首页 > 最新文献

International Journal of Information Security最新文献

英文 中文
A distributed and cooperative signature-based intrusion detection system framework for multi-channel man-in-the-middle attacks against protected Wi-Fi networks 针对受保护 Wi-Fi 网络的多通道中间人攻击的分布式合作签名入侵检测系统框架
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-14 DOI: 10.1007/s10207-024-00899-9
Manesh Thankappan, Helena Rifà-Pous, Carles Garrigues

A Multi-Channel Man-in-the-Middle (MC-MitM) attack is an advanced form of MitM attack, characterized by its ability to manipulate encrypted wireless communications between the Access Point (AP) and clients within a WiFi network. MC-MitM attacks can target any Wi-Fi client, regardless of the authentication method used with the AP. Notable examples of such attacks include Key Reinstallation Attacks and FragAttacks, which have impacted millions of WiFi systems worldwide, especially those involving Internet of Things devices. Current defense mechanisms are inadequate against these attacks due to interoperability challenges and the need for modifications to devices or protocols within the targeted Wi-Fi networks. This paper introduces a distributed and cooperative signature-based wireless intrusion detection mechanism designed for online passive monitoring to detect malicious traffic patterns during MC-MitM attacks in any environment, from apartments and houses to large areas like hotels, offices or industrial sites. We implemented the proposed framework on Raspberry Pis and evaluated it in real-world settings. Our evaluation demonstrates that this framework can effectively identify MC-MitM attacks with an average accuracy of 98% when deployed across different locations within our experimental testbed.

多通道中间人(MC-MitM)攻击是一种高级形式的MitM攻击,其特点是能够操纵WiFi网络中接入点(AP)与客户端之间的加密无线通信。MC-MitM 攻击可针对任何 Wi-Fi 客户端,无论接入点使用的是哪种验证方法。此类攻击的著名实例包括密钥重装攻击和碎片攻击,它们已影响到全球数百万个 WiFi 系统,特别是那些涉及物联网设备的系统。由于互操作性难题以及需要修改目标 Wi-Fi 网络内的设备或协议,目前的防御机制不足以抵御这些攻击。本文介绍了一种基于签名的分布式合作无线入侵检测机制,该机制专为在线被动监测而设计,可在任何环境(从公寓和住宅到酒店、办公室或工业场所等大型区域)中检测 MC-MitM 攻击期间的恶意流量模式。我们在 Raspberry Pis 上实施了建议的框架,并在实际环境中对其进行了评估。我们的评估结果表明,在实验平台的不同地点部署该框架时,它能有效识别 MC-MitM 攻击,平均准确率高达 98%。
{"title":"A distributed and cooperative signature-based intrusion detection system framework for multi-channel man-in-the-middle attacks against protected Wi-Fi networks","authors":"Manesh Thankappan, Helena Rifà-Pous, Carles Garrigues","doi":"10.1007/s10207-024-00899-9","DOIUrl":"https://doi.org/10.1007/s10207-024-00899-9","url":null,"abstract":"<p>A Multi-Channel Man-in-the-Middle (MC-MitM) attack is an advanced form of MitM attack, characterized by its ability to manipulate encrypted wireless communications between the Access Point (AP) and clients within a WiFi network. MC-MitM attacks can target any Wi-Fi client, regardless of the authentication method used with the AP. Notable examples of such attacks include Key Reinstallation Attacks and FragAttacks, which have impacted millions of WiFi systems worldwide, especially those involving Internet of Things devices. Current defense mechanisms are inadequate against these attacks due to interoperability challenges and the need for modifications to devices or protocols within the targeted Wi-Fi networks. This paper introduces a distributed and cooperative signature-based wireless intrusion detection mechanism designed for online passive monitoring to detect malicious traffic patterns during MC-MitM attacks in any environment, from apartments and houses to large areas like hotels, offices or industrial sites. We implemented the proposed framework on Raspberry Pis and evaluated it in real-world settings. Our evaluation demonstrates that this framework can effectively identify MC-MitM attacks with an average accuracy of 98% when deployed across different locations within our experimental testbed.\u0000</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"6 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142207474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Defect-scanner: a comparative empirical study on language model and deep learning approach for software vulnerability detection 缺陷扫描仪:用于软件漏洞检测的语言模型和深度学习方法的比较实证研究
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-13 DOI: 10.1007/s10207-024-00901-4
Van-Hau Pham, Do Thi Thu Hien, Hien Do Hoang, Phan The Duy

