首页 > 最新文献

EURASIP Journal on Information Security最新文献

英文 中文
Peer-to-peer botnets: exploring behavioural characteristics and machine/deep learning-based detection 点对点僵尸网络:探索行为特征和基于机器/深度学习的检测
IF 3.6 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-27 DOI: 10.1186/s13635-024-00169-0
Arkan Hammoodi Hasan Kabla, Achmad Husni Thamrin, Mohammed Anbar, Selvakumar Manickam, Shankar Karuppayah
The orientation of emerging technologies on the Internet is moving toward decentralisation. Botnets have always been one of the biggest threats to Internet security, and botmasters have adopted the robust concept of decentralisation to develop and improve peer-to-peer botnet tactics. This makes the botnets cleverer and more artful, although bots under the same botnet have symmetrical behaviour, which is what makes them detectable. However, the literature indicates that the last decade has lacked research that explores new behavioural characteristics that could be used to identify peer-to-peer botnets. For the abovementioned reasons, in this study, we propose new two methods to detect peer-to-peer botnets: first, we explored a new set of behavioural characteristics based on network traffic flow analyses that allow network administrators to more easily recognise a botnet’s presence, and second, we developed a new anomaly detection approach by adopting machine-learning and deep-learning techniques that have not yet been leveraged to detect peer-to-peer botnets using only the five-tuple static indicators as selected features. The experimental analyses revealed new and important behavioural characteristics that can be used to identify peer-to-peer botnets, whereas the experimental results for the detection approach showed a high detection accuracy of 99.99% with no false alarms.
互联网新兴技术的发展方向是去中心化。僵尸网络一直是互联网安全的最大威胁之一,僵尸网络管理员采用了去中心化这一强大的概念来开发和改进点对点僵尸网络战术。尽管同一僵尸网络下的僵尸具有对称行为,这也是它们能够被检测到的原因,但这使得僵尸网络变得更加聪明和巧妙。然而,文献表明,过去十年中缺乏对可用于识别点对点僵尸网络的新行为特征的研究。基于上述原因,在本研究中,我们提出了两种新的方法来检测点对点僵尸网络:首先,我们基于网络流量分析探索了一组新的行为特征,使网络管理员能够更容易地识别僵尸网络的存在;其次,我们开发了一种新的异常检测方法,采用机器学习和深度学习技术来检测点对点僵尸网络。实验分析揭示了可用于识别点对点僵尸网络的新的重要行为特征,而检测方法的实验结果显示其检测准确率高达 99.99%,且无误报。
{"title":"Peer-to-peer botnets: exploring behavioural characteristics and machine/deep learning-based detection","authors":"Arkan Hammoodi Hasan Kabla, Achmad Husni Thamrin, Mohammed Anbar, Selvakumar Manickam, Shankar Karuppayah","doi":"10.1186/s13635-024-00169-0","DOIUrl":"https://doi.org/10.1186/s13635-024-00169-0","url":null,"abstract":"The orientation of emerging technologies on the Internet is moving toward decentralisation. Botnets have always been one of the biggest threats to Internet security, and botmasters have adopted the robust concept of decentralisation to develop and improve peer-to-peer botnet tactics. This makes the botnets cleverer and more artful, although bots under the same botnet have symmetrical behaviour, which is what makes them detectable. However, the literature indicates that the last decade has lacked research that explores new behavioural characteristics that could be used to identify peer-to-peer botnets. For the abovementioned reasons, in this study, we propose new two methods to detect peer-to-peer botnets: first, we explored a new set of behavioural characteristics based on network traffic flow analyses that allow network administrators to more easily recognise a botnet’s presence, and second, we developed a new anomaly detection approach by adopting machine-learning and deep-learning techniques that have not yet been leveraged to detect peer-to-peer botnets using only the five-tuple static indicators as selected features. The experimental analyses revealed new and important behavioural characteristics that can be used to identify peer-to-peer botnets, whereas the experimental results for the detection approach showed a high detection accuracy of 99.99% with no false alarms. ","PeriodicalId":46070,"journal":{"name":"EURASIP Journal on Information Security","volume":"90 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141168226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Retraction Note: The design of network security protection trust management system based on an improved hidden Markov model 撤稿说明:基于改进隐马尔可夫模型的网络安全保护信任管理系统设计
IF 3.6 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-13 DOI: 10.1186/s13635-024-00167-2
Shaojun Chen
This article has been retracted. Please see the Retraction Notice for more detail: https://doi.org/10.1186/s13635-023-00146-z.
