首页 > 最新文献

Journal of Information Security and Applications最新文献

英文 中文
HierFedPDP:Hierarchical federated learning with personalized differential privacy HierFedPDP:具有个性化差异隐私的分层联合学习
IF 3.8 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-18 DOI: 10.1016/j.jisa.2024.103890
Sitong Li , Yifan Liu , Fan Feng , Yi Liu , Xiaofei Li , Zhenpeng Liu

Federated Learning (FL) is an innovative approach that enables multiple parties to collaboratively train a machine learning model while keeping their data private. This method significantly enhances data security as it avoids sharing raw data among participants. However, a critical challenge in FL is the potential leakage of sensitive information through shared model updates. To address this, differential privacy techniques, which add random noise to data or model updates, are used to safeguard individual data points from being inferred. Traditional approaches to differential privacy typically utilize a fixed privacy budget, which may not account for the varying sensitivity of data, potentially affecting model accuracy. To overcome these limitations, we introduce HierFedPDP, a new FL framework that optimizes data privacy and model performance. HierFedPDP employs a three-tier client–edge–cloud architecture, maximizing the use of edge computing to alleviate the computational load on the central server. At the core of HierFedPDP is a personalized local differential privacy mechanism that tailors privacy settings based on data sensitivity, thereby enhancing data protection while maintaining high utility. Our framework not only fortifies privacy but also improves model accuracy. Specifically, experiments on the MNIST dataset show that HierFedPDP outperforms existing models, increasing accuracy by 0.84% to 2.36%, and CIFAR-10 has also achieved effective improvements. This research advances the capabilities of FL in protecting data privacy and provides valuable insights for designing more efficient distributed learning systems.

联合学习(FL)是一种创新方法,可使多方合作训练机器学习模型,同时保持各自数据的私密性。这种方法避免了参与者之间共享原始数据,从而大大提高了数据的安全性。然而,FL 的一个关键挑战是共享模型更新可能导致敏感信息泄露。为了解决这个问题,我们采用了差分隐私技术,即在数据或模型更新中添加随机噪音,以防止单个数据点被推断出来。差分隐私的传统方法通常使用固定的隐私预算,这可能无法考虑数据敏感度的变化,从而可能影响模型的准确性。为了克服这些局限性,我们引入了 HierFedPDP,这是一种能优化数据隐私和模型性能的全新 FL 框架。HierFedPDP 采用客户-边缘-云三层架构,最大限度地利用边缘计算来减轻中央服务器的计算负荷。HierFedPDP 的核心是个性化的本地差异隐私机制,该机制可根据数据敏感性调整隐私设置,从而在保持高实用性的同时加强数据保护。我们的框架不仅能加强隐私保护,还能提高模型的准确性。具体来说,在 MNIST 数据集上的实验表明,HierFedPDP 的表现优于现有模型,准确率提高了 0.84% 到 2.36%,CIFAR-10 也取得了有效的改进。这项研究推进了 FL 在保护数据隐私方面的能力,并为设计更高效的分布式学习系统提供了有价值的见解。
{"title":"HierFedPDP:Hierarchical federated learning with personalized differential privacy","authors":"Sitong Li ,&nbsp;Yifan Liu ,&nbsp;Fan Feng ,&nbsp;Yi Liu ,&nbsp;Xiaofei Li ,&nbsp;Zhenpeng Liu","doi":"10.1016/j.jisa.2024.103890","DOIUrl":"10.1016/j.jisa.2024.103890","url":null,"abstract":"<div><p>Federated Learning (FL) is an innovative approach that enables multiple parties to collaboratively train a machine learning model while keeping their data private. This method significantly enhances data security as it avoids sharing raw data among participants. However, a critical challenge in FL is the potential leakage of sensitive information through shared model updates. To address this, differential privacy techniques, which add random noise to data or model updates, are used to safeguard individual data points from being inferred. Traditional approaches to differential privacy typically utilize a fixed privacy budget, which may not account for the varying sensitivity of data, potentially affecting model accuracy. To overcome these limitations, we introduce HierFedPDP, a new FL framework that optimizes data privacy and model performance. HierFedPDP employs a three-tier client–edge–cloud architecture, maximizing the use of edge computing to alleviate the computational load on the central server. At the core of HierFedPDP is a personalized local differential privacy mechanism that tailors privacy settings based on data sensitivity, thereby enhancing data protection while maintaining high utility. Our framework not only fortifies privacy but also improves model accuracy. Specifically, experiments on the MNIST dataset show that HierFedPDP outperforms existing models, increasing accuracy by 0.84% to 2.36%, and CIFAR-10 has also achieved effective improvements. This research advances the capabilities of FL in protecting data privacy and provides valuable insights for designing more efficient distributed learning systems.</p></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"86 ","pages":"Article 103890"},"PeriodicalIF":3.8,"publicationDate":"2024-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142243778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced Fourier–Mellin domain watermarking for social networking platforms 针对社交网络平台的增强型傅立叶-梅林域水印技术
IF 3.8 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-17 DOI: 10.1016/j.jisa.2024.103884
Jinghong Xia , Hongxia Wang , Sani M. Abdullahi , Heng Wang , Fei Zhang , Bingling Luo

Robustness to common hybrid distortions is a crucial requirement for effective watermarking, particularly on social networking platforms (SNPs). Images on SNPs undergo complex attacks initiated by both platforms and users, involving diverse distortion operations. However, there are few image watermarking schemes designed to handle such hybrid attacks effectively. Existing schemes, especially those based on the Fourier-Mellin domain, often struggle due to their susceptibility to single attacks. For instance, the ring watermark structure in the frequency domain is prone to distortion, leading to difficulties in mapping watermark information and causing streak diffraction phenomena in the image. Additionally, these schemes lack robustness against large-size image downsampling and image flipping attacks on SNPs. To address these limitations, this paper introduces an enhanced robust watermarking framework tailored for SNPs. The framework comprises three key modules: a module to stabilize the ring watermark structure, an adaptive embedding strength and range module, and a sliding window and flip state detection module. These modules, coupled with log-polar mapping (LPM) in the Fourier-Mellin domain, effectively mitigate the lack of robustness to specific attacks, resulting in comprehensive robustness for the entire framework. Numerous experiments demonstrate that our proposed scheme outperforms other state-of-the-art (SOTA) works in handling hybrid distortions on SNPs.