The complex and rapidly evolving nature of modern software landscapes introduces challenges such as increasingly sophisticated cyber threats, the diversity in programming languages and coding styles, and the need to identify subtle patterns indicative of vulnerabilities. These hurdles underscore the necessity for advanced techniques that can effectively cope with the intricacies of software security. Hence, this paper gives a comparative empirical study in harnessing the potential of cutting-edge natural language processing (NLP) advancements, namely Word2Vec and CodeBERT to detect vulnerabilities in C and C++ programs in the proposed Defect-Scanner framework. With the capability of converting code components and source code into contextual embedding vectors, various potential NLP techniques are combined with several DL models to evaluate the precision and accuracy of identifying vulnerabilities within software systems. Moreover, the experimentations are conducted using datasets with different representation types of codes, aiming to figure out the best combination of NLP techniques and DL models to work with each form of input. As a result, besides the outperformance of CodeBERT-based models with accuracies of approximately 90%, this comparative study also provides a comprehensive evaluation of NLP-based software vulnerability detection in the face of intricate security challenges.

现代软件环境的复杂性和快速演变性带来了各种挑战,如日益复杂的网络威胁、编程语言和编码风格的多样性,以及识别表明存在漏洞的微妙模式的必要性。这些障碍突出表明,有必要采用先进的技术来有效应对错综复杂的软件安全问题。因此,本文对如何利用最先进的自然语言处理(NLP)技术(即 Word2Vec 和 CodeBERT)的潜力进行了比较实证研究,以便在建议的缺陷扫描器框架中检测 C 和 C++ 程序中的漏洞。借助将代码组件和源代码转换为上下文嵌入向量的能力,各种潜在的 NLP 技术与多个 DL 模型相结合,以评估识别软件系统中漏洞的精度和准确性。此外,实验还使用了具有不同代码表示类型的数据集,旨在找出 NLP 技术与 DL 模型的最佳组合,以处理每种形式的输入。因此,除了基于 CodeBERT 的模型以约 90% 的准确率表现出色外,这项比较研究还提供了面对错综复杂的安全挑战时基于 NLP 的软件漏洞检测的全面评估。
{"title":"Defect-scanner: a comparative empirical study on language model and deep learning approach for software vulnerability detection","authors":"Van-Hau Pham, Do Thi Thu Hien, Hien Do Hoang, Phan The Duy","doi":"10.1007/s10207-024-00901-4","DOIUrl":"https://doi.org/10.1007/s10207-024-00901-4","url":null,"abstract":"<p>The complex and rapidly evolving nature of modern software landscapes introduces challenges such as increasingly sophisticated cyber threats, the diversity in programming languages and coding styles, and the need to identify subtle patterns indicative of vulnerabilities. These hurdles underscore the necessity for advanced techniques that can effectively cope with the intricacies of software security. Hence, this paper gives a comparative empirical study in harnessing the potential of cutting-edge natural language processing (NLP) advancements, namely Word2Vec and CodeBERT to detect vulnerabilities in C and C++ programs in the proposed Defect-Scanner framework. With the capability of converting code components and source code into contextual embedding vectors, various potential NLP techniques are combined with several DL models to evaluate the precision and accuracy of identifying vulnerabilities within software systems. Moreover, the experimentations are conducted using datasets with different representation types of codes, aiming to figure out the best combination of NLP techniques and DL models to work with each form of input. As a result, besides the outperformance of CodeBERT-based models with accuracies of approximately 90%, this comparative study also provides a comprehensive evaluation of NLP-based software vulnerability detection in the face of intricate security challenges.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"77 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142207473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A TCP-based covert channel with integrity check and retransmission 基于 TCP 的隐蔽信道,具有完整性检查和重传功能
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-12 DOI: 10.1007/s10207-024-00879-z
Stefano Bistarelli, Andrea Imparato, Francesco Santini

We propose a covert channel and its implementation in Windows OS. This storage channel uses the Initial Sequence Number of TCP to hide four characters of text and the identification field to “sign” the message and thus understand if it has been altered during the transmission. The secret is sent in the first SYN segment to open a connection, and an ACK-RST response acknowledges the receipt. Designed error-correction codes make the protocol more robust and able to handle (IP) packet drops and transmission errors. In this paper, we provide a detailed discussion of the implementation and an evaluation of the stealthiness of the proposed channel: we inspect the generated traffic with two IDSs and RITA, a tool performing statistical analysis to detect malware beaconing.

