首页 > 最新文献

Journal of Cyber Security and Mobility最新文献

英文 中文
Security of Encrypted Images in Network Transmission Based on an Improved Chaos Algorithm 基于改进混沌算法的加密图像网络传输安全性研究
Q3 Computer Science Pub Date : 2023-08-12 DOI: 10.13052/jcsm2245-1439.1253
G. Du
With the wide application of 5G networks, many digital images must rely on networks for transmission. Traditional image encryption algorithms can no longer meet modern security requirements, and it is important to protect digital images in network transmission more securely. To address the shortcomings of traditional chaotic algorithms in image encryption, such as the strong randomness of image pixel replacement and time-consuming computations of image pixel iteration, we use a fractional-order Fourier transform to replace the image pixel matrix, a one-dimensional logistic chaos algorithm to reduce the problem of strong randomness of image pixels, and a sine chaos-based idea to optimize the diffusion algorithm to reduce the computational complexity. After encrypting a digital image in simulation experiments, we achieved better results through statistical analysis, adjacent pixel correlation, and resistance to differential attack performance analysis index tests, and verified the protection effect of this algorithm in digital images during network attacks.
随着5G网络的广泛应用,许多数字图像必须依靠网络进行传输。传统的图像加密算法已经不能满足现代的安全要求,如何在网络传输中更加安全地保护数字图像具有重要意义。针对传统混沌算法在图像加密中存在的图像像素替换随机性强、图像像素迭代计算耗时等缺点,采用分数阶傅立叶变换替换图像像素矩阵,采用一维逻辑混沌算法减少图像像素的强随机性问题,采用基于正弦混沌的思想优化扩散算法以降低计算复杂度。在仿真实验中对数字图像进行加密后,通过统计分析、相邻像素相关、抗差分攻击性能分析指标测试,取得了较好的效果,验证了该算法在网络攻击时对数字图像的保护效果。
{"title":"Security of Encrypted Images in Network Transmission Based on an Improved Chaos Algorithm","authors":"G. Du","doi":"10.13052/jcsm2245-1439.1253","DOIUrl":"https://doi.org/10.13052/jcsm2245-1439.1253","url":null,"abstract":"With the wide application of 5G networks, many digital images must rely on networks for transmission. Traditional image encryption algorithms can no longer meet modern security requirements, and it is important to protect digital images in network transmission more securely. To address the shortcomings of traditional chaotic algorithms in image encryption, such as the strong randomness of image pixel replacement and time-consuming computations of image pixel iteration, we use a fractional-order Fourier transform to replace the image pixel matrix, a one-dimensional logistic chaos algorithm to reduce the problem of strong randomness of image pixels, and a sine chaos-based idea to optimize the diffusion algorithm to reduce the computational complexity. After encrypting a digital image in simulation experiments, we achieved better results through statistical analysis, adjacent pixel correlation, and resistance to differential attack performance analysis index tests, and verified the protection effect of this algorithm in digital images during network attacks.","PeriodicalId":37820,"journal":{"name":"Journal of Cyber Security and Mobility","volume":"45 1","pages":"675-696"},"PeriodicalIF":0.0,"publicationDate":"2023-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83150854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Camera Network Topology Mapping Based on the Integration of Network Information and Physical Distribution Under the Background of Communication Security 通信安全背景下基于网络信息与物理分布融合的摄像机网络拓扑映射
Q3 Computer Science Pub Date : 2023-08-12 DOI: 10.13052/jcsm2245-1439.1256
Min Chen
At present, most cameras use internal networks and use methods such as Traceroute for security protection, which cannot meet the requirements of camera network mapping. Therefore, a camera mapping scheme of network information and physical distribution is proposed. Firstly, the network topology problem of video content information collection was analyzed. This paper uses the mapping relationship between network space and physical space to propose the subnet division conjecture method and complete the preliminary mapping of the network through video data screening. Considering the insufficient coverage of topology mapping, a judgment and inference method based on Bayesian classification technology and network information is proposed, and the results are corrected and evaluated through the test of Jackard coefficient. In the preliminary network topology performance test, two state-of-the-art schemes are selected for experimental comparison. When the number of nodes in the proposed scheme is 5, 25, and 50, the mapping can be completed in the shortest time, and the accuracy reaches 80%. However, the surveying and mapping accuracy of the proposed scheme in the preliminary test is low, and the network information method is used for data screening. In the final surveying and mapping performance test, when the number of nodes is 40, the accuracy of the proposed scheme is 96%, which is better than previously proposed schemes, while the testing delay time is shorter. The technology proposed in the study has the best overall performance. It can effectively solve the problem of intranet surveying and mapping and has important reference value for the security protection of the camera network.