对常见混合失真的鲁棒性是有效水印的关键要求,尤其是在社交网络平台(SNP)上。社交网络平台上的图像会受到由平台和用户发起的复杂攻击,涉及多种失真操作。然而,目前很少有图像水印方案能有效处理这种混合攻击。现有的方案,尤其是那些基于傅立叶-梅林域的方案,往往由于容易受到单一攻击而陷入困境。例如,频域中的环形水印结构容易失真,导致水印信息难以映射,并在图像中造成条纹衍射现象。此外,这些方案对 SNP 的大尺寸图像降采样和图像翻转攻击缺乏鲁棒性。为了解决这些局限性,本文介绍了一种专为 SNP 量身定制的增强型鲁棒水印框架。该框架由三个关键模块组成:稳定环形水印结构模块、自适应嵌入强度和范围模块以及滑动窗口和翻转状态检测模块。这些模块与傅立叶-梅林域中的对数极性映射(LPM)相结合,有效缓解了对特定攻击的鲁棒性不足,从而使整个框架具有全面的鲁棒性。大量实验证明,我们提出的方案在处理 SNP 混合失真方面优于其他最先进的(SOTA)方案。
{"title":"Enhanced Fourier–Mellin domain watermarking for social networking platforms","authors":"Jinghong Xia ,&nbsp;Hongxia Wang ,&nbsp;Sani M. Abdullahi ,&nbsp;Heng Wang ,&nbsp;Fei Zhang ,&nbsp;Bingling Luo","doi":"10.1016/j.jisa.2024.103884","DOIUrl":"10.1016/j.jisa.2024.103884","url":null,"abstract":"<div><p>Robustness to common hybrid distortions is a crucial requirement for effective watermarking, particularly on social networking platforms (SNPs). Images on SNPs undergo complex attacks initiated by both platforms and users, involving diverse distortion operations. However, there are few image watermarking schemes designed to handle such hybrid attacks effectively. Existing schemes, especially those based on the Fourier-Mellin domain, often struggle due to their susceptibility to single attacks. For instance, the ring watermark structure in the frequency domain is prone to distortion, leading to difficulties in mapping watermark information and causing streak diffraction phenomena in the image. Additionally, these schemes lack robustness against large-size image downsampling and image flipping attacks on SNPs. To address these limitations, this paper introduces an enhanced robust watermarking framework tailored for SNPs. The framework comprises three key modules: a module to stabilize the ring watermark structure, an adaptive embedding strength and range module, and a sliding window and flip state detection module. These modules, coupled with log-polar mapping (LPM) in the Fourier-Mellin domain, effectively mitigate the lack of robustness to specific attacks, resulting in comprehensive robustness for the entire framework. Numerous experiments demonstrate that our proposed scheme outperforms other state-of-the-art (SOTA) works in handling hybrid distortions on SNPs.</p></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"86 ","pages":"Article 103884"},"PeriodicalIF":3.8,"publicationDate":"2024-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142243915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Self-sovereign identity management in ciphertext policy attribute based encryption for IoT protocols 物联网协议基于密码策略属性加密的自主权身份管理
IF 3.8 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-11 DOI: 10.1016/j.jisa.2024.103885
Weichu Deng , Jin Li , Hongyang Yan , Arthur Sandor Voundi Koe , Teng huang , Jianfeng Wang , Cong Peng

In the Internet of Things, access control and identity management rely on centralized platforms. However, centralized platforms will compromise user privacy with identity leakage. Self-sovereign identity (SSI) is a novel model for identity management that does not require third-party centralized authority. Thus, SSI is a potential solution to the identity management problem in IoT access control. This paper’s motivation is to address the problems of lack of identity sovereignty, centralized authorization, and high computational overhead for IoT access control. We propose a novel access control scheme for IoT that decentralizes identity management and tackles single-point-of-failure issues. This scheme leverages ciphertext policy attribute-based encryption (CP-ABE) and SSI to achieve the overall goal. Specifically, Our scheme eliminates the central authority and empowers users to manage their identity, allowing users to decide what attributes they disclose. Regarding the distribution of roles in the architecture, this paper follows the generic SSI model (ISSUER–HOLDER—VERIFIER) that allows a user to access a service from a service provider. To enable real-world deployment of our scheme, we establish an attribute authorization authority(such as the government) as a trusted identity point of entry. Users generate decentralized identifiers to enjoy services of interest in a privacy-preserving manner. The analysis demonstrates the practicality and superiority of our scheme. Our scheme requires less computation and is suitable for resource-constrained IoT scenarios.