我们提出了一种隐蔽信道及其在 Windows 操作系统中的实现方法。该存储信道利用 TCP 的初始序列号隐藏四个字符的文本和标识字段来 "签署 "信息,从而了解信息是否在传输过程中被篡改。密文在打开连接的第一个 SYN 段中发送,ACK-RST 响应确认收到密文。设计的纠错码使协议更加稳健,能够处理(IP)数据包丢失和传输错误。在本文中,我们详细讨论了实现方法,并评估了所建议信道的隐蔽性:我们使用两个 IDS 和 RITA(一种用于检测恶意软件信标的统计分析工具)检查了生成的流量。
{"title":"A TCP-based covert channel with integrity check and retransmission","authors":"Stefano Bistarelli, Andrea Imparato, Francesco Santini","doi":"10.1007/s10207-024-00879-z","DOIUrl":"https://doi.org/10.1007/s10207-024-00879-z","url":null,"abstract":"<p>We propose a covert channel and its implementation in Windows OS. This storage channel uses the <i>Initial Sequence Number</i> of TCP to hide four characters of text and the <i>identification</i> field to “sign” the message and thus understand if it has been altered during the transmission. The secret is sent in the first SYN segment to open a connection, and an ACK-RST response acknowledges the receipt. Designed error-correction codes make the protocol more robust and able to handle (IP) packet drops and transmission errors. In this paper, we provide a detailed discussion of the implementation and an evaluation of the stealthiness of the proposed channel: we inspect the generated traffic with two IDSs and RITA, a tool performing statistical analysis to detect malware beaconing.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"57 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142207475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unmasking SDN flow table saturation: fingerprinting, attacks and defenses 揭开 SDN 流量表饱和的面纱:指纹识别、攻击与防御
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-04 DOI: 10.1007/s10207-024-00897-x
Beytüllah Yiğit, Gürkan Gür, Bernhard Tellenbach, Fatih Alagöz

Software-Defined Networking stands as a pivotal technology in attaining the essential levels of flexibility and scalability demanded by pervasive and high-performance network infrastructure required for digital connected services. Nonetheless, its disaggregated and layered architecture makes it open to the time-based fingerprinting attacks. Besides, limited flow table capacity of the switches alleviates table saturation attacks. In this paper, an automated attacker tool called TASOS is proposed to infer flow table utilization rate, size and replacement algorithm. With this set of information, the attacker can conduct intelligent saturation attacks. Furthermore, a lightweight defense mechanism (LIDISA) for proactively deleting flow rules is described. A comprehensive simulation setup with different network conditions shows that the proposed techniques achieve superior success rate in diverse settings.

软件定义网络(Software-Defined Networking)是一项关键技术,可满足数字互联服务所需的普及型高性能网络基础设施对灵活性和可扩展性的基本要求。然而,其分解和分层架构使其容易受到基于时间的指纹攻击。此外,交换机的流量表容量有限,这也缓解了流量表饱和攻击。本文提出了一种名为 TASOS 的自动攻击工具,用于推断流量表的利用率、大小和替换算法。有了这组信息,攻击者就可以进行智能饱和攻击。此外,还介绍了一种用于主动删除流量规则的轻量级防御机制(LIDISA)。不同网络条件下的综合仿真设置表明,所提出的技术在不同环境下都能取得卓越的成功率。
{"title":"Unmasking SDN flow table saturation: fingerprinting, attacks and defenses","authors":"Beytüllah Yiğit, Gürkan Gür, Bernhard Tellenbach, Fatih Alagöz","doi":"10.1007/s10207-024-00897-x","DOIUrl":"https://doi.org/10.1007/s10207-024-00897-x","url":null,"abstract":"<p>Software-Defined Networking stands as a pivotal technology in attaining the essential levels of flexibility and scalability demanded by pervasive and high-performance network infrastructure required for digital connected services. Nonetheless, its disaggregated and layered architecture makes it open to the time-based fingerprinting attacks. Besides, limited flow table capacity of the switches alleviates table saturation attacks. In this paper, an automated attacker tool called <i>TASOS</i> is proposed to infer flow table utilization rate, size and replacement algorithm. With this set of information, the attacker can conduct intelligent saturation attacks. Furthermore, a lightweight defense mechanism (<i>LIDISA</i>) for proactively deleting flow rules is described. A comprehensive simulation setup with different network conditions shows that the proposed techniques achieve superior success rate in diverse settings.\u0000</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"2013 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141948115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep learning based network intrusion detection system: a systematic literature review and future scopes 基于深度学习的网络入侵检测系统:系统文献综述与未来展望
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-02 DOI: 10.1007/s10207-024-00896-y
Yogesh, Lalit Mohan Goyal