目前,大多数摄像机使用内部网络,使用Traceroute等方法进行安全保护,无法满足摄像机网络映射的要求。为此,提出了一种网络信息与物理分布的摄像机映射方案。首先,分析了视频内容信息采集的网络拓扑问题。本文利用网络空间与物理空间的映射关系,提出子网划分猜想方法,通过视频数据筛选完成网络的初步映射。针对拓扑映射覆盖不足的问题,提出了一种基于贝叶斯分类技术和网络信息的判断推理方法,并通过Jackard系数的检验对结果进行了修正和评价。在初步的网络拓扑性能测试中,选择了两种最先进的方案进行实验比较。当所提方案的节点数为5、25和50时,可以在最短的时间内完成映射,准确率达到80%。但所提出方案在初步试验中测绘精度较低,采用网络信息法进行数据筛选。在最终的测绘性能测试中,当节点数为40时,所提方案的准确率为96%,优于之前提出的方案,且测试延迟时间更短。本研究提出的技术综合性能最好。它能有效地解决内网测绘问题,对摄像机网络的安全防护具有重要的参考价值。
{"title":"Camera Network Topology Mapping Based on the Integration of Network Information and Physical Distribution Under the Background of Communication Security","authors":"Min Chen","doi":"10.13052/jcsm2245-1439.1256","DOIUrl":"https://doi.org/10.13052/jcsm2245-1439.1256","url":null,"abstract":"At present, most cameras use internal networks and use methods such as Traceroute for security protection, which cannot meet the requirements of camera network mapping. Therefore, a camera mapping scheme of network information and physical distribution is proposed. Firstly, the network topology problem of video content information collection was analyzed. This paper uses the mapping relationship between network space and physical space to propose the subnet division conjecture method and complete the preliminary mapping of the network through video data screening. Considering the insufficient coverage of topology mapping, a judgment and inference method based on Bayesian classification technology and network information is proposed, and the results are corrected and evaluated through the test of Jackard coefficient. In the preliminary network topology performance test, two state-of-the-art schemes are selected for experimental comparison. When the number of nodes in the proposed scheme is 5, 25, and 50, the mapping can be completed in the shortest time, and the accuracy reaches 80%. However, the surveying and mapping accuracy of the proposed scheme in the preliminary test is low, and the network information method is used for data screening. In the final surveying and mapping performance test, when the number of nodes is 40, the accuracy of the proposed scheme is 96%, which is better than previously proposed schemes, while the testing delay time is shorter. The technology proposed in the study has the best overall performance. It can effectively solve the problem of intranet surveying and mapping and has important reference value for the security protection of the camera network.","PeriodicalId":37820,"journal":{"name":"Journal of Cyber Security and Mobility","volume":"79 1","pages":"733-756"},"PeriodicalIF":0.0,"publicationDate":"2023-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85155661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptation of the Ant Colony Algorithm to Avoid Congestion in Wireless Mesh Networks 自适应蚁群算法避免无线Mesh网络拥塞
Q3 Computer Science Pub Date : 2023-08-12 DOI: 10.13052/jcsm2245-1439.1258
Fadhil Mohammed Salman, Ahssan Ahmed Mohammed, Fanar Ali Joda
Wireless mesh networks have recently presented a promising environment for many researchers to develop large-scale wireless communication. Traffic in WMNs often suffers from congestion due to heavy traffic load’s saturation of certain routes. Therefore, this article proposes an efficient approach for congestion awareness and load balancing in WMNs, based on the Ant Colony Optimization (ACO) approach. The proposed approach aims to raise the performance of the WMN by distributing the traffic load between optimal routes and avoiding severe traffic congestion. The proposed approach relies on three basic mechanisms: detection of severe congestion within the ideal paths used for data transmission, creation of ideal secondary paths with updated pheromone values, and distribution of the traffic load (data packet flow) between the primary and secondary ideal paths. According to the results of the NS2 simulator, the suggested approach increased the WMN throughput by 14.8% when compared to the CACO approach and by 37% when employing the WCETT approach. The results also showed that the proposed approach achieved an average end-to-end delay closing of 0.0562, while WCETT and CACO approaches achieved an average end-to-end delay close to 0.1021 and 0.0976, respectively. The results indicated that the proposed approach achieved a lower percentage of dropped packets by 6.97% and 0.99% compared to the WCETT and CACO approaches. Thus, the proposed approach is effective in improving the performance of WMNs.
