首页 > 最新文献

Journal of Cyber Security and Mobility最新文献

英文 中文
An Adaptive-Feature Centric XGBoost Ensemble Classifier Model for Improved Malware Detection and Classification 一种以自适应特征为中心的XGBoost集成分类器模型用于改进的恶意软件检测和分类
Q3 Computer Science Pub Date : 2022-12-31 DOI: 10.32604/jcs.2022.031889
J. Pavithra, S. Selvakumarasamy
Machine learning (ML) is often used to solve the problem of malware detection and classification and various machine learning approaches are adapted to the problem of malware classification; still  acquiring poor performance by the way of feature selection, and classification. To manage the issue, an efficient Adaptive Feature Centric XG Boost Ensemble Learner Classifier “AFC-XG Boost” novel algorithm is presented in this paper. The proposed model has been designed to handle varying data sets of malware detection obtained from Kaggle data set. The model turns the process of XG Boost classifier in several stages to optimize the performance. At preprocessing stage, the data set given has been noise removed, normalized and tamper removed using Feature Base Optimizer “FBO” algorithm. The FBO would normalize the data points as well as performs noise removal according to the feature values and their base information. Similarly, the performance of standard XG Boost has been optimized by adapting Feature selection using Class Based Principle Component Analysis “CBPCA” algorithm, which performs feature selection according to the fitness of any feature for different classes. Based on the selected features, the method generates regression tree for each feature considered. Based on the generated trees, the method performs classification by computing Tree Level Ensemble Similarity “TLES” and Class Level Ensemble Similarity “CLES”. Using both method computes the value of Class Match Similarity “CMS” based on which the malware has been classified. The proposed approach achieves 97% accuracy in malware detection and classification with the less time complexity of 34 seconds for 75000 samples
机器学习(ML)经常被用来解决恶意软件的检测和分类问题,各种机器学习方法都适用于恶意软件的分类问题;通过特征选择和分类的方法仍然获得较差的性能。为了解决这个问题,本文提出了一种高效的以自适应特征为中心的XG Boost集成学习分类器“AFC-XG Boost”新算法。该模型被设计用于处理从Kaggle数据集获得的各种恶意软件检测数据集。该模型将XG Boost分类器的过程分成几个阶段进行优化。在预处理阶段,使用Feature Base Optimizer“FBO”算法对给定的数据集进行去噪、归一化和去篡改。FBO将根据特征值及其基础信息对数据点进行归一化和去噪。同样,标准XG Boost的性能通过使用基于类的主成分分析(CBPCA)算法进行特征选择来优化,该算法根据不同类的任何特征的适应度进行特征选择。该方法根据所选择的特征,对所考虑的每个特征生成回归树。基于生成的树,该方法通过计算树级集成相似度“TLES”和类级集成相似度“CLES”进行分类。使用这两种方法计算类匹配相似度“CMS”的值,以此为基础对恶意软件进行分类。该方法对75000个样本的恶意软件检测和分类准确率达到97%,时间复杂度较低,仅为34秒
{"title":"An Adaptive-Feature Centric XGBoost Ensemble Classifier Model for Improved Malware Detection and Classification","authors":"J. Pavithra, S. Selvakumarasamy","doi":"10.32604/jcs.2022.031889","DOIUrl":"https://doi.org/10.32604/jcs.2022.031889","url":null,"abstract":"Machine learning (ML) is often used to solve the problem of malware detection and classification and various machine learning approaches are adapted to the problem of malware classification; still  acquiring poor performance by the way of feature selection, and classification. To manage the issue, an efficient Adaptive Feature Centric XG Boost Ensemble Learner Classifier “AFC-XG Boost” novel algorithm is presented in this paper. The proposed model has been designed to handle varying data sets of malware detection obtained from Kaggle data set. The model turns the process of XG Boost classifier in several stages to optimize the performance. At preprocessing stage, the data set given has been noise removed, normalized and tamper removed using Feature Base Optimizer “FBO” algorithm. The FBO would normalize the data points as well as performs noise removal according to the feature values and their base information. Similarly, the performance of standard XG Boost has been optimized by adapting Feature selection using Class Based Principle Component Analysis “CBPCA” algorithm, which performs feature selection according to the fitness of any feature for different classes. Based on the selected features, the method generates regression tree for each feature considered. Based on the generated trees, the method performs classification by computing Tree Level Ensemble Similarity “TLES” and Class Level Ensemble Similarity “CLES”. Using both method computes the value of Class Match Similarity “CMS” based on which the malware has been classified. The proposed approach achieves 97% accuracy in malware detection and classification with the less time complexity of 34 seconds for 75000 samples","PeriodicalId":37820,"journal":{"name":"Journal of Cyber Security and Mobility","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83080459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Monitoring and Identification of Abnormal Network Traffic by Different Mathematical Models 基于不同数学模型的网络异常流量监测与识别
Q3 Computer Science Pub Date : 2022-12-03 DOI: 10.13052/jcsm2245-1439.1153
Bing Bai
The presence of anomalous traffic on the network causes some dangers to network security. To address the issue of monitoring and identifying abnormal traffic on the network, this paper first selected the traffic features with the mutual information-based method and then compared different mathematical models, including k-Nearest Neighbor (KNN), Back-Propagation Neural Network (BPNN), and Elman. Then, parameters were optimized by the Grasshopper Optimization Algorithm (GOA) based on the defects of BPNN and Elman to obtain GOA-BPNN and GOA-Elman models. The performance of these mathematical models was compared on UNSW-UB15. It was found that the KNN model had the worst performance and the Elman model performed better than the BPNN model. After GOA optimization, the performance of the models was improved. The GOA-Elman model had the best performance in monitoring and recognizing abnormal traffic, with an accuracy of 97.33%, and it performed well in monitoring and recognizing different types of traffic. The research results demonstrate the reliability of the GOA-Elman model, providing a new approach for network security.
