首页 > 最新文献

Journal of Applied Security Research最新文献

英文 中文
IoT Security in Industry: A Threat Model of Existing and Future Network Infrastructure 工业物联网安全:现有和未来网络基础设施的威胁模型
IF 1.3 Q1 Social Sciences Pub Date : 2022-09-01 DOI: 10.1080/19361610.2022.2116921
Jackie McNett, Josh McNett, Xiaoli Su
{"title":"IoT Security in Industry: A Threat Model of Existing and Future Network Infrastructure","authors":"Jackie McNett, Josh McNett, Xiaoli Su","doi":"10.1080/19361610.2022.2116921","DOIUrl":"https://doi.org/10.1080/19361610.2022.2116921","url":null,"abstract":"","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44296469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy Enhanced Healthcare Data Management Using Associative Data Mining Approaches 使用关联数据挖掘方法增强隐私的医疗保健数据管理
IF 1.3 Q1 Social Sciences Pub Date : 2022-08-29 DOI: 10.1080/19361610.2022.2099707
N. Duraimutharasan
Abstract Hospital medical records with health examination findings can be integrated to assist in uncovering the link between aberrant test results and illness. It is possible to establish a disease-preventive knowledge center using these integrated data by performing associated rule mining on the results. In order to integrate data, sensitive patient information must be shared. Patients’ privacy may be violated by the disclosure of sensitive information. Thus, privacy-preserving associated rule mining in physically partitioned healthcare data is addressed in this article. The suggested technique is further evaluated in terms of data protection, transmission, and computing costs.
摘要医院的医疗记录与健康检查结果可以整合在一起,以帮助揭示异常检测结果与疾病之间的联系。通过对结果进行关联规则挖掘,可以使用这些集成数据建立疾病预防知识中心。为了整合数据,必须共享敏感的患者信息。披露敏感信息可能会侵犯患者的隐私。因此,本文讨论了物理分区医疗保健数据中的隐私保护关联规则挖掘。建议的技术在数据保护、传输和计算成本方面进行了进一步评估。
{"title":"Privacy Enhanced Healthcare Data Management Using Associative Data Mining Approaches","authors":"N. Duraimutharasan","doi":"10.1080/19361610.2022.2099707","DOIUrl":"https://doi.org/10.1080/19361610.2022.2099707","url":null,"abstract":"Abstract Hospital medical records with health examination findings can be integrated to assist in uncovering the link between aberrant test results and illness. It is possible to establish a disease-preventive knowledge center using these integrated data by performing associated rule mining on the results. In order to integrate data, sensitive patient information must be shared. Patients’ privacy may be violated by the disclosure of sensitive information. Thus, privacy-preserving associated rule mining in physically partitioned healthcare data is addressed in this article. The suggested technique is further evaluated in terms of data protection, transmission, and computing costs.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2022-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41285589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Predicting Money Laundering Using Machine Learning and Artificial Neural Networks Algorithms in Banks 利用机器学习和人工神经网络算法预测银行洗钱
IF 1.3 Q1 Social Sciences Pub Date : 2022-08-26 DOI: 10.1080/19361610.2022.2114744
M. Lokanan
{"title":"Predicting Money Laundering Using Machine Learning and Artificial Neural Networks Algorithms in Banks","authors":"M. Lokanan","doi":"10.1080/19361610.2022.2114744","DOIUrl":"https://doi.org/10.1080/19361610.2022.2114744","url":null,"abstract":"","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2022-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48572072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Stego Detection: Image Steganalysis Using a Novel Hidden Stego Visual Geometry Group–Based CNN Classification 隐写检测:基于CNN分类的新型隐写视觉几何组的图像隐写分析
IF 1.3 Q1 Social Sciences Pub Date : 2022-08-24 DOI: 10.1080/19361610.2022.2110637
Hemalatha Jeyaprakash, Balachander Chokkalingam, Vivek V, S. Mohan
Abstract Steganography is the concept of embedding or hiding secret information into a cover image by maintaining the visual quality. Various algorithms are designed to classify stego images but the race still continues between Steganographer and Steganalyser. Advances in deep learning provided a solution to detect stego images. In this article, we coin a new paradigm to detect stego image as a three-step process with the following repercussions: (1) employing preprocessing step to enhance the input image, (2 feature extraction using the Mustard honey bee optimization algorithm and, thus, the extracted features will be dimensionally reduced (3) by classification using HSVGG-based CNN. Experimentation carried out on ALASKA2 data set and the results were compared.