近年来,无线网状网络为许多研究人员开发大规模无线通信提供了一个有前景的环境。由于某些路由的高流量负荷饱和,WMNs中经常出现拥塞现象。因此,本文提出了一种基于蚁群优化(蚁群优化)方法的WMNs拥塞感知和负载平衡的有效方法。该方法旨在通过在最优路由之间分配交通负载和避免严重的交通拥堵来提高WMN的性能。所提出的方法依赖于三个基本机制:检测用于数据传输的理想路径中的严重拥塞,创建具有更新信息素值的理想次要路径,以及在主要和次要理想路径之间分配流量负载(数据包流)。根据NS2模拟器的结果,与CACO方法相比,建议的方法将WMN吞吐量提高了14.8%,与采用WCETT方法相比,该方法提高了37%。结果还表明,该方法的平均端到端延迟关闭为0.0562,而WCETT和CACO方法的平均端到端延迟分别接近0.1021和0.0976。结果表明,与WCETT和CACO方法相比,该方法的丢包率分别降低了6.97%和0.99%。因此,该方法可以有效地提高WMNs的性能。
{"title":"Adaptation of the Ant Colony Algorithm to Avoid Congestion in Wireless Mesh Networks","authors":"Fadhil Mohammed Salman, Ahssan Ahmed Mohammed, Fanar Ali Joda","doi":"10.13052/jcsm2245-1439.1258","DOIUrl":"https://doi.org/10.13052/jcsm2245-1439.1258","url":null,"abstract":"Wireless mesh networks have recently presented a promising environment for many researchers to develop large-scale wireless communication. Traffic in WMNs often suffers from congestion due to heavy traffic load’s saturation of certain routes. Therefore, this article proposes an efficient approach for congestion awareness and load balancing in WMNs, based on the Ant Colony Optimization (ACO) approach. The proposed approach aims to raise the performance of the WMN by distributing the traffic load between optimal routes and avoiding severe traffic congestion. The proposed approach relies on three basic mechanisms: detection of severe congestion within the ideal paths used for data transmission, creation of ideal secondary paths with updated pheromone values, and distribution of the traffic load (data packet flow) between the primary and secondary ideal paths. According to the results of the NS2 simulator, the suggested approach increased the WMN throughput by 14.8% when compared to the CACO approach and by 37% when employing the WCETT approach. The results also showed that the proposed approach achieved an average end-to-end delay closing of 0.0562, while WCETT and CACO approaches achieved an average end-to-end delay close to 0.1021 and 0.0976, respectively. The results indicated that the proposed approach achieved a lower percentage of dropped packets by 6.97% and 0.99% compared to the WCETT and CACO approaches. Thus, the proposed approach is effective in improving the performance of WMNs.","PeriodicalId":37820,"journal":{"name":"Journal of Cyber Security and Mobility","volume":"148 1","pages":"785-812"},"PeriodicalIF":0.0,"publicationDate":"2023-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86076916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine Learning: Research on Detection of Network Security Vulnerabilities by Extracting and Matching Features 机器学习:基于特征提取与匹配的网络安全漏洞检测研究
Q3 Computer Science Pub Date : 2023-08-12 DOI: 10.13052/jcsm2245-1439.1254
Ying Xue
The existence of vulnerabilities is a serious threat to the security of networks, which needs to be detected timely. In this paper, machine learning methods were mainly studied. Firstly, network security vulnerabilities were briefly introduced, and then a Convolutional Neural Network (CNN) + Long Short-Term Memory (LSTM) method was designed to extract and match vulnerability features by preprocessing vulnerability data based on National Vulnerability Database. It was found that the CNN-LSTM method had high training accuracy, and its recall rate, precision, F1, and Mathews correlation coefficient (MCC) values were better than those of support vector machine and other methods in detecting the test set; its F1 and MCC values reached 0.8807 and 0.9738, respectively; the F1 value was above 0.85 in detecting different categories of vulnerabilities. The results demonstrate the reliability of the CNN-LSTM method for vulnerability detection. The CNN-LSTM method can be applied to real networks.
