首页 > 最新文献

International Journal of Digital Crime and Forensics最新文献

英文 中文
Semisupervised Surveillance Video Character Extraction and Recognition With Attentional Learning Multiframe Fusion 基于注意学习多帧融合的半监督监控视频字符提取与识别
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2022-11-30 DOI: 10.4018/ijdcf.315745
Guiyan Cai, Liang Qu, Yongdong Li, Guoan Cheng, Xin Lu, Yiqi Wang, Fengqin Yao, Shengke Wang
Character extraction in the video is very helpful to the understanding of the video content, especially the artificially superimposed characters such as time and place in the surveillance video. However, the performance of the existing algorithms does not meet the needs of application. Therefore, the authors improve semisupervised surveillance video character extraction and recognition with attentional learning multiframe feature fusion. First, the multiframe fusion strategy based on an attention mechanism is adopted to solve the target missing problem, and the Dense ASPP network is introduced to solve the character multiscale problem. Second, a character image denoising algorithm based on semisupervised fuzzy C-means clustering is proposed to isolate and extract clean binary character images. Finally, for some video characters that may involve privacy, traditional and deep learning-based video restoration algorithms are used for characteristic elimination.
视频中的字符提取对于理解视频内容非常有帮助,尤其是监控视频中人为叠加的时间、地点等字符。但是,现有算法的性能不能满足实际应用的需要。因此,作者采用注意学习多帧特征融合的方法改进了半监督监控视频的特征提取和识别。首先,采用基于注意机制的多帧融合策略解决目标缺失问题,并引入密集ASPP网络解决特征多尺度问题。其次,提出了一种基于半监督模糊c均值聚类的字符图像去噪算法,分离并提取干净的二值字符图像。最后,对于一些可能涉及隐私的视频字符,分别使用传统和基于深度学习的视频恢复算法进行特征消除。
{"title":"Semisupervised Surveillance Video Character Extraction and Recognition With Attentional Learning Multiframe Fusion","authors":"Guiyan Cai, Liang Qu, Yongdong Li, Guoan Cheng, Xin Lu, Yiqi Wang, Fengqin Yao, Shengke Wang","doi":"10.4018/ijdcf.315745","DOIUrl":"https://doi.org/10.4018/ijdcf.315745","url":null,"abstract":"Character extraction in the video is very helpful to the understanding of the video content, especially the artificially superimposed characters such as time and place in the surveillance video. However, the performance of the existing algorithms does not meet the needs of application. Therefore, the authors improve semisupervised surveillance video character extraction and recognition with attentional learning multiframe feature fusion. First, the multiframe fusion strategy based on an attention mechanism is adopted to solve the target missing problem, and the Dense ASPP network is introduced to solve the character multiscale problem. Second, a character image denoising algorithm based on semisupervised fuzzy C-means clustering is proposed to isolate and extract clean binary character images. Finally, for some video characters that may involve privacy, traditional and deep learning-based video restoration algorithms are used for characteristic elimination.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"10 1","pages":"1-15"},"PeriodicalIF":0.7,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74265008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Golden Eye: An OS-Independent Algorithm for Recovering Files From Hard-Disk Raw Images 黄金眼:从硬盘原始图像中恢复文件的操作系统独立算法
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2022-11-30 DOI: 10.4018/ijdcf.315793
Fan Zhang, Wei Chen, Yongqiong Zhu
File systems are important sources of intelligence information and digital evidence. They have long attracted the interest of researchers in recovering files that are deleted from a hard disk. Existing file recovery studies rely heavily on an operating system (OS). However, it is often encountered that OS services are not available, making existing file recovery approaches unusable. To address this issue, the authors design and implement an OS-independent file recovery algorithm named Golden Eye (GE) by targeting the EXT4 file system. Fed the raw image obtained from a (sanitized) hard disk, GE can automatically recover any designated file or even the whole EXT4 file system. GE is based on the understanding of the file disk layout of EXT4 and does not need any support from additional hardware or software. Experimental results prove the feasibility and correctness of GE. This work not only solves the OS dependency problem that most existing file recovery work suffers from but also reveals the fact that even sanitized hard disks are still at risk of leaking sensitive data.