在物联网中,访问控制和身份管理依赖于集中式平台。然而,集中式平台会因身份泄露而损害用户隐私。自我主权身份(SSI)是一种无需第三方集中授权的新型身份管理模式。因此,SSI 是解决物联网访问控制中身份管理问题的潜在方案。本文旨在解决物联网访问控制中身份主权缺失、集中授权和高计算开销等问题。我们提出了一种新颖的物联网访问控制方案,它能分散身份管理并解决单点故障问题。该方案利用基于密文策略属性的加密(CP-ABE)和 SSI 来实现总体目标。具体来说,我们的方案消除了中央机构,并授权用户管理自己的身份,允许用户决定披露哪些属性。关于架构中的角色分配,本文遵循通用 SSI 模型(ISSUER-HOLDER-VERIFIER),允许用户访问服务提供商提供的服务。为了在现实世界中部署我们的方案,我们建立了一个属性授权机构(如政府)作为可信身份的入口点。用户生成分散的标识符,以保护隐私的方式享受感兴趣的服务。分析表明了我们方案的实用性和优越性。我们的方案所需的计算量较少,适用于资源有限的物联网场景。
{"title":"Self-sovereign identity management in ciphertext policy attribute based encryption for IoT protocols","authors":"Weichu Deng ,&nbsp;Jin Li ,&nbsp;Hongyang Yan ,&nbsp;Arthur Sandor Voundi Koe ,&nbsp;Teng huang ,&nbsp;Jianfeng Wang ,&nbsp;Cong Peng","doi":"10.1016/j.jisa.2024.103885","DOIUrl":"10.1016/j.jisa.2024.103885","url":null,"abstract":"<div><p>In the Internet of Things, access control and identity management rely on centralized platforms. However, centralized platforms will compromise user privacy with identity leakage. Self-sovereign identity (SSI) is a novel model for identity management that does not require third-party centralized authority. Thus, SSI is a potential solution to the identity management problem in IoT access control. This paper’s motivation is to address the problems of lack of identity sovereignty, centralized authorization, and high computational overhead for IoT access control. We propose a novel access control scheme for IoT that decentralizes identity management and tackles single-point-of-failure issues. This scheme leverages ciphertext policy attribute-based encryption (CP-ABE) and SSI to achieve the overall goal. Specifically, Our scheme eliminates the central authority and empowers users to manage their identity, allowing users to decide what attributes they disclose. Regarding the distribution of roles in the architecture, this paper follows the generic SSI model (ISSUER–HOLDER—VERIFIER) that allows a user to access a service from a service provider. To enable real-world deployment of our scheme, we establish an attribute authorization authority(such as the government) as a trusted identity point of entry. Users generate decentralized identifiers to enjoy services of interest in a privacy-preserving manner. The analysis demonstrates the practicality and superiority of our scheme. Our scheme requires less computation and is suitable for resource-constrained IoT scenarios.</p></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"86 ","pages":"Article 103885"},"PeriodicalIF":3.8,"publicationDate":"2024-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142169320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Shared file protection against unauthorised encryption using a Buffer-Based Signature Verification Method 使用基于缓冲区的签名验证方法保护共享文件,防止未经授权的加密
IF 3.8 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-09 DOI: 10.1016/j.jisa.2024.103873
Arash Mahboubi , Seyit Camtepe , Keyvan Ansari , Marcin Pawłowski , Paweł Morawiecki , Hamed Aboutorab , Josef Pieprzyk , Jarek Duda

Understanding the attributes of critical data and implementing suitable security measures help organisations bolster their data-protection strategies and diminish the potential impacts of ransomware incidents. Unauthorised extraction and acquisition of data are the principal objectives of most cyber invasions. We underscore the severity of this issue using a recent attack by the Clop ransomware group, which exploited the MOVEit Transfer vulnerability and bypassed network-detection mechanisms to exfiltrate data via a Command and Control server. As a countermeasure, we propose a method called Buffer-Based Signature Verification (BBSV). This approach involves embedding 32-byte tags into files prior to their storage in the cloud, thus offering enhanced data protection. The BBSV method can be integrated into software like MOVEit Secure Managed File Transfer, thereby thwarting attempts by ransomware to exfiltrate data. Empirically tested using a BBSV prototype, our approach was able to successfully halt the encryption process for 80 ransomware instances from 70 ransomware families. BBSV not only stops the encryption but also prevents data exfiltration when data are moved or written from the original location by adversaries. We further develop a hypothetical exploit scenario in which an adversary manages to bypass the BBSV, illicitly transmits data to a Command and Control server, and then removes files from the original location. We construct an extended state space, in which each state represents a tuple that integrates user authentication and system components at the filesystem level.

了解关键数据的属性并实施适当的安全措施,有助于组织加强数据保护战略,降低勒索软件事件的潜在影响。未经授权提取和获取数据是大多数网络入侵的主要目的。我们通过 Clop 勒索软件组织最近的一次攻击强调了这一问题的严重性,该组织利用 MOVEit Transfer 漏洞,绕过网络检测机制,通过指挥和控制服务器外泄数据。作为对策,我们提出了一种名为 "基于缓冲区的签名验证"(BBSV)的方法。这种方法是在文件存储到云之前将 32 字节标签嵌入文件,从而提供更强的数据保护。BBSV 方法可以集成到 MOVEit 安全托管文件传输等软件中,从而挫败勒索软件外泄数据的企图。通过使用 BBSV 原型进行经验测试,我们的方法能够成功阻止来自 70 个勒索软件家族的 80 个勒索软件实例的加密过程。BBSV 不仅能阻止加密,还能在数据被对手从原始位置移动或写入时防止数据外泄。我们进一步开发了一种假想的利用场景,即对手设法绕过 BBSV,非法将数据传输到指挥与控制服务器,然后从原始位置删除文件。我们构建了一个扩展的状态空间,其中每个状态都代表一个元组,在文件系统层面集成了用户验证和系统组件。
{"title":"Shared file protection against unauthorised encryption using a Buffer-Based Signature Verification Method","authors":"Arash Mahboubi ,&nbsp;Seyit Camtepe ,&nbsp;Keyvan Ansari ,&nbsp;Marcin Pawłowski ,&nbsp;Paweł Morawiecki ,&nbsp;Hamed Aboutorab ,&nbsp;Josef Pieprzyk ,&nbsp;Jarek Duda","doi":"10.1016/j.jisa.2024.103873","DOIUrl":"10.1016/j.jisa.2024.103873","url":null,"abstract":"<div><p>Understanding the attributes of critical data and implementing suitable security measures help organisations bolster their data-protection strategies and diminish the potential impacts of ransomware incidents. Unauthorised extraction and acquisition of data are the principal objectives of most cyber invasions. We underscore the severity of this issue using a recent attack by the Clop ransomware group, which exploited the MOVEit Transfer vulnerability and bypassed network-detection mechanisms to exfiltrate data via a Command and Control server. As a countermeasure, we propose a method called Buffer-Based Signature Verification (BBSV). This approach involves embedding 32-byte tags into files prior to their storage in the cloud, thus offering enhanced data protection. The BBSV method can be integrated into software like MOVEit Secure Managed File Transfer, thereby thwarting attempts by ransomware to exfiltrate data. Empirically tested using a BBSV prototype, our approach was able to successfully halt the encryption process for 80 ransomware instances from 70 ransomware families. BBSV not only stops the encryption but also prevents data exfiltration when data are moved or written from the original location by adversaries. We further develop a hypothetical exploit scenario in which an adversary manages to bypass the BBSV, illicitly transmits data to a Command and Control server, and then removes files from the original location. We construct an extended state space, in which each state represents a tuple that integrates user authentication and system components at the filesystem level.</p></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"86 ","pages":"Article 103873"},"PeriodicalIF":3.8,"publicationDate":"2024-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2214212624001753/pdfft?md5=68d74f2ecd64919a7bca1979c6adbfbd&pid=1-s2.0-S2214212624001753-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142157893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection of Evasive Android Malware Using EigenGCN 利用 EigenGCN 检测规避性安卓恶意软件
IF 3.8 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-07 DOI: 10.1016/j.jisa.2024.103880
Teenu S. John , Tony Thomas , Sabu Emmanuel