漏洞的存在是对网络安全的严重威胁,需要及时发现。本文主要研究了机器学习方法。首先对网络安全漏洞进行了简要介绍,然后基于国家漏洞数据库对漏洞数据进行预处理,设计了卷积神经网络(CNN) +长短期记忆(LSTM)方法提取漏洞特征并进行匹配。结果表明,CNN-LSTM方法具有较高的训练准确率,其查全率、查准率、F1值和Mathews相关系数(MCC)值在检测测试集方面均优于支持向量机等方法;F1和MCC值分别为0.8807和0.9738;检测不同类别漏洞的F1值均在0.85以上。结果验证了CNN-LSTM方法用于漏洞检测的可靠性。CNN-LSTM方法可以应用于实际网络。
{"title":"Machine Learning: Research on Detection of Network Security Vulnerabilities by Extracting and Matching Features","authors":"Ying Xue","doi":"10.13052/jcsm2245-1439.1254","DOIUrl":"https://doi.org/10.13052/jcsm2245-1439.1254","url":null,"abstract":"The existence of vulnerabilities is a serious threat to the security of networks, which needs to be detected timely. In this paper, machine learning methods were mainly studied. Firstly, network security vulnerabilities were briefly introduced, and then a Convolutional Neural Network (CNN) + Long Short-Term Memory (LSTM) method was designed to extract and match vulnerability features by preprocessing vulnerability data based on National Vulnerability Database. It was found that the CNN-LSTM method had high training accuracy, and its recall rate, precision, F1, and Mathews correlation coefficient (MCC) values were better than those of support vector machine and other methods in detecting the test set; its F1 and MCC values reached 0.8807 and 0.9738, respectively; the F1 value was above 0.85 in detecting different categories of vulnerabilities. The results demonstrate the reliability of the CNN-LSTM method for vulnerability detection. The CNN-LSTM method can be applied to real networks.","PeriodicalId":37820,"journal":{"name":"Journal of Cyber Security and Mobility","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134977357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Evaluation Model for Network Security Based on an Optimized Circular Algorithm 基于优化循环算法的网络安全评估模型
Q3 Computer Science Pub Date : 2023-08-12 DOI: 10.13052/jcsm2245-1439.1255
Xingfeng Li
With more and more control systems accessing computer networks, the increase in their associated vulnerabilities has led to a decreasing security evaluation of the networks. It is essential to secure computer networks from attacks. To this end, the study constructs a network of computer network security evaluation model based on an optimized circular algorithm. To avoid detecting the model’s parameters falling into the local optimum, the model is first optimized based on the Corsi grey wolf optimization (CGWO) algorithm for the hyperparameters of the Gaussian process (GP). To solve the problem of unbalanced data and the GP not having memory capability, the study proposes an optimized Gaussian Mixture Model-Recurrent neural networks (GMM-RNN) algorithm. Experimental results of attack type recognition accuracy showed that the research CGWO-GP algorithm can jump out of the local optimum, and its average value of accuracy reached 98.99%. The average value of the leakage rate was 0.42%, and the average value of the false alarm rate was 0.11%. The average detection accuracy of the GMM-RNN model for eight attack types was 95.899%. The optimal detection accuracy of this model performance was 96.3948%. The training time of the GMM-RNN model was 67.96 s, and the detection time of the test set was 6.45 s, which greatly optimized the real-time performance. The GMM-RNN model was more effective in predicting the security posture of computer networks, and the prediction value can reach 97.65%. The research model was significantly better than other algorithmic models in the performance and evaluation of computer network security and had certain research values.
随着越来越多的控制系统接入计算机网络,其相关漏洞的增加导致了网络安全评估的下降。保护计算机网络不受攻击是至关重要的。为此,本研究构建了一个基于优化循环算法的网络计算机网络安全评价模型。为了避免检测到模型参数陷入局部最优,首先基于高斯过程(GP)超参数的Corsi灰狼优化(CGWO)算法对模型进行优化。为了解决数据不平衡和GP不具有记忆能力的问题,提出了一种优化的高斯混合模型-递归神经网络(GMM-RNN)算法。攻击类型识别准确率实验结果表明,所研究的CGWO-GP算法能够跳出局部最优,准确率平均值达到98.99%。漏电率平均值为0.42%,虚警率平均值为0.11%。GMM-RNN模型对8种攻击类型的平均检测准确率为95.899%。该模型性能的最佳检测准确率为96.3948%。GMM-RNN模型的训练时间为67.96 s,测试集的检测时间为6.45 s,大大优化了实时性。GMM-RNN模型对计算机网络的安全态势预测更为有效,预测值可达97.65%。该研究模型在计算机网络安全性能和评价方面明显优于其他算法模型,具有一定的研究价值。
{"title":"An Evaluation Model for Network Security Based on an Optimized Circular Algorithm","authors":"Xingfeng Li","doi":"10.13052/jcsm2245-1439.1255","DOIUrl":"https://doi.org/10.13052/jcsm2245-1439.1255","url":null,"abstract":"With more and more control systems accessing computer networks, the increase in their associated vulnerabilities has led to a decreasing security evaluation of the networks. It is essential to secure computer networks from attacks. To this end, the study constructs a network of computer network security evaluation model based on an optimized circular algorithm. To avoid detecting the model’s parameters falling into the local optimum, the model is first optimized based on the Corsi grey wolf optimization (CGWO) algorithm for the hyperparameters of the Gaussian process (GP). To solve the problem of unbalanced data and the GP not having memory capability, the study proposes an optimized Gaussian Mixture Model-Recurrent neural networks (GMM-RNN) algorithm. Experimental results of attack type recognition accuracy showed that the research CGWO-GP algorithm can jump out of the local optimum, and its average value of accuracy reached 98.99%. The average value of the leakage rate was 0.42%, and the average value of the false alarm rate was 0.11%. The average detection accuracy of the GMM-RNN model for eight attack types was 95.899%. The optimal detection accuracy of this model performance was 96.3948%. The training time of the GMM-RNN model was 67.96 s, and the detection time of the test set was 6.45 s, which greatly optimized the real-time performance. The GMM-RNN model was more effective in predicting the security posture of computer networks, and the prediction value can reach 97.65%. The research model was significantly better than other algorithmic models in the performance and evaluation of computer network security and had certain research values.","PeriodicalId":37820,"journal":{"name":"Journal of Cyber Security and Mobility","volume":"79 1","pages":"711-732"},"PeriodicalIF":0.0,"publicationDate":"2023-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79299595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Multi-Path Approach to Protect DNS Against DDoS Attacks 多路径防御DDoS攻击
Q3 Computer Science Pub Date : 2023-06-30 DOI: 10.13052/jcsm2245-1439.1246
S. Alouneh
Domain Name System (DNS) is considered a vital service for the internet and networks operations, and practically this service is configured and accessible across networks’ firewall. Therefore, attackers take advantage of this open configuration to attack a network’s DNS server in order to use it as a reflector to achieve Denial of Service (DoS) attacks. Most of protection methods such as intrusion prevention and detection systems use blended tactics such as blocked-lists for suspicious sources, and thresholds for traffic volumes to detect and defend against DoS flooding attacks. However, these protection methods are not often successful. In this paper, we propose a new method to sense and protect DNS systems from DoS and Distributed DoS (DDoS) attacks. The main idea in our approach is to distribute the DNS request mapping into more than one DNS resolver such that an attack on one server should not affect the entire DNS services. Our approach uses the Multi-Protocol Label Switching (MPLS) along with multi-path routing to achieve this goal. Also, we use threshold secret sharing to code the distributed DNS requests. Our findings and results show that this approach performs better when compared with the traditional DNS structure.
