首页 > 最新文献

International Journal of Security and Its Applications最新文献

英文 中文
Security Enhancement in Android using Ellipic Curve Cryptography 使用Ellipic曲线加密技术增强安卓系统的安全性
Pub Date : 2017-06-30 DOI: 10.14257/IJSIA.2017.11.6.03
M. Dar, J. Parvez
Android has become an active area of research owing to its vast range of applications called apps. Traditional security protocols which are complex are not feasible for such systems due to the limitation of resources. However, Elliptic Curve Cryptography has been considered as a viable cryptographic technique due to its low computational overhead. In this paper we study the application of ECC on a popular Android operating system. Practical implementation of the ECC operations has been performed using Android library. Android operating system has been used to develop custom security protocols on a Smartphone. The performance benchmarking of the proposed protocols has also been carried out.
Android已经成为一个活跃的研究领域,因为它有大量的应用程序。由于资源的限制,传统的安全协议过于复杂,不适合此类系统。然而,椭圆曲线加密由于其较低的计算开销而被认为是一种可行的加密技术。本文研究了ECC在Android操作系统上的应用。使用Android库对ECC操作进行了实际实现。Android操作系统已被用于开发智能手机上的自定义安全协议。还对提议的协议进行了性能基准测试。
{"title":"Security Enhancement in Android using Ellipic Curve Cryptography","authors":"M. Dar, J. Parvez","doi":"10.14257/IJSIA.2017.11.6.03","DOIUrl":"https://doi.org/10.14257/IJSIA.2017.11.6.03","url":null,"abstract":"Android has become an active area of research owing to its vast range of applications called apps. Traditional security protocols which are complex are not feasible for such systems due to the limitation of resources. However, Elliptic Curve Cryptography has been considered as a viable cryptographic technique due to its low computational overhead. In this paper we study the application of ECC on a popular Android operating system. Practical implementation of the ECC operations has been performed using Android library. Android operating system has been used to develop custom security protocols on a Smartphone. The performance benchmarking of the proposed protocols has also been carried out.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":" ","pages":"27-34"},"PeriodicalIF":0.0,"publicationDate":"2017-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45659537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Mobile App User Licensing with Little or No Backend Server 很少或没有后端服务器的移动应用程序用户许可
Pub Date : 2017-05-31 DOI: 10.14257/IJSIA.2017.11.5.03
Anis Prasla, Sabah Mohammad, J. Fiaidhi
For decades software licensing has been relaying on copyright registration and the declaration of this copyright at the software to be accepted and downloaded by the users. In this case the software developer need to work closely with legal departments and rely on the copyright laws where such laws enforcement vary from one country to other. The complexity of enforcing this licensing model largely come from the robust way of formulating the end-user license agreement (EULA) and the existence of a backend server that can monitor the usage of the software. Obviously the enforcement of this model may prove to be legally impossible as there will be many users who do not care about the software license as well as there will be an associated expenses with using the backend server. In this paper, a new method and a prototype for licensing mobile application that are uploaded on public cloud. In this method the users of the mobile app starts by using a declarative form of the License but they need to provide user specific data including the mobile unique device id, operating system and brand. The method also includes activating the application on the computing device using the device specific information. This licensing model protects software piracy and license vulnerability issues. The developed prototype for this type of licensing model has been applied for android applications as there are tons of Android apps on application stores at different domains. Experimental results show the process of integrating the licensing library with any android applications is easy without changing the existing application code and avoiding lengthy development efforts to secure mobile apps with fully licensed app and no legal overhead.