网络中异常流量的存在给网络安全带来了一定的威胁。为了解决网络中异常流量的监控和识别问题,本文首先采用基于互信息的方法选择流量特征,然后比较了k-最近邻(KNN)、反向传播神经网络(BPNN)和Elman等不同的数学模型。然后,基于BPNN和Elman的缺陷,采用Grasshopper Optimization Algorithm (GOA)对参数进行优化,得到GOA-BPNN和GOA-Elman模型。在UNSW-UB15上比较了这些数学模型的性能。结果表明,KNN模型的性能最差,Elman模型的性能优于BPNN模型。经过GOA优化后,模型的性能得到了提高。GOA-Elman模型对异常流量的监控识别效果最好,准确率为97.33%,对不同类型流量的监控识别效果较好。研究结果证明了GOA-Elman模型的可靠性,为网络安全提供了一种新的途径。
{"title":"Monitoring and Identification of Abnormal Network Traffic by Different Mathematical Models","authors":"Bing Bai","doi":"10.13052/jcsm2245-1439.1153","DOIUrl":"https://doi.org/10.13052/jcsm2245-1439.1153","url":null,"abstract":"The presence of anomalous traffic on the network causes some dangers to network security. To address the issue of monitoring and identifying abnormal traffic on the network, this paper first selected the traffic features with the mutual information-based method and then compared different mathematical models, including k-Nearest Neighbor (KNN), Back-Propagation Neural Network (BPNN), and Elman. Then, parameters were optimized by the Grasshopper Optimization Algorithm (GOA) based on the defects of BPNN and Elman to obtain GOA-BPNN and GOA-Elman models. The performance of these mathematical models was compared on UNSW-UB15. It was found that the KNN model had the worst performance and the Elman model performed better than the BPNN model. After GOA optimization, the performance of the models was improved. The GOA-Elman model had the best performance in monitoring and recognizing abnormal traffic, with an accuracy of 97.33%, and it performed well in monitoring and recognizing different types of traffic. The research results demonstrate the reliability of the GOA-Elman model, providing a new approach for network security.","PeriodicalId":37820,"journal":{"name":"Journal of Cyber Security and Mobility","volume":"2014 1","pages":"695-712"},"PeriodicalIF":0.0,"publicationDate":"2022-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86551505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comparative Analysis of Digital Forensic Investigation Tools on Facebook Messenger Applications Facebook Messenger应用程序上数字法医调查工具的比较分析
Q3 Computer Science Pub Date : 2022-12-03 DOI: 10.13052/jcsm2245-1439.1151
Sunardi, Herman, Syifa Riski Ardiningtias
Technological developments make it easier for people to communicate and share information. Facebook Messenger is an instant messenger that contains multi-platform for sending text, image, sound, and video messages. Besides being used for positive purposes, this technology can also be used to carry out harmful activities. This study conducts a forensic investigation on a crime simulation in pornographic content distribution using Facebook Messenger as a communication medium on Android smartphones. Perpetrators communicate and send pornographic content in the shape of conversations, audio, and video, then delete them to eliminate traces. Every crime can leave evidence therefore after erasing the track, it can be revealed through digital forensic investigations on the smartphone devices that are used as objects to find digital evidence. The collection of evidence in this study is used four forensic tools with the research stages the National Institute of Justice (NIJ) framework. The study result can be used as evidence by investigators on handling criminal cases with the results obtained in the shape of application versions, accounts, emails, conversation, time of occurrence, pictures, audio, and video. MOBILedit Forensic Express has an accuracy of 84.85%, Wondershare Dr. Fone 36.36%, Magnet Axiom 75.76%, and Belkasoft Evidence Center 69.70%.
