Pub Date : 2022-09-01DOI: 10.1080/19361610.2022.2116921
Jackie McNett, Josh McNett, Xiaoli Su
{"title":"IoT Security in Industry: A Threat Model of Existing and Future Network Infrastructure","authors":"Jackie McNett, Josh McNett, Xiaoli Su","doi":"10.1080/19361610.2022.2116921","DOIUrl":"https://doi.org/10.1080/19361610.2022.2116921","url":null,"abstract":"","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44296469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-29DOI: 10.1080/19361610.2022.2099707
N. Duraimutharasan
Abstract Hospital medical records with health examination findings can be integrated to assist in uncovering the link between aberrant test results and illness. It is possible to establish a disease-preventive knowledge center using these integrated data by performing associated rule mining on the results. In order to integrate data, sensitive patient information must be shared. Patients’ privacy may be violated by the disclosure of sensitive information. Thus, privacy-preserving associated rule mining in physically partitioned healthcare data is addressed in this article. The suggested technique is further evaluated in terms of data protection, transmission, and computing costs.
{"title":"Privacy Enhanced Healthcare Data Management Using Associative Data Mining Approaches","authors":"N. Duraimutharasan","doi":"10.1080/19361610.2022.2099707","DOIUrl":"https://doi.org/10.1080/19361610.2022.2099707","url":null,"abstract":"Abstract Hospital medical records with health examination findings can be integrated to assist in uncovering the link between aberrant test results and illness. It is possible to establish a disease-preventive knowledge center using these integrated data by performing associated rule mining on the results. In order to integrate data, sensitive patient information must be shared. Patients’ privacy may be violated by the disclosure of sensitive information. Thus, privacy-preserving associated rule mining in physically partitioned healthcare data is addressed in this article. The suggested technique is further evaluated in terms of data protection, transmission, and computing costs.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2022-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41285589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-26DOI: 10.1080/19361610.2022.2114744
M. Lokanan
{"title":"Predicting Money Laundering Using Machine Learning and Artificial Neural Networks Algorithms in Banks","authors":"M. Lokanan","doi":"10.1080/19361610.2022.2114744","DOIUrl":"https://doi.org/10.1080/19361610.2022.2114744","url":null,"abstract":"","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2022-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48572072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-24DOI: 10.1080/19361610.2022.2110637
Hemalatha Jeyaprakash, Balachander Chokkalingam, Vivek V, S. Mohan
Abstract Steganography is the concept of embedding or hiding secret information into a cover image by maintaining the visual quality. Various algorithms are designed to classify stego images but the race still continues between Steganographer and Steganalyser. Advances in deep learning provided a solution to detect stego images. In this article, we coin a new paradigm to detect stego image as a three-step process with the following repercussions: (1) employing preprocessing step to enhance the input image, (2 feature extraction using the Mustard honey bee optimization algorithm and, thus, the extracted features will be dimensionally reduced (3) by classification using HSVGG-based CNN. Experimentation carried out on ALASKA2 data set and the results were compared.
{"title":"Stego Detection: Image Steganalysis Using a Novel Hidden Stego Visual Geometry Group–Based CNN Classification","authors":"Hemalatha Jeyaprakash, Balachander Chokkalingam, Vivek V, S. Mohan","doi":"10.1080/19361610.2022.2110637","DOIUrl":"https://doi.org/10.1080/19361610.2022.2110637","url":null,"abstract":"Abstract Steganography is the concept of embedding or hiding secret information into a cover image by maintaining the visual quality. Various algorithms are designed to classify stego images but the race still continues between Steganographer and Steganalyser. Advances in deep learning provided a solution to detect stego images. In this article, we coin a new paradigm to detect stego image as a three-step process with the following repercussions: (1) employing preprocessing step to enhance the input image, (2 feature extraction using the Mustard honey bee optimization algorithm and, thus, the extracted features will be dimensionally reduced (3) by classification using HSVGG-based CNN. Experimentation carried out on ALASKA2 data set and the results were compared.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2022-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47867152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-22DOI: 10.1080/19361610.2022.2113730
Molly M. Dundon, S. Houck
Abstract This article explores how foreign enemies of the United States target American citizens with propaganda intended to fuel societal division. It reviews propaganda conceptually, discusses individual, group, and cultural factors that make the United States is uniquely vulnerable to false propaganda, and details the processes and mechanisms by which adversarial propaganda attempts to create false narratives and perpetuate half-truths in the digital domain. It concludes with a discussion on how to mitigate adversarial propaganda’s effects.
