首页 > 最新文献

International Journal of Digital Crime and Forensics最新文献

英文 中文
A Privacy Protection Scheme for Cross-Chain Transactions Based on Group Signature and Relay Chain 基于群签名和中继链的跨链交易隐私保护方案
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2022-07-01 DOI: 10.4018/ijdcf.302876
Xiubo Liang, Yu Zhao, Jun-Fen Wu, Keting Yin
Recently, with the rapid development of blockchain technology, the information interaction and value transfer problems between different blockchains have become the focus of research. The cross-chain technology is to solve the cross-chain operation problems of assets and data between different chains. However, the existing cross-chain technology has the problem of identity privacy leakage. Therefore, this article proposes a cross-chain privacy protection scheme for consortium blockchains based on group signature, certificate authority and relay chain. The scheme is divided into three cross-chain service layers, called the management layer, the transaction layer, and the group layer. The management layer is responsible for the forwarding of cross-chain transactions, the transaction layer includes the blockchains that actually participate in cross-chain transactions, and the group layer is responsible for group signature related work. Through this scheme, the identity privacy of both parties to the transaction can be protected during the cross-chain transaction process.
近年来,随着区块链技术的快速发展,不同区块链之间的信息交互和价值传递问题成为研究的热点。跨链技术是解决不同链之间资产和数据的跨链操作问题。然而,现有的跨链技术存在身份隐私泄露的问题。因此,本文提出了一种基于组签名、证书颁发和中继链的联盟区块链跨链隐私保护方案。该方案分为三个跨链服务层,称为管理层、事务层和组层。管理层负责转发跨链交易,交易层包括实际参与跨链交易的区块链,组层负责组签名相关工作。通过该方案,可以在跨链交易过程中保护交易双方的身份隐私。
{"title":"A Privacy Protection Scheme for Cross-Chain Transactions Based on Group Signature and Relay Chain","authors":"Xiubo Liang, Yu Zhao, Jun-Fen Wu, Keting Yin","doi":"10.4018/ijdcf.302876","DOIUrl":"https://doi.org/10.4018/ijdcf.302876","url":null,"abstract":"Recently, with the rapid development of blockchain technology, the information interaction and value transfer problems between different blockchains have become the focus of research. The cross-chain technology is to solve the cross-chain operation problems of assets and data between different chains. However, the existing cross-chain technology has the problem of identity privacy leakage. Therefore, this article proposes a cross-chain privacy protection scheme for consortium blockchains based on group signature, certificate authority and relay chain. The scheme is divided into three cross-chain service layers, called the management layer, the transaction layer, and the group layer. The management layer is responsible for the forwarding of cross-chain transactions, the transaction layer includes the blockchains that actually participate in cross-chain transactions, and the group layer is responsible for group signature related work. Through this scheme, the identity privacy of both parties to the transaction can be protected during the cross-chain transaction process.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"232 1","pages":"1-20"},"PeriodicalIF":0.7,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73627274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Security Enhancement Through Compiler-Assisted Software Diversity With Deep Reinforcement Learning 通过深度强化学习的编译器辅助软件多样性来增强安全性
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2022-07-01 DOI: 10.4018/ijdcf.302878
Junchao Wang, Jin Wei, J. Pang, Fan Zhang, Shunbin Li
Traditional software defenses take corresponding actions after the attacks are discovered. The defenders in this situation are comparatively passive because the attackers may try many different ways to find vulnerability and bugs but the software remains static. This leads to the imbalance between offense and defense. Software diversity alleviates the current threats by implementing a heterogeneous software system. The N-Variant eXecution (NVX) systems, effective and applicable runtime diversifying methods, apply multiple variants to imporove software security. Higher diversity can lead to less vulnerabilities that attacks can exploit. However, runtime diversifying methods such as address randomization and reverse stack can only provide limited diversity to the system. Thus, we enhance the diversity of variants with a compiler-assisted approach. We use a Deep Reinforcement Learning-based algorithm to generate variants, ensuring the high diversity of the system. For different numbers of variants, we show the results of the Deep Q Network algorithm under different parameter settings.