几十年来,软件许可一直依赖于版权登记和用户接受和下载软件的版权声明。在这种情况下,软件开发商需要与法律部门密切合作,并依赖版权法,因为不同国家的法律执行情况不同。实施这种许可模式的复杂性很大程度上来自于制定最终用户许可协议(EULA)的稳健方式,以及可以监控软件使用情况的后端服务器的存在。显然,这种模式的实施可能在法律上是不可能的,因为会有许多用户不关心软件许可证,而且使用后端服务器也会产生相关费用。在本文中,提出了一种新的方法和一个原型来授权上传到公共云上的移动应用程序。在这种方法中,移动应用程序的用户首先使用声明形式的许可证,但他们需要提供用户特定的数据,包括移动唯一设备id、操作系统和品牌。该方法还包括使用设备特定信息激活计算设备上的应用程序。此许可模式可保护软件盗版和许可漏洞问题。这种类型的许可模型的开发原型已应用于android应用程序,因为不同域的应用程序商店中有大量android应用程序。实验结果表明,在不更改现有应用程序代码的情况下,将许可库与任何安卓应用程序集成的过程都很容易,也避免了漫长的开发工作,以确保具有完全许可的应用程序且没有法律开销的移动应用程序的安全。
{"title":"Mobile App User Licensing with Little or No Backend Server","authors":"Anis Prasla, Sabah Mohammad, J. Fiaidhi","doi":"10.14257/IJSIA.2017.11.5.03","DOIUrl":"https://doi.org/10.14257/IJSIA.2017.11.5.03","url":null,"abstract":"For decades software licensing has been relaying on copyright registration and the declaration of this copyright at the software to be accepted and downloaded by the users. In this case the software developer need to work closely with legal departments and rely on the copyright laws where such laws enforcement vary from one country to other. The complexity of enforcing this licensing model largely come from the robust way of formulating the end-user license agreement (EULA) and the existence of a backend server that can monitor the usage of the software. Obviously the enforcement of this model may prove to be legally impossible as there will be many users who do not care about the software license as well as there will be an associated expenses with using the backend server. In this paper, a new method and a prototype for licensing mobile application that are uploaded on public cloud. In this method the users of the mobile app starts by using a declarative form of the License but they need to provide user specific data including the mobile unique device id, operating system and brand. The method also includes activating the application on the computing device using the device specific information. This licensing model protects software piracy and license vulnerability issues. The developed prototype for this type of licensing model has been applied for android applications as there are tons of Android apps on application stores at different domains. Experimental results show the process of integrating the licensing library with any android applications is easy without changing the existing application code and avoiding lengthy development efforts to secure mobile apps with fully licensed app and no legal overhead.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"11 1","pages":"27-38"},"PeriodicalIF":0.0,"publicationDate":"2017-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46776393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Algorithm to Secure Virtual Machine Image in Cloud Environment 云环境下虚拟机镜像安全算法研究
Pub Date : 2017-05-31 DOI: 10.14257/ijsia.2017.11.5.05
Preeti Thakur, Devesh Kumar Srivastava
Virtual Machine is a combined form of operating system and application. Virtualization provides the facility to run multiple operating systems on a single physical machine. These multiple operating systems are called guest operating systems. In server Virtualization many virtual machines (VMs) can run on one server including its own server. These VMs can be migrated from one server to another. As VM image will be downloaded to create a new virtual machine on the guest operating system it has some security problems. Unauthorized access can create the security issues like Malware injection. Due to which there is a need of scheme capable of providing encryption, malware detection, automatic patching to restore the image. In this paper an algorithm is proposed which is capable of providing solution to the above issues.