科技的发展使人们更容易交流和分享信息。Facebook Messenger是一个包含多平台的即时通讯工具,可以发送文本、图像、声音和视频信息。除了被用于积极的目的,这项技术也可以被用来进行有害的活动。本研究对在Android智能手机上使用Facebook Messenger作为通信媒介进行色情内容分发的犯罪模拟进行了法医调查。犯罪者以对话、音频和视频的形式交流和发送色情内容,然后删除它们以消除痕迹。每一起犯罪都会留下证据,因此,在清除痕迹后,可以通过作为寻找数字证据对象的智能手机进行数字法医调查。本研究中的证据收集使用了四种法医工具,研究阶段为国家司法研究所(NIJ)框架。研究结果可以作为侦查人员办理刑事案件的证据,以应用程序版本、账号、邮件、对话、发生时间、图片、音频、视频等形式获得。MOBILedit Forensic Express的准确率为84.85%,Wondershare Dr. Fone的准确率为36.36%,Magnet Axiom的准确率为75.76%,Belkasoft Evidence Center的准确率为69.70%。
{"title":"A Comparative Analysis of Digital Forensic Investigation Tools on Facebook Messenger Applications","authors":"Sunardi, Herman, Syifa Riski Ardiningtias","doi":"10.13052/jcsm2245-1439.1151","DOIUrl":"https://doi.org/10.13052/jcsm2245-1439.1151","url":null,"abstract":"Technological developments make it easier for people to communicate and share information. Facebook Messenger is an instant messenger that contains multi-platform for sending text, image, sound, and video messages. Besides being used for positive purposes, this technology can also be used to carry out harmful activities. This study conducts a forensic investigation on a crime simulation in pornographic content distribution using Facebook Messenger as a communication medium on Android smartphones. Perpetrators communicate and send pornographic content in the shape of conversations, audio, and video, then delete them to eliminate traces. Every crime can leave evidence therefore after erasing the track, it can be revealed through digital forensic investigations on the smartphone devices that are used as objects to find digital evidence. The collection of evidence in this study is used four forensic tools with the research stages the National Institute of Justice (NIJ) framework. The study result can be used as evidence by investigators on handling criminal cases with the results obtained in the shape of application versions, accounts, emails, conversation, time of occurrence, pictures, audio, and video. MOBILedit Forensic Express has an accuracy of 84.85%, Wondershare Dr. Fone 36.36%, Magnet Axiom 75.76%, and Belkasoft Evidence Center 69.70%.","PeriodicalId":37820,"journal":{"name":"Journal of Cyber Security and Mobility","volume":"56 1","pages":"655-672"},"PeriodicalIF":0.0,"publicationDate":"2022-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78452312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Study of Encrypted Transmission of Private Data During Network Communication: Performance Comparison of Advanced Encryption Standard and Data Encryption Standard Algorithms 网络通信中私有数据的加密传输研究:高级加密标准与数据加密标准算法的性能比较
Q3 Computer Science Pub Date : 2022-12-03 DOI: 10.13052/jcsm2245-1439.1154
Dongliang Bian, Jun Pan, Yanhui Wang
The involvement of the Internet in the production of daily life has increased the demand for the security of private data on the Internet. This paper briefly introduced the principles of advanced encryption standard (AES) and data encryption standard (DES) algorithms and then conducted simulation experiments on the two encryption algorithms in a laboratory server. The results showed that both algorithms had excellent sensitivity to plaintext keys, and the sensitivity of the AES algorithm was higher; the encryption and decryption time of both algorithms increased as the file got larger, and the encryption and decryption time of the same algorithm was not much different; the encryption and decryption time of the AES algorithm was less than that of the DES algorithm for the same file, and the time taken to crack the AES-encrypted data by brute force was also much longer; during the transmission of encrypted data, as the data increased, the integrity of the ciphertext decryption by the third-party decreased, and the integrity of the AES algorithm-encrypted file was significantly smaller than that of the DES algorithm-encrypted file when it was decrypted.