Recently there is an upsurge in Android malware that use obfuscation and repackaging techniques for evasion. Malware may also combine both these techniques to create stealthy adversarial mimicry samples to launch mimicry attacks. In mimicry attacks, the adversary makes sure that the static and dynamic features present in the crafted malware mimics the features present in the legitimate applications. In such cases, the existing detection mechanisms may become less effective. We found that the malicious nature of Android applications can be determined by identifying certain subgraphs that appear in their system call graphs. These subgraphs can be determined with the help of spectral clustering mechanism present in EigenGCN. With this, the system call graph G will be partitioned into two subgraphs G1 and G2, in which the malicious functionality if any will be present in the subgraph G1. The graph Fourier transform based pooling technique in EigenGCN then computes the features of the subgraphs in the form of graph signals. This graph signals serve as a robust signature to detect malware. The proposed mechanism gave an accuracy of 98.7% on common malware, 97.3% on obfuscated malware, 97.8% on repackaged malware, and 90% on adversarial mimicry malware datasets. As far as we know, this is the first work that proposes a malware detection mechanism, that can detect common as well as obfuscated, repackaged, and mimicry malware in Android.

最近,使用混淆和重新打包技术进行规避的安卓恶意软件激增。恶意软件还可能将这两种技术结合起来,创建隐蔽的恶意模仿样本,发起模仿攻击。在模仿攻击中,对手会确保制作的恶意软件中的静态和动态特征模仿合法应用程序中的特征。在这种情况下,现有的检测机制可能会变得不那么有效。我们发现,可以通过识别系统调用图中出现的某些子图来确定 Android 应用程序的恶意性质。这些子图可以借助 EigenGCN 中的光谱聚类机制来确定。这样,系统调用图 G 将被划分为两个子图 G1 和 G2,其中恶意功能(如有)将出现在子图 G1 中。然后,EigenGCN 中基于图傅立叶变换的池化技术将以图信号的形式计算出子图的特征。这种图信号可作为检测恶意软件的稳健签名。所提出的机制对普通恶意软件的准确率为 98.7%,对混淆恶意软件的准确率为 97.3%,对重新打包恶意软件的准确率为 97.8%,对对抗性模仿恶意软件数据集的准确率为 90%。据我们所知,这是第一项提出恶意软件检测机制的工作,它既能检测安卓系统中的普通恶意软件,也能检测混淆、重新打包和模仿恶意软件。
{"title":"Detection of Evasive Android Malware Using EigenGCN","authors":"Teenu S. John ,&nbsp;Tony Thomas ,&nbsp;Sabu Emmanuel","doi":"10.1016/j.jisa.2024.103880","DOIUrl":"10.1016/j.jisa.2024.103880","url":null,"abstract":"<div><p>Recently there is an upsurge in Android malware that use obfuscation and repackaging techniques for evasion. Malware may also combine both these techniques to create stealthy adversarial mimicry samples to launch mimicry attacks. In mimicry attacks, the adversary makes sure that the static and dynamic features present in the crafted malware mimics the features present in the legitimate applications. In such cases, the existing detection mechanisms may become less effective. We found that the malicious nature of Android applications can be determined by identifying certain subgraphs that appear in their system call graphs. These subgraphs can be determined with the help of spectral clustering mechanism present in EigenGCN. With this, the system call graph <span><math><mi>G</mi></math></span> will be partitioned into two subgraphs <span><math><msub><mrow><mi>G</mi></mrow><mrow><mn>1</mn></mrow></msub></math></span> and <span><math><msub><mrow><mi>G</mi></mrow><mrow><mn>2</mn></mrow></msub></math></span>, in which the malicious functionality if any will be present in the subgraph <span><math><msub><mrow><mi>G</mi></mrow><mrow><mn>1</mn></mrow></msub></math></span>. The graph Fourier transform based pooling technique in EigenGCN then computes the features of the subgraphs in the form of graph signals. This graph signals serve as a robust signature to detect malware. The proposed mechanism gave an accuracy of 98.7% on common malware, 97.3% on obfuscated malware, 97.8% on repackaged malware, and 90% on adversarial mimicry malware datasets. As far as we know, this is the first work that proposes a malware detection mechanism, that can detect common as well as obfuscated, repackaged, and mimicry malware in Android.</p></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"86 ","pages":"Article 103880"},"PeriodicalIF":3.8,"publicationDate":"2024-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142151348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Moment invariants based zero watermarking algorithm for trajectory data 基于矩不变式的轨迹数据零水印算法
IF 3.8 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-03 DOI: 10.1016/j.jisa.2024.103867
Na Ren , Yuchen Hu , Changqing Zhu , Shuitao Guo , Xianshu Zhu