摘要隐写术是通过保持视觉质量将秘密信息嵌入或隐藏到封面图像中的概念。设计了各种算法来对隐写图像进行分类,但隐写器和隐写分析器之间的竞争仍在继续。深度学习的进步为检测隐写图像提供了一种解决方案。在本文中,我们提出了一种新的范式,将检测炖煮图像作为一个三步过程,其影响如下:(1)采用预处理步骤来增强输入图像,(2)使用芥末蜜蜂优化算法进行特征提取,因此,提取的特征将被降维(3)通过使用基于HSVGG的CNN进行分类。在ALASKA2数据集上进行的实验与结果进行了比较。
{"title":"Stego Detection: Image Steganalysis Using a Novel Hidden Stego Visual Geometry Group–Based CNN Classification","authors":"Hemalatha Jeyaprakash, Balachander Chokkalingam, Vivek V, S. Mohan","doi":"10.1080/19361610.2022.2110637","DOIUrl":"https://doi.org/10.1080/19361610.2022.2110637","url":null,"abstract":"Abstract Steganography is the concept of embedding or hiding secret information into a cover image by maintaining the visual quality. Various algorithms are designed to classify stego images but the race still continues between Steganographer and Steganalyser. Advances in deep learning provided a solution to detect stego images. In this article, we coin a new paradigm to detect stego image as a three-step process with the following repercussions: (1) employing preprocessing step to enhance the input image, (2 feature extraction using the Mustard honey bee optimization algorithm and, thus, the extracted features will be dimensionally reduced (3) by classification using HSVGG-based CNN. Experimentation carried out on ALASKA2 data set and the results were compared.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2022-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47867152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adversarial Propaganda: How Enemies Target the U.S. to Fuel Division 对抗性宣传:敌人如何瞄准美国以助长分裂
IF 1.3 Q1 Social Sciences Pub Date : 2022-08-22 DOI: 10.1080/19361610.2022.2113730
Molly M. Dundon, S. Houck
Abstract This article explores how foreign enemies of the United States target American citizens with propaganda intended to fuel societal division. It reviews propaganda conceptually, discusses individual, group, and cultural factors that make the United States is uniquely vulnerable to false propaganda, and details the processes and mechanisms by which adversarial propaganda attempts to create false narratives and perpetuate half-truths in the digital domain. It concludes with a discussion on how to mitigate adversarial propaganda’s effects.
摘要本文探讨了美国的外国敌人如何通过旨在加剧社会分裂的宣传来针对美国公民。它从概念上回顾了宣传,讨论了使美国特别容易受到虚假宣传影响的个人、群体和文化因素,并详细说明了对抗性宣传试图制造虚假叙事并在数字领域延续半真半假的过程和机制。最后讨论了如何减轻对抗性宣传的影响。
{"title":"Adversarial Propaganda: How Enemies Target the U.S. to Fuel Division","authors":"Molly M. Dundon, S. Houck","doi":"10.1080/19361610.2022.2113730","DOIUrl":"https://doi.org/10.1080/19361610.2022.2113730","url":null,"abstract":"Abstract This article explores how foreign enemies of the United States target American citizens with propaganda intended to fuel societal division. It reviews propaganda conceptually, discusses individual, group, and cultural factors that make the United States is uniquely vulnerable to false propaganda, and details the processes and mechanisms by which adversarial propaganda attempts to create false narratives and perpetuate half-truths in the digital domain. It concludes with a discussion on how to mitigate adversarial propaganda’s effects.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2022-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44824007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Geospatial Intelligence and Artificial Intelligence for Detecting Potential Coca Paste Production Infrastructure in the Border Region of Venezuela and Colombia 用于探测委内瑞拉和哥伦比亚边境地区潜在古柯膏生产基础设施的地理空间智能和人工智能
IF 1.3 Q1 Social Sciences Pub Date : 2022-08-18 DOI: 10.1080/19361610.2022.2111184
Jairo Jesús Pinto Hidalgo, Jorge Antonio Silva Centeno
Abstract Cocaine production has reached record levels in recent years. Latin America and the Caribbean are the primary sources of all cocaine consumed globally, thus there are indications that cocaine production processes could spread to countries of transit and consumption, becoming a threat to the security of states. In this article, we address the challenge of detecting potential primary infrastructures to produce coca paste in the border region of Venezuela and Colombia. We use geospatial intelligence and artificial intelligence to detect these objects in remote sensing images and identify their geographic location. We generated a dataset of 16,778 training samples that we named CocaPaste-PI-DETECTION, constructed from PlanetScope satellite imagery rated at NIIRS level 3, ground truth data, and A1, A2, and B2 information sources. An advanced deep learning model, specialized for object detection tasks, was trained. A mean Average Precision (mAP) score of 90.07% was obtained, and we analyzed generalization capabilities and conducted different experiments that demonstrated how the proposed methodology could strengthen intervention strategies against drug trafficking.