{"title":"Adversarial Propaganda: How Enemies Target the U.S. to Fuel Division","authors":"Molly M. Dundon, S. Houck","doi":"10.1080/19361610.2022.2113730","DOIUrl":"https://doi.org/10.1080/19361610.2022.2113730","url":null,"abstract":"Abstract This article explores how foreign enemies of the United States target American citizens with propaganda intended to fuel societal division. It reviews propaganda conceptually, discusses individual, group, and cultural factors that make the United States is uniquely vulnerable to false propaganda, and details the processes and mechanisms by which adversarial propaganda attempts to create false narratives and perpetuate half-truths in the digital domain. It concludes with a discussion on how to mitigate adversarial propaganda’s effects.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2022-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44824007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-18DOI: 10.1080/19361610.2022.2111184
Jairo Jesús Pinto Hidalgo, Jorge Antonio Silva Centeno
Abstract Cocaine production has reached record levels in recent years. Latin America and the Caribbean are the primary sources of all cocaine consumed globally, thus there are indications that cocaine production processes could spread to countries of transit and consumption, becoming a threat to the security of states. In this article, we address the challenge of detecting potential primary infrastructures to produce coca paste in the border region of Venezuela and Colombia. We use geospatial intelligence and artificial intelligence to detect these objects in remote sensing images and identify their geographic location. We generated a dataset of 16,778 training samples that we named CocaPaste-PI-DETECTION, constructed from PlanetScope satellite imagery rated at NIIRS level 3, ground truth data, and A1, A2, and B2 information sources. An advanced deep learning model, specialized for object detection tasks, was trained. A mean Average Precision (mAP) score of 90.07% was obtained, and we analyzed generalization capabilities and conducted different experiments that demonstrated how the proposed methodology could strengthen intervention strategies against drug trafficking.
近年来,可卡因的产量达到了创纪录的水平。拉丁美洲和加勒比是全球消费的所有可卡因的主要来源,因此有迹象表明,可卡因的生产过程可能蔓延到过境国和消费国,对各国的安全构成威胁。在这篇文章中,我们解决了在委内瑞拉和哥伦比亚边境地区发现潜在的生产古柯膏的初级基础设施的挑战。我们利用地理空间智能和人工智能在遥感图像中检测这些物体并确定其地理位置。我们生成了一个包含16,778个训练样本的数据集,我们将其命名为cocapast - pi - detection,该数据集由NIIRS 3级的PlanetScope卫星图像、地面真实数据以及A1、A2和B2信息源构建而成。训练了一个专门用于目标检测任务的高级深度学习模型。平均精度(mAP)得分为90.07%,我们分析了该方法的泛化能力,并进行了不同的实验,以证明该方法可以加强对毒品贩运的干预策略。
{"title":"Geospatial Intelligence and Artificial Intelligence for Detecting Potential Coca Paste Production Infrastructure in the Border Region of Venezuela and Colombia","authors":"Jairo Jesús Pinto Hidalgo, Jorge Antonio Silva Centeno","doi":"10.1080/19361610.2022.2111184","DOIUrl":"https://doi.org/10.1080/19361610.2022.2111184","url":null,"abstract":"Abstract Cocaine production has reached record levels in recent years. Latin America and the Caribbean are the primary sources of all cocaine consumed globally, thus there are indications that cocaine production processes could spread to countries of transit and consumption, becoming a threat to the security of states. In this article, we address the challenge of detecting potential primary infrastructures to produce coca paste in the border region of Venezuela and Colombia. We use geospatial intelligence and artificial intelligence to detect these objects in remote sensing images and identify their geographic location. We generated a dataset of 16,778 training samples that we named CocaPaste-PI-DETECTION, constructed from PlanetScope satellite imagery rated at NIIRS level 3, ground truth data, and A1, A2, and B2 information sources. An advanced deep learning model, specialized for object detection tasks, was trained. A mean Average Precision (mAP) score of 90.07% was obtained, and we analyzed generalization capabilities and conducted different experiments that demonstrated how the proposed methodology could strengthen intervention strategies against drug trafficking.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2022-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42803393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-11DOI: 10.1080/19361610.2022.2103364
M. H. Noorallahzadeh, R. Alimoradi, A. Gholami
Abstract Cloud service providers allow businesses to drastically reduce their costs. However, it is good to know that most outsourced data is sensitive data. Therefore, to protect this data set from potential attacks on cloud servers, it is strongly recommended that you encrypt it before outsourcing. But cloud servers cannot search encrypted data by default. Many researchers have published work proposing efficient and secure schemes to overcome this problem. So far, many searchable encryption schemes have been published. Searchable Encryption has two main branches. 1-Symmetric searchable encryption (SSE) 2-Asymmetric searchable encryption (ASE). In this article, SE schemes are investigated in a new way. We provide a complete classification of searchable encryption schemes in terms of search type, index type, results type, security models, type of implementation, Multiplicity of users, Cryptographic Primitives, and Technique used. For each classification, the available schemes are compared. We provide an available searchable encryption solutions overview.