Zero watermarking is a lossless copyright protection technology that satisfies the need for copyright protection without compromising the accuracy of trajectory data. However, existing zero watermarking algorithms for trajectory data are unable to resist random deletion point attack. Therefore, a trajectory data zero watermarking algorithm based on moment invariants was proposed to address the problem. Firstly, two compression algorithms are utilized to extract feature points from the trajectory data. Then, a coordinate system is constructed using the minimum area bounding rectangle (MABR) of the feature points. Next, based on the constructed coordinate system, the feature points are divided into subtrajectories, and the linear moment invariants generated by the subtrajectories are calculated. Finally, the zero watermark information is constructed based on the linear moment invariants, and the watermark copyright information is generated by exclusive-ORing (XOR) it with the copyright image. Experimental results demonstrate that the zero watermark information constructed by the proposed algorithm has good uniqueness and strong robustness against random deletion, compression, and other common attacks. Furthermore, the proposed algorithm has good algorithm efficiency and is applicable to vector data with plane coordinates. The study makes a positive contribution to copyright protection for trajectory data and provides useful references for research on lossless watermarking of vector geographic data.

零水印是一种无损版权保护技术,既能满足版权保护的需要,又不影响轨迹数据的准确性。然而,现有的轨迹数据零水印算法无法抵御随机删除点攻击。因此,针对这一问题,提出了一种基于矩不变式的轨迹数据零水印算法。首先,利用两种压缩算法从轨迹数据中提取特征点。然后,利用特征点的最小区域边界矩形(MABR)构建坐标系。然后,根据构建的坐标系,将特征点划分为子轨迹,并计算子轨迹产生的线性矩不变式。最后,根据线性矩不变式构建零水印信息,并通过与版权图像的排他-OR(XOR)生成水印版权信息。实验结果表明,所提算法构建的零水印信息具有良好的唯一性,对随机删除、压缩和其他常见攻击具有很强的鲁棒性。此外,所提出的算法具有良好的算法效率,适用于平面坐标的矢量数据。该研究为轨迹数据的版权保护做出了积极贡献,也为矢量地理数据的无损水印研究提供了有益参考。
{"title":"Moment invariants based zero watermarking algorithm for trajectory data","authors":"Na Ren ,&nbsp;Yuchen Hu ,&nbsp;Changqing Zhu ,&nbsp;Shuitao Guo ,&nbsp;Xianshu Zhu","doi":"10.1016/j.jisa.2024.103867","DOIUrl":"10.1016/j.jisa.2024.103867","url":null,"abstract":"<div><p>Zero watermarking is a lossless copyright protection technology that satisfies the need for copyright protection without compromising the accuracy of trajectory data. However, existing zero watermarking algorithms for trajectory data are unable to resist random deletion point attack. Therefore, a trajectory data zero watermarking algorithm based on moment invariants was proposed to address the problem. Firstly, two compression algorithms are utilized to extract feature points from the trajectory data. Then, a coordinate system is constructed using the minimum area bounding rectangle (MABR) of the feature points. Next, based on the constructed coordinate system, the feature points are divided into subtrajectories, and the linear moment invariants generated by the subtrajectories are calculated. Finally, the zero watermark information is constructed based on the linear moment invariants, and the watermark copyright information is generated by exclusive-ORing (XOR) it with the copyright image. Experimental results demonstrate that the zero watermark information constructed by the proposed algorithm has good uniqueness and strong robustness against random deletion, compression, and other common attacks. Furthermore, the proposed algorithm has good algorithm efficiency and is applicable to vector data with plane coordinates. The study makes a positive contribution to copyright protection for trajectory data and provides useful references for research on lossless watermarking of vector geographic data.</p></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"86 ","pages":"Article 103867"},"PeriodicalIF":3.8,"publicationDate":"2024-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142129429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
P-Chain: Towards privacy-aware smart contract using SMPC P-Chain:使用 SMPC 实现隐私感知智能合约
IF 3.8 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-03 DOI: 10.1016/j.jisa.2024.103872
Yiqing Diao , Ayong Ye , Yuexin Zhang , Ji Zhang , Li Xu

Smart contract, as the representative application of blockchain, has recently fueled extensive research interests from both academia and industry. However, with its wide applications, the weaknesses of smart contract have been gradually revealed. The major barrier to the widespread adoption of smart contract involves concerns about on-chain privacy which refers to the details of input/output privacy. To address privacy concerns, we propose in this paper, P-Chain, a privacy-aware framework for smart contracts of permissioned blockchain to protect sensitive data of users based on Secure Multi-party Computation (SMPC). Unlike existing work that suffer several key drawbacks, including introducing a third party who could get the details of the deal, and high overhead for on-chain and off-chain communication, as well as lacking a privacy protection for output data, we enhance the privacy protection for smart contracts system by adding a new secure multi-party computation layer in P-Chain. Through secure multi-party computing, sensitive inputs of smart contracts are divided into multiple sub-inputs and sent to computing participants for operation respectively, which ensures that each participant can only access part of the user’s information. A stochastic strategy based on (t;n) threshold secret sharing to select calculating parties is also been proposed, which makes it difficult for an attacker to aggregate t of n participants for launching a collusive attack. In addition, we propose the output privacy protection method that makes it possible to reach a consensus without the need to know the output. The extensive experimental evaluation and analysis demonstrate that our scheme enjoys the advantages of calculation correctness, input–output privacy as well as anti-collusion.