近年来,可卡因的产量达到了创纪录的水平。拉丁美洲和加勒比是全球消费的所有可卡因的主要来源,因此有迹象表明,可卡因的生产过程可能蔓延到过境国和消费国,对各国的安全构成威胁。在这篇文章中,我们解决了在委内瑞拉和哥伦比亚边境地区发现潜在的生产古柯膏的初级基础设施的挑战。我们利用地理空间智能和人工智能在遥感图像中检测这些物体并确定其地理位置。我们生成了一个包含16,778个训练样本的数据集,我们将其命名为cocapast - pi - detection,该数据集由NIIRS 3级的PlanetScope卫星图像、地面真实数据以及A1、A2和B2信息源构建而成。训练了一个专门用于目标检测任务的高级深度学习模型。平均精度(mAP)得分为90.07%,我们分析了该方法的泛化能力,并进行了不同的实验,以证明该方法可以加强对毒品贩运的干预策略。
{"title":"Geospatial Intelligence and Artificial Intelligence for Detecting Potential Coca Paste Production Infrastructure in the Border Region of Venezuela and Colombia","authors":"Jairo Jesús Pinto Hidalgo, Jorge Antonio Silva Centeno","doi":"10.1080/19361610.2022.2111184","DOIUrl":"https://doi.org/10.1080/19361610.2022.2111184","url":null,"abstract":"Abstract Cocaine production has reached record levels in recent years. Latin America and the Caribbean are the primary sources of all cocaine consumed globally, thus there are indications that cocaine production processes could spread to countries of transit and consumption, becoming a threat to the security of states. In this article, we address the challenge of detecting potential primary infrastructures to produce coca paste in the border region of Venezuela and Colombia. We use geospatial intelligence and artificial intelligence to detect these objects in remote sensing images and identify their geographic location. We generated a dataset of 16,778 training samples that we named CocaPaste-PI-DETECTION, constructed from PlanetScope satellite imagery rated at NIIRS level 3, ground truth data, and A1, A2, and B2 information sources. An advanced deep learning model, specialized for object detection tasks, was trained. A mean Average Precision (mAP) score of 90.07% was obtained, and we analyzed generalization capabilities and conducted different experiments that demonstrated how the proposed methodology could strengthen intervention strategies against drug trafficking.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2022-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42803393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Searchable Encryption Taxonomy: Survey 可搜索的加密分类:调查
IF 1.3 Q1 Social Sciences Pub Date : 2022-08-11 DOI: 10.1080/19361610.2022.2103364
M. H. Noorallahzadeh, R. Alimoradi, A. Gholami
Abstract Cloud service providers allow businesses to drastically reduce their costs. However, it is good to know that most outsourced data is sensitive data. Therefore, to protect this data set from potential attacks on cloud servers, it is strongly recommended that you encrypt it before outsourcing. But cloud servers cannot search encrypted data by default. Many researchers have published work proposing efficient and secure schemes to overcome this problem. So far, many searchable encryption schemes have been published. Searchable Encryption has two main branches. 1-Symmetric searchable encryption (SSE) 2-Asymmetric searchable encryption (ASE). In this article, SE schemes are investigated in a new way. We provide a complete classification of searchable encryption schemes in terms of search type, index type, results type, security models, type of implementation, Multiplicity of users, Cryptographic Primitives, and Technique used. For each classification, the available schemes are compared. We provide an available searchable encryption solutions overview.