传统的软件防御是在发现攻击后才采取相应的防御措施。在这种情况下,防御者相对被动,因为攻击者可能尝试许多不同的方法来寻找漏洞和错误,但软件保持静态。这导致了进攻和防守的不平衡。软件多样性通过实现异构软件系统减轻了当前的威胁。NVX (N-Variant eXecution)系统是一种有效且适用的运行时多样化方法,可以应用多种变体来提高软件的安全性。更高的多样性可以减少攻击可利用的漏洞。然而,运行时多样化的方法,如地址随机化和反向堆栈只能为系统提供有限的多样性。因此,我们用编译器辅助的方法增强了变体的多样性。我们使用基于深度强化学习的算法来生成变量,确保系统的高度多样性。对于不同数量的变量,我们展示了Deep Q Network算法在不同参数设置下的结果。
{"title":"Security Enhancement Through Compiler-Assisted Software Diversity With Deep Reinforcement Learning","authors":"Junchao Wang, Jin Wei, J. Pang, Fan Zhang, Shunbin Li","doi":"10.4018/ijdcf.302878","DOIUrl":"https://doi.org/10.4018/ijdcf.302878","url":null,"abstract":"Traditional software defenses take corresponding actions after the attacks are discovered. The defenders in this situation are comparatively passive because the attackers may try many different ways to find vulnerability and bugs but the software remains static. This leads to the imbalance between offense and defense. Software diversity alleviates the current threats by implementing a heterogeneous software system. The N-Variant eXecution (NVX) systems, effective and applicable runtime diversifying methods, apply multiple variants to imporove software security. Higher diversity can lead to less vulnerabilities that attacks can exploit. However, runtime diversifying methods such as address randomization and reverse stack can only provide limited diversity to the system. Thus, we enhance the diversity of variants with a compiler-assisted approach. We use a Deep Reinforcement Learning-based algorithm to generate variants, ensuring the high diversity of the system. For different numbers of variants, we show the results of the Deep Q Network algorithm under different parameter settings.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"67 1","pages":"1-18"},"PeriodicalIF":0.7,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77161344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Model of Network Security Situation Assessment Based on BPNN Optimized by SAA-SSA 基于SAA-SSA优化的BPNN网络安全态势评估模型
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2022-07-01 DOI: 10.4018/ijdcf.302877
Ran Zhang, Zhi-Peng Pan, Yifeng Yin, Zengyu Cai
In order to address the problems that the accuracy and convergence of current network security situation assessment models need to be improved, a model of network security situation assessment based on SAA-SSA-BPNN is proposed. Using the characteristics of sparrow search algorithm (SSA) optimized by simulated annealing algorithm (SAA) with good stability, fast convergence speed and is not easy to fall into local optimum to improve the BP neural network (BPNN), so as to find the best fitness individual, and obtain the optimal weight and threshold, then assign them to the BP neural network as the initial values. The preprocessed index data is input into the improved BP neural network model for training, and finally the threat degree of the network system is assessed based on the trained model. Comparative experimental results show that this assessment model has higher accuracy and faster convergence than other situation assessment models based on improved BP neural network.
针对当前网络安全态势评估模型精度和收敛性有待提高的问题,提出了一种基于SAA-SSA-BPNN的网络安全态势评估模型。利用模拟退火算法(SAA)优化后的麻雀搜索算法(SSA)稳定性好、收敛速度快、不易陷入局部最优的特点,对BP神经网络(BPNN)进行改进,从而找到最优适应度个体,并获得最优权值和阈值,将其赋值给BP神经网络作为初始值。将预处理后的指标数据输入到改进的BP神经网络模型中进行训练,最后根据训练后的模型对网络系统的威胁程度进行评估。对比实验结果表明,该评估模型比其他基于改进BP神经网络的态势评估模型具有更高的准确性和更快的收敛速度。
{"title":"A Model of Network Security Situation Assessment Based on BPNN Optimized by SAA-SSA","authors":"Ran Zhang, Zhi-Peng Pan, Yifeng Yin, Zengyu Cai","doi":"10.4018/ijdcf.302877","DOIUrl":"https://doi.org/10.4018/ijdcf.302877","url":null,"abstract":"In order to address the problems that the accuracy and convergence of current network security situation assessment models need to be improved, a model of network security situation assessment based on SAA-SSA-BPNN is proposed. Using the characteristics of sparrow search algorithm (SSA) optimized by simulated annealing algorithm (SAA) with good stability, fast convergence speed and is not easy to fall into local optimum to improve the BP neural network (BPNN), so as to find the best fitness individual, and obtain the optimal weight and threshold, then assign them to the BP neural network as the initial values. The preprocessed index data is input into the improved BP neural network model for training, and finally the threat degree of the network system is assessed based on the trained model. Comparative experimental results show that this assessment model has higher accuracy and faster convergence than other situation assessment models based on improved BP neural network.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"30 1","pages":"1-18"},"PeriodicalIF":0.7,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85172116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Model Study on Hierarchical Assisted Exploration of RBAC RBAC的分层辅助探索模型研究