智能合约作为区块链的代表性应用,近年来引起了学术界和产业界的广泛研究兴趣。然而,随着智能合约的广泛应用,其弱点也逐渐暴露出来。智能合约广泛应用的主要障碍涉及对链上隐私的担忧,即输入/输出隐私的细节问题。为了解决隐私问题,我们在本文中提出了P-Chain,这是一个隐私感知框架,用于许可区块链的智能合约,以保护基于安全多方计算(SMPC)的用户敏感数据。与现有工作的几个主要缺点不同,包括引入第三方获取交易细节、链上和链下通信开销高以及缺乏对输出数据的隐私保护,我们通过在P-Chain中添加一个新的安全多方计算层来增强智能合约系统的隐私保护。通过安全多方计算,智能合约的敏感输入被分成多个子输入,分别发送给计算参与方进行运算,确保每个参与方只能获取用户的部分信息。我们还提出了一种基于(t;n)阈值秘密共享的随机策略来选择计算参与方,这使得攻击者很难聚合 n 个参与方中的 t 个参与方来发起合谋攻击。此外,我们还提出了输出隐私保护方法,使得在不知道输出的情况下达成共识成为可能。大量的实验评估和分析表明,我们的方案具有计算正确性、输入输出隐私性和防串通等优点。
{"title":"P-Chain: Towards privacy-aware smart contract using SMPC","authors":"Yiqing Diao ,&nbsp;Ayong Ye ,&nbsp;Yuexin Zhang ,&nbsp;Ji Zhang ,&nbsp;Li Xu","doi":"10.1016/j.jisa.2024.103872","DOIUrl":"10.1016/j.jisa.2024.103872","url":null,"abstract":"<div><p>Smart contract, as the representative application of blockchain, has recently fueled extensive research interests from both academia and industry. However, with its wide applications, the weaknesses of smart contract have been gradually revealed. The major barrier to the widespread adoption of smart contract involves concerns about on-chain privacy which refers to the details of input/output privacy. To address privacy concerns, we propose in this paper, P-Chain, a privacy-aware framework for smart contracts of permissioned blockchain to protect sensitive data of users based on Secure Multi-party Computation (SMPC). Unlike existing work that suffer several key drawbacks, including introducing a third party who could get the details of the deal, and high overhead for on-chain and off-chain communication, as well as lacking a privacy protection for output data, we enhance the privacy protection for smart contracts system by adding a new secure multi-party computation layer in P-Chain. Through secure multi-party computing, sensitive inputs of smart contracts are divided into multiple sub-inputs and sent to computing participants for operation respectively, which ensures that each participant can only access part of the user’s information. A stochastic strategy based on <span><math><mrow><mo>(</mo><mi>t</mi><mo>;</mo><mi>n</mi><mo>)</mo></mrow></math></span> threshold secret sharing to select calculating parties is also been proposed, which makes it difficult for an attacker to aggregate <span><math><mi>t</mi></math></span> of <span><math><mi>n</mi></math></span> participants for launching a collusive attack. In addition, we propose the output privacy protection method that makes it possible to reach a consensus without the need to know the output. The extensive experimental evaluation and analysis demonstrate that our scheme enjoys the advantages of calculation correctness, input–output privacy as well as anti-collusion.</p></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"86 ","pages":"Article 103872"},"PeriodicalIF":3.8,"publicationDate":"2024-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142129428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Visualization-based comprehensive feature representation with improved EfficientNet for malicious file and variant recognition 基于可视化的综合特征表示与改进的 EfficientNet,用于识别恶意文件和变体
IF 3.8 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-03 DOI: 10.1016/j.jisa.2024.103865
Liangwei Yao , Bin Liu , Yang Xin

Malicious file attacks seriously affect network and data security, and recognizing malicious files and variants is crucial for preventing network attacks. Faced with the challenge of traditional methods in quickly, effectively, and efficiently recognizing malicious files or variants, visualization-based feature representation methods have shown promising results. However, practical applications encounter issues such as loss of crucial information, high spatiotemporal overhead, and the need for model performance improvement. Therefore, this paper introduces a novel recognition framework focusing on feature representation and model performance. The framework uses the proposed visualization-based comprehensive feature representation method (VCFR) to extract file information into the Gray-Level Co-occurrence Matrix (GLCM), 2-gram frequency matrix, and interval 2-gram frequency matrix, followed by feature fusion to generate the three-channel RGB images. Subsequently, the proposed lightweight model is applied for recognizing those files, which utilizes ideas such as group convolution, channel shuffle, and attention mechanisms to improve model performance while significantly reducing model parameters, size, and FLOPs. In summary, through a series of experiments conducted on manually collected malicious file dataset (MFD) and public dataset MMCC, the proposed framework significantly outperformed other state-of-the-art technologies and has F1-Score as high as 94.10% and 98.58%, respectively, further verifying its outstanding effectiveness and efficiency.