云服务提供商允许企业大幅降低成本。然而,最好知道大多数外包数据都是敏感数据。因此,为了保护该数据集免受云服务器上的潜在攻击,强烈建议您在外包之前对其进行加密。但默认情况下,云服务器无法搜索加密数据。许多研究人员已经发表了工作,提出了有效和安全的方案来克服这个问题。到目前为止,已经发布了许多可搜索的加密方案。可搜索加密有两个主要分支。对称可搜索加密(SSE) 2非对称可搜索加密(ASE)本文以一种新的方式对SE方案进行了研究。我们根据搜索类型、索引类型、结果类型、安全模型、实现类型、用户多样性、加密原语和使用的技术提供了可搜索加密方案的完整分类。对于每种分类,比较了可用的方案。我们提供了一个可用的可搜索的加密解决方案概述。
{"title":"Searchable Encryption Taxonomy: Survey","authors":"M. H. Noorallahzadeh, R. Alimoradi, A. Gholami","doi":"10.1080/19361610.2022.2103364","DOIUrl":"https://doi.org/10.1080/19361610.2022.2103364","url":null,"abstract":"Abstract Cloud service providers allow businesses to drastically reduce their costs. However, it is good to know that most outsourced data is sensitive data. Therefore, to protect this data set from potential attacks on cloud servers, it is strongly recommended that you encrypt it before outsourcing. But cloud servers cannot search encrypted data by default. Many researchers have published work proposing efficient and secure schemes to overcome this problem. So far, many searchable encryption schemes have been published. Searchable Encryption has two main branches. 1-Symmetric searchable encryption (SSE) 2-Asymmetric searchable encryption (ASE). In this article, SE schemes are investigated in a new way. We provide a complete classification of searchable encryption schemes in terms of search type, index type, results type, security models, type of implementation, Multiplicity of users, Cryptographic Primitives, and Technique used. For each classification, the available schemes are compared. We provide an available searchable encryption solutions overview.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2022-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45885567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Brazil Method of Anti-Malware Evaluation and Cyber Defense Impacts 反恶意软件评估和网络防御影响的巴西方法
IF 1.3 Q1 Social Sciences Pub Date : 2022-08-02 DOI: 10.1080/19361610.2022.2104104
Rodrigo Ruiz, Rogério Winter, Ferrucio de Franco Rosa, Pancham Shukla, H. Kazemian
Abstract Cyber risk profoundly affects all. In the context of cyber threats, malware is trending in various productive sectors. Nowadays, anti-malware is essential to combat cyber threats; however, their efficiency is often questioned, because malware is different for different regions in the world. Choosing an efficient anti-malware software solution is crucial to protect information from different institutions. The method confirmed the reality of evaluating the different known methodologies, showing another scenario of the efficiency of the different testers. The method allowed visualizing an interesting panorama because 50% of malware collected on the Brazilian Internet was detected by anti-malware commercially available in Brazil.
摘要网络风险深刻影响着所有人。在网络威胁的背景下,恶意软件正在各个生产部门流行。如今,反恶意软件对于对抗网络威胁至关重要;然而,它们的效率经常受到质疑,因为世界上不同地区的恶意软件不同。选择一个高效的反恶意软件解决方案对于保护来自不同机构的信息至关重要。该方法证实了评估不同已知方法的现实,显示了不同测试人员效率的另一种情况。该方法可以可视化一个有趣的全景,因为在巴西互联网上收集的恶意软件中有50%是由巴西商用的反恶意软件检测到的。
{"title":"Brazil Method of Anti-Malware Evaluation and Cyber Defense Impacts","authors":"Rodrigo Ruiz, Rogério Winter, Ferrucio de Franco Rosa, Pancham Shukla, H. Kazemian","doi":"10.1080/19361610.2022.2104104","DOIUrl":"https://doi.org/10.1080/19361610.2022.2104104","url":null,"abstract":"Abstract Cyber risk profoundly affects all. In the context of cyber threats, malware is trending in various productive sectors. Nowadays, anti-malware is essential to combat cyber threats; however, their efficiency is often questioned, because malware is different for different regions in the world. Choosing an efficient anti-malware software solution is crucial to protect information from different institutions. The method confirmed the reality of evaluating the different known methodologies, showing another scenario of the efficiency of the different testers. The method allowed visualizing an interesting panorama because 50% of malware collected on the Brazilian Internet was detected by anti-malware commercially available in Brazil.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2022-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41806767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
In Search for the Best Police Oversight Mechanism for Zimbabwe: The Imperative for an Independent Police Complaints Board 为津巴布韦寻找最佳的警察监督机制:建立独立的警察投诉委员会的必要性
IF 1.3 Q1 Social Sciences Pub Date : 2022-08-01 DOI: 10.1080/19361610.2022.2105283
Ishmael Mugari, A. Olutola
Abstract On numerous occasions, the Zimbabwean police have had to contend with allegations of police abuse of power, with various sectors of the society calling for sound mechanisms for holding the police to account. This study gathered data from purposefully sampled representatives of police oversight institutions to find out their perspectives on the best police oversight mechanism for Zimbabwe. Findings revealed that an independent board consisting of non-police officers is the most effective mechanism for handling police misconduct. Findings also revealed that the independent board should be manned by retired judicial officers, retired senior police officers and representatives from the civic society.
