Index). The results of the study show that Russia with a GCI 2020 score of 98.06 and Kazakhstan with a GCI score of 93.15 have relatively low levels of political stability. This is evidenced by their 45.7 and 25.7 percentile ranks on Political Stability and Absence of Violence/Terrorism and a high frequency of offenses using information and communication technologies. Findings suggest that with a high level of commitment to information security, the growth in cyber incidents will not necessarily affect political stability. The obtained findings provide countries an insight into cybersecurity within the national system as well as present a great deal of data on best practices to work through gaps in the national culture of cybersecurity at the state level. The results and methodology of this study can be used by officials to develop information security strategies and tactics, as well as by other researchers for quantitative analysis of the relationship between information security and political stability of different countries and regions.
在当今时代,信息安全不仅成为国际经济关系体系的优先事项,而且成为国家层面的优先事项。本研究旨在通过定量分析研究“数字”国家的信息安全对其政治稳定的影响。这项研究是一项混合研究设计,重点是俄罗斯联邦和哈萨克斯坦共和国。其方法基础是收集和分析网络安全威胁的级别和性质(全球网络安全指数,网络事件数量)和政治稳定水平(全球治理指数中的政治稳定和无暴力/恐怖主义指标)的数据。研究结果表明,GCI 2020得分为98.06的俄罗斯和GCI得分为93.15的哈萨克斯坦的政治稳定水平相对较低。在政治稳定和没有暴力/恐怖主义方面的排名分别为45.7%和25.7%,以及利用信息和通信技术进行犯罪的频率很高,都证明了这一点。研究结果表明,在高度重视信息安全的情况下,网络事件的增长不一定会影响政治稳定。获得的研究结果为各国提供了对国家系统内网络安全的深入了解,并提供了大量关于最佳实践的数据,以便在州一级解决国家网络安全文化中的差距。本研究的结果和方法可用于官员制定信息安全战略和战术,也可用于其他研究人员定量分析不同国家和地区的信息安全与政治稳定之间的关系。
{"title":"Effects of ‘Digital’ Country’s Information Security on Political Stability","authors":"T. Nguyen, K. Koblandin, S. Suleymanova, V. Volokh","doi":"10.13052/jcsm2245-1439.1112","DOIUrl":"https://doi.org/10.13052/jcsm2245-1439.1112","url":null,"abstract":"In this day and age, information security is becoming a priority not only in the system of international economic relations but also at the state level. This study aims to study the effect of a ‘digital’ country’s information security on its political stability through quantitative analysis. The study is a mixed research design with a focus on the Russian Federation and the Republic of Kazakhstan. Its methodological basis is represented by the collection and analysis of data on the level and nature of cybersecurity threats (Global Cybersecurity Index, the number of cyber incidents) and on the level of political stability (Political Stability and Absence of Violence/Terrorism indicator of the Worldwide Governance Index). The results of the study show that Russia with a GCI 2020 score of 98.06 and Kazakhstan with a GCI score of 93.15 have relatively low levels of political stability. This is evidenced by their 45.7 and 25.7 percentile ranks on Political Stability and Absence of Violence/Terrorism and a high frequency of offenses using information and communication technologies. Findings suggest that with a high level of commitment to information security, the growth in cyber incidents will not necessarily affect political stability. The obtained findings provide countries an insight into cybersecurity within the national system as well as present a great deal of data on best practices to work through gaps in the national culture of cybersecurity at the state level. The results and methodology of this study can be used by officials to develop information security strategies and tactics, as well as by other researchers for quantitative analysis of the relationship between information security and political stability of different countries and regions.","PeriodicalId":37820,"journal":{"name":"Journal of Cyber Security and Mobility","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46200965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Review on Audio Encryption Algorithms Using Chaos Maps-Based Techniques 基于混沌映射技术的音频加密算法综述
Q3 Computer Science Pub Date : 2021-11-20 DOI: 10.13052/jcsm2245-1439.1113
Ekhlas Abbas Albahrani, Tayseer Karam Alshekly, Sadeq H. Lafta
Due to the quick improvement in digital communications and multimedia applications during recent periods up to the current time, data protection of digital data such as image, audio and video becomes a significant challenge. The security of audio data that transfer through different networks was rated as a preferred research field in the preceding years. This review covers the recent contribution for audio encryption and gives the most evaluations for audio encryption algorithm involving security analysis, computational complexity and quality analysis and their requirements. This paper fundamentally concentrates on displaying the different types of audio encryption and decryption techniques based on chaotic maps. Digital and analog audio algorithms were displayed, discussed and compared with the illustration of the important features and drawbacks. Various digital and audio proposed projects for audio encryption using chaotic maps have been covered, which they showed extreme sensitivity to initial conditions, unpredictability and conducting in a quasi-random manner. A comparison among the proposed algorithms in the key space, chaotic maps sensitivity and statistical analysis were provided.
