首页 > 最新文献

Journal of Cyber Security and Mobility最新文献

英文 中文
Tools for Analyzing Signature-Based Hardware Solutions for Cyber Security Systems 基于签名的网络安全硬件解决方案分析工具
Q3 Computer Science Pub Date : 2023-05-18 DOI: 10.13052/jcsm2245-1439.123.5
S.Ya. Hilgurt, Anatolii M. Davydenko, T.V. Matovka, Mykhailo P. Prygara
When creating signature-based cybersecurity systems for network intrusion detection (NIDS), spam filtering, protection against viruses, worms, etc., developers have to use hardware devices such as field programmable gate arrays (FPGA), since software solutions can no longer support the necessary speeds. There are many different approaches to build hardware circuits for pattern matching (where patterns are the parts of signatures). Choosing the optimal technical solution for certain conditions is not a trivial task. Developers of such hardware tend to act intuitively, heuristically. In this article, we provide tools to help them intelligently build cybersecurity systems using FPGAs. For the qualitative analysis of FPGA-based matching schemes, the classification of efficiency criteria and related indicators is considered. This classification was compiled by studying a large number of practical developments of FPGA-based cybersecurity systems, primarily NIDS. A method of rapid calculating numerical characteristics of the FPGA-based signature system components is proposed as a quantitative assessment tool. This method based on the use of so-called estimation functions allows avoiding the time-consuming execution of the digital circuit synthesis procedure. A number of experiments were carried out with the most promising matching schemes, allowing evaluating the above-mentioned tools. The rapid quantification method allows developers of hardware-accelerated cybersecurity systems to even apply it at each iteration within the optimization procedure cycle.
在为网络入侵检测(NIDS)、垃圾邮件过滤、病毒、蠕虫等创建基于签名的网络安全系统时,开发人员必须使用现场可编程门阵列(FPGA)等硬件设备,因为软件解决方案无法再支持必要的速度。有许多不同的方法来构建用于模式匹配的硬件电路(模式是签名的一部分)。为特定条件选择最佳技术解决方案并不是一项简单的任务。这种硬件的开发人员倾向于凭直觉行事。在本文中,我们提供了工具来帮助他们使用fpga智能地构建网络安全系统。对基于fpga的匹配方案进行定性分析时,考虑了效率标准和相关指标的分类。该分类是通过研究大量基于fpga的网络安全系统(主要是NIDS)的实际发展而编制的。提出了一种快速计算基于fpga的签名系统组件数值特性的方法,作为一种定量评估工具。这种基于使用所谓的估计函数的方法可以避免执行耗时的数字电路合成程序。用最有希望的匹配方案进行了大量实验,从而对上述工具进行了评估。快速量化方法允许硬件加速网络安全系统的开发人员甚至在优化过程周期的每次迭代中应用它。
{"title":"Tools for Analyzing Signature-Based Hardware Solutions for Cyber Security Systems","authors":"S.Ya. Hilgurt, Anatolii M. Davydenko, T.V. Matovka, Mykhailo P. Prygara","doi":"10.13052/jcsm2245-1439.123.5","DOIUrl":"https://doi.org/10.13052/jcsm2245-1439.123.5","url":null,"abstract":"When creating signature-based cybersecurity systems for network intrusion detection (NIDS), spam filtering, protection against viruses, worms, etc., developers have to use hardware devices such as field programmable gate arrays (FPGA), since software solutions can no longer support the necessary speeds. There are many different approaches to build hardware circuits for pattern matching (where patterns are the parts of signatures). Choosing the optimal technical solution for certain conditions is not a trivial task. Developers of such hardware tend to act intuitively, heuristically. In this article, we provide tools to help them intelligently build cybersecurity systems using FPGAs. For the qualitative analysis of FPGA-based matching schemes, the classification of efficiency criteria and related indicators is considered. This classification was compiled by studying a large number of practical developments of FPGA-based cybersecurity systems, primarily NIDS. A method of rapid calculating numerical characteristics of the FPGA-based signature system components is proposed as a quantitative assessment tool. This method based on the use of so-called estimation functions allows avoiding the time-consuming execution of the digital circuit synthesis procedure. A number of experiments were carried out with the most promising matching schemes, allowing evaluating the above-mentioned tools. The rapid quantification method allows developers of hardware-accelerated cybersecurity systems to even apply it at each iteration within the optimization procedure cycle.","PeriodicalId":37820,"journal":{"name":"Journal of Cyber Security and Mobility","volume":"28 1","pages":"339-366"},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77556011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Inconsistencies in Darknet Researches 暗网研究的不一致性
Q3 Computer Science Pub Date : 2023-05-03 DOI: 10.13052/jcsm2245-1439.1223
Florian Platzer, Alexandra Lux
The darknet terminology is not used consistently among scientific research papers. This can lead to difficulties in regards to the applicability and the significance of the results and also facilitates misinterpretation of them. As a consequence, comparisons of the different works are complicated.In this paper, we conduct a review of previous darknet research papers in order to elaborate the distribution of the inconsistent usage of the darknet terminology. Overall, inconsistencies in darknet terminology in 63 out of 97 papers were observed. The most common statement indicated that the dark web is a part of the deep web. 19 papers equate the terms darknet and dark web. Others do not distinguish between dark web and deep web, or between deep web and darknet.