虚拟机是操作系统和应用程序的结合形式。虚拟化提供了在单个物理机器上运行多个操作系统的功能。这些多个操作系统被称为客户操作系统。在服务器虚拟化中,许多虚拟机(VM)可以在一台服务器上运行,包括它自己的服务器。这些虚拟机可以从一台服务器迁移到另一台服务器。由于VM映像将被下载以在来宾操作系统上创建新的虚拟机,因此存在一些安全问题。未经授权的访问可能会造成诸如恶意软件注入之类的安全问题。因此,需要一种能够提供加密、恶意软件检测、自动修补以恢复图像的方案。本文提出了一种能够解决上述问题的算法。
{"title":"An Algorithm to Secure Virtual Machine Image in Cloud Environment","authors":"Preeti Thakur, Devesh Kumar Srivastava","doi":"10.14257/ijsia.2017.11.5.05","DOIUrl":"https://doi.org/10.14257/ijsia.2017.11.5.05","url":null,"abstract":"Virtual Machine is a combined form of operating system and application. Virtualization provides the facility to run multiple operating systems on a single physical machine. These multiple operating systems are called guest operating systems. In server Virtualization many virtual machines (VMs) can run on one server including its own server. These VMs can be migrated from one server to another. As VM image will be downloaded to create a new virtual machine on the guest operating system it has some security problems. Unauthorized access can create the security issues like Malware injection. Due to which there is a need of scheme capable of providing encryption, malware detection, automatic patching to restore the image. In this paper an algorithm is proposed which is capable of providing solution to the above issues.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"11 1","pages":"49-58"},"PeriodicalIF":0.0,"publicationDate":"2017-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46505970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Impersonation Attack in Wireless Networks 无线网络中模拟攻击研究综述
Pub Date : 2017-05-31 DOI: 10.14257/IJSIA.2017.11.5.04
R. Regan, J. Manickam
Commucation being a mode of sending and receiving understanding is gaining extra popularity in today’s world. Today wireless systems are increasingly getting used for primary conversation and undertaking to hold electronic knowledge transmissions comfortable. Almost always, it's problematic to implement mighty security in small-footprint devices having low processing power, low memory capacity and utilising unreliable, low bandwidth. Impersonation attack may be very common in these days in wireless network, but the principal hindrance is the security. There is lots of solution provided by different researcher but still faces research challenge. Impersonation attacks are also known as spoofing attacks. The attacker assumes the identification of one more node in the network, as a result receiving messages directed to the node it fakes. As a rule this would be some of the first steps to intervene a network with the intention of accomplishing further assaults to disrupt operation. In this paper we describe the causes of Wireless impersonation attack, their vulnerable effects and various defense mechanisms for defending this attack.
通信作为一种传递和接受理解的方式,在当今世界越来越受欢迎。如今,无线系统越来越多地被用于初级对话,并致力于保持电子知识传输的舒适性。在处理能力低、内存容量低、使用不可靠、低带宽的小型设备中实现强大的安全性几乎总是有问题的。模拟攻击在当今无线网络中可能非常常见,但主要的障碍是安全性。不同的研究者提供了许多解决方案,但仍然面临着研究挑战。模拟攻击也称为欺骗攻击。攻击者假定网络中又有一个节点的标识,结果接收到指向其伪造节点的消息。通常,这将是干预网络的第一步,目的是实现进一步的攻击,扰乱运营。在本文中,我们描述了无线模拟攻击的原因、其易受攻击的影响以及防御这种攻击的各种防御机制。
{"title":"A Survey on Impersonation Attack in Wireless Networks","authors":"R. Regan, J. Manickam","doi":"10.14257/IJSIA.2017.11.5.04","DOIUrl":"https://doi.org/10.14257/IJSIA.2017.11.5.04","url":null,"abstract":"Commucation being a mode of sending and receiving understanding is gaining extra popularity in today’s world. Today wireless systems are increasingly getting used for primary conversation and undertaking to hold electronic knowledge transmissions comfortable. Almost always, it's problematic to implement mighty security in small-footprint devices having low processing power, low memory capacity and utilising unreliable, low bandwidth. Impersonation attack may be very common in these days in wireless network, but the principal hindrance is the security. There is lots of solution provided by different researcher but still faces research challenge. Impersonation attacks are also known as spoofing attacks. The attacker assumes the identification of one more node in the network, as a result receiving messages directed to the node it fakes. As a rule this would be some of the first steps to intervene a network with the intention of accomplishing further assaults to disrupt operation. In this paper we describe the causes of Wireless impersonation attack, their vulnerable effects and various defense mechanisms for defending this attack.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"11 1","pages":"39-48"},"PeriodicalIF":0.0,"publicationDate":"2017-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43816973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A Secure and Efficient Message Delivery Scheme for VANET 一种安全高效的VANET消息传递方案
Pub Date : 2017-05-31 DOI: 10.14257/IJSIA.2017.11.5.07
Huaijin Liu, Yonghong Chen, D. Agrawal
In order to meet the need of scalability of vehicular ad hoc network (VANET), when using the roadside unit (RSU) for message authentication and broadcast, many studies have paid little attention to the message transmission delay and the communication overhead caused by the signature. For the sake of guaranteeing the reliability of the message and improve the efficiency of message transmission, this paper proposes a secure and efficient message delivery scheme for VANET. The scheme firstly uses the opp-dir dissemination model to propagate the message to solve the problem of message transmission delay. Then, the message is signed by the aggregate MAC technique to ensure the reliability of the message. Extensive experiments validate that the proposed scheme can reduce the message transmission delay and communication overhead, improve the message delivery ratio.