With the immense growth of the internet, sensitive, confidential, important corporate and individual data passing through the internet has grown rapidly. Due to the limitation of security systems, potential hackers and attackers have possessed vulnerabilities and attacks for intruding into the network to gain confidential and sensitive information to affect the performance of networks by breaching network confidentiality. Thereby, to counterfeit these attacks and abnormal behaviors, a network intrusion detection system (NIDS), acts as a crucial branch of cybersecurity for analysis and monitoring the network traffic regularly to report and detect abnormal and malicious activities in a network. Currently, various reviews and survey papers have covered various techniques for NIDS, out of which, mostly followed a non-systematic way of approach without an in-depth analysis of techniques and evaluation metrics used by deep learning(DL) based NIDS models. In addition, various reviews focused on machine learning (ML) and DL-based methodology, but with less emphasis on DL techniques (i.e. AE, CNN, DNN, DBN, RNN, and Hybrid DL) based classification. Thereby, the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) methodology was used to accomplish this work by providing a comprehensive and detailed overview of DL-based NIDS. Research papers for this work were collected from five well-known databases (ScienceDirect, IEEE, Hindawi, SpringerNature, and MDPI) which were cut among several reputable conference proceedings and reputable journals. Across the 750 articles identified in the literature, 72 research papers were finally marked and selected for synthesis and analysis to find the answers to research questions. In addition, we identified various potential research challenges in the current domain based on research findings. Lastly, to design an efficient NIDS, we concluded our study by identifying high-impact and promising future research areas in the NIDS domain.

随着互联网的飞速发展,通过互联网传递的敏感、机密、重要的企业和个人数据也在迅速增长。由于安全系统的局限性,潜在的黑客和攻击者拥有了入侵网络的漏洞和攻击手段,以获取机密和敏感信息,并通过破坏网络保密性来影响网络性能。因此,为了抵御这些攻击和异常行为,网络入侵检测系统(NIDS)作为网络安全的一个重要分支,定期分析和监控网络流量,报告和检测网络中的异常和恶意活动。目前,各种综述和调查论文涵盖了网络入侵检测系统的各种技术,其中大部分采用的是非系统化的方法,没有对基于深度学习(DL)的网络入侵检测系统模型所使用的技术和评估指标进行深入分析。此外,各种综述侧重于机器学习(ML)和基于 DL 的方法,但较少强调基于 DL 技术(即 AE、CNN、DNN、DBN、RNN 和混合 DL)的分类。因此,为了完成这项工作,我们采用了系统综述和元分析首选报告项目(PRISMA)方法,对基于 DL 的 NIDS 进行了全面而详细的概述。这项工作的研究论文是从五个知名数据库(ScienceDirect、IEEE、Hindawi、SpringerNature 和 MDPI)中收集的,这些数据库是从几个著名的会议论文集和知名期刊中筛选出来的。在确定的 750 篇文献中,我们最终标记并选择了 72 篇研究论文进行综合分析,以找到研究问题的答案。此外,我们还根据研究结果确定了当前领域中各种潜在的研究挑战。最后,为了设计出高效的 NIDS,我们在研究的最后确定了 NIDS 领域中影响大、前景好的未来研究领域。
{"title":"Deep learning based network intrusion detection system: a systematic literature review and future scopes","authors":"Yogesh, Lalit Mohan Goyal","doi":"10.1007/s10207-024-00896-y","DOIUrl":"https://doi.org/10.1007/s10207-024-00896-y","url":null,"abstract":"<p>With the immense growth of the internet, sensitive, confidential, important corporate and individual data passing through the internet has grown rapidly. Due to the limitation of security systems, potential hackers and attackers have possessed vulnerabilities and attacks for intruding into the network to gain confidential and sensitive information to affect the performance of networks by breaching network confidentiality. Thereby, to counterfeit these attacks and abnormal behaviors, a network intrusion detection system (NIDS), acts as a crucial branch of cybersecurity for analysis and monitoring the network traffic regularly to report and detect abnormal and malicious activities in a network. Currently, various reviews and survey papers have covered various techniques for NIDS, out of which, mostly followed a non-systematic way of approach without an in-depth analysis of techniques and evaluation metrics used by deep learning(DL) based NIDS models. In addition, various reviews focused on machine learning (ML) and DL-based methodology, but with less emphasis on DL techniques (i.e. AE, CNN, DNN, DBN, RNN, and Hybrid DL) based classification. Thereby, the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) methodology was used to accomplish this work by providing a comprehensive and detailed overview of DL-based NIDS. Research papers for this work were collected from five well-known databases (ScienceDirect, IEEE, Hindawi, SpringerNature, and MDPI) which were cut among several reputable conference proceedings and reputable journals. Across the 750 articles identified in the literature, 72 research papers were finally marked and selected for synthesis and analysis to find the answers to research questions. In addition, we identified various potential research challenges in the current domain based on research findings. Lastly, to design an efficient NIDS, we concluded our study by identifying high-impact and promising future research areas in the NIDS domain.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"216 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141882884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy-preserving two-party computation of line segment intersection 保护隐私的线段相交双方计算
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-31 DOI: 10.1007/s10207-024-00895-z
Sorour Sheidani, Alireza Zarei