文件系统是情报信息和数字证据的重要来源。长期以来,它们一直吸引着研究人员对恢复从硬盘上删除的文件的兴趣。现有的文件恢复研究严重依赖于操作系统(OS)。但是,经常会遇到OS服务不可用的情况,这使得现有的文件恢复方法无法使用。为了解决这个问题,作者针对EXT4文件系统设计并实现了一个名为Golden Eye (GE)的独立于操作系统的文件恢复算法。使用从(经过消毒的)硬盘获得的原始映像,GE可以自动恢复任何指定的文件甚至整个EXT4文件系统。GE基于对EXT4文件磁盘布局的理解,不需要任何额外的硬件或软件的支持。实验结果证明了该方法的可行性和正确性。这项工作不仅解决了大多数现有文件恢复工作所面临的操作系统依赖问题,而且还揭示了一个事实,即即使经过消毒的硬盘仍然有泄露敏感数据的风险。
{"title":"Golden Eye: An OS-Independent Algorithm for Recovering Files From Hard-Disk Raw Images","authors":"Fan Zhang, Wei Chen, Yongqiong Zhu","doi":"10.4018/ijdcf.315793","DOIUrl":"https://doi.org/10.4018/ijdcf.315793","url":null,"abstract":"File systems are important sources of intelligence information and digital evidence. They have long attracted the interest of researchers in recovering files that are deleted from a hard disk. Existing file recovery studies rely heavily on an operating system (OS). However, it is often encountered that OS services are not available, making existing file recovery approaches unusable. To address this issue, the authors design and implement an OS-independent file recovery algorithm named Golden Eye (GE) by targeting the EXT4 file system. Fed the raw image obtained from a (sanitized) hard disk, GE can automatically recover any designated file or even the whole EXT4 file system. GE is based on the understanding of the file disk layout of EXT4 and does not need any support from additional hardware or software. Experimental results prove the feasibility and correctness of GE. This work not only solves the OS dependency problem that most existing file recovery work suffers from but also reveals the fact that even sanitized hard disks are still at risk of leaking sensitive data.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"40 1","pages":"1-23"},"PeriodicalIF":0.7,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86325408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improvement of the PBFT Algorithm Based on Grouping and Reputation Value Voting 基于分组和声誉值投票的PBFT算法改进
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2022-11-30 DOI: 10.4018/ijdcf.315615
Shannan Liu, Ronghua Zhang, Changzheng Liu, Chenxi Xu, Jie Zhou, Jiaojiao Wang
An improved practical Byzantine fault tolerance (Practical Byzantine Fault Tolerant consensus algorithm based on reputation, RPBFT) algorithm based on grouping and reputation value voting is proposed for the problems of high communication complexity, poor scalability, and random selection of master nodes of the practical Byzantine fault tolerance (PBFT) consensus algorithm of the consortium chain. First, the consistency process is optimized to take the response speed of nodes to each group leader as the basis of grouping, and the intragroup consensus is performed. The group leader then takes the result of intragroup consensus and participates in extra-group consensus to reduce the frequency and time of internode communication. Second, the reputation model and voting mechanism are proposed, and the group leader is generated by node reputation value voting, which enhances the initiative and reliability of trusted nodes and reduces the abnormal nodes as group leader. Finally, a simulation and performance testing system based on this improved scheme is built to prove the effectiveness as well as the usability of the scheme through simulation experiments. The experimental results show that when the number of network nodes is 36, the throughput of the RPBFT algorithm is six times that of PBFT. Therefore, the consensus delay is reduced by 91.7%, and the communication overhead is reduced by 37.8%.