摘要在许多场合,津巴布韦警方不得不应对警察滥用职权的指控,社会各界呼吁建立健全机制,追究警察的责任。这项研究收集了有意抽样的警察监督机构代表的数据,以了解他们对津巴布韦最佳警察监督机制的看法。调查结果显示,由非警务人员组成的独立委员会是处理警察不当行为的最有效机制。调查结果还显示,独立委员会应由退休司法人员、退休高级警官和公民社会代表组成。
{"title":"In Search for the Best Police Oversight Mechanism for Zimbabwe: The Imperative for an Independent Police Complaints Board","authors":"Ishmael Mugari, A. Olutola","doi":"10.1080/19361610.2022.2105283","DOIUrl":"https://doi.org/10.1080/19361610.2022.2105283","url":null,"abstract":"Abstract On numerous occasions, the Zimbabwean police have had to contend with allegations of police abuse of power, with various sectors of the society calling for sound mechanisms for holding the police to account. This study gathered data from purposefully sampled representatives of police oversight institutions to find out their perspectives on the best police oversight mechanism for Zimbabwe. Findings revealed that an independent board consisting of non-police officers is the most effective mechanism for handling police misconduct. Findings also revealed that the independent board should be manned by retired judicial officers, retired senior police officers and representatives from the civic society.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43555720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Real-Time Hardware Intrusion Detection System and a Classifying Features Algorithm 一种实时硬件入侵检测系统及分类特征算法
IF 1.3 Q1 Social Sciences Pub Date : 2022-07-28 DOI: 10.1080/19361610.2022.2103363
T. Sobh
Abstract Nowadays, everybody needs to secure his/her activities. Existing levels of cyber-criminals need technology for detecting malicious activity. This work proposes a real-time Hardware IDS implemented on FPGA and an algorithm for classifying features from network traffic through the network interface card (NIC). It minimizes search time for extracting statistical features from connection records stored in connection queues to memory references. Therefore, it can detect most internal and external network attacks. A decision tree classifier is used as an inference engine and gives a high detection rate of 99.93%.
摘要如今,每个人都需要保护自己的活动。现有级别的网络罪犯需要检测恶意活动的技术。本文提出了一种在FPGA上实现的实时硬件入侵检测系统,以及一种通过网络接口卡(NIC)对网络流量特征进行分类的算法。它最大限度地减少了从存储在连接队列中的连接记录中提取统计特征到内存引用的搜索时间。因此,它可以检测大多数内部和外部网络攻击。使用决策树分类器作为推理引擎,给出了99.93%的高检测率。
{"title":"A Real-Time Hardware Intrusion Detection System and a Classifying Features Algorithm","authors":"T. Sobh","doi":"10.1080/19361610.2022.2103363","DOIUrl":"https://doi.org/10.1080/19361610.2022.2103363","url":null,"abstract":"Abstract Nowadays, everybody needs to secure his/her activities. Existing levels of cyber-criminals need technology for detecting malicious activity. This work proposes a real-time Hardware IDS implemented on FPGA and an algorithm for classifying features from network traffic through the network interface card (NIC). It minimizes search time for extracting statistical features from connection records stored in connection queues to memory references. Therefore, it can detect most internal and external network attacks. A decision tree classifier is used as an inference engine and gives a high detection rate of 99.93%.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2022-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47512014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Applied Security Research
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1