为了满足车载自组织网络(VANET)可扩展性的需要,在使用路旁单元(RSU)进行消息认证和广播时,许多研究很少关注由签名引起的消息传输延迟和通信开销。为了保证消息的可靠性和提高消息传输的效率,本文提出了一种安全高效的VANET消息传递方案。该方案首先采用opp-dir传播模型进行消息传播,解决了消息传输延迟的问题。然后采用聚合MAC技术对消息进行签名,保证消息的可靠性。大量的实验证明,该方案可以降低消息传输延迟和通信开销,提高消息传送率。
{"title":"A Secure and Efficient Message Delivery Scheme for VANET","authors":"Huaijin Liu, Yonghong Chen, D. Agrawal","doi":"10.14257/IJSIA.2017.11.5.07","DOIUrl":"https://doi.org/10.14257/IJSIA.2017.11.5.07","url":null,"abstract":"In order to meet the need of scalability of vehicular ad hoc network (VANET), when using the roadside unit (RSU) for message authentication and broadcast, many studies have paid little attention to the message transmission delay and the communication overhead caused by the signature. For the sake of guaranteeing the reliability of the message and improve the efficiency of message transmission, this paper proposes a secure and efficient message delivery scheme for VANET. The scheme firstly uses the opp-dir dissemination model to propagate the message to solve the problem of message transmission delay. Then, the message is signed by the aggregate MAC technique to ensure the reliability of the message. Extensive experiments validate that the proposed scheme can reduce the message transmission delay and communication overhead, improve the message delivery ratio.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"11 1","pages":"69-78"},"PeriodicalIF":0.0,"publicationDate":"2017-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47205067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Coalesce of SNE-Wavelet-SVM Technique for Network Intrusion Detection 基于sne -小波-支持向量机的网络入侵检测
Pub Date : 2017-05-31 DOI: 10.14257/IJSIA.2017.11.5.01
Yasir Hamid, Ludovic Journax, F. Shah, M. Sugumaran
Recognizing intrusions quickly and precisely is vital to the proficient operation of computer networks. Precisely describing critical classes of intrusions extraordinarily encourages their recognizable proof; be that as it may, the nuances and complexities of anomalous activities can without much of a stretch complicate the procedure. Due to the inherent capability of the signal processing to discover the novel and obscure attacks, they have been pretty popular for Network Intrusion Detection, and the nearness of the self-comparability in the system activity propels the appropriateness for the application Wavelets. In this work we first subject the network data to dimension reduction using Stochastic Neighbor Embedding (SNE) and then preform the wavelet decomposition of the data. The classification results of the pre-processed data using Gaussian SVM over different bandwidths uphold the claim that the proposed system has appreciably improved detection coverage for all the attack groups and the normal data as well, and at the same time minimized the false alarms. (Coiflets), Biorthogonal wavelets, Harmonic wavelets, Legendre wavelets, M-band wavelets and Composite wavelets.