针对联盟链实用拜占庭容错(practical Byzantine fault tolerance, PBFT)共识算法通信复杂度高、可扩展性差、主节点选择随机等问题,提出了一种基于分组和声誉值投票的改进实用拜占庭容错(practical Byzantine fault tolerance consensus algorithm based on reputation, RPBFT)算法。首先,对一致性过程进行优化,以节点对各组长的响应速度作为分组的依据,并进行组内共识。然后,组长接受组内共识的结果,参与组外共识,以减少节点间沟通的频率和时间。其次,提出了信誉模型和投票机制,通过节点信誉值投票产生组长,增强了可信节点的主动性和可靠性,减少了作为组长的异常节点;最后,基于该改进方案搭建了仿真与性能测试系统,通过仿真实验验证了该方案的有效性和可用性。实验结果表明,当网络节点数为36时,RPBFT算法的吞吐量是PBFT算法的6倍。因此,共识延迟减少了91.7%,通信开销减少了37.8%。
{"title":"Improvement of the PBFT Algorithm Based on Grouping and Reputation Value Voting","authors":"Shannan Liu, Ronghua Zhang, Changzheng Liu, Chenxi Xu, Jie Zhou, Jiaojiao Wang","doi":"10.4018/ijdcf.315615","DOIUrl":"https://doi.org/10.4018/ijdcf.315615","url":null,"abstract":"An improved practical Byzantine fault tolerance (Practical Byzantine Fault Tolerant consensus algorithm based on reputation, RPBFT) algorithm based on grouping and reputation value voting is proposed for the problems of high communication complexity, poor scalability, and random selection of master nodes of the practical Byzantine fault tolerance (PBFT) consensus algorithm of the consortium chain. First, the consistency process is optimized to take the response speed of nodes to each group leader as the basis of grouping, and the intragroup consensus is performed. The group leader then takes the result of intragroup consensus and participates in extra-group consensus to reduce the frequency and time of internode communication. Second, the reputation model and voting mechanism are proposed, and the group leader is generated by node reputation value voting, which enhances the initiative and reliability of trusted nodes and reduces the abnormal nodes as group leader. Finally, a simulation and performance testing system based on this improved scheme is built to prove the effectiveness as well as the usability of the scheme through simulation experiments. The experimental results show that when the number of network nodes is 36, the throughput of the RPBFT algorithm is six times that of PBFT. Therefore, the consensus delay is reduced by 91.7%, and the communication overhead is reduced by 37.8%.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"17 1","pages":"1-15"},"PeriodicalIF":0.7,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79645674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Unhealthy Webpage Discovery System Based on Convolutional Neural Network 基于卷积神经网络的不良网页发现系统
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2022-11-30 DOI: 10.4018/ijdcf.315614
Zengyu Cai, Chunchen Tan, Jianwei Zhang, Tengteng Xiao, Yuan Feng
Currently, with the popularity of the internet, people are surrounded by a large number of unhealthy pages which have a serious impact on the physical and mental health of visitors. To protect the legitimate rights and interests of internet users from infringement and maintain the harmonious and stable development of society, a new unhealthy webpage discovery system is needed. First, this paper proposed the knowledge of unhealthy webpages and web crawlers, and then the whole system's plan and design were introduced. The test results show that the unhealthy webpage discovery system can meet the needs of users. This experiment uses a CNN algorithm to classify the text and completes the collection and classification of unhealthy information through URL acquisition and URL filtering. The experimental results show that the unhealthy webpage discovery system based on a convolutional neural network can greatly improve the accuracy of unhealthy webpage discovery and reduce the omission rate, which can meet the needs of users for unhealthy webpage discovery.
目前,随着互联网的普及,人们被大量不健康的网页所包围,这些网页严重影响了访问者的身心健康。为了保护网民的合法权益不受侵害,维护社会的和谐稳定发展,需要一种新的不健康网页发现系统。本文首先介绍了不良网页和网络爬虫的相关知识,然后介绍了整个系统的方案和设计。测试结果表明,该不健康网页发现系统能够满足用户的需求。本实验采用CNN算法对文本进行分类,通过URL获取和URL过滤完成对不健康信息的收集和分类。实验结果表明,基于卷积神经网络的不健康网页发现系统可以大大提高不健康网页发现的准确率,降低不健康网页发现的遗漏率,能够满足用户对不健康网页发现的需求。
{"title":"An Unhealthy Webpage Discovery System Based on Convolutional Neural Network","authors":"Zengyu Cai, Chunchen Tan, Jianwei Zhang, Tengteng Xiao, Yuan Feng","doi":"10.4018/ijdcf.315614","DOIUrl":"https://doi.org/10.4018/ijdcf.315614","url":null,"abstract":"Currently, with the popularity of the internet, people are surrounded by a large number of unhealthy pages which have a serious impact on the physical and mental health of visitors. To protect the legitimate rights and interests of internet users from infringement and maintain the harmonious and stable development of society, a new unhealthy webpage discovery system is needed. First, this paper proposed the knowledge of unhealthy webpages and web crawlers, and then the whole system's plan and design were introduced. The test results show that the unhealthy webpage discovery system can meet the needs of users. This experiment uses a CNN algorithm to classify the text and completes the collection and classification of unhealthy information through URL acquisition and URL filtering. The experimental results show that the unhealthy webpage discovery system based on a convolutional neural network can greatly improve the accuracy of unhealthy webpage discovery and reduce the omission rate, which can meet the needs of users for unhealthy webpage discovery.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"107 1","pages":"1-15"},"PeriodicalIF":0.7,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75773379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research and Application of Warship Multiattribute Threat Assessment Based on Improved TOPSIS Gray Association Analysis 基于改进TOPSIS灰色关联分析的舰船多属性威胁评估研究与应用