域名系统(DNS)被认为是互联网和网络运营的重要服务,实际上,这项服务是通过网络防火墙配置和访问的。因此,攻击者利用这种开放配置攻击网络的DNS服务器,将其作为反射器来实现拒绝服务(DoS)攻击。大多数防御方法,如入侵防御和检测系统,使用混合策略,如可疑源的阻止列表和流量阈值来检测和防御DoS洪水攻击。然而,这些保护方法往往不成功。本文提出了一种检测和保护DNS系统免受DoS和分布式DoS (DDoS)攻击的新方法。我们方法的主要思想是将DNS请求映射分布到多个DNS解析器中,这样对一个服务器的攻击就不会影响整个DNS服务。我们的方法使用多协议标签交换(MPLS)和多路径路由来实现这一目标。此外,我们还使用阈值秘密共享对分布式DNS请求进行编码。我们的研究结果表明,与传统的DNS结构相比,这种方法的性能更好。
{"title":"A Multi-Path Approach to Protect DNS Against DDoS Attacks","authors":"S. Alouneh","doi":"10.13052/jcsm2245-1439.1246","DOIUrl":"https://doi.org/10.13052/jcsm2245-1439.1246","url":null,"abstract":"Domain Name System (DNS) is considered a vital service for the internet and networks operations, and practically this service is configured and accessible across networks’ firewall. Therefore, attackers take advantage of this open configuration to attack a network’s DNS server in order to use it as a reflector to achieve Denial of Service (DoS) attacks. Most of protection methods such as intrusion prevention and detection systems use blended tactics such as blocked-lists for suspicious sources, and thresholds for traffic volumes to detect and defend against DoS flooding attacks. However, these protection methods are not often successful. In this paper, we propose a new method to sense and protect DNS systems from DoS and Distributed DoS (DDoS) attacks. The main idea in our approach is to distribute the DNS request mapping into more than one DNS resolver such that an attack on one server should not affect the entire DNS services. Our approach uses the Multi-Protocol Label Switching (MPLS) along with multi-path routing to achieve this goal. Also, we use threshold secret sharing to code the distributed DNS requests. Our findings and results show that this approach performs better when compared with the traditional DNS structure.","PeriodicalId":37820,"journal":{"name":"Journal of Cyber Security and Mobility","volume":"9 1","pages":"569-588"},"PeriodicalIF":0.0,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83524505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Hybrid Domain Medical Image Encryption Scheme Using URUK and WAM Chaotic Maps with Wavelet - Fourier Transforms 基于小波傅里叶变换的URUK和WAM混沌映射混合域医学图像加密方案
Q3 Computer Science Pub Date : 2023-06-30 DOI: 10.13052/jcsm2245-1439.1241
Ali Akram Abdul-Kareem, W. A. M. Al-Jawher
Image encryption is one of the most important techniques to maintain data confidentiality against illegal access and fraudulent usage. In this study, a new medical image encryption technique was developed by combining the discrete wavelet transform, the fast Fourier transform, the Arnold transform, and two multidimensional chaotic systems. The medical image is subjected to a discrete wavelet transform before the magic square shuffles the image sub-bands. Confusion operations are performed on each scrambled subdomain using the Uruk 4D chaotic system. To increase randomness and unpredictability, a second stage of confusion is implemented in the domain of the Fast Fourier transform using the Arnold transform. The final encrypted image is obtained utilizing secret keys derived from the WAM 3D chaotic system. In particular, the initial conditions for chaotic systems are derived from grayscale values, thereby increasing the algorithm’s sensitivity to the input image. The results of the tests and the security analysis indicate that the proposed algorithm is exceptionally reliable and secure.