本文已被撤回。详情请参见撤稿通知:https://doi.org/10.1186/s13635-023-00146-z。
{"title":"Retraction Note: The design of network security protection trust management system based on an improved hidden Markov model","authors":"Shaojun Chen","doi":"10.1186/s13635-024-00167-2","DOIUrl":"https://doi.org/10.1186/s13635-024-00167-2","url":null,"abstract":"This article has been retracted. Please see the Retraction Notice for more detail: https://doi.org/10.1186/s13635-023-00146-z.","PeriodicalId":46070,"journal":{"name":"EURASIP Journal on Information Security","volume":"38 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140930697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Retraction Note: Hierarchical energy-saving routing algorithm using fuzzy logic in wireless sensor networks 撤稿说明:无线传感器网络中使用模糊逻辑的分层节能路由算法
IF 3.6 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-13 DOI: 10.1186/s13635-024-00168-1
Dan Wang, Qing Wu, Ming Hu
This article has been retracted. Please see the Retraction Notice for more detail: https://doi.org/10.1186/s13635-023-00144-1.
本文已被撤回。详情请参见撤稿通知:https://doi.org/10.1186/s13635-023-00144-1。
{"title":"Retraction Note: Hierarchical energy-saving routing algorithm using fuzzy logic in wireless sensor networks","authors":"Dan Wang, Qing Wu, Ming Hu","doi":"10.1186/s13635-024-00168-1","DOIUrl":"https://doi.org/10.1186/s13635-024-00168-1","url":null,"abstract":"This article has been retracted. Please see the Retraction Notice for more detail: https://doi.org/10.1186/s13635-023-00144-1.","PeriodicalId":46070,"journal":{"name":"EURASIP Journal on Information Security","volume":"65 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140930721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Retraction Note: RFID tag recognition model for Internet of Things for training room management 撤稿说明:用于培训室管理的物联网 RFID 标签识别模型
IF 3.6 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-13 DOI: 10.1186/s13635-024-00164-5
Shengqi Wu
This article has been retracted. Please see the Retraction Notice for more detail: https://doi.org/10.1186/s13635-024-00154-7
本文已被撤回。详情请见撤稿通知:https://doi.org/10.1186/s13635-024-00154-7。
{"title":"Retraction Note: RFID tag recognition model for Internet of Things for training room management","authors":"Shengqi Wu","doi":"10.1186/s13635-024-00164-5","DOIUrl":"https://doi.org/10.1186/s13635-024-00164-5","url":null,"abstract":"This article has been retracted. Please see the Retraction Notice for more detail: https://doi.org/10.1186/s13635-024-00154-7","PeriodicalId":46070,"journal":{"name":"EURASIP Journal on Information Security","volume":"47 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140930785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Retraction Note: Improved RFID mutual authentication protocol against exhaustive attack in the context of big data 撤稿说明:大数据背景下针对穷举攻击的改进型 RFID 相互验证协议
IF 3.6 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-10 DOI: 10.1186/s13635-024-00163-6
Kongze Li
This article has been retracted. Please see the Retraction Notice for more detail: https://doi.org/10.1186/s13635-024-00151-w.
本文已被撤回。详情请参见撤稿通知:https://doi.org/10.1186/s13635-024-00151-w。
{"title":"Retraction Note: Improved RFID mutual authentication protocol against exhaustive attack in the context of big data","authors":"Kongze Li","doi":"10.1186/s13635-024-00163-6","DOIUrl":"https://doi.org/10.1186/s13635-024-00163-6","url":null,"abstract":"This article has been retracted. Please see the Retraction Notice for more detail: https://doi.org/10.1186/s13635-024-00151-w.","PeriodicalId":46070,"journal":{"name":"EURASIP Journal on Information Security","volume":"65 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140930690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Retraction Note: Node fault diagnosis algorithm for wireless sensor networks based on BN and WSN 撤稿说明:基于 BN 和 WSN 的无线传感器网络节点故障诊断算法
IF 3.6 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-10 DOI: 10.1186/s13635-024-00166-3
Ming Li
This article has been retracted. Please see the Retraction Notice for more detail: https://doi.org/10.1186/s13635-023-00149-w.