由于近年来数字通信和多媒体应用的快速发展,图像、音频和视频等数字数据的数据保护成为一项重大挑战。通过不同网络传输的音频数据的安全性在前几年被评为首选研究领域。这篇综述涵盖了音频加密的最新贡献,并对音频加密算法进行了最多的评估,包括安全分析、计算复杂性和质量分析及其要求。本文从根本上集中展示了基于混沌映射的不同类型的音频加密和解密技术。对数字和模拟音频算法进行了展示、讨论,并对其重要特点和缺点进行了对比说明。已经涵盖了使用混沌图进行音频加密的各种数字和音频拟议项目,它们对初始条件表现出极大的敏感性、不可预测性和以准随机方式进行。在关键空间、混沌映射灵敏度和统计分析方面对所提出的算法进行了比较。
{"title":"A Review on Audio Encryption Algorithms Using Chaos Maps-Based Techniques","authors":"Ekhlas Abbas Albahrani, Tayseer Karam Alshekly, Sadeq H. Lafta","doi":"10.13052/jcsm2245-1439.1113","DOIUrl":"https://doi.org/10.13052/jcsm2245-1439.1113","url":null,"abstract":"Due to the quick improvement in digital communications and multimedia applications during recent periods up to the current time, data protection of digital data such as image, audio and video becomes a significant challenge. The security of audio data that transfer through different networks was rated as a preferred research field in the preceding years. This review covers the recent contribution for audio encryption and gives the most evaluations for audio encryption algorithm involving security analysis, computational complexity and quality analysis and their requirements. This paper fundamentally concentrates on displaying the different types of audio encryption and decryption techniques based on chaotic maps. Digital and analog audio algorithms were displayed, discussed and compared with the illustration of the important features and drawbacks. Various digital and audio proposed projects for audio encryption using chaotic maps have been covered, which they showed extreme sensitivity to initial conditions, unpredictability and conducting in a quasi-random manner. A comparison among the proposed algorithms in the key space, chaotic maps sensitivity and statistical analysis were provided.","PeriodicalId":37820,"journal":{"name":"Journal of Cyber Security and Mobility","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44233900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Adaptive Matrix Pattern Steganography on RGB Images RGB图像的自适应矩阵模式隐写
Q3 Computer Science Pub Date : 2021-08-30 DOI: 10.13052/jcsm2245-1439.1111
Amirfarhad Nilizadeh, Shirin Nilizadeh, W. Mazurczyk, C. Zou, Gary T. Leavens
Almost all spatial domain image steganography methods rely on modifying the Least Significant Bits (LSB) of each pixel to minimize the visual distortions. However, these methods are susceptible to LSB blind attacks and quantitative steganalyses. This paper presents an adaptive spatial domain image steganography algorithm for hiding digital media based on matrix patterns, named “Adaptive Matrix Pattern” (AMP). The AMP method increases the security of the steganography scheme of largely hidden messages since it adaptively generates a unique codebook matrix pattern for each ASCII character in each image block. Therefore, each ASCII character gets a different codebook matrix pattern even in different regions of the same image. Moreover, it uses a preprocessing algorithm to identify the most suitable image blocks for hiding purposes. The resulting stego-images are robust against LSB blind attacks since the middle bits of green and blue channels generate matrix patterns and hiding secrets, respectively. Experimental results show that AMP is robust against quantitative steganalyses. Additionally, the quality of stego-images, based on the peak signal-to-noise ratio metric, remains high in both stego-RGB-image and in the stego-blue-channel. Finally, the AMP method provides a high hiding capacity, up to 1.33 bits per pixel.