在科学研究论文中,暗网术语的使用并不一致。这可能会导致在结果的适用性和意义方面的困难,也会导致对结果的误解。因此,不同作品的比较是复杂的。在本文中,我们对以往的暗网研究论文进行了回顾,以阐述暗网术语使用不一致的分布。总的来说,在97篇论文中有63篇发现暗网术语不一致。最常见的说法是暗网是深网的一部分。19篇论文将暗网和暗网等同起来。其他人不区分暗网和深网,或者深网和暗网。
{"title":"Inconsistencies in Darknet Researches","authors":"Florian Platzer, Alexandra Lux","doi":"10.13052/jcsm2245-1439.1223","DOIUrl":"https://doi.org/10.13052/jcsm2245-1439.1223","url":null,"abstract":"The darknet terminology is not used consistently among scientific research papers. This can lead to difficulties in regards to the applicability and the significance of the results and also facilitates misinterpretation of them. As a consequence, comparisons of the different works are complicated.\u0000In this paper, we conduct a review of previous darknet research papers in order to elaborate the distribution of the inconsistent usage of the darknet terminology. Overall, inconsistencies in darknet terminology in 63 out of 97 papers were observed. The most common statement indicated that the dark web is a part of the deep web. 19 papers equate the terms darknet and dark web. Others do not distinguish between dark web and deep web, or between deep web and darknet.","PeriodicalId":37820,"journal":{"name":"Journal of Cyber Security and Mobility","volume":"12 1","pages":"187-204"},"PeriodicalIF":0.0,"publicationDate":"2023-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87314678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Taxonomic Classification of Insider Threats: Existing Techniques, Future Directions & Recommendations 内部威胁的分类:现有技术,未来方向和建议
Q3 Computer Science Pub Date : 2023-05-03 DOI: 10.13052/jcsm2245-1439.1225
Usman Rauf, Fadi Mohsen, Zhiyuan Wei
In the last two decades, the number of rapidly increasing cyber incidents (i.e., data theft and privacy breaches) shows that it is becoming enormously difficult for conventional defense mechanisms and architectures to neutralize modern cyber threats in a real-time situation. Disgruntled and rouge employees/agents and intrusive applications are two notorious classes of such modern threats, referred to as Insider Threats, which lead to data theft and privacy breaches. To counter such state-of-the-art threats, modern defense mechanisms require the incorporation of active threat analytics to proactively detect and mitigate any malicious intent at the employee or application level. Existing solutions to these problems intensively rely on co-relation, distance-based risk metrics, and human judgment. Especially when humans are kept in the loop for access-control policy-related decision-making against advanced persistent threats. As a consequence, the situation can escalate and lead to privacy/data breaches in case of insider threats. To confront such challenges, the security community has been striving to identify anomalous intent for advanced behavioral anomaly detection and auto-resiliency (the ability to deter an ongoing threat by policy tuning). Towards this dimension, we aim to review the literature in this domain and evaluate the effectiveness of existing approaches per our proposed criteria. According to our knowledge, this is one of the first endeavors toward developing evaluation-based standards to assess the effectiveness of relevant approaches in this domain while considering insider employees and intrusive applications simultaneously. There have been efforts in literature towards describing and understanding insider threats in general. However, none have addressed the detection and deterrence element in its entirety, hence making our contribution one of a kind. Towards the end of this article, we enlist and discuss the existing data sets. The data sets can help understand the attributes that play crucial roles in insider threat detection. In addition, they can be beneficial for testing the newly designed security solutions in this domain. We also present recommendations for establishing a baseline standard for analyzing insider-threat data sets. This baseline standard could be used in the future to design resilient architectures and provide a road map for organizations to enhance their defense capabilities against insider threats.