快速准确地识别入侵对于熟练操作计算机网络至关重要。准确地描述入侵的关键类别,极大地鼓励了它们的可识别证据;尽管如此,异常活动的细微差别和复杂性可能会使程序复杂化。由于信号处理发现新颖和模糊攻击的固有能力,它们在网络入侵检测中非常流行,而系统活动中自相似性的接近性推动了应用Wavelets的适当性。在这项工作中,我们首先使用随机邻居嵌入(SNE)对网络数据进行降维,然后对数据进行小波分解。使用高斯SVM在不同带宽上对预处理数据的分类结果支持这样的说法,即所提出的系统显著提高了对所有攻击组和正常数据的检测覆盖率,同时最大限度地减少了误报。(Coiflets)、双正交小波、谐波小波、勒让德小波、M-带小波和复合小波。
{"title":"A Coalesce of SNE-Wavelet-SVM Technique for Network Intrusion Detection","authors":"Yasir Hamid, Ludovic Journax, F. Shah, M. Sugumaran","doi":"10.14257/IJSIA.2017.11.5.01","DOIUrl":"https://doi.org/10.14257/IJSIA.2017.11.5.01","url":null,"abstract":"Recognizing intrusions quickly and precisely is vital to the proficient operation of computer networks. Precisely describing critical classes of intrusions extraordinarily encourages their recognizable proof; be that as it may, the nuances and complexities of anomalous activities can without much of a stretch complicate the procedure. Due to the inherent capability of the signal processing to discover the novel and obscure attacks, they have been pretty popular for Network Intrusion Detection, and the nearness of the self-comparability in the system activity propels the appropriateness for the application Wavelets. In this work we first subject the network data to dimension reduction using Stochastic Neighbor Embedding (SNE) and then preform the wavelet decomposition of the data. The classification results of the pre-processed data using Gaussian SVM over different bandwidths uphold the claim that the proposed system has appreciably improved detection coverage for all the attack groups and the normal data as well, and at the same time minimized the false alarms. (Coiflets), Biorthogonal wavelets, Harmonic wavelets, Legendre wavelets, M-band wavelets and Composite wavelets.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":" ","pages":"1-14"},"PeriodicalIF":0.0,"publicationDate":"2017-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43136683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
E-Voting System using Homomorphic Encryption in a Cloud Based Environment 基于云环境的同态加密电子投票系统
Pub Date : 2017-05-31 DOI: 10.14257/IJSIA.2017.11.5.06
R. Jain, S. Madan, B. Garg, Y. Kapila, Abhishek Gupta
Cryptography as we know it, is among the most discussed topics in the security world. Any transaction, financial or social, any data, corporate or private is not secure in an environment such as the cloud, where everything is connected to everything. The only way to save anything or to make a transaction securely is to make it meaningless to the rest of the world. It can be made meaningless when converted to some other form and this some other form can only be obtained through encryption. In this paper we discuss various techniques of homomorphic encryption applied on cloud computing and the need of security over the cloud by citing relevant statistics. We then propose and implement a secure E-voting system using the paillier encryption scheme. The main goal of this research is to design a secure voting system using the internet platform to communicate between the voting system and voters.