随着互联网对日常生产生活的介入,对互联网上私人数据的安全性提出了更高的要求。本文简要介绍了高级加密标准(AES)和数据加密标准(DES)算法的原理,并在实验室服务器上对这两种加密算法进行了仿真实验。结果表明:两种算法对明文密钥的敏感性都很好,AES算法的敏感性更高;两种算法的加解密时间都随着文件的增大而增大,同一算法的加解密时间差异不大;对于同一文件,AES算法的加解密时间比DES算法短,用暴力破解AES加密数据的时间也要长得多;在加密数据的传输过程中,随着数据量的增加,第三方对密文解密的完整性降低,AES算法加密后的文件在解密时的完整性明显小于DES算法加密后的文件。
{"title":"Study of Encrypted Transmission of Private Data During Network Communication: Performance Comparison of Advanced Encryption Standard and Data Encryption Standard Algorithms","authors":"Dongliang Bian, Jun Pan, Yanhui Wang","doi":"10.13052/jcsm2245-1439.1154","DOIUrl":"https://doi.org/10.13052/jcsm2245-1439.1154","url":null,"abstract":"The involvement of the Internet in the production of daily life has increased the demand for the security of private data on the Internet. This paper briefly introduced the principles of advanced encryption standard (AES) and data encryption standard (DES) algorithms and then conducted simulation experiments on the two encryption algorithms in a laboratory server. The results showed that both algorithms had excellent sensitivity to plaintext keys, and the sensitivity of the AES algorithm was higher; the encryption and decryption time of both algorithms increased as the file got larger, and the encryption and decryption time of the same algorithm was not much different; the encryption and decryption time of the AES algorithm was less than that of the DES algorithm for the same file, and the time taken to crack the AES-encrypted data by brute force was also much longer; during the transmission of encrypted data, as the data increased, the integrity of the ciphertext decryption by the third-party decreased, and the integrity of the AES algorithm-encrypted file was significantly smaller than that of the DES algorithm-encrypted file when it was decrypted.","PeriodicalId":37820,"journal":{"name":"Journal of Cyber Security and Mobility","volume":"24 1","pages":"713-726"},"PeriodicalIF":0.0,"publicationDate":"2022-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81037438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Combination of BB84 Quantum Key Distribution and An Improved Scheme of NTRU Post-Quantum Cryptosystem BB84量子密钥分配与NTRU后量子密码系统改进方案的组合
Q3 Computer Science Pub Date : 2022-12-03 DOI: 10.13052/jcsm2245-1439.1152
El Hassane Laaji, A. Azizi
The BB84 quantum key distribution (QKD) protocol is based on the no-cloning quantum physic property, so if an attacker measures a photon state, he disturbs that state. This protocol uses two channels: (1) A quantum channel for sending the quantum information (photons polarized). (2) And a classical channel for exchanging the polarization and the measurement information (base sets or filters). The BB84 supposes that the classical channel is secure, but it is not always right, because it depends on the methods used during the communication over this channel. If an eavesdropper gets the sender or the receiver filters or both of them, he can leak some or all bits of the constructed key. In this context, we contribute by creating a protocol that combines the BB84 protocol with an improved scheme of NTRU post-quantum cryptosystem, which will secure the transmitted information over the classical channel. NTRU is a structured lattice scheme, and it is based on the hardness to solve lattice problems in Rn. Actually, it is one of the most important candidates for the NIST post-quantum standardization project.
BB84量子密钥分发(QKD)协议基于不可克隆量子物理特性,因此如果攻击者测量光子状态,他就会干扰该状态。该协议使用两个通道:(1)一个量子通道用于发送量子信息(光子偏振)。(2)交换偏振和测量信息(基组或滤波器)的经典通道。BB84假定经典信道是安全的,但它并不总是正确的,因为它取决于在该信道上通信期间使用的方法。如果窃听者得到了发送方或接收方的过滤器,或者两者都得到了,他就可以泄露构造密钥的部分或全部位。在这种情况下,我们通过创建一个将BB84协议与改进的NTRU后量子密码系统方案相结合的协议来做出贡献,该协议将确保在经典信道上传输的信息的安全性。NTRU是一种结构化的点阵格式,它是基于硬度来求解Rn中的点阵问题。实际上,它是NIST后量子标准化项目最重要的候选项目之一。
{"title":"A Combination of BB84 Quantum Key Distribution and An Improved Scheme of NTRU Post-Quantum Cryptosystem","authors":"El Hassane Laaji, A. Azizi","doi":"10.13052/jcsm2245-1439.1152","DOIUrl":"https://doi.org/10.13052/jcsm2245-1439.1152","url":null,"abstract":"The BB84 quantum key distribution (QKD) protocol is based on the no-cloning quantum physic property, so if an attacker measures a photon state, he disturbs that state. This protocol uses two channels: (1) A quantum channel for sending the quantum information (photons polarized). (2) And a classical channel for exchanging the polarization and the measurement information (base sets or filters). The BB84 supposes that the classical channel is secure, but it is not always right, because it depends on the methods used during the communication over this channel. If an eavesdropper gets the sender or the receiver filters or both of them, he can leak some or all bits of the constructed key. In this context, we contribute by creating a protocol that combines the BB84 protocol with an improved scheme of NTRU post-quantum cryptosystem, which will secure the transmitted information over the classical channel. NTRU is a structured lattice scheme, and it is based on the hardness to solve lattice problems in Rn. Actually, it is one of the most important candidates for the NIST post-quantum standardization project.","PeriodicalId":37820,"journal":{"name":"Journal of Cyber Security and Mobility","volume":"1 1","pages":"673-694"},"PeriodicalIF":0.0,"publicationDate":"2022-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82908301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Attack Mitigation and Security for Vehicle Platoon 车辆排的攻击缓解和安全
Q3 Computer Science Pub Date : 2022-11-07 DOI: 10.13052/jcsm2245-1439.1141
Daniel Kyalo Ndambuki, Hitmi Khalifa Alhitmi
This research entails an investigation into enhanced attack detection techniques as a security feature in vehicular platooning. The paper evaluates critical challenges in the security of Vehicular Ad hoc Networks (VANETs) with a focus on vulnerabilities in vehicle platooning. We evaluate the possibilities of securing a platoon through enhanced attack detection following an inside attack while considering current communication-based approaches to vehicular platoon security that have been effective at isolating infected platoon members. This study proposes the use of color-shift keying (CSK) as a security tool for enhanced detection of an apparent platoon attack. We simulate various attack scenarios involving a vehicular platoon communicating via a VLC network and assess the degree of exposure of such networks to three types of attacks – Sybil attacks, delay attacks, and denial-of-service (DoS) attacks. We recommend the use of a light-to-frequency (LTF) converter comprising of a receiver to collect and decode transmitted symbols with regard to the frequency of transmission. Once there is a drop in the intensity of the light transmitted in the platoon, CSK is implemented to alter the intensity of the red, green, and blue (RGB) spectrum coupled with radiofrequency to ensure the security of the communication. CSK will use coded symbols to transmit the control information from the leader using a microcontroller.