By considering maps and routes as sequences of line segments, their intersections can be computed to find out useful information like the possibility of collision in a military area where the parties do not trust each other. At the first glance, finding the coordinates of the intersections is seemed impossible to be solved securely since having coordinates of two intersection points on the same line reveals the passing line. In this paper, we solve this problem by suggesting a secure two-party protocol in presence of passive adversaries. Additionally, regarding the fact that in some cases, the fixedness of the inputs of the parties in classic security models is an unrealistic assumption, we define the new concept of input-adaptive security and show that our method is secure against such an adversary who is able to select his inputs adaptively. In addition to serve different approaches like oblivious transfer and sometimes homomorphic encryption, we also employ some tricks to prevent the distribution of harmful information between specific parties to achieve our intended security level. We provide formal proofs to show the security of our protocol. Time complexity analysis and implementations show that our protocol finds the intersections in feasible time of ({mathcal {O}}(n log n)) and indicate that our protocol is as good as the unsecure optimal method of line segment intersection computation. In comparison, previous methods require (O(n^2)) to only detect the existence of intersection between two sets of n line segments and are unable to find the coordinates of the intersections.

通过将地图和路线视为线段序列,可以计算出它们的交叉点,从而找出有用的信息,例如在双方互不信任的军事区域发生碰撞的可能性。乍一看,找到交叉点的坐标似乎不可能安全解决,因为在同一条直线上的两个交叉点的坐标会显示经过的直线。在本文中,我们提出了一种在被动对手存在的情况下安全的两方协议,从而解决了这一问题。此外,在某些情况下,经典安全模型中双方输入的固定性是一个不切实际的假设,针对这一事实,我们定义了输入自适应安全这一新概念,并证明我们的方法可以安全地对抗能够自适应选择输入的对手。除了采用不同的方法(如遗忘传输和同态加密),我们还采用了一些技巧来防止有害信息在特定各方之间传播,以达到我们预期的安全等级。我们提供了正式的证明来展示我们协议的安全性。时间复杂性分析和实现表明,我们的协议可以在 ({mathcal {O}}(n log n)) 的可行时间内找到交点,并且表明我们的协议与不安全的最优线段交点计算方法一样好。相比之下,之前的方法需要(O(n^2))的时间才能检测出两组 n 条线段之间是否存在交集,并且无法找到交集的坐标。
{"title":"Privacy-preserving two-party computation of line segment intersection","authors":"Sorour Sheidani, Alireza Zarei","doi":"10.1007/s10207-024-00895-z","DOIUrl":"https://doi.org/10.1007/s10207-024-00895-z","url":null,"abstract":"<p>By considering maps and routes as sequences of line segments, their intersections can be computed to find out useful information like the possibility of collision in a military area where the parties do not trust each other. At the first glance, finding the coordinates of the intersections is seemed impossible to be solved securely since having coordinates of two intersection points on the same line reveals the passing line. In this paper, we solve this problem by suggesting a secure two-party protocol in presence of passive adversaries. Additionally, regarding the fact that in some cases, the fixedness of the inputs of the parties in classic security models is an unrealistic assumption, we define the new concept of input-adaptive security and show that our method is secure against such an adversary who is able to select his inputs adaptively. In addition to serve different approaches like oblivious transfer and sometimes homomorphic encryption, we also employ some tricks to prevent the distribution of harmful information between specific parties to achieve our intended security level. We provide formal proofs to show the security of our protocol. Time complexity analysis and implementations show that our protocol finds the intersections in feasible time of <span>({mathcal {O}}(n log n))</span> and indicate that our protocol is as good as the unsecure optimal method of line segment intersection computation. In comparison, previous methods require <span>(O(n^2))</span> to only detect the existence of intersection between two sets of <i>n</i> line segments and are unable to find the coordinates of the intersections.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"44 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141869942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Early mitigation of CPU-optimized ransomware using monitoring encryption instructions 利用监控加密指令及早缓解 CPU 优化的勒索软件
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-30 DOI: 10.1007/s10207-024-00892-2
Shuhei Enomoto, Hiroki Kuzuno, Hiroshi Yamada, Yoshiaki Shiraishi, Masakatu Morii

Ransomware attacks pose a significant threat to information systems. Server hosts, including cloud infrastructure as a service, are prime targets for ransomware developers. To address this, security mechanisms, such as antivirus software, have proven effective. Moreover, research on ransomware detection advocates for behavior-based finding mechanisms while ransomware is in operation. In response to evolving detections, ransomware developers are now adapting an optimized design tailored for CPU architecture (CPU-optimized ransomware). This variant can rapidly encrypt files, potentially evading detection by traditional antivirus methods that rely on fixed time intervals for file scans. In ransomware detection research, numerous files can be encrypted by CPU-optimized ransomware until malicious activity is detected. This study proposes an early mitigation mechanism named CryptoSniffer, which is designed specifically to counter CPU-optimized ransomware attacks on server hosts. CryptoSniffer focuses on the misuse of CPU architecture-specific encryption instructions for swift file encryption by CPU-optimized ransomware. This can be achieved by capturing the ciphertext in user processes and thwarting file encryption by scrutinizing the content intended for writing. To demonstrate the efficacy of CryptoSniffer, the mechanism was implemented in the latest Linux kernel, and its security and performance were systematically evaluated. The experimental results demonstrate that CryptoSniffer successfully prevents real-world CPU-optimized ransomware, and the performance overhead is well-suited for practical applications.