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2022-11-30 DOI: 10.4018/ijdcf.315288
D. Zang, Xinlei Sheng, Liya Wang, Aimin Yang, Tao Xue, Jie Li
Multitarget threat evaluation of warship air attacks is one of the most urgent problems in warship defense operations. To evaluate the target threat quickly and accurately, an air attack multitarget threat evaluation method based on improved TOPSIS gray relational analysis is proposed. This method establishes threat assessment system of five attributes of target type, anti-jamming ability, heading angle, altitude, and speed. The weight coefficient of each index of the warship is obtained by combining the entropy weight method with the analytic hierarchy process. Topsis can make full use of the information of the original data, and its results can accurately reflect the gap between various evaluation schemes. The weighted Mahalanobis distance and comprehensive gray correlation between the attribute to be evaluated and the positive and negative ideal states are calculated by the improved TOPSIS gray correlation method. The target threat degree to be evaluated is obtained by combining the two methods. Finally, an example is given to prove the effectiveness of the evaluation model.
舰船空袭的多目标威胁评估是舰船防御作战中最迫切需要解决的问题之一。为了快速准确地评估目标威胁,提出了一种基于改进TOPSIS灰色关联分析的空袭多目标威胁评估方法。该方法建立了目标类型、抗干扰能力、航向角、高度、速度五种属性的威胁评估体系。将熵权法与层次分析法相结合,得到舰船各指标的权重系数。Topsis可以充分利用原始数据的信息,其结果可以准确反映各种评价方案之间的差距。采用改进的TOPSIS灰色关联度法计算待评价属性与正、负理想状态的加权马氏距离和综合灰色关联度。将两种方法结合得到待评估目标的威胁程度。最后通过实例验证了该评价模型的有效性。
{"title":"Research and Application of Warship Multiattribute Threat Assessment Based on Improved TOPSIS Gray Association Analysis","authors":"D. Zang, Xinlei Sheng, Liya Wang, Aimin Yang, Tao Xue, Jie Li","doi":"10.4018/ijdcf.315288","DOIUrl":"https://doi.org/10.4018/ijdcf.315288","url":null,"abstract":"Multitarget threat evaluation of warship air attacks is one of the most urgent problems in warship defense operations. To evaluate the target threat quickly and accurately, an air attack multitarget threat evaluation method based on improved TOPSIS gray relational analysis is proposed. This method establishes threat assessment system of five attributes of target type, anti-jamming ability, heading angle, altitude, and speed. The weight coefficient of each index of the warship is obtained by combining the entropy weight method with the analytic hierarchy process. Topsis can make full use of the information of the original data, and its results can accurately reflect the gap between various evaluation schemes. The weighted Mahalanobis distance and comprehensive gray correlation between the attribute to be evaluated and the positive and negative ideal states are calculated by the improved TOPSIS gray correlation method. The target threat degree to be evaluated is obtained by combining the two methods. Finally, an example is given to prove the effectiveness of the evaluation model.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"1 1","pages":"1-14"},"PeriodicalIF":0.7,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90196825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SRGM Decision Model Considering Cost-Reliability 考虑成本-可靠性的SRGM决策模型
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2022-07-01 DOI: 10.4018/ijdcf.302873
W. Jiang, Ce Zhang, Di Liu, Kaiwei Liu, Zhichao Sun, Jianyuan Wang, Zhongyin Qiu, W. Lv
Aiming at the current software cost model and optimal release research, which does not fully consider the actual faults in the testing phase, a cost-reliability SRGM evaluation and selection algorithm SESABCRC is proposed. From the perspective of incomplete debugging, introducing new faults, and considering testing effort, the imperfect debugging SRGM is established. The proposed SRGM can be used to describe the testing process of the software through the actual failure data set verification, and is superior to other models. Based on the proposed SRGM, the corresponding cost function is given, which explicitly considers the impact of imperfect debugging on the cost. Furthermore, an optimal release strategy is proposed when given restricted reliability target requirements and when considering the uncertainty that the actual cost may exceed the expected cost. Finally, an experimental example is given to illustrate and verify the optimal publishing problem, and parameter sensitivity analysis is carried out.