这项研究需要调查增强攻击检测技术作为车辆队列的安全特征。本文评估了车辆自组织网络(vanet)安全中的关键挑战,重点关注车辆队列中的漏洞。我们评估了在内部攻击后通过增强攻击检测来保护车队安全的可能性,同时考虑了当前基于通信的车辆车队安全方法,这些方法有效地隔离了受感染的车队成员。本研究建议使用色移键控(CSK)作为一种安全工具,以增强对明显排攻击的检测。我们模拟了各种攻击场景,涉及车辆排通过VLC网络进行通信,并评估了此类网络暴露于三种类型攻击的程度- Sybil攻击,延迟攻击和拒绝服务(DoS)攻击。我们建议使用由接收器组成的光频(LTF)转换器来收集和解码有关传输频率的传输符号。一旦排中传输的光强度下降,就会实施CSK来改变红、绿、蓝(RGB)频谱与射频耦合的强度,以确保通信的安全性。CSK将使用编码符号通过微控制器传输来自领导的控制信息。
{"title":"Attack Mitigation and Security for Vehicle Platoon","authors":"Daniel Kyalo Ndambuki, Hitmi Khalifa Alhitmi","doi":"10.13052/jcsm2245-1439.1141","DOIUrl":"https://doi.org/10.13052/jcsm2245-1439.1141","url":null,"abstract":"This research entails an investigation into enhanced attack detection techniques as a security feature in vehicular platooning. The paper evaluates critical challenges in the security of Vehicular Ad hoc Networks (VANETs) with a focus on vulnerabilities in vehicle platooning. We evaluate the possibilities of securing a platoon through enhanced attack detection following an inside attack while considering current communication-based approaches to vehicular platoon security that have been effective at isolating infected platoon members. This study proposes the use of color-shift keying (CSK) as a security tool for enhanced detection of an apparent platoon attack. We simulate various attack scenarios involving a vehicular platoon communicating via a VLC network and assess the degree of exposure of such networks to three types of attacks – Sybil attacks, delay attacks, and denial-of-service (DoS) attacks. We recommend the use of a light-to-frequency (LTF) converter comprising of a receiver to collect and decode transmitted symbols with regard to the frequency of transmission. Once there is a drop in the intensity of the light transmitted in the platoon, CSK is implemented to alter the intensity of the red, green, and blue (RGB) spectrum coupled with radiofrequency to ensure the security of the communication. CSK will use coded symbols to transmit the control information from the leader using a microcontroller.","PeriodicalId":37820,"journal":{"name":"Journal of Cyber Security and Mobility","volume":"86 4 1","pages":"497-530"},"PeriodicalIF":0.0,"publicationDate":"2022-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89359545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of Video Forensics System for Detection of Gun, Mask and Anomaly Using Soft Computing Techniques 基于软计算技术的枪支、掩码和异常检测视频取证系统分析
Q3 Computer Science Pub Date : 2022-11-07 DOI: 10.13052/jcsm2245-1439.1143
S. K. Nanda, D. Ghai, P. Ingole
The video forensics world is a developing network of experts associated with the computerized video forensics industry. With quickly developing innovation, the video turned out to be the most significant weapon in the battle against individuals who violate the law by catching them in the act. Proof caught on video is viewed as more dependable, more exact, and more persuading than observer declaration alone. But, proof can be effortlessly tempered by utilizing programming. Video forensics examination, tells us about the accuracy of the input video. It has become a challenge for law enforcement agencies to deal with the increasing violence rate which involves the use of masks and weapons. The identification of a person becomes difficult with the use of face masks. The proposed method uses an efficient technique that is YOLO to detect guns, masks and suspicious persons from a video by extracting frames and features. It further compares the obtained frame with the available images in the dataset and generates output with bounding boxes detecting guns, masks and suspicious persons. This paper also examined the domain of video forensics and its outcomes. Experimental results show that the proposed method outperforms the existing techniques tested on different datasets. The precision for YOLO design for guns and masks is 100% and 75% respectively. The precision for customized CNN engineering for guns and face masks is 61.54% and 61.5% respectively. Execution measurements for both models have shown that the YOLO design outperformed the customized CNN with its presentation.