正如我们所知,密码学是安全世界中讨论最多的话题之一。任何交易,无论是金融还是社交,任何数据,无论是公司还是私人,在云这样的环境中都是不安全的,在云环境中,一切都与一切相连。保存任何东西或安全地进行交易的唯一方法是使其对世界其他地方毫无意义。当转换成其他形式时,它可能变得毫无意义,而这种其他形式只能通过加密获得。在本文中,我们通过引用相关统计数据,讨论了应用于云计算的各种同态加密技术以及在云上安全的需要。然后,我们提出并实现了一个使用paillier加密方案的安全电子投票系统。本研究的主要目标是设计一个安全的投票系统,利用互联网平台在投票系统和选民之间进行通信。
{"title":"E-Voting System using Homomorphic Encryption in a Cloud Based Environment","authors":"R. Jain, S. Madan, B. Garg, Y. Kapila, Abhishek Gupta","doi":"10.14257/IJSIA.2017.11.5.06","DOIUrl":"https://doi.org/10.14257/IJSIA.2017.11.5.06","url":null,"abstract":"Cryptography as we know it, is among the most discussed topics in the security world. Any transaction, financial or social, any data, corporate or private is not secure in an environment such as the cloud, where everything is connected to everything. The only way to save anything or to make a transaction securely is to make it meaningless to the rest of the world. It can be made meaningless when converted to some other form and this some other form can only be obtained through encryption. In this paper we discuss various techniques of homomorphic encryption applied on cloud computing and the need of security over the cloud by citing relevant statistics. We then propose and implement a secure E-voting system using the paillier encryption scheme. The main goal of this research is to design a secure voting system using the internet platform to communicate between the voting system and voters.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":" ","pages":"59-68"},"PeriodicalIF":0.0,"publicationDate":"2017-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48994736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Conceptual Model for Exploring the Factors Influencing Information Security Culture 探讨信息安全文化影响因素的概念模型
Pub Date : 2017-05-31 DOI: 10.14257/ijsia.2017.11.5.02
Amjad Mahfuth, S. Yussof, Asmidar Abu Bakar, N. Ali, Waleed Abdallah
Human behavior is considered as one of the main threats in an organization. Owing to the fact that human element is the weakest link in security area, it is crucial to provide an ideal information security culture within an organization in order to guide the employees’ perception, attitudes and security behavior. Furthermore, this culture can protect an organization against many information security threats posed by the employees. In this paper, we have proposed a conceptual model exploring the factors influencing the information security culture. Those factors are Security Awareness, Security Knowledge, Belief, Top Management, Security Policy, Security Behavior , Information Security Training, Security Risk Analysis and Assessment, Security Compliance, Ethical and Legal, Trust, Technology, Change Management, People, Information Security, Security Responsibility, Process, Strategy and Environment. The aim of the conceptual model would help the researchers to develop effective solutions and to provide a suitable background for information security culture across an organization. The study recommends researchers to conduct many studies in this area to focus on and investigate each of identified factors in the conceptual model in order to improve information security culture in organizations.
人的行为被认为是组织中的主要威胁之一。鉴于人的因素是安全领域最薄弱的环节,在组织内部提供一种理想的信息安全文化,以指导员工的感知、态度和安全行为至关重要。此外,这种文化可以保护组织免受员工带来的许多信息安全威胁。在本文中,我们提出了一个概念模型,探讨了影响信息安全文化的因素。这些因素包括安全意识、安全知识、信念、最高管理层、安全政策、安全行为、信息安全培训、安全风险分析和评估、安全合规性、道德和法律、信任、技术、变革管理、人员、信息安全、安全责任、流程、战略和环境。概念模型的目的是帮助研究人员制定有效的解决方案,并为整个组织的信息安全文化提供合适的背景。该研究建议研究人员在这一领域进行许多研究,重点关注和调查概念模型中的每一个已确定因素,以改善组织中的信息安全文化。
{"title":"A Conceptual Model for Exploring the Factors Influencing Information Security Culture","authors":"Amjad Mahfuth, S. Yussof, Asmidar Abu Bakar, N. Ali, Waleed Abdallah","doi":"10.14257/ijsia.2017.11.5.02","DOIUrl":"https://doi.org/10.14257/ijsia.2017.11.5.02","url":null,"abstract":"Human behavior is considered as one of the main threats in an organization. Owing to the fact that human element is the weakest link in security area, it is crucial to provide an ideal information security culture within an organization in order to guide the employees’ perception, attitudes and security behavior. Furthermore, this culture can protect an organization against many information security threats posed by the employees. In this paper, we have proposed a conceptual model exploring the factors influencing the information security culture. Those factors are Security Awareness, Security Knowledge, Belief, Top Management, Security Policy, Security Behavior , Information Security Training, Security Risk Analysis and Assessment, Security Compliance, Ethical and Legal, Trust, Technology, Change Management, People, Information Security, Security Responsibility, Process, Strategy and Environment. The aim of the conceptual model would help the researchers to develop effective solutions and to provide a suitable background for information security culture across an organization. The study recommends researchers to conduct many studies in this area to focus on and investigate each of identified factors in the conceptual model in order to improve information security culture in organizations.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":" ","pages":"15-26"},"PeriodicalIF":0.0,"publicationDate":"2017-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.14257/ijsia.2017.11.5.02","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45960626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Application Layer DDOS Attack Detection Using Hybrid Machine Learning Approach 应用层DDOS攻击检测的混合机器学习方法