勒索软件攻击对信息系统构成重大威胁。包括云基础设施即服务在内的服务器主机是勒索软件开发者的主要目标。为解决这一问题,杀毒软件等安全机制已被证明是有效的。此外,有关勒索软件检测的研究主张在勒索软件运行时采用基于行为的查找机制。为了应对不断发展的检测,勒索软件开发者现在正在调整一种针对 CPU 架构的优化设计(CPU 优化勒索软件)。这种变种可以快速加密文件,有可能躲过依赖固定时间间隔扫描文件的传统防病毒方法的检测。在勒索软件检测研究中,CPU 优化勒索软件可能会加密大量文件,直到检测到恶意活动。本研究提出了一种名为 "CryptoSniffer "的早期缓解机制,该机制专门用于对抗针对服务器主机的CPU优化勒索软件攻击。CryptoSniffer 主要针对 CPU 优化勒索软件滥用 CPU 架构特定加密指令进行快速文件加密的问题。这可以通过捕获用户进程中的密文来实现,并通过仔细检查打算写入的内容来挫败文件加密。为了证明 CryptoSniffer 的功效,我们在最新的 Linux 内核中实现了该机制,并对其安全性和性能进行了系统评估。实验结果表明,CryptoSniffer 能成功阻止现实世界中经过 CPU 优化的勒索软件,其性能开销也非常适合实际应用。
{"title":"Early mitigation of CPU-optimized ransomware using monitoring encryption instructions","authors":"Shuhei Enomoto, Hiroki Kuzuno, Hiroshi Yamada, Yoshiaki Shiraishi, Masakatu Morii","doi":"10.1007/s10207-024-00892-2","DOIUrl":"https://doi.org/10.1007/s10207-024-00892-2","url":null,"abstract":"<p>Ransomware attacks pose a significant threat to information systems. Server hosts, including cloud infrastructure as a service, are prime targets for ransomware developers. To address this, security mechanisms, such as antivirus software, have proven effective. Moreover, research on ransomware detection advocates for behavior-based finding mechanisms while ransomware is in operation. In response to evolving detections, ransomware developers are now adapting an optimized design tailored for CPU architecture (CPU-optimized ransomware). This variant can rapidly encrypt files, potentially evading detection by traditional antivirus methods that rely on fixed time intervals for file scans. In ransomware detection research, numerous files can be encrypted by CPU-optimized ransomware until malicious activity is detected. This study proposes an early mitigation mechanism named CryptoSniffer, which is designed specifically to counter CPU-optimized ransomware attacks on server hosts. CryptoSniffer focuses on the misuse of CPU architecture-specific encryption instructions for swift file encryption by CPU-optimized ransomware. This can be achieved by capturing the ciphertext in user processes and thwarting file encryption by scrutinizing the content intended for writing. To demonstrate the efficacy of CryptoSniffer, the mechanism was implemented in the latest Linux kernel, and its security and performance were systematically evaluated. The experimental results demonstrate that CryptoSniffer successfully prevents real-world CPU-optimized ransomware, and the performance overhead is well-suited for practical applications.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"2 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141869943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Press play, install malware: a study of rhythm game-based malware dropping 按下播放键,安装恶意软件:基于节奏游戏的恶意软件下载研究
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-29 DOI: 10.1007/s10207-024-00893-1
Efstratios Vasilellis, Grigoris Gkionis, Dimitris Gritzalis

Malware remains a major cybersecurity threat, often evading traditional detection methods. This study builds on our previous research with Tetris to present a more efficient covert channel attack using a Trojanized version of the rhythm game “Guitar Hero”. This new method delivers and executes malicious payloads in under 2.5 min, significantly faster than our previous Tetris-based approach. The engaging and musical nature of the rhythm game makes it more appealing to users, increasing the likelihood of attracting potential victims compared to the more monotonous Tetris. The attack encodes payloads into game levels, compelling users to make specific moves that unknowingly assemble malware on their devices, thereby evading detection. This study is the second to introduce gamification in malware transmission and the first to “force” user actions to achieve the objectives of the attacker. We provide a detailed analysis of this attack and suggest countermeasures, highlighting the necessity of human-based dynamic malware analysis and enhanced user awareness. Our findings underscore the evolving nature of cyber threats and the urgent need for innovative defensive strategies to address such sophisticated covert channel attacks.