图像加密是保护数据机密性,防止非法访问和欺诈使用的最重要技术之一。本文将离散小波变换、快速傅立叶变换、阿诺德变换和两个多维混沌系统相结合,提出了一种新的医学图像加密技术。在魔方变换图像子带之前,对医学图像进行离散小波变换。利用Uruk 4D混沌系统对每个加扰子域进行混淆运算。为了增加随机性和不可预测性,在使用阿诺德变换的快速傅里叶变换域中实现了第二阶段的混淆。利用WAM三维混沌系统导出的密钥获得最终的加密图像。特别是混沌系统的初始条件由灰度值导出,从而提高了算法对输入图像的灵敏度。测试结果和安全性分析表明,该算法具有很高的可靠性和安全性。
{"title":"A Hybrid Domain Medical Image Encryption Scheme Using URUK and WAM Chaotic Maps with Wavelet - Fourier Transforms","authors":"Ali Akram Abdul-Kareem, W. A. M. Al-Jawher","doi":"10.13052/jcsm2245-1439.1241","DOIUrl":"https://doi.org/10.13052/jcsm2245-1439.1241","url":null,"abstract":"Image encryption is one of the most important techniques to maintain data confidentiality against illegal access and fraudulent usage. In this study, a new medical image encryption technique was developed by combining the discrete wavelet transform, the fast Fourier transform, the Arnold transform, and two multidimensional chaotic systems. The medical image is subjected to a discrete wavelet transform before the magic square shuffles the image sub-bands. Confusion operations are performed on each scrambled subdomain using the Uruk 4D chaotic system. To increase randomness and unpredictability, a second stage of confusion is implemented in the domain of the Fast Fourier transform using the Arnold transform. The final encrypted image is obtained utilizing secret keys derived from the WAM 3D chaotic system. In particular, the initial conditions for chaotic systems are derived from grayscale values, thereby increasing the algorithm’s sensitivity to the input image. The results of the tests and the security analysis indicate that the proposed algorithm is exceptionally reliable and secure.","PeriodicalId":37820,"journal":{"name":"Journal of Cyber Security and Mobility","volume":"34 1","pages":"435-464"},"PeriodicalIF":0.0,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87242718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Assessment of Cyber Security's Significance in the Financial Sector of Lithuania 立陶宛金融部门网络安全重要性评估
Q3 Computer Science Pub Date : 2023-06-30 DOI: 10.13052/jcsm2245-1439.1243
Julija Gavėnaitė-Sirvydienė, Algita Miečinskienė
Constantly evolving high technologies provide new approaches to business development and deliver unknown business risks. Online financial services and operations are integral to everyday life, making cyber risk one of the most relevant risks for the financial sector’s companies. As the survey conducted by the National Bank of Lithuania at the end of 2018 showed, the possibility of cyber threats and presumable effects on the financial system in Lithuania is one of the critical problems that should be prioritized. Therefore, it is essential to clarify what potential cyber threats in financial sector companies are considered the most significant and likely to occur. As well as identify how companies in the financial sector estimate their dispositions and preparedness for this cyber risk management and control. The findings of this research are significant for financial institutions as a tool to adopt their cyber risk management processes, increase preparedness and cyber security, and identify the possible threats to the organization.