Pub Date : 2017-04-30 DOI: 10.14257/IJSIA.2017.11.4.07
Rizwan Ur Rahman, D. Tomar, A. V. Jijin
Application Layer Distributed Denial of Service (App-DDoS) attack has become a major threat to web security. Attack detection is difficult as they mimic genuine user request. This paper proposes a clustering based correlation approach for detecting application layer DDoS attack on HTTP protocol. Proposed approach has two main modules ----Flow monitoring module and User behavior monitoring module. Flow monitor is responsible to analyze data flow information. User behavior monitor analyses end user behavior. Proposed approach is capable to detect three main attacks on HTTP protocol, i.e. HTTP-GET attack, HTTP-POST attack and Slow Read attack. It is also possible to detect hybrid type of DDoS attacks which uses a mixture network and application layer DDoS techniques. Comparative analysis of clustering algorithms on generated dataset is also done to demonstrate the effectiveness of detection approach.
应用层分布式拒绝服务(App DDoS)攻击已成为网络安全的主要威胁。攻击检测很困难,因为它们模仿真实的用户请求。本文提出了一种基于聚类的关联检测HTTP协议应用层DDoS攻击的方法。所提出的方法有两个主要模块——流量监控模块和用户行为监控模块。流量监控器负责分析数据流信息。用户行为监视器分析最终用户的行为。该方法能够检测HTTP协议的三种主要攻击,即HTTP-GET攻击、HTTP-POST攻击和慢速读取攻击。还可以检测使用混合网络和应用层DDoS技术的混合类型的DDoS攻击。并对生成的数据集的聚类算法进行了比较分析,验证了检测方法的有效性。
{"title":"Application Layer DDOS Attack Detection Using Hybrid Machine Learning Approach","authors":"Rizwan Ur Rahman, D. Tomar, A. V. Jijin","doi":"10.14257/IJSIA.2017.11.4.07","DOIUrl":"https://doi.org/10.14257/IJSIA.2017.11.4.07","url":null,"abstract":"Application Layer Distributed Denial of Service (App-DDoS) attack has become a major threat to web security. Attack detection is difficult as they mimic genuine user request. This paper proposes a clustering based correlation approach for detecting application layer DDoS attack on HTTP protocol. Proposed approach has two main modules ----Flow monitoring module and User behavior monitoring module. Flow monitor is responsible to analyze data flow information. User behavior monitor analyses end user behavior. Proposed approach is capable to detect three main attacks on HTTP protocol, i.e. HTTP-GET attack, HTTP-POST attack and Slow Read attack. It is also possible to detect hybrid type of DDoS attacks which uses a mixture network and application layer DDoS techniques. Comparative analysis of clustering algorithms on generated dataset is also done to demonstrate the effectiveness of detection approach.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"11 1","pages":"85-96"},"PeriodicalIF":0.0,"publicationDate":"2017-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41601823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Implementation of a Two-Level Security Door Access Using Keypad and Voice Recognition 使用键盘和语音识别实现两级安全门禁
Pub Date : 2017-04-30 DOI: 10.14257/ijsia.2017.11.4.04
Morkat M. Yilwatda, J. A. Enokela, N. Goshwe
It is possible today to automate a growing number of speaker-recognition tasks with such technologies as voice or speaker verification and voice identification. These systems have been applied to real-world security applications. They have, however, been undergoing modifications due to the poor level of security architecture that they provide to users. Hence there is the need, as has been done in this work, to develop a more efficient, user friendly and complex security system that can curtail illegal intrusion into special facilities. The system described in this paper uses matrix keypad which is interfaced with a microcontroller for first level security validation to monitor and control the execution of desired tasks within the keypad and voice recognition (KVR) system. A voice recognition Integrated Circuit is used for second level security verification. A tristate buffer is also employed to logically isolate the buses of the digital signal processing (DSP) chip and those of the microcontroller. From the research, tests were conducted for both noiseless and noisy environments and the recommended distance between the user and microphone in a noiseless environment using electrets type condenser microphone is 1.0 cm to 16 cm while under noisy condition it was found to be 1.0 cm to 6.0 cm. These results depend on the sensitivity of the microphone and the environmental conditions at the time. It can be deduced from the research that integrating the keypad and voice recognition design can help to optimize the security level of the system and by implication help in controlling unwanted intrusion into the special facilities such as museum, military armory, financial institution, etc.