恶意文件攻击严重影响了网络和数据安全,识别恶意文件及其变种是防止网络攻击的关键。面对传统方法在快速、有效、高效地识别恶意文件或变种方面的挑战,基于可视化的特征表示方法取得了可喜的成果。然而,实际应用中会遇到关键信息丢失、时空开销大、模型性能有待提高等问题。因此,本文介绍了一种新型识别框架,重点关注特征表示和模型性能。该框架采用所提出的基于可视化的综合特征表示方法(VCFR),将文件信息提取为灰度共生矩阵(GLCM)、2-gram 频率矩阵和间隔 2-gram 频率矩阵,然后进行特征融合,生成三通道 RGB 图像。随后,提出的轻量级模型被用于识别这些文件,该模型利用了群卷积、通道洗牌和注意力机制等思想来提高模型性能,同时显著降低了模型参数、大小和 FLOP。总之,通过在人工收集的恶意文件数据集(MFD)和公共数据集 MMCC 上进行一系列实验,所提出的框架明显优于其他最先进的技术,F1-Score 分别高达 94.10% 和 98.58%,进一步验证了其出色的有效性和效率。
{"title":"Visualization-based comprehensive feature representation with improved EfficientNet for malicious file and variant recognition","authors":"Liangwei Yao ,&nbsp;Bin Liu ,&nbsp;Yang Xin","doi":"10.1016/j.jisa.2024.103865","DOIUrl":"10.1016/j.jisa.2024.103865","url":null,"abstract":"<div><p>Malicious file attacks seriously affect network and data security, and recognizing malicious files and variants is crucial for preventing network attacks. Faced with the challenge of traditional methods in quickly, effectively, and efficiently recognizing malicious files or variants, visualization-based feature representation methods have shown promising results. However, practical applications encounter issues such as loss of crucial information, high spatiotemporal overhead, and the need for model performance improvement. Therefore, this paper introduces a novel recognition framework focusing on feature representation and model performance. The framework uses the proposed <strong>v</strong>isualization-based <strong>c</strong>omprehensive <strong>f</strong>eature <strong>r</strong>epresentation method (VCFR) to extract file information into the Gray-Level Co-occurrence Matrix (GLCM), 2-gram frequency matrix, and interval 2-gram frequency matrix, followed by feature fusion to generate the three-channel RGB images. Subsequently, the proposed lightweight model is applied for recognizing those files, which utilizes ideas such as group convolution, channel shuffle, and attention mechanisms to improve model performance while significantly reducing model parameters, size, and FLOPs. In summary, through a series of experiments conducted on manually collected <strong>m</strong>alicious <strong>f</strong>ile <strong>d</strong>ataset (MFD) and public dataset MMCC, the proposed framework significantly outperformed other state-of-the-art technologies and has F1-Score as high as 94.10% and 98.58%, respectively, further verifying its outstanding effectiveness and efficiency.</p></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"86 ","pages":"Article 103865"},"PeriodicalIF":3.8,"publicationDate":"2024-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142129334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust secret color image sharing anti-cropping and tampering in shares 稳健的秘密彩色图像共享,防止共享中的裁剪和篡改
IF 3.8 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-01 DOI: 10.1016/j.jisa.2024.103869
Shengyang Luo, Yaqi Liu, Xuehu Yan, Yuyuan Sun

Secret image sharing (SIS) has excellent properties such as loss tolerance and relatively low computational complexity, providing a brand-new solution for image security protection. However, there has been little research on the robustness of SIS systems, such as how to resist cropping or malicious tampering in shares. Existing related schemes generally focus on grayscale images and suffer from issues such as lossy recovery, weak robustness, and serious pixel expansion, which are challenging to meet the requirements of high-quality sensitive image applications. In this regard, a robust SIS scheme for color images is proposed, which can resist large-scale cropping and malicious tampering in shares. According to the idea of “breaking up the whole cropped area into parts, repairing the shares independently”, the proposed scheme can realize lossless recovery of secret images through organic fusion of secret sharing, error-correcting code, and pixel re-arrangement techniques. Even if all the shares are cropped by 25%, it can still achieve lossless recovery regardless of whether the cropping positions intersect or overlap. It can also resist various malicious tampering (such as marking, defacing, and copy-move forgery) as well as image noise. Moreover, it avoids pixel expansion and requires no auxiliary encryption or preprocessing. Theoretical analysis and experimental results demonstrate that the proposed scheme is superior to existing schemes in terms of robustness and comprehensive performance, and is expected to promote the practical application of SIS.

秘密图像共享(SIS)具有抗丢失和计算复杂度相对较低等优良特性,为图像安全保护提供了一种全新的解决方案。然而,人们对 SIS 系统的鲁棒性,如如何抵御共享中的裁剪或恶意篡改等问题研究甚少。现有的相关方案一般侧重于灰度图像,存在有损恢复、鲁棒性弱、像素扩展严重等问题,难以满足高质量敏感图像应用的要求。为此,本文提出了一种针对彩色图像的鲁棒 SIS 方案,该方案可抵御大规模裁剪和恶意篡改份额。该方案按照 "整体分割、独立修复 "的思路,将秘密共享技术、纠错码技术和像素重排技术有机融合,实现了秘密图像的无损恢复。即使将所有份额裁剪 25%,无论裁剪位置是相交还是重叠,都能实现无损恢复。它还能抵御各种恶意篡改(如标记、污损和复制移动伪造)以及图像噪声。此外,它还避免了像素扩展,无需辅助加密或预处理。理论分析和实验结果表明,所提出的方案在鲁棒性和综合性能方面均优于现有方案,有望推动 SIS 的实际应用。
{"title":"Robust secret color image sharing anti-cropping and tampering in shares","authors":"Shengyang Luo,&nbsp;Yaqi Liu,&nbsp;Xuehu Yan,&nbsp;Yuyuan Sun","doi":"10.1016/j.jisa.2024.103869","DOIUrl":"10.1016/j.jisa.2024.103869","url":null,"abstract":"<div><p>Secret image sharing (SIS) has excellent properties such as loss tolerance and relatively low computational complexity, providing a brand-new solution for image security protection. However, there has been little research on the robustness of SIS systems, such as how to resist cropping or malicious tampering in shares. Existing related schemes generally focus on grayscale images and suffer from issues such as lossy recovery, weak robustness, and serious pixel expansion, which are challenging to meet the requirements of high-quality sensitive image applications. In this regard, a robust SIS scheme for color images is proposed, which can resist large-scale cropping and malicious tampering in shares. According to the idea of “breaking up the whole cropped area into parts, repairing the shares independently”, the proposed scheme can realize lossless recovery of secret images through organic fusion of secret sharing, error-correcting code, and pixel re-arrangement techniques. Even if all the shares are cropped by 25%, it can still achieve lossless recovery regardless of whether the cropping positions intersect or overlap. It can also resist various malicious tampering (such as marking, defacing, and copy-move forgery) as well as image noise. Moreover, it avoids pixel expansion and requires no auxiliary encryption or preprocessing. Theoretical analysis and experimental results demonstrate that the proposed scheme is superior to existing schemes in terms of robustness and comprehensive performance, and is expected to promote the practical application of SIS.</p></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"85 ","pages":"Article 103869"},"PeriodicalIF":3.8,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142096958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SQL injection attack: Detection, prioritization & prevention SQL 注入攻击:检测、优先级排序和预防
IF 3.8 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-01 DOI: 10.1016/j.jisa.2024.103871
Alan Paul, Vishal Sharma, Oluwafemi Olukoya