针对当前软件成本模型和最优发布研究未充分考虑测试阶段实际故障的问题,提出了一种成本可靠性SRGM评估与选择算法SESABCRC。从不完全调试、引入新故障和考虑测试工作量的角度,建立了不完全调试SRGM。通过实际故障数据集验证,所提出的SRGM模型可以用来描述软件的测试过程,优于其他模型。在此基础上,给出了相应的代价函数,明确考虑了不完全调试对代价的影响。在给定有限的可靠性目标要求和考虑实际成本可能超过预期成本的不确定性时,提出了一种最优的放行策略。最后,给出了一个实验实例来说明和验证最优发布问题,并进行了参数灵敏度分析。
{"title":"SRGM Decision Model Considering Cost-Reliability","authors":"W. Jiang, Ce Zhang, Di Liu, Kaiwei Liu, Zhichao Sun, Jianyuan Wang, Zhongyin Qiu, W. Lv","doi":"10.4018/ijdcf.302873","DOIUrl":"https://doi.org/10.4018/ijdcf.302873","url":null,"abstract":"Aiming at the current software cost model and optimal release research, which does not fully consider the actual faults in the testing phase, a cost-reliability SRGM evaluation and selection algorithm SESABCRC is proposed. From the perspective of incomplete debugging, introducing new faults, and considering testing effort, the imperfect debugging SRGM is established. The proposed SRGM can be used to describe the testing process of the software through the actual failure data set verification, and is superior to other models. Based on the proposed SRGM, the corresponding cost function is given, which explicitly considers the impact of imperfect debugging on the cost. Furthermore, an optimal release strategy is proposed when given restricted reliability target requirements and when considering the uncertainty that the actual cost may exceed the expected cost. Finally, an experimental example is given to illustrate and verify the optimal publishing problem, and parameter sensitivity analysis is carried out.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"34 1","pages":"1-19"},"PeriodicalIF":0.7,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85817015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel IDS Securing Industrial Control System of Critical Infrastructure Using Deception Technology 一种利用欺骗技术保护关键基础设施工业控制系统的IDS
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2022-07-01 DOI: 10.4018/ijdcf.302874
Shaobo Zhang, Yuhang Liu, Dequan Yang
The Industrial Control System (ICS) has become the key concept in the modern industrial world, enabling process monitoring and system control for general industrial systems and critical infrastructures. High-skilled hackers can invade an imperfect ICS by existing vulnerabilities without much effort. Conventional defenses (such as encryption and firewall) to keep invaders away are getting less and less effective when an attack is carried out by exploiting an array of particular vulnerabilities. Under this circumstance, a new-type intrusion detection system (IDS) based on deception strategy using honeypot technique is proposed, which is of dramatic effectiveness in protecting ICSs of critical infrastructures. In this honeypot-based model, we capture malicious Internet flows and system operations. We analyze the collected data before alerting and preventing the intrusion alike when it affects the system in the future. This paper deals with the model's concept, architecture, deployment, and what else can be achieved in the field of Critical Infrastructure Cybersecurity (CIC).