如今,利用诸如语音或说话者验证和语音识别之类的技术,可以使越来越多的说话者识别任务自动化。这些系统已应用于现实世界中的安全应用程序。然而,由于它们为用户提供的安全体系结构级别较差,它们一直在进行修改。因此,正如在这项工作中所做的那样,有必要开发一个更高效、用户友好和复杂的安全系统,以减少对特殊设施的非法入侵。本文中描述的系统使用矩阵键盘,该键盘与用于一级安全验证的微控制器接口,以监控和控制键盘和语音识别(KVR)系统内所需任务的执行。语音识别集成电路用于二级安全验证。三态缓冲器也用于逻辑隔离数字信号处理(DSP)芯片的总线和微控制器的总线。根据研究,对无噪声和有噪声环境进行了测试,在使用驻极体型电容式麦克风的无噪声环境中,用户与麦克风之间的推荐距离为1.0厘米至16厘米,而在有噪声的条件下,建议距离为1.0 cm至6.0厘米。这些结果取决于麦克风的灵敏度和当时的环境条件。研究表明,将键盘和语音识别设计相结合有助于优化系统的安全级别,并有助于控制对博物馆、军事军械库、金融机构等特殊设施的不必要入侵。
{"title":"Implementation of a Two-Level Security Door Access Using Keypad and Voice Recognition","authors":"Morkat M. Yilwatda, J. A. Enokela, N. Goshwe","doi":"10.14257/ijsia.2017.11.4.04","DOIUrl":"https://doi.org/10.14257/ijsia.2017.11.4.04","url":null,"abstract":"It is possible today to automate a growing number of speaker-recognition tasks with such technologies as voice or speaker verification and voice identification. These systems have been applied to real-world security applications. They have, however, been undergoing modifications due to the poor level of security architecture that they provide to users. Hence there is the need, as has been done in this work, to develop a more efficient, user friendly and complex security system that can curtail illegal intrusion into special facilities. The system described in this paper uses matrix keypad which is interfaced with a microcontroller for first level security validation to monitor and control the execution of desired tasks within the keypad and voice recognition (KVR) system. A voice recognition Integrated Circuit is used for second level security verification. A tristate buffer is also employed to logically isolate the buses of the digital signal processing (DSP) chip and those of the microcontroller. From the research, tests were conducted for both noiseless and noisy environments and the recommended distance between the user and microphone in a noiseless environment using electrets type condenser microphone is 1.0 cm to 16 cm while under noisy condition it was found to be 1.0 cm to 6.0 cm. These results depend on the sensitivity of the microphone and the environmental conditions at the time. It can be deduced from the research that integrating the keypad and voice recognition design can help to optimize the security level of the system and by implication help in controlling unwanted intrusion into the special facilities such as museum, military armory, financial institution, etc.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":" ","pages":"45-58"},"PeriodicalIF":0.0,"publicationDate":"2017-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49392167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Security and Its Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1