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2022-07-01 DOI: 10.4018/ijdcf.302871
Wan Chen, Daojun Han, Lei Zhang, Qi Xiao, Qiuyue Li, Hongzhen Xiang
Role-based access control(RBAC) system has been widely used in data security because of its good flexibility and security, wherein RBAC dominates the field of access control. However, the process of establishing RBAC roles is complex and time-consuming, which hinders the development and application of this field. Recently, the introduction of expert interactive q&a algorithm based on attribute exploration has greatly reduced the complexity and time-consuming of RBAC role building process. However, when attributes increases, algorithm will face challenges that the time complexity will explode exponentially with the increase of attributes. To cope with above problems, this paper proposes a hierarchical assisted exploration model of RBAC under attribute-based exploration expert interactive q&a algorithm framework from the view of reducing time-consuming of overall and single role engineering. This model not only avoids time-consuming process of single role requirements, but also reduces time-consuming process of whole role establishment from the overall architecture perspective.
基于角色的访问控制(Role-based access control, RBAC)系统以其良好的灵活性和安全性在数据安全领域得到了广泛的应用,在访问控制领域占据主导地位。然而,RBAC角色的建立过程复杂且耗时,阻碍了该领域的发展和应用。近年来,基于属性探索的专家交互式问答算法的引入,大大降低了RBAC角色构建过程的复杂性和耗时。然而,当属性增加时,算法将面临时间复杂度随着属性的增加呈指数增长的挑战。针对上述问题,从减少整体工程和单角色工程耗时的角度出发,提出了一种基于属性的勘探专家交互问答算法框架下的RBAC分层辅助勘探模型。该模型不仅避免了单个角色需求的耗时过程,而且从整体架构的角度减少了整个角色建立的耗时过程。
{"title":"A Model Study on Hierarchical Assisted Exploration of RBAC","authors":"Wan Chen, Daojun Han, Lei Zhang, Qi Xiao, Qiuyue Li, Hongzhen Xiang","doi":"10.4018/ijdcf.302871","DOIUrl":"https://doi.org/10.4018/ijdcf.302871","url":null,"abstract":"Role-based access control(RBAC) system has been widely used in data security because of its good flexibility and security, wherein RBAC dominates the field of access control. However, the process of establishing RBAC roles is complex and time-consuming, which hinders the development and application of this field. Recently, the introduction of expert interactive q&a algorithm based on attribute exploration has greatly reduced the complexity and time-consuming of RBAC role building process. However, when attributes increases, algorithm will face challenges that the time complexity will explode exponentially with the increase of attributes. To cope with above problems, this paper proposes a hierarchical assisted exploration model of RBAC under attribute-based exploration expert interactive q&a algorithm framework from the view of reducing time-consuming of overall and single role engineering. This model not only avoids time-consuming process of single role requirements, but also reduces time-consuming process of whole role establishment from the overall architecture perspective.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"61 1","pages":"1-13"},"PeriodicalIF":0.7,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72529661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Audio Tampering Forensics Based on Representation Learning of ENF Phase Sequence 基于ENF相序列表示学习的音频篡改取证
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2022-01-01 DOI: 10.4018/ijdcf.302894
Chunyan Zeng, Yao Yang, Zhifeng Wang, Shuaifei Kong, Shixiong Feng
This paper proposes an audio tampering detection method based on the ENF phase and BI-LSTM network from the perspective of temporal feature representation learning. First, the ENF phase is obtained by discrete Fourier transform of ENF component in audio. Second, the ENF phase is divided into frames to obtain ENF phase sequence characterization, and each frame is represented as the change information of the ENF phase in a period. Then, the BI-LSTM neural network is used to train and output the state of each time step, and the difference information between real audio and tampered audio is obtained. Finally, these differences were fitted and dimensionally reduced by the fully connected network and classified by the Softmax classifier. Experimental results show that the performance of this method is better than the state-of-the-art approaches.