本文已被撤回。详情请参见撤稿通知:https://doi.org/10.1186/s13635-023-00149-w。
{"title":"Retraction Note: Node fault diagnosis algorithm for wireless sensor networks based on BN and WSN","authors":"Ming Li","doi":"10.1186/s13635-024-00166-3","DOIUrl":"https://doi.org/10.1186/s13635-024-00166-3","url":null,"abstract":"This article has been retracted. Please see the Retraction Notice for more detail: https://doi.org/10.1186/s13635-023-00149-w.","PeriodicalId":46070,"journal":{"name":"EURASIP Journal on Information Security","volume":"42 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140930844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Retraction Note: Efficient identity security authentication method based on improved R-LWE algorithm in IoT environment 撤稿说明:物联网环境下基于改进的 R-LWE 算法的高效身份安全认证方法
IF 3.6 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-10 DOI: 10.1186/s13635-024-00162-7
Lin Yang
This article has been retracted. Please see the Retraction Notice for more detail: https://doi.org/10.1186/s13635-024-00153-8.
本文已被撤回。详情请参见撤稿通知:https://doi.org/10.1186/s13635-024-00153-8。
{"title":"Retraction Note: Efficient identity security authentication method based on improved R-LWE algorithm in IoT environment","authors":"Lin Yang","doi":"10.1186/s13635-024-00162-7","DOIUrl":"https://doi.org/10.1186/s13635-024-00162-7","url":null,"abstract":"This article has been retracted. Please see the Retraction Notice for more detail: https://doi.org/10.1186/s13635-024-00153-8.","PeriodicalId":46070,"journal":{"name":"EURASIP Journal on Information Security","volume":"16 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140930695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Retraction Note: Research on privacy and secure storage protection of personalized medical data based on hybrid encryption 撤稿说明:基于混合加密的个性化医疗数据隐私和安全存储保护研究
IF 3.6 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-10 DOI: 10.1186/s13635-024-00165-4
Jialu Lv
This article has been retracted. Please see the Retraction Notice for more detail: https://doi.org/10.1186/s13635-023-00150-3.
本文已被撤回。详情请参见撤稿通知:https://doi.org/10.1186/s13635-023-00150-3。
{"title":"Retraction Note: Research on privacy and secure storage protection of personalized medical data based on hybrid encryption","authors":"Jialu Lv","doi":"10.1186/s13635-024-00165-4","DOIUrl":"https://doi.org/10.1186/s13635-024-00165-4","url":null,"abstract":"This article has been retracted. Please see the Retraction Notice for more detail: https://doi.org/10.1186/s13635-023-00150-3.","PeriodicalId":46070,"journal":{"name":"EURASIP Journal on Information Security","volume":"156 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140930786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Retraction Note: IoT devices and data availability optimization by ANN and KNN 撤回说明:利用 ANN 和 KNN 优化物联网设备和数据可用性
IF 3.6 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-08 DOI: 10.1186/s13635-024-00160-9
Zhiqiang Chen, Zhihua Song, Tao Zhang, Yong Wei
This article has been retracted. Please see the Retraction Notice for more detail: https://doi.org/10.1186/s13635-023-00145-0.
本文已被撤回。详情请参见撤稿通知:https://doi.org/10.1186/s13635-023-00145-0。
{"title":"Retraction Note: IoT devices and data availability optimization by ANN and KNN","authors":"Zhiqiang Chen, Zhihua Song, Tao Zhang, Yong Wei","doi":"10.1186/s13635-024-00160-9","DOIUrl":"https://doi.org/10.1186/s13635-024-00160-9","url":null,"abstract":"This article has been retracted. Please see the Retraction Notice for more detail: https://doi.org/10.1186/s13635-023-00145-0.","PeriodicalId":46070,"journal":{"name":"EURASIP Journal on Information Security","volume":"35 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140930784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Retraction Note: Network security threat detection technology based on EPSO-BP algorithm 撤稿说明:基于 EPSO-BP 算法的网络安全威胁检测技术
IF 3.6 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-07 DOI: 10.1186/s13635-024-00161-8
Zhu Lan
This article has been retracted. Please see the Retraction Notice for more detail: https://doi.org/10.1186/s13635-024-00152-9
本文已被撤回。详情请见撤稿通知:https://doi.org/10.1186/s13635-024-00152-9。
{"title":"Retraction Note: Network security threat detection technology based on EPSO-BP algorithm","authors":"Zhu Lan","doi":"10.1186/s13635-024-00161-8","DOIUrl":"https://doi.org/10.1186/s13635-024-00161-8","url":null,"abstract":"This article has been retracted. Please see the Retraction Notice for more detail: https://doi.org/10.1186/s13635-024-00152-9","PeriodicalId":46070,"journal":{"name":"EURASIP Journal on Information Security","volume":"82 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140930722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
EURASIP Journal on Information Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1