几乎所有的空间域图像隐写方法都依赖于修改每个像素的最低有效位(LSB)来最小化视觉失真。然而,这些方法容易受到LSB盲攻击和定量隐写分析。提出了一种基于矩阵模式的自适应空间域图像隐写算法,用于隐藏数字媒体,称为“自适应矩阵模式”(AMP)。AMP方法自适应地为每个图像块中的每个ASCII字符生成唯一的码本矩阵模式,从而提高了大部分隐藏消息的隐写方案的安全性。因此,即使在同一图像的不同区域,每个ASCII字符也会得到不同的码本矩阵模式。此外,它使用预处理算法来识别最适合隐藏的图像块。由于绿色和蓝色通道的中间位分别生成矩阵图案和隐藏秘密,因此得到的隐写图像对LSB盲攻击具有鲁棒性。实验结果表明,AMP对定量隐写分析具有较强的鲁棒性。此外,基于峰值信噪比度量的隐去图像质量在隐去- rgb图像和隐去-蓝色通道中仍然很高。最后,AMP方法提供了高隐藏容量,高达每像素1.33位。
{"title":"Adaptive Matrix Pattern Steganography on RGB Images","authors":"Amirfarhad Nilizadeh, Shirin Nilizadeh, W. Mazurczyk, C. Zou, Gary T. Leavens","doi":"10.13052/jcsm2245-1439.1111","DOIUrl":"https://doi.org/10.13052/jcsm2245-1439.1111","url":null,"abstract":"Almost all spatial domain image steganography methods rely on modifying the Least Significant Bits (LSB) of each pixel to minimize the visual distortions. However, these methods are susceptible to LSB blind attacks and quantitative steganalyses. This paper presents an adaptive spatial domain image steganography algorithm for hiding digital media based on matrix patterns, named “Adaptive Matrix Pattern” (AMP). The AMP method increases the security of the steganography scheme of largely hidden messages since it adaptively generates a unique codebook matrix pattern for each ASCII character in each image block. Therefore, each ASCII character gets a different codebook matrix pattern even in different regions of the same image. Moreover, it uses a preprocessing algorithm to identify the most suitable image blocks for hiding purposes. The resulting stego-images are robust against LSB blind attacks since the middle bits of green and blue channels generate matrix patterns and hiding secrets, respectively. Experimental results show that AMP is robust against quantitative steganalyses. Additionally, the quality of stego-images, based on the peak signal-to-noise ratio metric, remains high in both stego-RGB-image and in the stego-blue-channel. Finally, the AMP method provides a high hiding capacity, up to 1.33 bits per pixel.","PeriodicalId":37820,"journal":{"name":"Journal of Cyber Security and Mobility","volume":"53 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80779828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Time Lag-Based Modelling for Software Vulnerability Exploitation Process 基于时间滞后的软件漏洞开发过程建模
Q3 Computer Science Pub Date : 2021-06-15 DOI: 10.13052/jcsm2245-1439.1042
Adarsh Anand, N. Bhatt, J. Kaur, Y. Tamura
With the increase in the discovery of vulnerabilities, the expected exploits occurred in various software platform has shown an increased growth with respect to time. Only after being discovered, the potential vulnerabilities might be exploited. There exists a finite time lag in the exploitation process; from the moment the hackers get information about the discovery of a vulnerability and the time required in the final exploitation. By making use of the time lag approach, we have developed a framework for the vulnerability exploitation process that occurred in multiple stages. The time lag between the discovery and exploitation of a vulnerability has been bridged via the memory kernel function over a finite time interval. The applicability of the proposed model has been validated using various software exploit datasets.