本文从时间特征表示学习的角度,提出了一种基于ENF相位和BI-LSTM网络的音频篡改检测方法。首先,对音频中ENF分量进行离散傅里叶变换,得到ENF相位;其次,将ENF相位分成帧,得到ENF相位序列表征,每一帧表示为一个周期内ENF相位的变化信息。然后,利用BI-LSTM神经网络对每个时间步长的状态进行训练和输出,得到真实音频与篡改音频之间的差异信息。最后,这些差异通过全连接网络进行拟合和降维,并用Softmax分类器进行分类。实验结果表明,该方法的性能优于现有的方法。
{"title":"Audio Tampering Forensics Based on Representation Learning of ENF Phase Sequence","authors":"Chunyan Zeng, Yao Yang, Zhifeng Wang, Shuaifei Kong, Shixiong Feng","doi":"10.4018/ijdcf.302894","DOIUrl":"https://doi.org/10.4018/ijdcf.302894","url":null,"abstract":"This paper proposes an audio tampering detection method based on the ENF phase and BI-LSTM network from the perspective of temporal feature representation learning. First, the ENF phase is obtained by discrete Fourier transform of ENF component in audio. Second, the ENF phase is divided into frames to obtain ENF phase sequence characterization, and each frame is represented as the change information of the ENF phase in a period. Then, the BI-LSTM neural network is used to train and output the state of each time step, and the difference information between real audio and tampered audio is obtained. Finally, these differences were fitted and dimensionally reduced by the fully connected network and classified by the Softmax classifier. Experimental results show that the performance of this method is better than the state-of-the-art approaches.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"144 1","pages":"1-19"},"PeriodicalIF":0.7,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89020076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
The Impact of Social Engineer Attack Phases on Improved Security Countermeasures: Social Engineer Involvement as Mediating Variable 社会工程师攻击阶段对改进安全对策的影响:社会工程师参与作为中介变量
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2022-01-01 DOI: 10.4018/ijdcf.286762
Louay Karadsheh, Haroun Alryalat, Ja'far Alqatawna, S. Alhawari, M. Al-Jarrah
The objective of this paper is to examine a model to identify Social Engineer Attack Phases to improve the security countermeasures by Social-Engineer Involvement. A questionnaire was developed and distributed to a sample of 243 respondents who were actively engaged in 3 Jordanian telecommunication companies. All hypotheses were tested using (PLS-SEM). The results of the study indicate that Social Engineer Attack Phases (Identification the potential target, Target Recognition, Decision approach, and Execution) have a partially mediate and significant impact on improving the security countermeasures by Social-Engineer Involvement. On the other hand, the Social Engineer Attack Phases (Information Aggregations, Analysis and Interpretation, Armament, and Influencing) have a fully mediate and significant impact on improving the security countermeasures by Social-Engineer Involvement. The findings of this study help to provide deep insight to help security professionals prepare better and implement the right and appropriate countermeasures, whether technical or soft measures.