在过去的二十年中,快速增加的网络事件(即数据盗窃和隐私泄露)的数量表明,传统的防御机制和架构在实时情况下抵消现代网络威胁变得非常困难。心怀不满的员工/代理和侵入性的应用程序是这类现代威胁的两种臭名昭著的类别,它们被称为内部威胁,会导致数据盗窃和隐私泄露。为了应对这种最先进的威胁,现代防御机制需要结合主动威胁分析,以主动检测和减轻员工或应用程序级别的任何恶意意图。这些问题的现有解决方案主要依赖于相互关系、基于距离的风险度量和人为判断。特别是当人类参与访问控制策略相关的决策,以应对高级持续性威胁时。因此,这种情况可能会升级,并在内部威胁的情况下导致隐私/数据泄露。为了应对这样的挑战,安全社区一直在努力为高级行为异常检测和自动恢复(通过策略调优阻止正在进行的威胁的能力)识别异常意图。针对这一维度,我们的目标是回顾该领域的文献,并根据我们提出的标准评估现有方法的有效性。据我们所知,这是在同时考虑内部员工和侵入性应用程序的情况下,开发基于评估的标准来评估该领域相关方法的有效性的首批努力之一。在文学作品中,人们一直在努力描述和理解内部威胁。但是,没有一个国家全面处理侦查和威慑因素,从而使我们的贡献是独一无二的。在本文的最后,我们将收集并讨论现有的数据集。数据集可以帮助理解在内部威胁检测中发挥关键作用的属性。此外,它们还有助于测试该领域中新设计的安全解决方案。我们还提出了建立分析内部威胁数据集的基线标准的建议。这个基线标准可以在未来用于设计弹性架构,并为组织提供路线图,以增强其对内部威胁的防御能力。
{"title":"A Taxonomic Classification of Insider Threats: Existing Techniques, Future Directions & Recommendations","authors":"Usman Rauf, Fadi Mohsen, Zhiyuan Wei","doi":"10.13052/jcsm2245-1439.1225","DOIUrl":"https://doi.org/10.13052/jcsm2245-1439.1225","url":null,"abstract":"In the last two decades, the number of rapidly increasing cyber incidents (i.e., data theft and privacy breaches) shows that it is becoming enormously difficult for conventional defense mechanisms and architectures to neutralize modern cyber threats in a real-time situation. Disgruntled and rouge employees/agents and intrusive applications are two notorious classes of such modern threats, referred to as Insider Threats, which lead to data theft and privacy breaches. To counter such state-of-the-art threats, modern defense mechanisms require the incorporation of active threat analytics to proactively detect and mitigate any malicious intent at the employee or application level. Existing solutions to these problems intensively rely on co-relation, distance-based risk metrics, and human judgment. Especially when humans are kept in the loop for access-control policy-related decision-making against advanced persistent threats. As a consequence, the situation can escalate and lead to privacy/data breaches in case of insider threats. To confront such challenges, the security community has been striving to identify anomalous intent for advanced behavioral anomaly detection and auto-resiliency (the ability to deter an ongoing threat by policy tuning). Towards this dimension, we aim to review the literature in this domain and evaluate the effectiveness of existing approaches per our proposed criteria. According to our knowledge, this is one of the first endeavors toward developing evaluation-based standards to assess the effectiveness of relevant approaches in this domain while considering insider employees and intrusive applications simultaneously. There have been efforts in literature towards describing and understanding insider threats in general. However, none have addressed the detection and deterrence element in its entirety, hence making our contribution one of a kind. Towards the end of this article, we enlist and discuss the existing data sets. The data sets can help understand the attributes that play crucial roles in insider threat detection. In addition, they can be beneficial for testing the newly designed security solutions in this domain. We also present recommendations for establishing a baseline standard for analyzing insider-threat data sets. This baseline standard could be used in the future to design resilient architectures and provide a road map for organizations to enhance their defense capabilities against insider threats.","PeriodicalId":37820,"journal":{"name":"Journal of Cyber Security and Mobility","volume":"39 1","pages":"221-252"},"PeriodicalIF":0.0,"publicationDate":"2023-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76656363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cryptanalysis of Tropical Encryption Scheme Based on Double Key Exchange 基于双密钥交换的热带加密方案的密码分析
Q3 Computer Science Pub Date : 2023-05-03 DOI: 10.13052/jcsm2245-1439.1224
Xin Jiang, Huawei Huang, Geyang Pan
A tropical encryption scheme is analyzed in this paper, which uses double key exchange protocol (KEP). The key exchange protocol is divided into two stages: The first stage of the key exchange uses matrix power function in a tropical semiring; the obtained shared key at the first phase of the key exchange serves as an input for the second phase. This paper proves that the common secret key of the first key exchange phase can be obtained by solving linear equations, and when the order of the matrix is 50, the time to solve the shared key is less than 1 second. Finally, the common secret key of the second phase can be obtained through KU attack and common secret key of the first key exchange. So the protocol isn’t secure.