不断发展的高科技为业务发展提供了新的途径,同时也带来了未知的业务风险。在线金融服务和运营是日常生活中不可或缺的一部分,使网络风险成为金融行业公司最相关的风险之一。正如立陶宛国家银行在2018年底进行的调查所显示的那样,网络威胁的可能性和对立陶宛金融体系的可能影响是应该优先考虑的关键问题之一。因此,有必要澄清金融行业公司中哪些潜在的网络威胁被认为是最严重和最可能发生的。并确定金融部门的公司如何评估其对这种网络风险管理和控制的配置和准备。本研究的结果对于金融机构采用网络风险管理流程、加强准备和网络安全以及识别组织可能面临的威胁具有重要意义。
{"title":"The Assessment of Cyber Security's Significance in the Financial Sector of Lithuania","authors":"Julija Gavėnaitė-Sirvydienė, Algita Miečinskienė","doi":"10.13052/jcsm2245-1439.1243","DOIUrl":"https://doi.org/10.13052/jcsm2245-1439.1243","url":null,"abstract":"Constantly evolving high technologies provide new approaches to business development and deliver unknown business risks. Online financial services and operations are integral to everyday life, making cyber risk one of the most relevant risks for the financial sector’s companies. As the survey conducted by the National Bank of Lithuania at the end of 2018 showed, the possibility of cyber threats and presumable effects on the financial system in Lithuania is one of the critical problems that should be prioritized. Therefore, it is essential to clarify what potential cyber threats in financial sector companies are considered the most significant and likely to occur. As well as identify how companies in the financial sector estimate their dispositions and preparedness for this cyber risk management and control. The findings of this research are significant for financial institutions as a tool to adopt their cyber risk management processes, increase preparedness and cyber security, and identify the possible threats to the organization.","PeriodicalId":37820,"journal":{"name":"Journal of Cyber Security and Mobility","volume":"34 1","pages":"497-518"},"PeriodicalIF":0.0,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84715261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FedBully: A Cross-Device Federated Approach for Privacy Enabled Cyber Bullying Detection using Sentence Encoders FedBully:一种使用句子编码器的跨设备联邦方法,用于支持隐私的网络欺凌检测
Q3 Computer Science Pub Date : 2023-06-30 DOI: 10.13052/jcsm2245-1439.1242
Nisha P. Shetty, Balachandra Muniyal, Aman Priyanshu, Vedant Rishi Das
Cyberbullying has become one of the most pressing concerns for online platforms, putting individuals at risk and raising severe public concerns. Recent studies have shown a significant correlation between declining mental health and cyberbullying. Automated detection offers a great solution to this problem; however, the sensitivity of client-data becomes a concern during data collection, and as such, access may be restricted. This paper demonstrates FedBully, a federated approach for cyberbullying detection using sentence encoders for feature extraction. This paper introduces concepts of secure aggregation to ensure client privacy in a cross-device learning system. Optimal hyper-parameters were studied through comprehensive experiments, and a computationally and communicationally inexpensive network is proposed. Experiments reveal promising results with up to 93% classification AUC (Area Under the Curve) using only dense networks to fine-tune sentence embeddings on IID datasets and 91% AUC on non-IID datasets, where IID refers to Independent and Identically Distributed data. The analysis also shows that data independence profoundly impacts network performance, with AUC decreasing by a mean of 5.1% between Non-IID and IID. A rich and extensive study has also been performed on client network size and secure aggregation protocols, which prove the robustness and practicality of the proposed model. The novel approach presented offers an efficient and practical solution to training a cross-device cyberbullying detector while ensuring client-privacy.
网络欺凌已成为网络平台最紧迫的问题之一,使个人处于危险之中,并引起了公众的严重关注。最近的研究表明,心理健康状况下降与网络欺凌之间存在显著相关性。自动检测为这个问题提供了一个很好的解决方案;但是,在数据收集期间,客户机数据的敏感性成为一个问题,因此,访问可能受到限制。本文演示了FedBully,一种使用句子编码器进行特征提取的网络欺凌检测的联邦方法。本文介绍了安全聚合的概念,以确保跨设备学习系统中的客户端隐私。通过综合实验研究了最优超参数,提出了一种计算成本低、通信成本低的网络。实验显示,仅使用密集网络对IID数据集上的句子嵌入进行微调,分类AUC(曲线下面积)高达93%,非IID数据集上的AUC高达91%,其中IID指的是独立和同分布的数据。分析还表明,数据独立性深刻影响了网络性能,非IID和IID之间的AUC平均下降了5.1%。对客户端网络规模和安全聚合协议进行了丰富而广泛的研究,证明了该模型的鲁棒性和实用性。提出的新方法为训练跨设备网络欺凌检测器提供了有效和实用的解决方案,同时确保客户端隐私。
{"title":"FedBully: A Cross-Device Federated Approach for Privacy Enabled Cyber Bullying Detection using Sentence Encoders","authors":"Nisha P. Shetty, Balachandra Muniyal, Aman Priyanshu, Vedant Rishi Das","doi":"10.13052/jcsm2245-1439.1242","DOIUrl":"https://doi.org/10.13052/jcsm2245-1439.1242","url":null,"abstract":"Cyberbullying has become one of the most pressing concerns for online platforms, putting individuals at risk and raising severe public concerns. Recent studies have shown a significant correlation between declining mental health and cyberbullying. Automated detection offers a great solution to this problem; however, the sensitivity of client-data becomes a concern during data collection, and as such, access may be restricted. This paper demonstrates FedBully, a federated approach for cyberbullying detection using sentence encoders for feature extraction. This paper introduces concepts of secure aggregation to ensure client privacy in a cross-device learning system. Optimal hyper-parameters were studied through comprehensive experiments, and a computationally and communicationally inexpensive network is proposed. Experiments reveal promising results with up to 93% classification AUC (Area Under the Curve) using only dense networks to fine-tune sentence embeddings on IID datasets and 91% AUC on non-IID datasets, where IID refers to Independent and Identically Distributed data. The analysis also shows that data independence profoundly impacts network performance, with AUC decreasing by a mean of 5.1% between Non-IID and IID. A rich and extensive study has also been performed on client network size and secure aggregation protocols, which prove the robustness and practicality of the proposed model. The novel approach presented offers an efficient and practical solution to training a cross-device cyberbullying detector while ensuring client-privacy.","PeriodicalId":37820,"journal":{"name":"Journal of Cyber Security and Mobility","volume":"37 1","pages":"465-496"},"PeriodicalIF":0.0,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81264947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Network Security Prediction and Situational Assessment Using Neural Network-based Method 基于神经网络的网络安全预测与态势评估方法