随着漏洞发现的增加,各种软件平台上发生的预期漏洞也呈现出随时间增长的趋势。只有被发现后,潜在的漏洞才有可能被利用。在开发过程中存在一定的时滞;从黑客获得有关漏洞发现的信息的那一刻起,以及最终利用所需的时间。通过使用时间滞后方法,我们为多个阶段发生的漏洞利用过程开发了一个框架。漏洞的发现和利用之间的时间差已经通过内存内核函数在有限的时间间隔内弥合。利用各种软件漏洞数据集验证了所提出模型的适用性。
{"title":"Time Lag-Based Modelling for Software Vulnerability Exploitation Process","authors":"Adarsh Anand, N. Bhatt, J. Kaur, Y. Tamura","doi":"10.13052/jcsm2245-1439.1042","DOIUrl":"https://doi.org/10.13052/jcsm2245-1439.1042","url":null,"abstract":"With the increase in the discovery of vulnerabilities, the expected exploits occurred in various software platform has shown an increased growth with respect to time. Only after being discovered, the potential vulnerabilities might be exploited. There exists a finite time lag in the exploitation process; from the moment the hackers get information about the discovery of a vulnerability and the time required in the final exploitation. By making use of the time lag approach, we have developed a framework for the vulnerability exploitation process that occurred in multiple stages. The time lag between the discovery and exploitation of a vulnerability has been bridged via the memory kernel function over a finite time interval. The applicability of the proposed model has been validated using various software exploit datasets.","PeriodicalId":37820,"journal":{"name":"Journal of Cyber Security and Mobility","volume":"3 1","pages":"663-678"},"PeriodicalIF":0.0,"publicationDate":"2021-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78318902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
API Call-Based Malware Classification Using Recurrent Neural Networks 基于API调用的递归神经网络恶意软件分类
Q3 Computer Science Pub Date : 2021-05-27 DOI: 10.13052/JCSM2245-1439.1036
Chen Li, Junjun Zheng
Malicious software, called malware, can perform harmful actions on computer systems, which may cause economic damage and information leakage. Therefore, malware classification is meaningful and required to prevent malware attacks. Application programming interface (API) call sequences are easily observed and are good choices as features for malware classification. However, one of the main issues is how to generate a suitable feature for the algorithms of classification to achieve a high classification accuracy. Different malware sample brings API call sequence with different lengths, and these lengths may reach millions, which may cause computation cost and time complexities. Recurrent neural networks (RNNs) is one of the most versatile approaches to process time series data, which can be used to API call-based Malware calssification. In this paper, we propose a malware classification model with RNN, especially the long short-term memory (LSTM) and the gated recurrent unit (GRU), to classify variants of malware by using long-sequences of API calls. In numerical experiments, a benchmark dataset is used to illustrate the proposed approach and validate its accuracy. The numerical results show that the proposed RNN model works well on the malware classification.
被称为恶意软件的恶意软件可以在计算机系统上执行有害操作,这可能会造成经济损失和信息泄露。因此,恶意软件分类对于防止恶意软件攻击是有意义和必要的。应用程序编程接口(API)调用序列很容易被观察到,并且作为恶意软件分类的功能是很好的选择。然而,主要问题之一是如何为分类算法生成合适的特征以实现高分类精度。不同的恶意软件样本带来不同长度的API调用序列,这些长度可能达到数百万,这可能会导致计算成本和时间复杂性。递归神经网络(RNN)是处理时间序列数据最通用的方法之一,可用于API基于调用的恶意软件分类。在本文中,我们提出了一个带有RNN的恶意软件分类模型,特别是长短期记忆(LSTM)和门控递归单元(GRU),通过使用API调用的长序列对恶意软件的变体进行分类。在数值实验中,使用基准数据集来说明所提出的方法并验证其准确性。数值结果表明,所提出的RNN模型对恶意软件分类效果良好。
{"title":"API Call-Based Malware Classification Using Recurrent Neural Networks","authors":"Chen Li, Junjun Zheng","doi":"10.13052/JCSM2245-1439.1036","DOIUrl":"https://doi.org/10.13052/JCSM2245-1439.1036","url":null,"abstract":"Malicious software, called malware, can perform harmful actions on computer systems, which may cause economic damage and information leakage. Therefore, malware classification is meaningful and required to prevent malware attacks. Application programming interface (API) call sequences are easily observed and are good choices as features for malware classification. However, one of the main issues is how to generate a suitable feature for the algorithms of classification to achieve a high classification accuracy. Different malware sample brings API call sequence with different lengths, and these lengths may reach millions, which may cause computation cost and time complexities. Recurrent neural networks (RNNs) is one of the most versatile approaches to process time series data, which can be used to API call-based Malware calssification. In this paper, we propose a malware classification model with RNN, especially the long short-term memory (LSTM) and the gated recurrent unit (GRU), to classify variants of malware by using long-sequences of API calls. In numerical experiments, a benchmark dataset is used to illustrate the proposed approach and validate its accuracy. The numerical results show that the proposed RNN model works well on the malware classification.","PeriodicalId":37820,"journal":{"name":"Journal of Cyber Security and Mobility","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45990827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