本文分析了一种采用双密钥交换协议(KEP)的热带加密方案。密钥交换协议分为两个阶段:第一阶段在热带半环中使用矩阵幂函数进行密钥交换;在密钥交换的第一阶段获得的共享密钥用作第二阶段的输入。本文证明了第一密钥交换阶段的公共密钥可以通过求解线性方程得到,当矩阵的阶数为50时,求解共享密钥的时间小于1秒。最后,通过KU攻击和第一次密钥交换的公共密钥可以获得第二阶段的公共密钥。所以协议不安全。
{"title":"Cryptanalysis of Tropical Encryption Scheme Based on Double Key Exchange","authors":"Xin Jiang, Huawei Huang, Geyang Pan","doi":"10.13052/jcsm2245-1439.1224","DOIUrl":"https://doi.org/10.13052/jcsm2245-1439.1224","url":null,"abstract":"A tropical encryption scheme is analyzed in this paper, which uses double key exchange protocol (KEP). The key exchange protocol is divided into two stages: The first stage of the key exchange uses matrix power function in a tropical semiring; the obtained shared key at the first phase of the key exchange serves as an input for the second phase. This paper proves that the common secret key of the first key exchange phase can be obtained by solving linear equations, and when the order of the matrix is 50, the time to solve the shared key is less than 1 second. Finally, the common secret key of the second phase can be obtained through KU attack and common secret key of the first key exchange. So the protocol isn’t secure.","PeriodicalId":37820,"journal":{"name":"Journal of Cyber Security and Mobility","volume":"145 1","pages":"205-220"},"PeriodicalIF":0.0,"publicationDate":"2023-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89068270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Image Hashing Robust Against Cropping and Rotation 图像哈希鲁棒抗裁剪和旋转
Q3 Computer Science Pub Date : 2023-05-03 DOI: 10.13052/jcsm2245-1439.1221
M. Steinebach, Tiberius Berwanger, Huajian Liu
Image recognition is an important mechanism used in various scenarios. In the context of multimedia forensics, its most significant task is to automatically detect already known child and adolescent pornography in a large set of images. When fighting disinformation, it is used to identify images taken out of context or image montages. For this purpose, numerous methods based on robust hashing and feature extraction are already known, and recently also supported by machine learning. However, in general, these methods are either only partially robust to changes such as rotation and pruning, or they require a large amount of data and computation. We present a method based on a simple block hash that is efficient to compute and memory efficient. To be robust against cropping and rotation, we combine the method with image segmentation and a method to normalize the rotation of the objects. Our evaluation shows that the method produces results comparable to much more complex approaches, but requires fewer resources.
图像识别是在各种场景中使用的重要机制。在多媒体取证的背景下,其最重要的任务是在大量图像中自动检测已知的儿童和青少年色情内容。在打击虚假信息时,它被用来识别脱离上下文或图像蒙太奇的图像。为此,已经有许多基于鲁棒哈希和特征提取的方法,最近也得到了机器学习的支持。然而,一般来说,这些方法要么对诸如旋转和修剪之类的变化只有部分鲁棒性,要么需要大量的数据和计算。我们提出了一种基于简单块哈希的方法,该方法计算效率高,内存效率高。为了增强对裁剪和旋转的鲁棒性,我们将该方法与图像分割和物体旋转归一化方法相结合。我们的评估表明,该方法产生的结果与更复杂的方法相当,但需要更少的资源。
{"title":"Image Hashing Robust Against Cropping and Rotation","authors":"M. Steinebach, Tiberius Berwanger, Huajian Liu","doi":"10.13052/jcsm2245-1439.1221","DOIUrl":"https://doi.org/10.13052/jcsm2245-1439.1221","url":null,"abstract":"Image recognition is an important mechanism used in various scenarios. In the context of multimedia forensics, its most significant task is to automatically detect already known child and adolescent pornography in a large set of images. When fighting disinformation, it is used to identify images taken out of context or image montages. For this purpose, numerous methods based on robust hashing and feature extraction are already known, and recently also supported by machine learning. However, in general, these methods are either only partially robust to changes such as rotation and pruning, or they require a large amount of data and computation. We present a method based on a simple block hash that is efficient to compute and memory efficient. To be robust against cropping and rotation, we combine the method with image segmentation and a method to normalize the rotation of the objects. Our evaluation shows that the method produces results comparable to much more complex approaches, but requires fewer resources.","PeriodicalId":37820,"journal":{"name":"Journal of Cyber Security and Mobility","volume":"2 1","pages":"129-160"},"PeriodicalIF":0.0,"publicationDate":"2023-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90483551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Scraping and Analyzing Data of a Large Darknet Marketplace 大型暗网市场数据的抓取与分析
Q3 Computer Science Pub Date : 2023-05-03 DOI: 10.13052/jcsm2245-1439.1222
York Yannikos, J. Heeger, M. Steinebach
Darknet marketplaces in the Tor network are popular places to anonymously buy and sell various kinds of illegal goods. Previous research on marketplaces ranged from analyses of type, availability and quality of goods to methods for identifying users. Although many darknet marketplaces exist, their lifespan is usually short, especially for very popular marketplaces that are in focus of law enforcement agencies.We built a data acquisition architecture to collect data from White House Market, one of the largest darknet marketplaces in 2021. In this paper we describe our architecture and the problems we had to solve, and present findings from our analysis of the collected data.