恶意软件仍然是一个主要的网络安全威胁,往往能躲过传统的检测方法。本研究以我们之前对俄罗斯方块的研究为基础,利用节奏游戏 "吉他英雄 "的木马化版本,提出了一种更高效的隐蔽通道攻击。这种新方法可在 2.5 分钟内发送并执行恶意有效载荷,大大快于我们以前基于俄罗斯方块的方法。与较为单调的俄罗斯方块相比,节奏游戏引人入胜的音乐性使其对用户更具吸引力,从而增加了吸引潜在受害者的可能性。这种攻击将有效载荷编码到游戏关卡中,迫使用户做出特定动作,在不知情的情况下将恶意软件组装到他们的设备上,从而逃避检测。这项研究是第二项在恶意软件传播中引入游戏化的研究,也是第一项 "强迫 "用户行动以实现攻击者目标的研究。我们对这种攻击进行了详细分析,并提出了应对措施,强调了以人为基础的动态恶意软件分析和增强用户意识的必要性。我们的研究结果强调了网络威胁不断演变的本质,以及迫切需要创新的防御策略来应对这种复杂的隐蔽渠道攻击。
{"title":"Press play, install malware: a study of rhythm game-based malware dropping","authors":"Efstratios Vasilellis, Grigoris Gkionis, Dimitris Gritzalis","doi":"10.1007/s10207-024-00893-1","DOIUrl":"https://doi.org/10.1007/s10207-024-00893-1","url":null,"abstract":"<p>Malware remains a major cybersecurity threat, often evading traditional detection methods. This study builds on our previous research with Tetris to present a more efficient covert channel attack using a Trojanized version of the rhythm game “Guitar Hero”. This new method delivers and executes malicious payloads in under 2.5 min, significantly faster than our previous Tetris-based approach. The engaging and musical nature of the rhythm game makes it more appealing to users, increasing the likelihood of attracting potential victims compared to the more monotonous Tetris. The attack encodes payloads into game levels, compelling users to make specific moves that unknowingly assemble malware on their devices, thereby evading detection. This study is the second to introduce gamification in malware transmission and the first to “force” user actions to achieve the objectives of the attacker. We provide a detailed analysis of this attack and suggest countermeasures, highlighting the necessity of human-based dynamic malware analysis and enhanced user awareness. Our findings underscore the evolving nature of cyber threats and the urgent need for innovative defensive strategies to address such sophisticated covert channel attacks.\u0000</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"14 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141869945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mitigation of privilege escalation attack using kernel data relocation mechanism 利用内核数据迁移机制缓解权限升级攻击
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-25 DOI: 10.1007/s10207-024-00890-4
Hiroki Kuzuno, Toshihiro Yamauchi

Kernel memory corruption, which leads to a privilege escalation attack, has been reported as a security threat to operating systems. To mitigate privilege escalation attacks, several security mechanisms are proposed. Kernel address space layout randomization randomizes kernel code and data virtual address layout on the kernel memory. Privileged information protection methods monitor and restore illegal privilege modifications. Therefore, if an adversary identifies the kernel data containing privileged information, an adversary can achieve the privilege escalation in a running kernel. This paper proposes a kernel data relocation mechanism (KDRM) that dynamically relocates privileged information in the running kernel to mitigate privilege escalation attacks. The KDRM introduces the relocation-only page into the kernel. The relocation-only page allows the virtual address of the privileged information to change by dynamically relocating for the user process. One of the relocation-only pages is randomly selected to store the privileged information at the system call invocations. The evaluation results indicate the possibility of mitigating privilege escalation attacks through direct memory overwriting by user processes on Linux with KDRM. The KDRM showed an acceptable performance cost. The overhead of a system call was up to 11.52%, and the kernel performance score was 0.11%.