DDOS Detection on Internet of Things Using Unsupervised Algorithms 基于无监督算法的物联网DDOS检测
Q3 Computer Science Pub Date : 2021-05-27 DOI: 10.13052/JCSM2245-1439.1034
Victor Odumuyiwa, Rukayat Alabi
The increase in the deployment of IOT networks has improved productivity of humans and organisations. However, IOT networks are increasingly becoming platforms for launching DDOS attacks due to inherent weaker security and resource-constrained nature of IOT devices. This paper focusses on detecting DDOS attack in IOT networks by classifying incoming network packets on the transport layer as either “Suspicious” or “Benign” using unsupervised machine learning algorithms. In this work, two deep learning algorithms and two clustering algorithms were independently trained for mitigating DDOS attacks. Emphasis was laid on exploitation based DDOS attacks which include Transmission Control Protocol SYN-Flood attacks and UDP-Lag attacks. Mirai, BASHLITE and CICDDOS2019 datasets were used in training the algorithms during the experimentation phase. The accuracy score and normalized-mutual-information score are used to quantify the classification performance of the four algorithms. Our results show that the autoencoder performed overall best with the highest accuracy across all the datasets.
物联网网络部署的增加提高了人类和组织的生产力。然而,由于物联网设备固有的安全性较弱和资源受限的特性,物联网网络正日益成为DDOS攻击的平台。本文的重点是通过使用无监督机器学习算法将传输层上的传入网络数据包分类为“可疑”或“良性”来检测物联网网络中的DDOS攻击。在这项工作中,分别训练了两种深度学习算法和两种聚类算法来缓解DDOS攻击。重点研究了基于利用的DDOS攻击,包括传输控制协议SYN-Flood攻击和UDP-Lag攻击。在实验阶段,使用Mirai、BASHLITE和CICDDOS2019数据集对算法进行训练。使用准确率评分和归一化互信息评分来量化四种算法的分类性能。我们的结果表明,自动编码器在所有数据集上表现最好,精度最高。
{"title":"DDOS Detection on Internet of Things Using Unsupervised Algorithms","authors":"Victor Odumuyiwa, Rukayat Alabi","doi":"10.13052/JCSM2245-1439.1034","DOIUrl":"https://doi.org/10.13052/JCSM2245-1439.1034","url":null,"abstract":"The increase in the deployment of IOT networks has improved productivity of humans and organisations. However, IOT networks are increasingly becoming platforms for launching DDOS attacks due to inherent weaker security and resource-constrained nature of IOT devices. This paper focusses on detecting DDOS attack in IOT networks by classifying incoming network packets on the transport layer as either “Suspicious” or “Benign” using unsupervised machine learning algorithms. In this work, two deep learning algorithms and two clustering algorithms were independently trained for mitigating DDOS attacks. Emphasis was laid on exploitation based DDOS attacks which include Transmission Control Protocol SYN-Flood attacks and UDP-Lag attacks. Mirai, BASHLITE and CICDDOS2019 datasets were used in training the algorithms during the experimentation phase. The accuracy score and normalized-mutual-information score are used to quantify the classification performance of the four algorithms. Our results show that the autoencoder performed overall best with the highest accuracy across all the datasets.","PeriodicalId":37820,"journal":{"name":"Journal of Cyber Security and Mobility","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42005020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
An Accelerator-based Logistic Map Image Cryptosystems for Grayscale Images 基于加速器的灰度图像逻辑映射密码系统
Q3 Computer Science Pub Date : 2021-05-15 DOI: 10.13052/jcsm2245-1439.1031
M. Holla, A. R. Pais, D. Suma
The logistic map is a class of chaotic maps. It is still in use in image cryptography. The logistic map cryptosystem has two stages, namely permutation, and diffusion. These two stages being computationally intensive, the permutation relocates the pixels, whereas the diffusion rescales them. The research on refining the logistic map is progressing to make the encryption more secure. Now there is a need to improve its efficiency to enable such models to fit for high-speed applications. The new invention of accelerators offers efficiency. But the inherent data dependencies hinder the use of accelerators. This paper discusses the novelty of identifying independent data-parallel tasks in a logistic map, handing them over to the accelerators, and improving their efficiency. Among the two accelerator models proposed, the first one achieves peak efficiency using coalesced memory access. The other cryptosystem further improves performance at the cost of more execution resources. In this investigation, it is noteworthy that the parallelly accelerated logistic map achieved a significant speedup to the larger grayscale image used. The objective security estimates proved that the two stages of the proposed systems progressively ensure security.