Tor网络中的暗网市场是匿名买卖各种非法商品的热门场所。以前对市场的研究范围从商品的类型、可用性和质量分析到识别用户的方法。虽然存在许多暗网市场,但它们的寿命通常很短,尤其是那些非常受欢迎的市场,它们是执法机构关注的重点。我们建立了一个数据采集架构,从白宫市场收集数据,白宫市场是2021年最大的暗网市场之一。在本文中,我们描述了我们的体系结构和我们必须解决的问题,并介绍了我们对收集的数据进行分析后的发现。
{"title":"Scraping and Analyzing Data of a Large Darknet Marketplace","authors":"York Yannikos, J. Heeger, M. Steinebach","doi":"10.13052/jcsm2245-1439.1222","DOIUrl":"https://doi.org/10.13052/jcsm2245-1439.1222","url":null,"abstract":"Darknet marketplaces in the Tor network are popular places to anonymously buy and sell various kinds of illegal goods. Previous research on marketplaces ranged from analyses of type, availability and quality of goods to methods for identifying users. Although many darknet marketplaces exist, their lifespan is usually short, especially for very popular marketplaces that are in focus of law enforcement agencies.\u0000We built a data acquisition architecture to collect data from White House Market, one of the largest darknet marketplaces in 2021. In this paper we describe our architecture and the problems we had to solve, and present findings from our analysis of the collected data.","PeriodicalId":37820,"journal":{"name":"Journal of Cyber Security and Mobility","volume":"23 1","pages":"161-186"},"PeriodicalIF":0.0,"publicationDate":"2023-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88254149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
WSN Network Node Malicious Intrusion Detection Method Based on Reputation Score 基于信誉评分的WSN网络节点恶意入侵检测方法
Q3 Computer Science Pub Date : 2023-03-07 DOI: 10.13052/jcsm2245-1439.1213
Junlin Zhang
Wireless sensor network (WSN) is the Internet of Things by a large number of sensors in the external physical environment to obtain data information, and use wireless communication technology to provide users with information transmission services. At this stage, communication and security mechanisms are the main problems faced by WSN. This is because most of the existing sensors are powered by batteries with very limited energy, and most of them are deployed in an outdoor open environment, which is easy to be captured as a malicious node. Network attacks. However, the existing malicious node detection methods have shortcomings such as low efficiency, high energy consumption, and insufficient performance. Therefore, this paper proposes a WSN malicious node intrusion detection method based on genetic algorithm optimization of LEACH hierarchical routing protocol. Based on the optimization of the LEACH protocol by genetic algorithm, the method integrates the reputation evaluation mechanism, and screens and eliminates malicious nodes by calculating direct reputation, indirect reputation and comprehensive reputation, thereby ensuring the safe operation of WSN. The simulation results show that this method can effectively resist the attack of malicious nodes on WSN, and has obvious advantages over other methods.