视频取证世界是一个与计算机视频取证行业相关的专家发展网络。随着创新的迅速发展,视频被证明是打击违法行为的最重要的武器。视频证据被认为比单独的观察员声明更可靠、更准确、更有说服力。但是,通过使用编程可以毫不费力地缓和证明。视频取证检验,告诉我们输入视频的准确性。对于执法机构来说,应对日益增加的暴力率已成为一项挑战,其中涉及使用面具和武器。使用口罩后,识别一个人变得很困难。该方法采用了一种高效的YOLO技术,通过提取帧和特征来检测视频中的枪支、面具和可疑人员。它进一步将得到的帧与数据集中的可用图像进行比较,并生成带有检测枪支、面具和可疑人员的边界框的输出。本文还研究了视频取证领域及其成果。实验结果表明,该方法在不同数据集上的性能优于现有的方法。枪口和面罩的YOLO设计精度分别为100%和75%。枪支和口罩定制CNN工程精度分别为61.54%和61.5%。两种模型的执行测量表明,YOLO设计的表现优于定制CNN。
{"title":"Analysis of Video Forensics System for Detection of Gun, Mask and Anomaly Using Soft Computing Techniques","authors":"S. K. Nanda, D. Ghai, P. Ingole","doi":"10.13052/jcsm2245-1439.1143","DOIUrl":"https://doi.org/10.13052/jcsm2245-1439.1143","url":null,"abstract":"The video forensics world is a developing network of experts associated with the computerized video forensics industry. With quickly developing innovation, the video turned out to be the most significant weapon in the battle against individuals who violate the law by catching them in the act. Proof caught on video is viewed as more dependable, more exact, and more persuading than observer declaration alone. But, proof can be effortlessly tempered by utilizing programming. Video forensics examination, tells us about the accuracy of the input video. It has become a challenge for law enforcement agencies to deal with the increasing violence rate which involves the use of masks and weapons. The identification of a person becomes difficult with the use of face masks. The proposed method uses an efficient technique that is YOLO to detect guns, masks and suspicious persons from a video by extracting frames and features. It further compares the obtained frame with the available images in the dataset and generates output with bounding boxes detecting guns, masks and suspicious persons. This paper also examined the domain of video forensics and its outcomes. Experimental results show that the proposed method outperforms the existing techniques tested on different datasets. The precision for YOLO design for guns and masks is 100% and 75% respectively. The precision for customized CNN engineering for guns and face masks is 61.54% and 61.5% respectively. Execution measurements for both models have shown that the YOLO design outperformed the customized CNN with its presentation.","PeriodicalId":37820,"journal":{"name":"Journal of Cyber Security and Mobility","volume":"16 1","pages":"549-574"},"PeriodicalIF":0.0,"publicationDate":"2022-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90271696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Solution to User Authorization Query Problem in RBAC Systems Using Hierarchical Clustering 基于层次聚类的RBAC系统中用户授权查询问题的有效解决
Q3 Computer Science Pub Date : 2022-11-07 DOI: 10.13052/jcsm2245-1439.1142
K. R. Rao, Aditya Kolpe, Tribikram Pradhan, B. B. Zarpelão
 Role Based Access Control (RBAC) systems face an essential issue related to systematic handling of users’ access requests known as the User Authentication Query (UAQ) Problem. In this paper, we show that the UAQ problem can be resolved using Unsupervised machine learning following the guaranteed access request and Dynamic Separation of Duty relations. The use of Agglomerative Hierarchical Clustering not only improves efficiency but also avoids disordered merging of existing roles to create new ones and steers clear of duplication. With a time complexity of  O(n^3), the algorithm proves to be one of the fastest and promising models in state-of-the-art. The proposed model has been compared with the existing models and experimentally evaluated.