logistic映射是混沌映射的一类。它仍然在图像密码学中使用。逻辑映射密码系统有两个阶段:置换阶段和扩散阶段。这两个阶段是计算密集的,排列重新定位像素,而扩散重新缩放它们。为了提高加密的安全性,对逻辑映射的细化研究正在进行中。现在有必要提高其效率,使这种模型适合高速应用。新发明的加速器提高了效率。但是固有的数据依赖性阻碍了加速器的使用。本文讨论了在逻辑映射中识别独立的数据并行任务,并将其移交给加速器并提高其效率的新方法。在提出的两种加速器模型中,第一种模型使用合并内存访问实现了最高效率。另一种密码系统以更多的执行资源为代价进一步提高性能。在这项研究中,值得注意的是,并行加速的逻辑图实现了显著的加速,以使用更大的灰度图像。客观的安全性估计证明了所提系统的两个阶段逐步保证了安全性。
{"title":"An Accelerator-based Logistic Map Image Cryptosystems for Grayscale Images","authors":"M. Holla, A. R. Pais, D. Suma","doi":"10.13052/jcsm2245-1439.1031","DOIUrl":"https://doi.org/10.13052/jcsm2245-1439.1031","url":null,"abstract":"The logistic map is a class of chaotic maps. It is still in use in image cryptography. The logistic map cryptosystem has two stages, namely permutation, and diffusion. These two stages being computationally intensive, the permutation relocates the pixels, whereas the diffusion rescales them. The research on refining the logistic map is progressing to make the encryption more secure. Now there is a need to improve its efficiency to enable such models to fit for high-speed applications. The new invention of accelerators offers efficiency. But the inherent data dependencies hinder the use of accelerators. This paper discusses the novelty of identifying independent data-parallel tasks in a logistic map, handing them over to the accelerators, and improving their efficiency. Among the two accelerator models proposed, the first one achieves peak efficiency using coalesced memory access. The other cryptosystem further improves performance at the cost of more execution resources. In this investigation, it is noteworthy that the parallelly accelerated logistic map achieved a significant speedup to the larger grayscale image used. The objective security estimates proved that the two stages of the proposed systems progressively ensure security.","PeriodicalId":37820,"journal":{"name":"Journal of Cyber Security and Mobility","volume":"22 1","pages":"487-510"},"PeriodicalIF":0.0,"publicationDate":"2021-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74732529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identifying the Phishing Websites Using the Patterns of TLS Certificates 利用TLS证书模式识别钓鱼网站
Q3 Computer Science Pub Date : 2021-04-15 DOI: 10.13052/jcsm2245-1439.1026
Yuji Sakurai, Takuya Watanabe, Tetsuya Okuda, Mitsuaki Akiyama, Tatsuya Mori
With the recent rise of HTTPS adoption on the Web, attackers have begun “HTTPSifying” phishing websites. HTTPSifying a phishing website has the advantage of making the website appear legitimate and evading conventional detection methods that leverage URLs or web contents in the network. Further, adopting HTTPS could also contribute to generating intrinsic footprints and provide defenders with a great opportunity to monitor and detect websites, including phishing sites, as they would need to obtain a public-key certificate issued for the preparation of the websites. The potential benefits of certificate-based detection include (1) the comprehensive monitoring of all HTTPSified websites by using certificates immediately after their issuance, even if the attacker utilizes dynamic DNS (DDNS) or hosting services; this could be overlooked with the conventional domain-registration-based approaches; and (2) to detect phishing websites before they are published on the Internet. Accordingly, we address the following research question: How can we make use of the footprints of TLS certificates to defend against phishing attacks? For this, we collected a large set of TLS certificates corresponding to phishing websites from Certificate Transparency (CT) logs and extensively analyzed these TLS certificates. We demonstrated that a template of common names, which are equivalent to the fully qualified domain names, obtained through the clustering analysis of the certificates can be used for the following promising applications: (1) The discovery of previously unknown phishing websites and (2) understanding the infrastructure used to generate the phishing websites. Furthermore, we developed a real-time monitoring system using the analysis techniques. We demonstrate its usefulness for the practical security operation. We use our findings on the abuse of free certificate authorities (CAs) for operating HTTPSified phishing websites to discuss possible solutions against such abuse and provide a recommendation to the CAs.