Q3 Computer Science Pub Date : 2023-06-30 DOI: 10.13052/jcsm2245-1439.1245
Liu Zhang, Yanyu Liu
Technology development has promoted network construction, but malicious network attacks are still inevitable. To solve the problem that the current network security assessment is not practical and the assessment effect is poor, this study proposes a network security monitoring tool based on situation assessment and prediction to assist network security construction. The framework of the evaluation module is based on convolution neural network. The initial module is introduced to convert some large convolution cores into small convolution cores in series. This is to reduce the operating cost, because building multiple evaluators in series can maximize the retention of characteristic values. This module is the optimized form of Elman neural network. The delay operator is added to the model to respond to the time property of network attack. At the same time, particle swarm optimization algorithm is used to solve the initial weight dependence problem. The research adopts two methods of security situation assessment and situation prediction to carry out model application test. During the test, the commonly used KDD Cup99 is used as intrusion detection data. The experimental results of the network security situation evaluation module show that the optimization reduces the evaluation error by 3.34%, and the accuracy meets the evaluation requirements. The model is superior to the back propagation neural network and the standard Elman model. The model proposed in this study achieves better prediction of posture scores from 0.3 to 0.9, which is more stable than BP neural network. It proves that the model designed by the research can achieve more stable and higher prediction than similar models. It is more practical to obtain better results on the basis of a more stable model architecture and lower implementation costs, which is a meaningful attempt in the wide application of network security.
技术的发展促进了网络建设,但恶意网络攻击仍然不可避免。针对目前网络安全评估不实用、评估效果差的问题,本研究提出了一种基于态势评估与预测的网络安全监测工具,以辅助网络安全建设。评估模块的框架是基于卷积神经网络的。引入初始模块将一些大的卷积核串联成小的卷积核。这是为了降低运行成本,因为串联构建多个评估器可以最大限度地保留特征值。该模块是Elman神经网络的优化形式。在模型中加入延迟算子以响应网络攻击的时间特性。同时,采用粒子群优化算法解决初始权依赖问题。本研究采用安全态势评估和态势预测两种方法进行模型应用试验。在测试过程中,使用常用的KDD Cup99作为入侵检测数据。网络安全态势评估模块的实验结果表明,优化后的评估误差降低了3.34%,准确度满足评估要求。该模型优于反向传播神经网络和标准Elman模型。本研究提出的模型在0.3 ~ 0.9范围内对姿态评分的预测效果较好,比BP神经网络更稳定。实验证明,所设计的模型比同类模型更稳定,预测精度更高。在更稳定的模型体系结构和更低的实现成本的基础上,获得更好的结果更具有实用性,是网络安全广泛应用中的一次有意义的尝试。
{"title":"Network Security Prediction and Situational Assessment Using Neural Network-based Method","authors":"Liu Zhang, Yanyu Liu","doi":"10.13052/jcsm2245-1439.1245","DOIUrl":"https://doi.org/10.13052/jcsm2245-1439.1245","url":null,"abstract":"Technology development has promoted network construction, but malicious network attacks are still inevitable. To solve the problem that the current network security assessment is not practical and the assessment effect is poor, this study proposes a network security monitoring tool based on situation assessment and prediction to assist network security construction. The framework of the evaluation module is based on convolution neural network. The initial module is introduced to convert some large convolution cores into small convolution cores in series. This is to reduce the operating cost, because building multiple evaluators in series can maximize the retention of characteristic values. This module is the optimized form of Elman neural network. The delay operator is added to the model to respond to the time property of network attack. At the same time, particle swarm optimization algorithm is used to solve the initial weight dependence problem. The research adopts two methods of security situation assessment and situation prediction to carry out model application test. During the test, the commonly used KDD Cup99 is used as intrusion detection data. The experimental results of the network security situation evaluation module show that the optimization reduces the evaluation error by 3.34%, and the accuracy meets the evaluation requirements. The model is superior to the back propagation neural network and the standard Elman model. The model proposed in this study achieves better prediction of posture scores from 0.3 to 0.9, which is more stable than BP neural network. It proves that the model designed by the research can achieve more stable and higher prediction than similar models. It is more practical to obtain better results on the basis of a more stable model architecture and lower implementation costs, which is a meaningful attempt in the wide application of network security.","PeriodicalId":37820,"journal":{"name":"Journal of Cyber Security and Mobility","volume":"24 1","pages":"547-568"},"PeriodicalIF":0.0,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77926762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Cyber Security and Mobility
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1