工业控制系统(ICS)已成为现代工业世界的关键概念,可以对一般工业系统和关键基础设施进行过程监控和系统控制。高技能的黑客可以毫不费力地利用现有的漏洞入侵不完美的ICS。当利用一系列特殊漏洞进行攻击时,阻止入侵者的传统防御(如加密和防火墙)变得越来越无效。在这种情况下,提出了一种基于蜜罐欺骗策略的新型入侵检测系统,该系统在保护关键基础设施的入侵控制系统方面具有显著的效果。在这个基于蜜罐的模型中,我们捕获了恶意的互联网流和系统操作。我们对收集到的数据进行分析,然后在将来入侵影响系统时发出警报,防止入侵。本文讨论了该模型的概念、体系结构、部署以及在关键基础设施网络安全(CIC)领域可以实现的其他目标。
{"title":"A Novel IDS Securing Industrial Control System of Critical Infrastructure Using Deception Technology","authors":"Shaobo Zhang, Yuhang Liu, Dequan Yang","doi":"10.4018/ijdcf.302874","DOIUrl":"https://doi.org/10.4018/ijdcf.302874","url":null,"abstract":"The Industrial Control System (ICS) has become the key concept in the modern industrial world, enabling process monitoring and system control for general industrial systems and critical infrastructures. High-skilled hackers can invade an imperfect ICS by existing vulnerabilities without much effort. Conventional defenses (such as encryption and firewall) to keep invaders away are getting less and less effective when an attack is carried out by exploiting an array of particular vulnerabilities. Under this circumstance, a new-type intrusion detection system (IDS) based on deception strategy using honeypot technique is proposed, which is of dramatic effectiveness in protecting ICSs of critical infrastructures. In this honeypot-based model, we capture malicious Internet flows and system operations. We analyze the collected data before alerting and preventing the intrusion alike when it affects the system in the future. This paper deals with the model's concept, architecture, deployment, and what else can be achieved in the field of Critical Infrastructure Cybersecurity (CIC).","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"1 1","pages":"1-20"},"PeriodicalIF":0.7,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83863129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Web Vulnerability Detection Analyzer Based on Python 基于Python的Web漏洞检测分析器
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2022-07-01 DOI: 10.4018/ijdcf.302875
Dawei Xu, Tianxin Chen, Zhonghua Tan, Fudong Wu, Jiaqi Gao, Yunfan Yang
In the information age, hackers will use Web vulnerabilities to infiltrate websites, resulting in many security incidents. To solve this problem, security-conscious enterprises or individuals will conduct penetration tests on websites to test and analyze the security of websites, but penetration tests often take a lot of time. Therefore, based on the traditional Web vulnerability scanner, the Web vulnerability detection analyzer designed in this article uses vulnerability detection technologies such as sub-domain scanning, application fingerprint recognition, and web crawling to penetrate the website. The vulnerability scanning process of the website using log records and HTML output helps users discover the vulnerability information of the website in a short time, patch the website in time. It can reduce the security risks caused by website vulnerabilities.
在信息时代,黑客会利用Web漏洞渗透网站,造成许多安全事件。为了解决这个问题,有安全意识的企业或个人会对网站进行渗透测试,以测试和分析网站的安全性,但渗透测试通常需要花费大量的时间。因此,本文设计的Web漏洞检测分析器在传统Web漏洞扫描器的基础上,采用子域扫描、应用指纹识别、网页爬行等漏洞检测技术对网站进行渗透。通过日志记录和HTML输出对网站进行漏洞扫描,可以帮助用户在短时间内发现网站的漏洞信息,及时对网站进行修补。它可以降低网站漏洞带来的安全风险。
{"title":"Web Vulnerability Detection Analyzer Based on Python","authors":"Dawei Xu, Tianxin Chen, Zhonghua Tan, Fudong Wu, Jiaqi Gao, Yunfan Yang","doi":"10.4018/ijdcf.302875","DOIUrl":"https://doi.org/10.4018/ijdcf.302875","url":null,"abstract":"In the information age, hackers will use Web vulnerabilities to infiltrate websites, resulting in many security incidents. To solve this problem, security-conscious enterprises or individuals will conduct penetration tests on websites to test and analyze the security of websites, but penetration tests often take a lot of time. Therefore, based on the traditional Web vulnerability scanner, the Web vulnerability detection analyzer designed in this article uses vulnerability detection technologies such as sub-domain scanning, application fingerprint recognition, and web crawling to penetrate the website. The vulnerability scanning process of the website using log records and HTML output helps users discover the vulnerability information of the website in a short time, patch the website in time. It can reduce the security risks caused by website vulnerabilities.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"38 1","pages":"1-17"},"PeriodicalIF":0.7,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88889838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Monocular Depth Matching With Hybrid Sampling and Depth Label Propagation 基于混合采样和深度标签传播的单目深度匹配
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2022-07-01 DOI: 10.4018/ijdcf.302879
Ye Hua, Qu Xi Long, Lihua Jin
This paper proposes a monocular depth label propagation model, which describes monocular images into depth label distribution for the target classification matching. 1) Depth label propagation by hybrid sampling and salient region sifting, improve the discrimination of detection feature categories. 2) Depth label mapping and spectrum clustering to classify target, define the depth of the sorting rules. The experimental results of motion recognition and 3D point cloud processing, show that this method can approximately reach the performance of all previous monocular depth estimation methods. The neural network model black box training learning module is not used, which improves the interpretability of the proposed model.