据报道,导致权限升级攻击的内核内存损坏是操作系统的一个安全威胁。为了减轻权限升级攻击,人们提出了几种安全机制。内核地址空间布局随机化可对内核内存中的内核代码和数据虚拟地址布局进行随机化。特权信息保护方法可监控和恢复非法的特权修改。因此,如果对手识别出包含特权信息的内核数据,就可以在运行的内核中实现特权升级。本文提出了一种内核数据重定位机制(KDRM),它能动态重定位运行内核中的特权信息,以减轻特权升级攻击。KDRM 在内核中引入了只允许重新定位的页面。只重新定位页允许用户进程通过动态重新定位来改变特权信息的虚拟地址。在系统调用调用时,随机选择一个只重新定位页来存储特权信息。评估结果表明,使用 KDRM 有可能减轻 Linux 系统上通过用户进程直接覆盖内存进行的特权升级攻击。KDRM 的性能代价是可以接受的。系统调用的开销高达 11.52%,而内核性能得分仅为 0.11%。
{"title":"Mitigation of privilege escalation attack using kernel data relocation mechanism","authors":"Hiroki Kuzuno, Toshihiro Yamauchi","doi":"10.1007/s10207-024-00890-4","DOIUrl":"https://doi.org/10.1007/s10207-024-00890-4","url":null,"abstract":"<p>Kernel memory corruption, which leads to a privilege escalation attack, has been reported as a security threat to operating systems. To mitigate privilege escalation attacks, several security mechanisms are proposed. Kernel address space layout randomization randomizes kernel code and data virtual address layout on the kernel memory. Privileged information protection methods monitor and restore illegal privilege modifications. Therefore, if an adversary identifies the kernel data containing privileged information, an adversary can achieve the privilege escalation in a running kernel. This paper proposes a kernel data relocation mechanism (KDRM) that dynamically relocates privileged information in the running kernel to mitigate privilege escalation attacks. The KDRM introduces the relocation-only page into the kernel. The relocation-only page allows the virtual address of the privileged information to change by dynamically relocating for the user process. One of the relocation-only pages is randomly selected to store the privileged information at the system call invocations. The evaluation results indicate the possibility of mitigating privilege escalation attacks through direct memory overwriting by user processes on Linux with KDRM. The KDRM showed an acceptable performance cost. The overhead of a system call was up to 11.52%, and the kernel performance score was 0.11%.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"2 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141773466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A comprehensive analysis on software vulnerability detection datasets: trends, challenges, and road ahead 软件漏洞检测数据集综合分析:趋势、挑战和未来之路
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-23 DOI: 10.1007/s10207-024-00888-y
Yuejun Guo, Seifeddine Bettaieb, Fran Casino

As society’s dependence on information and communication systems (ICTs) grows, so does the necessity of guaranteeing the proper functioning and use of such systems. In this context, it is critical to enhance the security and robustness of the DevSecOps pipeline through timely vulnerability detection. Usually, AI-based models enable desirable features such as automation, performance, and efficacy. However, the quality of such models highly depends on the datasets used during the training stage. The latter encompasses a series of challenges yet to be solved, such as access to extensive labelled datasets with specific properties, such as well-represented and balanced samples. This article explores the current state of practice of software vulnerability datasets and provides a classification of the main challenges and issues. After an extensive analysis, it describes a set of guidelines and desirable features that datasets should guarantee. The latter is applied to create a new dataset, which fulfils these properties, along with a descriptive comparison with the state of the art. Finally, a discussion on how to foster good practices among researchers and practitioners sets the ground for further research and continued improvement within this critical domain.

随着社会对信息和通信系统(ICTs)的依赖性不断增加,保证此类系统正常运行和使用的必要性也在增加。在这种情况下,通过及时发现漏洞来提高 DevSecOps 管道的安全性和稳健性至关重要。通常,基于人工智能的模型可以实现自动化、性能和功效等理想功能。然而,此类模型的质量在很大程度上取决于训练阶段使用的数据集。后者包括一系列尚待解决的挑战,如获取具有特定属性的广泛标记数据集,如代表性强且均衡的样本。本文探讨了软件漏洞数据集的实践现状,并对主要挑战和问题进行了分类。经过广泛的分析,文章描述了一套数据集应保证的准则和理想特性。后者被用于创建一个符合这些特性的新数据集,并与现有技术进行了描述性比较。最后,讨论了如何在研究人员和从业人员中推广良好做法,为这一关键领域的进一步研究和持续改进奠定了基础。
{"title":"A comprehensive analysis on software vulnerability detection datasets: trends, challenges, and road ahead","authors":"Yuejun Guo, Seifeddine Bettaieb, Fran Casino","doi":"10.1007/s10207-024-00888-y","DOIUrl":"https://doi.org/10.1007/s10207-024-00888-y","url":null,"abstract":"<p>As society’s dependence on information and communication systems (ICTs) grows, so does the necessity of guaranteeing the proper functioning and use of such systems. In this context, it is critical to enhance the security and robustness of the DevSecOps pipeline through timely vulnerability detection. Usually, AI-based models enable desirable features such as automation, performance, and efficacy. However, the quality of such models highly depends on the datasets used during the training stage. The latter encompasses a series of challenges yet to be solved, such as access to extensive labelled datasets with specific properties, such as well-represented and balanced samples. This article explores the current state of practice of software vulnerability datasets and provides a classification of the main challenges and issues. After an extensive analysis, it describes a set of guidelines and desirable features that datasets should guarantee. The latter is applied to create a new dataset, which fulfils these properties, along with a descriptive comparison with the state of the art. Finally, a discussion on how to foster good practices among researchers and practitioners sets the ground for further research and continued improvement within this critical domain.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"17 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141773356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Information Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1