无线传感器网络(WSN)是物联网由大量传感器在外部物理环境中获取数据信息,并利用无线通信技术为用户提供信息传输服务。现阶段,无线传感器网络面临的主要问题是通信机制和安全机制。这是因为现有的传感器大多是由能量非常有限的电池供电,而且大多部署在室外开放环境中,很容易被捕获为恶意节点。网络攻击。然而,现有的恶意节点检测方法存在效率低、能耗高、性能不足等缺点。为此,本文提出了一种基于LEACH分层路由协议遗传算法优化的WSN恶意节点入侵检测方法。该方法在遗传算法优化LEACH协议的基础上,集成了声誉评估机制,通过计算直接声誉、间接声誉和综合声誉来筛选和消除恶意节点,从而保证WSN的安全运行。仿真结果表明,该方法能够有效抵御WSN上恶意节点的攻击,与其他方法相比具有明显的优势。
{"title":"WSN Network Node Malicious Intrusion Detection Method Based on Reputation Score","authors":"Junlin Zhang","doi":"10.13052/jcsm2245-1439.1213","DOIUrl":"https://doi.org/10.13052/jcsm2245-1439.1213","url":null,"abstract":"Wireless sensor network (WSN) is the Internet of Things by a large number of sensors in the external physical environment to obtain data information, and use wireless communication technology to provide users with information transmission services. At this stage, communication and security mechanisms are the main problems faced by WSN. This is because most of the existing sensors are powered by batteries with very limited energy, and most of them are deployed in an outdoor open environment, which is easy to be captured as a malicious node. Network attacks. However, the existing malicious node detection methods have shortcomings such as low efficiency, high energy consumption, and insufficient performance. Therefore, this paper proposes a WSN malicious node intrusion detection method based on genetic algorithm optimization of LEACH hierarchical routing protocol. Based on the optimization of the LEACH protocol by genetic algorithm, the method integrates the reputation evaluation mechanism, and screens and eliminates malicious nodes by calculating direct reputation, indirect reputation and comprehensive reputation, thereby ensuring the safe operation of WSN. The simulation results show that this method can effectively resist the attack of malicious nodes on WSN, and has obvious advantages over other methods.","PeriodicalId":37820,"journal":{"name":"Journal of Cyber Security and Mobility","volume":"1 1","pages":"55-76"},"PeriodicalIF":0.0,"publicationDate":"2023-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73114929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Research on Elliptic Curve Crypto System with Bitcoin Curves - SECP256k1, NIST256p, NIST521p and LLL 基于比特币曲线的椭圆曲线加密系统研究——SECP256k1, NIST256p, NIST521p和LLL
Q3 Computer Science Pub Date : 2023-03-07 DOI: 10.13052/jcsm2245-1439.1215
Mohammed Mujeer Ulla, Deepak S. Sakkari
Very recent attacks like ladder leak demonstrated feasibility to recover private key with side channel attacks using just one bit of secret nonce. ECDSA nonce bias can be exploited in many ways. Some attacks on ECDSA involve complicated Fourier analysis and lattice mathematics. In this paper will enable cryptographers to identify efficient ways in which ECDSA can be cracked on curves NIST256p, SECP256k1, NIST521p and weak nonce, kind of attacks that can crack ECDSA and how to protect yourself. Initially we begin with ECDSA signature to sign a message using private key and validate the generated signature using the shared public key. Then we use a nonce or a random value to randomize the generated signature. Every time we sign, a new verifiable random nonce value is created and way in which the intruder can discover the private key if the signer leaks any one of the nonce value. Then we use Lenstra–Lenstra–Lovasz (LLL) method as a black box, we will try to attack signatures generated from bad nonce or bad random number generator (RAG) on NIST256p, SECP256k1 curves. The analysis is performed by considering all the three curves for implementation of Elliptic Curve Digital Signature Algorithm (ECDSA).The comparative analysis for each of the selected curves in terms of computational time is done with leak of nonce and with Lenstra–Lenstra–Lovasz method to crack ECDSA. The average computational costs to break ECDSA with curves NIST256p, NIST521p and SECP256k1 are 0.016, 0.34, 0.46 respectively which is almost to zero depicts the strength of algorithm. The average computational costs to break ECDSA with curves SECP256K1 and NIST256p using LLL are 2.9 and 3.4 respectively.