本文的目的是研究一个识别社会工程师攻击阶段的模型,通过社会工程师的参与来改进安全对策。编制了一份调查表,并向积极参与约旦3家电信公司工作的243名抽样答复者分发。采用PLS-SEM对所有假设进行检验。研究结果表明,社会工程师攻击阶段(潜在目标识别、目标识别、决策方法和执行)对社会工程师参与改进安全对策具有部分中介和显著影响。另一方面,社会工程师攻击阶段(信息聚合阶段、分析与解释阶段、武装阶段和影响阶段)对社会工程师参与改进安全对策具有充分的中介作用和显著的影响。本研究的结果有助于提供深入的见解,以帮助安全专业人员更好地准备和实施正确和适当的对策,无论是技术措施还是软措施。
{"title":"The Impact of Social Engineer Attack Phases on Improved Security Countermeasures: Social Engineer Involvement as Mediating Variable","authors":"Louay Karadsheh, Haroun Alryalat, Ja'far Alqatawna, S. Alhawari, M. Al-Jarrah","doi":"10.4018/ijdcf.286762","DOIUrl":"https://doi.org/10.4018/ijdcf.286762","url":null,"abstract":"The objective of this paper is to examine a model to identify Social Engineer Attack Phases to improve the security countermeasures by Social-Engineer Involvement. A questionnaire was developed and distributed to a sample of 243 respondents who were actively engaged in 3 Jordanian telecommunication companies. All hypotheses were tested using (PLS-SEM). The results of the study indicate that Social Engineer Attack Phases (Identification the potential target, Target Recognition, Decision approach, and Execution) have a partially mediate and significant impact on improving the security countermeasures by Social-Engineer Involvement. On the other hand, the Social Engineer Attack Phases (Information Aggregations, Analysis and Interpretation, Armament, and Influencing) have a fully mediate and significant impact on improving the security countermeasures by Social-Engineer Involvement. The findings of this study help to provide deep insight to help security professionals prepare better and implement the right and appropriate countermeasures, whether technical or soft measures.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"2 1","pages":"1-26"},"PeriodicalIF":0.7,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82892477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
P2DF: A Privacy-Preserving Digital Forensics Framework P2DF:一个保护隐私的数字取证框架
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2021-11-01 DOI: 10.4018/IJDCF.288547
M. Abulaish, Nur Al Hasan Haldar, Jahiruddin Sharma
The extensive use of digital devices by individuals generates a significant amount of private data which creates challenges for investigation agencies to protect suspects’ privacy. Existing digital forensics models illustrate the steps and actions to be followed during an investigation, but most of them are inadequate to investigate a crime with all the processes in an integrated manner and do not protect suspect privacy. In this paper, the authors propose the development of a privacy-preserving digital forensics (P2DF) framework, which facilitates investigation through maintaining confidentiality of the suspects through various privacy standards and policies. It includes an access control mechanism which allows only authorized investigators to access private data and identified digital evidence. It is also equipped with a digital evidence preservation mechanism which could be helpful for the court of law to ensure the authenticity, confidentiality, and reliability of the evidence and to verify whether privacy of the suspect was preserved during the investigation process.
个人对数字设备的广泛使用产生了大量的私人数据,这给调查机构保护嫌疑人的隐私带来了挑战。现有的数字取证模型说明了调查过程中应遵循的步骤和行动,但大多数模型不足以以综合方式调查所有过程的犯罪,也不能保护嫌疑人的隐私。在本文中,作者提出了一种保护隐私的数字取证(P2DF)框架的发展,该框架通过各种隐私标准和政策维护嫌疑人的机密性,从而促进调查。它包括一个访问控制机制,只允许授权的调查人员访问私人数据和已识别的数字证据。它还配备了数字证据保全机制,有助于法院确保证据的真实性、保密性和可靠性,并验证在调查过程中是否保留了嫌疑人的隐私。
{"title":"P2DF: A Privacy-Preserving Digital Forensics Framework","authors":"M. Abulaish, Nur Al Hasan Haldar, Jahiruddin Sharma","doi":"10.4018/IJDCF.288547","DOIUrl":"https://doi.org/10.4018/IJDCF.288547","url":null,"abstract":"The extensive use of digital devices by individuals generates a significant amount of private data which creates challenges for investigation agencies to protect suspects’ privacy. Existing digital forensics models illustrate the steps and actions to be followed during an investigation, but most of them are inadequate to investigate a crime with all the processes in an integrated manner and do not protect suspect privacy. In this paper, the authors propose the development of a privacy-preserving digital forensics (P2DF) framework, which facilitates investigation through maintaining confidentiality of the suspects through various privacy standards and policies. It includes an access control mechanism which allows only authorized investigators to access private data and identified digital evidence. It is also equipped with a digital evidence preservation mechanism which could be helpful for the court of law to ensure the authenticity, confidentiality, and reliability of the evidence and to verify whether privacy of the suspect was preserved during the investigation process.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"322 1","pages":"1-15"},"PeriodicalIF":0.7,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85412813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Reversible Data Hiding in a Chaotic Encryption Domain Based on Odevity Verification 基于方差验证的混沌加密域可逆数据隐藏
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2021-11-01 DOI: 10.4018/ijdcf.20211101.oa9
Lianshan Liu, Xiaoli Wang, Lingzhuang Meng, Gang Tian, Ting Wang
On the premise of guaranteeing the visual effect, in order to improve the security of the image containing digital watermarking and restore the carrier image without distortion, reversible data hiding in chaotic encryption domain based on odevity verification was proposed. The original image was scrambled and encrypted by Henon mapping, and the redundancy between the pixels of the encrypted image was lost. Then, the embedding capacity of watermarking can be improved by using odevity verification, and the embedding location of watermarking can be randomly selected by using logistic mapping. When extracting the watermarking, the embedded data was judged according to the odevity of the pixel value of the embedding position of the watermarking, and the carrier image was restored nondestructively by odevity check image. The experimental results show that the peak signal-to-noise ratio (PSNR) of the original image is above 53 decibels after the image is decrypted and restored after embedding the watermarking in the encrypted domain, and the invisibility is good.