{"title":"Searchable Encryption Taxonomy: Survey","authors":"M. H. Noorallahzadeh, R. Alimoradi, A. Gholami","doi":"10.1080/19361610.2022.2103364","DOIUrl":"https://doi.org/10.1080/19361610.2022.2103364","url":null,"abstract":"Abstract Cloud service providers allow businesses to drastically reduce their costs. However, it is good to know that most outsourced data is sensitive data. Therefore, to protect this data set from potential attacks on cloud servers, it is strongly recommended that you encrypt it before outsourcing. But cloud servers cannot search encrypted data by default. Many researchers have published work proposing efficient and secure schemes to overcome this problem. So far, many searchable encryption schemes have been published. Searchable Encryption has two main branches. 1-Symmetric searchable encryption (SSE) 2-Asymmetric searchable encryption (ASE). In this article, SE schemes are investigated in a new way. We provide a complete classification of searchable encryption schemes in terms of search type, index type, results type, security models, type of implementation, Multiplicity of users, Cryptographic Primitives, and Technique used. For each classification, the available schemes are compared. We provide an available searchable encryption solutions overview.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2022-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45885567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-02DOI: 10.1080/19361610.2022.2104104
Rodrigo Ruiz, Rogério Winter, Ferrucio de Franco Rosa, Pancham Shukla, H. Kazemian
Abstract Cyber risk profoundly affects all. In the context of cyber threats, malware is trending in various productive sectors. Nowadays, anti-malware is essential to combat cyber threats; however, their efficiency is often questioned, because malware is different for different regions in the world. Choosing an efficient anti-malware software solution is crucial to protect information from different institutions. The method confirmed the reality of evaluating the different known methodologies, showing another scenario of the efficiency of the different testers. The method allowed visualizing an interesting panorama because 50% of malware collected on the Brazilian Internet was detected by anti-malware commercially available in Brazil.
{"title":"Brazil Method of Anti-Malware Evaluation and Cyber Defense Impacts","authors":"Rodrigo Ruiz, Rogério Winter, Ferrucio de Franco Rosa, Pancham Shukla, H. Kazemian","doi":"10.1080/19361610.2022.2104104","DOIUrl":"https://doi.org/10.1080/19361610.2022.2104104","url":null,"abstract":"Abstract Cyber risk profoundly affects all. In the context of cyber threats, malware is trending in various productive sectors. Nowadays, anti-malware is essential to combat cyber threats; however, their efficiency is often questioned, because malware is different for different regions in the world. Choosing an efficient anti-malware software solution is crucial to protect information from different institutions. The method confirmed the reality of evaluating the different known methodologies, showing another scenario of the efficiency of the different testers. The method allowed visualizing an interesting panorama because 50% of malware collected on the Brazilian Internet was detected by anti-malware commercially available in Brazil.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2022-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41806767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-01DOI: 10.1080/19361610.2022.2105283
Ishmael Mugari, A. Olutola
Abstract On numerous occasions, the Zimbabwean police have had to contend with allegations of police abuse of power, with various sectors of the society calling for sound mechanisms for holding the police to account. This study gathered data from purposefully sampled representatives of police oversight institutions to find out their perspectives on the best police oversight mechanism for Zimbabwe. Findings revealed that an independent board consisting of non-police officers is the most effective mechanism for handling police misconduct. Findings also revealed that the independent board should be manned by retired judicial officers, retired senior police officers and representatives from the civic society.
{"title":"In Search for the Best Police Oversight Mechanism for Zimbabwe: The Imperative for an Independent Police Complaints Board","authors":"Ishmael Mugari, A. Olutola","doi":"10.1080/19361610.2022.2105283","DOIUrl":"https://doi.org/10.1080/19361610.2022.2105283","url":null,"abstract":"Abstract On numerous occasions, the Zimbabwean police have had to contend with allegations of police abuse of power, with various sectors of the society calling for sound mechanisms for holding the police to account. This study gathered data from purposefully sampled representatives of police oversight institutions to find out their perspectives on the best police oversight mechanism for Zimbabwe. Findings revealed that an independent board consisting of non-police officers is the most effective mechanism for handling police misconduct. Findings also revealed that the independent board should be manned by retired judicial officers, retired senior police officers and representatives from the civic society.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43555720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-28DOI: 10.1080/19361610.2022.2103363
T. Sobh
Abstract Nowadays, everybody needs to secure his/her activities. Existing levels of cyber-criminals need technology for detecting malicious activity. This work proposes a real-time Hardware IDS implemented on FPGA and an algorithm for classifying features from network traffic through the network interface card (NIC). It minimizes search time for extracting statistical features from connection records stored in connection queues to memory references. Therefore, it can detect most internal and external network attacks. A decision tree classifier is used as an inference engine and gives a high detection rate of 99.93%.
{"title":"A Real-Time Hardware Intrusion Detection System and a Classifying Features Algorithm","authors":"T. Sobh","doi":"10.1080/19361610.2022.2103363","DOIUrl":"https://doi.org/10.1080/19361610.2022.2103363","url":null,"abstract":"Abstract Nowadays, everybody needs to secure his/her activities. Existing levels of cyber-criminals need technology for detecting malicious activity. This work proposes a real-time Hardware IDS implemented on FPGA and an algorithm for classifying features from network traffic through the network interface card (NIC). It minimizes search time for extracting statistical features from connection records stored in connection queues to memory references. Therefore, it can detect most internal and external network attacks. A decision tree classifier is used as an inference engine and gives a high detection rate of 99.93%.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2022-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47512014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}