本文提出了一种单眼深度标签传播模型,该模型将单眼图像描述为深度标签分布,用于目标分类匹配。1)采用混合采样和显著区筛选的深度标签传播方法,提高检测特征类别的判别能力。2)深度标签映射和谱聚类对目标进行分类,定义深度排序规则。运动识别和三维点云处理的实验结果表明,该方法可以近似达到以往所有单目深度估计方法的性能。不使用神经网络模型黑匣子训练学习模块,提高了模型的可解释性。
{"title":"Monocular Depth Matching With Hybrid Sampling and Depth Label Propagation","authors":"Ye Hua, Qu Xi Long, Lihua Jin","doi":"10.4018/ijdcf.302879","DOIUrl":"https://doi.org/10.4018/ijdcf.302879","url":null,"abstract":"This paper proposes a monocular depth label propagation model, which describes monocular images into depth label distribution for the target classification matching. 1) Depth label propagation by hybrid sampling and salient region sifting, improve the discrimination of detection feature categories. 2) Depth label mapping and spectrum clustering to classify target, define the depth of the sorting rules. The experimental results of motion recognition and 3D point cloud processing, show that this method can approximately reach the performance of all previous monocular depth estimation methods. The neural network model black box training learning module is not used, which improves the interpretability of the proposed model.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"371 1","pages":"1-14"},"PeriodicalIF":0.7,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76316161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Face Anonymity Based on Facial Pose Consistency 基于面部姿势一致性的面部匿名
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2022-07-01 DOI: 10.4018/ijdcf.302872
Junchang Wang
With the development of artificial intelligence, there are more and more applications related to face images. The recording of face information causes potential cyber security risks and personal privacy disclosure risks to the public. To solve this problem, we hope to protect face privacy through face anonymity. This paper designs a conditional autoencoder that uses the data preprocessing method of image inpainting. Based on the realistic generation ability of StyleGAN, our autoencoder model introduces facial pose information as conditional information. The input image only contains pre-processed face-removed images. Our method can generate high-resolution images and maintain the posture of the original face. It can be used for identity-independent computer vision tasks. Experiments further proves the effectiveness of our anonymization framework.
随着人工智能的发展,与人脸图像相关的应用越来越多。人脸信息的记录会给公众带来潜在的网络安全风险和个人隐私泄露风险。为了解决这个问题,我们希望通过人脸匿名来保护人脸隐私。本文设计了一种采用图像绘制数据预处理方法的条件自编码器。基于StyleGAN的逼真生成能力,我们的自编码器模型将面部姿态信息作为条件信息引入。输入图像只包含经过预处理的去脸图像。我们的方法可以生成高分辨率的图像,并保持原始人脸的姿态。它可以用于独立于身份的计算机视觉任务。实验进一步证明了匿名化框架的有效性。
{"title":"Face Anonymity Based on Facial Pose Consistency","authors":"Junchang Wang","doi":"10.4018/ijdcf.302872","DOIUrl":"https://doi.org/10.4018/ijdcf.302872","url":null,"abstract":"With the development of artificial intelligence, there are more and more applications related to face images. The recording of face information causes potential cyber security risks and personal privacy disclosure risks to the public. To solve this problem, we hope to protect face privacy through face anonymity. This paper designs a conditional autoencoder that uses the data preprocessing method of image inpainting. Based on the realistic generation ability of StyleGAN, our autoencoder model introduces facial pose information as conditional information. The input image only contains pre-processed face-removed images. Our method can generate high-resolution images and maintain the posture of the original face. It can be used for identity-independent computer vision tasks. Experiments further proves the effectiveness of our anonymization framework.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"45 1","pages":"1-12"},"PeriodicalIF":0.7,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82573149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Digital Crime and Forensics
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1