在保证视觉效果的前提下,为了提高含有数字水印的图像的安全性,不失真地还原载体图像,提出了基于方差验证的混沌加密域可逆数据隐藏。对原始图像进行Henon映射置乱加密,加密后的图像失去了像素间的冗余。然后,利用方差验证提高水印的嵌入能力,并利用逻辑映射随机选择水印的嵌入位置。在提取水印时,根据水印嵌入位置像素值的方差来判断嵌入数据,并通过方差检查图像对载体图像进行无损恢复。实验结果表明,在加密域嵌入水印后对图像进行解密和还原,原始图像的峰值信噪比(PSNR)在53分贝以上,且不可见性良好。
{"title":"Reversible Data Hiding in a Chaotic Encryption Domain Based on Odevity Verification","authors":"Lianshan Liu, Xiaoli Wang, Lingzhuang Meng, Gang Tian, Ting Wang","doi":"10.4018/ijdcf.20211101.oa9","DOIUrl":"https://doi.org/10.4018/ijdcf.20211101.oa9","url":null,"abstract":"On the premise of guaranteeing the visual effect, in order to improve the security of the image containing digital watermarking and restore the carrier image without distortion, reversible data hiding in chaotic encryption domain based on odevity verification was proposed. The original image was scrambled and encrypted by Henon mapping, and the redundancy between the pixels of the encrypted image was lost. Then, the embedding capacity of watermarking can be improved by using odevity verification, and the embedding location of watermarking can be randomly selected by using logistic mapping. When extracting the watermarking, the embedded data was judged according to the odevity of the pixel value of the embedding position of the watermarking, and the carrier image was restored nondestructively by odevity check image. The experimental results show that the peak signal-to-noise ratio (PSNR) of the original image is above 53 decibels after the image is decrypted and restored after embedding the watermarking in the encrypted domain, and the invisibility is good.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"210 1","pages":"1-14"},"PeriodicalIF":0.7,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78157232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hidden Service Circuit Reconstruction Attacks Based on Middle Node Traffic Analysis 基于中间节点流量分析的隐藏业务电路重构攻击
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2021-11-01 DOI: 10.4018/ijdcf.288548
Yitong Meng, Jin-long Fei
Traffic analysis is widely considered as an attack posing a threat to anonymity of the communication and may reveal the real identity of the users. In this paper, a novel anonymous circuit reconstruction attack method that correlates the circuit traffic is proposed. This method then reconstructs a complete communication tunnel using the location of middle nodes found between the hidden and client services. The attack process includes independent determination of the location of the malicious nodes. A traffic correlation framework of AutoEncoder + CNN + BiLSTM is established, based on the Generative Adversarial Networks (GAN) model. BiLSTM applies the packet size and packet interval features of bidirectional traffic and combines the reconstruction loss function with the discrimination loss function to achieve correlated traffic evaluation. After balancing the reconstruction loss and discrimination loss scores, the simulation results confirm that the identification performance of the proposed system is higher than the advanced models.