Web applications have become central in the digital landscape, providing users instant access to information and allowing businesses to expand their reach. Injection attacks, such as SQL injection (SQLi), are prominent attacks on web applications, given that most web applications integrate a database system. While there have been solutions proposed in the literature for SQLi attack detection using learning-based frameworks, the problem is often formulated as a binary, single-attack vector problem without considering the prioritization and prevention component of the attack. In this work, we propose a holistic solution, SQLR34P3R, that formulates the SQLi attack as a multi-class, multi-attack vector, prioritization, and prevention problem. For attack detection and classification, we gathered 457,233 samples of benign and malicious network traffic, as well as 70,023 samples that had SQLi and benign payloads. After evaluating several machine-learning-based algorithms, the hybrid CNN-LSTM models achieve an average F1-Score of 97% in web and network traffic filtering. Furthermore, by using CVEs of SQLi vulnerabilities, SQLR34P3R incorporates a novel risk analysis approach which reduces additional effort while maintaining reasonable coverage to assist businesses in allocating resources effectively by focusing on patching vulnerabilities with high exploitability. We also present an in-the-wild evaluation of the proposed solution by integrating SQLR34P3R into the pipeline of known vulnerable web applications such as Damn Vulnerable Web Application (DVWA) and Vulnado and via network traffic captured using Wireshark from SQLi DNS exfiltration conducted with SQLMap for real-time detection. Finally, we provide a comparative analysis with state-of-the-art SQLi attack detection and risk ratings solutions.

网络应用程序已成为数字领域的核心,为用户提供了即时获取信息的途径,并使企业能够扩大其业务范围。由于大多数网络应用程序都集成了数据库系统,因此 SQL 注入 (SQLi) 等注入攻击是网络应用程序面临的主要攻击。虽然文献中已经提出了使用基于学习的框架检测 SQLi 攻击的解决方案,但该问题通常被表述为二元、单一攻击向量问题,而没有考虑攻击的优先级和预防部分。在这项工作中,我们提出了一个整体解决方案 SQLR34P3R,它将 SQLi 攻击表述为一个多类别、多攻击向量、优先级和预防问题。为了进行攻击检测和分类,我们收集了 457,233 个良性和恶意网络流量样本,以及 70,023 个包含 SQLi 和良性有效载荷的样本。在对几种基于机器学习的算法进行评估后,混合 CNN-LSTM 模型在网页和网络流量过滤方面的平均 F1 分数达到了 97%。此外,通过使用 SQLi 漏洞的 CVE,SQLR34P3R 采用了一种新颖的风险分析方法,在保持合理覆盖率的同时减少了额外的工作量,从而帮助企业有效分配资源,集中修补可利用性高的漏洞。我们还通过将 SQLR34P3R 集成到 Damn Vulnerable Web Application (DVWA) 和 Vulnado 等已知易受攻击网络应用程序的管道中,以及通过使用 Wireshark 从 SQLi DNS 外渗捕获的网络流量和 SQLMap 进行实时检测,对所提出的解决方案进行了现场评估。最后,我们提供了与最先进的 SQLi 攻击检测和风险评级解决方案的比较分析。
{"title":"SQL injection attack: Detection, prioritization & prevention","authors":"Alan Paul,&nbsp;Vishal Sharma,&nbsp;Oluwafemi Olukoya","doi":"10.1016/j.jisa.2024.103871","DOIUrl":"10.1016/j.jisa.2024.103871","url":null,"abstract":"<div><p>Web applications have become central in the digital landscape, providing users instant access to information and allowing businesses to expand their reach. Injection attacks, such as SQL injection (SQLi), are prominent attacks on web applications, given that most web applications integrate a database system. While there have been solutions proposed in the literature for SQLi attack detection using learning-based frameworks, the problem is often formulated as a binary, single-attack vector problem without considering the prioritization and prevention component of the attack. In this work, we propose a holistic solution, SQLR34P3R, that formulates the SQLi attack as a multi-class, multi-attack vector, prioritization, and prevention problem. For attack detection and classification, we gathered 457,233 samples of benign and malicious network traffic, as well as 70,023 samples that had SQLi and benign payloads. After evaluating several machine-learning-based algorithms, the hybrid CNN-LSTM models achieve an average F1-Score of 97% in web and network traffic filtering. Furthermore, by using CVEs of SQLi vulnerabilities, SQLR34P3R incorporates a novel risk analysis approach which reduces additional effort while maintaining reasonable coverage to assist businesses in allocating resources effectively by focusing on patching vulnerabilities with high exploitability. We also present an in-the-wild evaluation of the proposed solution by integrating SQLR34P3R into the pipeline of known vulnerable web applications such as Damn Vulnerable Web Application (DVWA) and Vulnado and via network traffic captured using Wireshark from SQLi DNS exfiltration conducted with SQLMap for real-time detection. Finally, we provide a comparative analysis with state-of-the-art SQLi attack detection and risk ratings solutions.</p></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"85 ","pages":"Article 103871"},"PeriodicalIF":3.8,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S221421262400173X/pdfft?md5=876619c18c5e77543023637cfa5180d8&pid=1-s2.0-S221421262400173X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142096959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Information Security and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1