最近的攻击,如梯子泄漏,证明了利用侧通道攻击恢复私钥的可行性,只需使用一个比特的秘密nonce。ECDSA nonce偏差可以在许多方面被利用。对ECDSA的一些攻击涉及复杂的傅里叶分析和格数学。本文将使密码学家能够识别在曲线NIST256p, SECP256k1, NIST521p和弱nonce上破解ECDSA的有效方法,可以破解ECDSA的攻击类型以及如何保护自己。首先,我们从ECDSA签名开始,使用私钥对消息进行签名,并使用共享公钥验证生成的签名。然后我们使用随机数或随机值来随机化生成的签名。每次我们签名时,都会创建一个新的可验证的随机nonce值,并且如果签名者泄露任何一个nonce值,入侵者可以发现私钥。然后我们使用Lenstra-Lenstra-Lovasz (LLL)方法作为黑盒,我们将尝试攻击由NIST256p, SECP256k1曲线上的坏随机数生成器(RAG)或坏随机数生成器(RAG)生成的签名。在椭圆曲线数字签名算法(ECDSA)的实现中,对这三种曲线进行了综合分析。采用nonce泄漏法和Lenstra-Lenstra-Lovasz方法对所选曲线的计算时间进行了比较分析。NIST256p、NIST521p和SECP256k1曲线破断ECDSA的平均计算代价分别为0.016、0.34、0.46,几乎为零,说明了算法的强度。使用LLL破坏SECP256K1和NIST256p曲线的ECDSA的平均计算成本分别为2.9和3.4。
{"title":"Research on Elliptic Curve Crypto System with Bitcoin Curves - SECP256k1, NIST256p, NIST521p and LLL","authors":"Mohammed Mujeer Ulla, Deepak S. Sakkari","doi":"10.13052/jcsm2245-1439.1215","DOIUrl":"https://doi.org/10.13052/jcsm2245-1439.1215","url":null,"abstract":"Very recent attacks like ladder leak demonstrated feasibility to recover private key with side channel attacks using just one bit of secret nonce. ECDSA nonce bias can be exploited in many ways. Some attacks on ECDSA involve complicated Fourier analysis and lattice mathematics. In this paper will enable cryptographers to identify efficient ways in which ECDSA can be cracked on curves NIST256p, SECP256k1, NIST521p and weak nonce, kind of attacks that can crack ECDSA and how to protect yourself. Initially we begin with ECDSA signature to sign a message using private key and validate the generated signature using the shared public key. Then we use a nonce or a random value to randomize the generated signature. Every time we sign, a new verifiable random nonce value is created and way in which the intruder can discover the private key if the signer leaks any one of the nonce value. Then we use Lenstra–Lenstra–Lovasz (LLL) method as a black box, we will try to attack signatures generated from bad nonce or bad random number generator (RAG) on NIST256p, SECP256k1 curves. The analysis is performed by considering all the three curves for implementation of Elliptic Curve Digital Signature Algorithm (ECDSA).The comparative analysis for each of the selected curves in terms of computational time is done with leak of nonce and with Lenstra–Lenstra–Lovasz method to crack ECDSA. The average computational costs to break ECDSA with curves NIST256p, NIST521p and SECP256k1 are 0.016, 0.34, 0.46 respectively which is almost to zero depicts the strength of algorithm. The average computational costs to break ECDSA with curves SECP256K1 and NIST256p using LLL are 2.9 and 3.4 respectively.","PeriodicalId":37820,"journal":{"name":"Journal of Cyber Security and Mobility","volume":"446 1","pages":"103-128"},"PeriodicalIF":0.0,"publicationDate":"2023-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75081539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of Network Security Countermeasures From the Perspective of Improved FS Algorithm and ICT Convergence 改进FS算法与ICT融合视角下的网络安全对策分析
Q3 Computer Science Pub Date : 2023-03-07 DOI: 10.13052/jcsm2245-1439.1211
Zhihong Zhang
In this paper, the forward selection (FS) algorithm is introduced on the basis of information and communication technology, and the design of intrusion detection method for communication network is carried out. By studying the classification and detection pattern matching of communication network intrusion behavior, extracting the intrusion behavior features of communication network based on FS algorithm, and optimizing the intrusion detection and learning effect based on the limit learning machine, the intrusion behavior attributes of communication network are clarified, and a new detection method is proposed to solve the problems of low detection accuracy and low recall in the current intrusion behavior detection of complex communication network environments. Compared with the intrusion detection method based on GA-SVM algorithm, the accuracy of the detection results reaches 94.23%, and the recall rate exceeds 97%, which is obviously better than the 85% accuracy and 75% recall rate of the traditional detection method, which can ensure the security of the communication network environment. In addition, this paper proposes the APDR dynamic comprehensive information security assurance system model, which has considerable flexibility and can respond to current network security requirements.