流量分析被广泛认为是一种对通信匿名性构成威胁的攻击,可能会泄露用户的真实身份。本文提出了一种关联电路流量的匿名电路重构攻击方法。然后,该方法使用在隐藏服务和客户端服务之间找到的中间节点的位置重建完整的通信隧道。攻击过程包括独立确定恶意节点的位置。基于生成式对抗网络(GAN)模型,建立了AutoEncoder + CNN + BiLSTM的流量关联框架。BiLSTM利用双向流量的报文大小和报文间隔特征,结合重构损失函数和判别损失函数实现相关流量评估。在平衡了重建损失和识别损失分数后,仿真结果证实了该系统的识别性能优于先进的模型。
{"title":"Hidden Service Circuit Reconstruction Attacks Based on Middle Node Traffic Analysis","authors":"Yitong Meng, Jin-long Fei","doi":"10.4018/ijdcf.288548","DOIUrl":"https://doi.org/10.4018/ijdcf.288548","url":null,"abstract":"Traffic analysis is widely considered as an attack posing a threat to anonymity of the communication and may reveal the real identity of the users. In this paper, a novel anonymous circuit reconstruction attack method that correlates the circuit traffic is proposed. This method then reconstructs a complete communication tunnel using the location of middle nodes found between the hidden and client services. The attack process includes independent determination of the location of the malicious nodes. A traffic correlation framework of AutoEncoder + CNN + BiLSTM is established, based on the Generative Adversarial Networks (GAN) model. BiLSTM applies the packet size and packet interval features of bidirectional traffic and combines the reconstruction loss function with the discrimination loss function to achieve correlated traffic evaluation. After balancing the reconstruction loss and discrimination loss scores, the simulation results confirm that the identification performance of the proposed system is higher than the advanced models.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"64 1","pages":"1-30"},"PeriodicalIF":0.7,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85007189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Automated Detection of Higher-Order Command Injection Vulnerabilities in IoT Devices: Fuzzing With Dynamic Data Flow Analysis 物联网设备中高阶命令注入漏洞的自动检测:动态数据流分析的模糊测试
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2021-11-01 DOI: 10.4018/ijdcf.286755
Lei Yu, Haoyu Wang, Linyu Li, Houhua He
Command injection vulnerabilities are among the most common and dangerous attack vectors in IoT devices. Current detection approaches can detect single-step injection vulnerabilities well by fuzzing tests. However, an attacker could inject malicious commands in an IoT device via a multi-step exploit if he first abuses an interface to store the injection payload and later use it in a command interpreter through another interface. We identify a large class of such multi-step injection attacks to address these stealthy and harmful threats and define them as higher-order command injection vulnerabilities (HOCIVs). We develop an automatic system named Request Linking (ReLink) to detect data stores that would be transferred to command interpreters and then identify HOCIVs. ReLink is validated on an experimental embedded system injected with 150 HOCIVs. According to the experimental results, ReLink is significantly better than existing command injection detection tools in terms of detection rate, test space and time.
命令注入漏洞是物联网设备中最常见和最危险的攻击媒介之一。现有的检测方法可以通过模糊测试很好地检测出单步注入漏洞。但是,如果攻击者首先滥用接口来存储注入有效载荷,然后通过另一个接口在命令解释器中使用它,则攻击者可以通过多步骤漏洞在物联网设备中注入恶意命令。我们确定了一大类这样的多步骤注入攻击来解决这些隐形和有害的威胁,并将其定义为高阶命令注入漏洞(hociv)。我们开发了一个名为请求链接(ReLink)的自动系统,用于检测将传输给命令解释器的数据存储,然后识别HOCIVs。ReLink在一个注入150个hociv的实验性嵌入式系统上进行了验证。实验结果表明,ReLink在检测率、测试空间和时间上都明显优于现有的命令注入检测工具。
{"title":"Towards Automated Detection of Higher-Order Command Injection Vulnerabilities in IoT Devices: Fuzzing With Dynamic Data Flow Analysis","authors":"Lei Yu, Haoyu Wang, Linyu Li, Houhua He","doi":"10.4018/ijdcf.286755","DOIUrl":"https://doi.org/10.4018/ijdcf.286755","url":null,"abstract":"Command injection vulnerabilities are among the most common and dangerous attack vectors in IoT devices. Current detection approaches can detect single-step injection vulnerabilities well by fuzzing tests. However, an attacker could inject malicious commands in an IoT device via a multi-step exploit if he first abuses an interface to store the injection payload and later use it in a command interpreter through another interface. We identify a large class of such multi-step injection attacks to address these stealthy and harmful threats and define them as higher-order command injection vulnerabilities (HOCIVs). We develop an automatic system named Request Linking (ReLink) to detect data stores that would be transferred to command interpreters and then identify HOCIVs. ReLink is validated on an experimental embedded system injected with 150 HOCIVs. According to the experimental results, ReLink is significantly better than existing command injection detection tools in terms of detection rate, test space and time.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"44 1","pages":"1-14"},"PeriodicalIF":0.7,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90978636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
International Journal of Digital Crime and Forensics
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1