基于角色的访问控制(RBAC)系统面临着一个与用户访问请求的系统处理相关的基本问题,即用户身份验证查询(UAQ)问题。在本文中,我们证明了在保证访问请求和动态职责分离关系下,使用无监督机器学习可以解决UAQ问题。使用聚合层次聚类不仅提高了效率,而且避免了现有角色的无序合并以创建新角色,并避免了重复。该算法的时间复杂度为0 (n^3),是目前最快速、最有前途的模型之一。将该模型与现有模型进行了比较,并进行了实验验证。
{"title":"An Efficient Solution to User Authorization Query Problem in RBAC Systems Using Hierarchical Clustering","authors":"K. R. Rao, Aditya Kolpe, Tribikram Pradhan, B. B. Zarpelão","doi":"10.13052/jcsm2245-1439.1142","DOIUrl":"https://doi.org/10.13052/jcsm2245-1439.1142","url":null,"abstract":" Role Based Access Control (RBAC) systems face an essential issue related to systematic handling of users’ access requests known as the User Authentication Query (UAQ) Problem. In this paper, we show that the UAQ problem can be resolved using Unsupervised machine learning following the guaranteed access request and Dynamic Separation of Duty relations. The use of Agglomerative Hierarchical Clustering not only improves efficiency but also avoids disordered merging of existing roles to create new ones and steers clear of duplication. With a time complexity of  O(n^3), the algorithm proves to be one of the fastest and promising models in state-of-the-art. The proposed model has been compared with the existing models and experimentally evaluated.","PeriodicalId":37820,"journal":{"name":"Journal of Cyber Security and Mobility","volume":"35 1","pages":"531-548"},"PeriodicalIF":0.0,"publicationDate":"2022-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75168536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Two-Dimensional Projection Based Wireless Intrusion Classification Using Lightweight EfficientNet 基于轻量级高效网络的二维投影无线入侵分类
Q3 Computer Science Pub Date : 2022-11-07 DOI: 10.32604/cmc.2022.026749
H. Tekleselassie
Internet of Things (IoT) networks leverage wireless communication protocol, which adversaries can exploit. Impersonation attacks, injection attacks, and flooding are several examples of different attacks existing in Wi-Fi networks. Intrusion Detection System (IDS) became one solution to distinguish those attacks from benign traffic. Deep learning techniques have been intensively utilized to classify the attacks. However, the main issue of utilizing deep learning models is projecting the data, notably tabular data, into image-based data. This study proposes a novel projection from wireless network attacks data into grid-like data for feeding one of the Convolutional Neural Network (CNN) models, EfficientNet. We define the particular sequence of placing the attribute values in a matrix that would be captured as an image. By combining the most important subset of attributes and EfficientNet, we aim for an accurate and lightweight IDS module deployed in IoT networks. We examine the proposed model using the Wi-Fi attacks dataset, called AWID dataset. We achieve the best performance by a 99.91% F1 score and 0.11% false positive rate. In addition, our proposed model achieved comparable results with other statistical machine learning models, which shows that our proposed model successfully exploited the spatial information of tabular data to maintain detection accuracy. We also successfully maintain the false positive rate of about 0.11%. We also compared the proposed model with other machine learning models, and it is shown that our proposed model achieved comparable results with the other three models. We believe the spatial information must be considered by projecting the tabular data into grid-like data.
物联网(IoT)网络利用无线通信协议,对手可以利用这一协议。冒充攻击、注入攻击和泛洪攻击是Wi-Fi网络中存在的几种不同攻击的例子。入侵检测系统(IDS)成为区分这些攻击与良性流量的一种解决方案。深度学习技术已被广泛用于对攻击进行分类。然而,利用深度学习模型的主要问题是将数据(特别是表格数据)投影到基于图像的数据中。这项研究提出了一种新的从无线网络攻击数据到网格状数据的投影,用于输入卷积神经网络(CNN)模型之一——高效网络。我们定义了将属性值放置在矩阵中的特定序列,该矩阵将被捕获为图像。通过将最重要的属性子集与高效网络相结合,我们的目标是在物联网网络中部署准确且轻量级的IDS模块。我们使用Wi-Fi攻击数据集(称为AWID数据集)来检查所提出的模型。我们获得了99.91%的F1分数和0.11%的假阳性率的最佳性能。此外,我们提出的模型与其他统计机器学习模型取得了可比较的结果,这表明我们提出的模型成功地利用了表格数据的空间信息来保持检测精度。我们还成功地将假阳性率维持在0.11%左右。我们还将提出的模型与其他机器学习模型进行了比较,结果表明,我们提出的模型与其他三种模型取得了相当的结果。我们认为,必须通过将表格数据投影到网格数据中来考虑空间信息。
{"title":"Two-Dimensional Projection Based Wireless Intrusion Classification Using Lightweight EfficientNet","authors":"H. Tekleselassie","doi":"10.32604/cmc.2022.026749","DOIUrl":"https://doi.org/10.32604/cmc.2022.026749","url":null,"abstract":"Internet of Things (IoT) networks leverage wireless communication protocol, which adversaries can exploit. Impersonation attacks, injection attacks, and flooding are several examples of different attacks existing in Wi-Fi networks. Intrusion Detection System (IDS) became one solution to distinguish those attacks from benign traffic. Deep learning techniques have been intensively utilized to classify the attacks. However, the main issue of utilizing deep learning models is projecting the data, notably tabular data, into image-based data. This study proposes a novel projection from wireless network attacks data into grid-like data for feeding one of the Convolutional Neural Network (CNN) models, EfficientNet. We define the particular sequence of placing the attribute values in a matrix that would be captured as an image. By combining the most important subset of attributes and EfficientNet, we aim for an accurate and lightweight IDS module deployed in IoT networks. We examine the proposed model using