本文介绍了基于信息通信技术的前向选择(FS)算法,并进行了通信网络入侵检测方法的设计。通过研究通信网络入侵行为的分类和检测模式匹配,基于FS算法提取通信网络入侵行为特征,基于极限学习机优化入侵检测和学习效果,明确了通信网络的入侵行为属性;针对当前复杂通信网络环境下入侵行为检测中检测准确率低、召回率低的问题,提出了一种新的检测方法。与基于GA-SVM算法的入侵检测方法相比,检测结果的准确率达到94.23%,召回率超过97%,明显优于传统检测方法85%的准确率和75%的召回率,能够保证通信网络环境的安全性。此外,本文还提出了APDR动态综合信息安全保障体系模型,该模型具有相当的灵活性,能够响应当前的网络安全需求。
{"title":"Analysis of Network Security Countermeasures From the Perspective of Improved FS Algorithm and ICT Convergence","authors":"Zhihong Zhang","doi":"10.13052/jcsm2245-1439.1211","DOIUrl":"https://doi.org/10.13052/jcsm2245-1439.1211","url":null,"abstract":"In this paper, the forward selection (FS) algorithm is introduced on the basis of information and communication technology, and the design of intrusion detection method for communication network is carried out. By studying the classification and detection pattern matching of communication network intrusion behavior, extracting the intrusion behavior features of communication network based on FS algorithm, and optimizing the intrusion detection and learning effect based on the limit learning machine, the intrusion behavior attributes of communication network are clarified, and a new detection method is proposed to solve the problems of low detection accuracy and low recall in the current intrusion behavior detection of complex communication network environments. Compared with the intrusion detection method based on GA-SVM algorithm, the accuracy of the detection results reaches 94.23%, and the recall rate exceeds 97%, which is obviously better than the 85% accuracy and 75% recall rate of the traditional detection method, which can ensure the security of the communication network environment. In addition, this paper proposes the APDR dynamic comprehensive information security assurance system model, which has considerable flexibility and can respond to current network security requirements.","PeriodicalId":37820,"journal":{"name":"Journal of Cyber Security and Mobility","volume":"50 10 1","pages":"1-24"},"PeriodicalIF":0.0,"publicationDate":"2023-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90988846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Chaos-Based Encryption Algorithm for Database System 一种基于混沌的数据库加密算法
Q3 Computer Science Pub Date : 2023-03-07 DOI: 10.13052/jcsm2245-1439.1212
Ekhlas Abbas Albahrani, Sadeq H. Lafta, Naeem Howrie Ghayad
This paper introduces a new Database Transposition, Substitution and XORing Algorithm (DTSXA) based on using chaotic maps. It is based primarily on two well-known security properties: confusion and diffusion. A random number generator was depended on to produce the keys for the algorithm of encryption and decryption. The encryption of the Arabic language in addition to the English language was done, besides it can encrypt a table, individual row and individual column. The suggested algorithm was obeyed and analyzed by different tests involving brute force attack analyses, statistical attack analyses (security analysis histogram, correlation coefficient analysis and information entropy analysis), key sensitivity analysis, differential attack analysis, and mean square error analysis. This algorithm passed all the applied analyses well-deservedly, which indicates that the presented encryption algorithm has a high security level due to its large key space and high sensitivity to the change in the cipher keys.
介绍了一种基于混沌映射的数据库换位、替换和XORing算法(DTSXA)。它主要基于两个众所周知的安全特性:混淆和扩散。该算法依靠随机数生成器生成加解密算法所需的密钥。除了对英语进行加密外,还对阿拉伯语进行了加密,此外还可以对一个表、单个行和单个列进行加密。采用蛮力攻击分析、统计攻击分析(安全分析直方图、相关系数分析、信息熵分析)、密钥敏感性分析、差分攻击分析、均方误差分析等方法对算法进行了遵从和分析。该算法很好地通过了所有的应用分析,表明该算法具有较大的密钥空间和对密钥变化的高度敏感性,具有较高的安全性。
{"title":"A Chaos-Based Encryption Algorithm for Database System","authors":"Ekhlas Abbas Albahrani, Sadeq H. Lafta, Naeem Howrie Ghayad","doi":"10.13052/jcsm2245-1439.1212","DOIUrl":"https://doi.org/10.13052/jcsm2245-1439.1212","url":null,"abstract":"This paper introduces a new Database Transposition, Substitution and XORing Algorithm (DTSXA) based on using chaotic maps. It is based primarily on two well-known security properties: confusion and diffusion. A random number generator was depended on to produce the keys for the algorithm of encryption and decryption. The encryption of the Arabic language in addition to the English language was done, besides it can encrypt a table, individual row and individual column. The suggested algorithm was obeyed and analyzed by different tests involving brute force attack analyses, statistical attack analyses (security analysis histogram, correlation coefficient analysis and information entropy analysis), key sensitivity analysis, differential attack analysis, and mean square error analysis. This algorithm passed all the applied analyses well-deservedly, which indicates that the presented encryption algorithm has a high security level due to its large key space and high sensitivity to the change in the cipher keys.","PeriodicalId":37820,"journal":{"name":"Journal of Cyber Security and Mobility","volume":"17 1","pages":"25-54"},"PeriodicalIF":0.0,"publicationDate":"2023-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91001326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Journal of Cyber Security and Mobility
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1