随着最近HTTPS在网络上的普及,攻击者已经开始对网络钓鱼网站进行“http检测”。http检测钓鱼网站的优点是使网站看起来合法,并避开利用网络中的url或web内容的传统检测方法。此外,采用HTTPS还可能有助于产生固有足迹,并为防御者提供监视和检测网站(包括网络钓鱼网站)的绝佳机会,因为他们需要获得为准备网站而颁发的公钥证书。基于证书的检测的潜在好处包括:(1)通过在证书颁发后立即使用证书对所有http认证的网站进行全面监控,即使攻击者使用动态DNS (DDNS)或托管服务;传统的基于域名注册的方法可能会忽略这一点;(2)在网络钓鱼网站发布之前进行检测。因此,我们解决了以下研究问题:我们如何利用TLS证书的足迹来防御网络钓鱼攻击?为此,我们从证书透明度(Certificate Transparency, CT)日志中收集了大量网络钓鱼网站对应的TLS证书,并对这些TLS证书进行了广泛的分析。我们证明,通过对证书进行聚类分析获得的通用名称模板(相当于完全限定域名)可用于以下有前景的应用:(1)发现以前未知的网络钓鱼网站;(2)了解用于生成网络钓鱼网站的基础设施。此外,我们利用分析技术开发了一个实时监测系统。我们在实际的安全操作中证明了它的实用性。我们使用我们关于滥用免费证书颁发机构(ca)来操作http认证的网络钓鱼网站的调查结果来讨论针对此类滥用的可能解决方案,并向ca提供建议。
{"title":"Identifying the Phishing Websites Using the Patterns of TLS Certificates","authors":"Yuji Sakurai, Takuya Watanabe, Tetsuya Okuda, Mitsuaki Akiyama, Tatsuya Mori","doi":"10.13052/jcsm2245-1439.1026","DOIUrl":"https://doi.org/10.13052/jcsm2245-1439.1026","url":null,"abstract":"With the recent rise of HTTPS adoption on the Web, attackers have begun “HTTPSifying” phishing websites. HTTPSifying a phishing website has the advantage of making the website appear legitimate and evading conventional detection methods that leverage URLs or web contents in the network. Further, adopting HTTPS could also contribute to generating intrinsic footprints and provide defenders with a great opportunity to monitor and detect websites, including phishing sites, as they would need to obtain a public-key certificate issued for the preparation of the websites. The potential benefits of certificate-based detection include (1) the comprehensive monitoring of all HTTPSified websites by using certificates immediately after their issuance, even if the attacker utilizes dynamic DNS (DDNS) or hosting services; this could be overlooked with the conventional domain-registration-based approaches; and (2) to detect phishing websites before they are published on the Internet. Accordingly, we address the following research question: How can we make use of the footprints of TLS certificates to defend against phishing attacks? For this, we collected a large set of TLS certificates corresponding to phishing websites from Certificate Transparency (CT) logs and extensively analyzed these TLS certificates. We demonstrated that a template of common names, which are equivalent to the fully qualified domain names, obtained through the clustering analysis of the certificates can be used for the following promising applications: (1) The discovery of previously unknown phishing websites and (2) understanding the infrastructure used to generate the phishing websites. Furthermore, we developed a real-time monitoring system using the analysis techniques. We demonstrate its usefulness for the practical security operation. We use our findings on the abuse of free certificate authorities (CAs) for operating HTTPSified phishing websites to discuss possible solutions against such abuse and provide a recommendation to the CAs.","PeriodicalId":37820,"journal":{"name":"Journal of Cyber Security and Mobility","volume":"4 1","pages":"451-486"},"PeriodicalIF":0.0,"publicationDate":"2021-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73712180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Data Tamper Detection from NoSQL Database in Forensic Environment 取证环境下NoSQL数据库数据篡改检测
Q3 Computer Science Pub Date : 2021-04-08 DOI: 10.13052/jcsm2245-1439.1025
Rupali M. Chopade, V. Pachghare