the Wi-Fi attacks dataset, called AWID dataset. We achieve the best performance by a 99.91% F1 score and 0.11% false positive rate. In addition, our proposed model achieved comparable results with other statistical machine learning models, which shows that our proposed model successfully exploited the spatial information of tabular data to maintain detection accuracy. We also successfully maintain the false positive rate of about 0.11%. We also compared the proposed model with other machine learning models, and it is shown that our proposed model achieved comparable results with the other three models. We believe the spatial information must be considered by projecting the tabular data into grid-like data.","PeriodicalId":37820,"journal":{"name":"Journal of Cyber Security and Mobility","volume":"4 1","pages":"601-620"},"PeriodicalIF":0.0,"publicationDate":"2022-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81683448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
AI-enhanced Defense Against Ransomware Within the Organization's Architecture 在组织架构内增强人工智能防御勒索软件
Q3 Computer Science Pub Date : 2022-11-07 DOI: 10.13052/jcsm2245-1439.1146
B. Chaithanya, S. Brahmananda
Ransomware is a type of revenue-generating tactic that cybercriminals utilize to improve their income. Businesses have spent billions of dollars recovering control of their resources, which may include confidential data, operational applications and models, financial transactions, and other information, as a result of malicious software. Ransomware can infiltrate a resource or device and restrict the owner from accessing or utilizing it. There are various obstacles that a business must overcome in order to avoid ransomware attacks. Traditional ransomware detection systems employ a static detection method in which a finite dataset is provided into the system and a logical check is performed to prevent ransomware attacks against the system. This was effective in the early stages of the internet, but the scenario of recent times is far more advanced, and as more and more cyber world contrivances have been analyzed, multiple gaps have been identified, to the benefit of ransomware attackers, who use these gaps to generate astronomically large sums of money. As a result, the suggested methodology aims to efficiently detect diverse patterns associated with various file formats by starting with their sources, data collecting, probabilistic identification of target devices, and deep learning classifier with intelligent detection. An organization can use the recommended approach to safeguard its data and prepare for future ransomware attacks by using it as a roadmap to lead them through their security efforts.
勒索软件是网络犯罪分子用来增加收入的一种创收策略。企业已经花费了数十亿美元来恢复对其资源的控制,这些资源可能包括机密数据、操作应用程序和模型、金融交易和其他信息,这些都是恶意软件造成的。勒索软件可以渗透资源或设备,并限制所有者访问或使用它。为了避免勒索软件攻击,企业必须克服各种障碍。传统的勒索软件检测系统采用静态检测方法,将有限数据集提供给系统,并执行逻辑检查以防止勒索软件对系统的攻击。这在互联网的早期阶段是有效的,但最近的情况要先进得多,随着越来越多的网络世界的发明被分析,已经发现了多个漏洞,这有利于勒索软件攻击者,他们利用这些漏洞来赚取天文数字的巨额资金。因此,建议的方法旨在通过从各种文件格式的来源、数据收集、目标设备的概率识别以及具有智能检测的深度学习分类器开始,有效地检测与各种文件格式相关的各种模式。组织可以使用推荐的方法来保护其数据,并通过将其作为路线图来引导他们完成安全工作,从而为未来的勒索软件攻击做好准备。
{"title":"AI-enhanced Defense Against Ransomware Within the Organization's Architecture","authors":"B. Chaithanya, S. Brahmananda","doi":"10.13052/jcsm2245-1439.1146","DOIUrl":"https://doi.org/10.13052/jcsm2245-1439.1146","url":null,"abstract":"Ransomware is a type of revenue-generating tactic that cybercriminals utilize to improve their income. Businesses have spent billions of dollars recovering control of their resources, which may include confidential data, operational applications and models, financial transactions, and other information, as a result of malicious software. Ransomware can infiltrate a resource or device and restrict the owner from accessing or utilizing it. There are various obstacles that a business must overcome in order to avoid ransomware attacks. Traditional ransomware detection systems employ a static detection method in which a finite dataset is provided into the system and a logical check is performed to prevent ransomware attacks against the system. This was effective in the early stages of the internet, but the scenario of recent times is far more advanced, and as more and more cyber world contrivances have been analyzed, multiple gaps have been identified, to the benefit of ransomware attackers, who use these gaps to generate astronomically large sums of money. As a result, the suggested methodology aims to efficiently detect diverse patterns associated with various file formats by starting with their sources, data collecting, probabilistic identification of target devices, and deep learning classifier with intelligent detection. An organization can use the recommended approach to safeguard its data and prepare for future ransomware attacks by using it as a roadmap to lead them through their security efforts.","PeriodicalId":37820,"journal":{"name":"Journal of Cyber Security and Mobility","volume":"7 1","pages":"621-654"},"PeriodicalIF":0.0,"publicationDate":"2022-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85821054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Journal of Cyber Security and Mobility
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1