The growth of service sector is increasing the usage of digital applications worldwide. These digital applications are making use of database to store the sensitive and secret information. As the database has distributed over the internet, cybercrime attackers may tamper the database to attack on such sensitive and confidential information. In such scenario, maintaining the integrity of database is a big challenge. Database tampering will change the database state by any data manipulation operation like insert, update or delete. Tamper detection techniques are useful for the detection of such data tampering which play an important role in database forensic investigation process. Use of NoSQL database has been attracted by big data requirements. Previous research work has limited to tamper detection in relational database and very less work has been found in NoSQL database. So there is a need to propose a mechanism to detect the tampering of NoSQL database systems. Whereas this article proposes an idea of tamper detection in NoSQL database such as MongoDB and Cassandra, which are widely used document-oriented and column-based NoSQL database respectively. This research work has proposed tamper detection technique which works in forensic environment to give more relevant outcome on data tampering and distinguish between suspicious and genuine tampering.  
服务业的增长正在增加全球数字应用程序的使用。这些数字化应用都是利用数据库来存储敏感和机密信息。由于数据库在互联网上分布,网络犯罪攻击者可能会篡改数据库以攻击这些敏感和机密信息。在这种情况下,维护数据库的完整性是一个很大的挑战。数据库篡改将通过插入、更新或删除等任何数据操作来改变数据库状态。篡改检测技术是检测此类数据篡改的有效手段,在数据库取证调查过程中起着重要的作用。NoSQL数据库的使用受到大数据需求的吸引。以往的研究工作仅限于关系数据库的篡改检测,对NoSQL数据库的篡改检测工作很少。因此,有必要提出一种检测NoSQL数据库系统被篡改的机制。本文提出了在MongoDB和Cassandra等应用广泛的面向文档和基于列的NoSQL数据库中进行篡改检测的思想。本研究提出了一种适用于法医环境的篡改检测技术,以便对数据篡改给出更相关的结论,并区分可疑篡改和真实篡改。
{"title":"Data Tamper Detection from NoSQL Database in Forensic Environment","authors":"Rupali M. Chopade, V. Pachghare","doi":"10.13052/jcsm2245-1439.1025","DOIUrl":"https://doi.org/10.13052/jcsm2245-1439.1025","url":null,"abstract":"The growth of service sector is increasing the usage of digital applications worldwide. These digital applications are making use of database to store the sensitive and secret information. As the database has distributed over the internet, cybercrime attackers may tamper the database to attack on such sensitive and confidential information. In such scenario, maintaining the integrity of database is a big challenge. Database tampering will change the database state by any data manipulation operation like insert, update or delete. Tamper detection techniques are useful for the detection of such data tampering which play an important role in database forensic investigation process. Use of NoSQL database has been attracted by big data requirements. Previous research work has limited to tamper detection in relational database and very less work has been found in NoSQL database. So there is a need to propose a mechanism to detect the tampering of NoSQL database systems. Whereas this article proposes an idea of tamper detection in NoSQL database such as MongoDB and Cassandra, which are widely used document-oriented and column-based NoSQL database respectively. This research work has proposed tamper detection technique which works in forensic environment to give more relevant outcome on data tampering and distinguish between suspicious and genuine tampering.  ","PeriodicalId":37820,"journal":{"name":"Journal of Cyber Security and Mobility","volume":"179 1","pages":"421-450"},"PeriodicalIF":0.0,"publicationDate":"2021-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78566257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
Journal of Cyber Security and Mobility
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1