首页 > 最新文献

International Journal of Information Security最新文献

英文 中文
IoT cybersecurity in 5G and beyond: a systematic literature review 5G 及以后的物联网网络安全:系统性文献综述
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-28 DOI: 10.1007/s10207-024-00865-5
Sandeep Pirbhulal, Sabarathinam Chockalingam, Ankur Shukla, Habtamu Abie

The 5th generation (5G) and beyond use Internet of Things (IoT) to offer the feature of remote monitoring for different applications such as transportation, healthcare, and energy. There are several advantages of 5G and beyond for IoT applications like high speed and low latency. However, they are prone to cybersecurity threats due to networks softwarization and virtualization, thus raising additional security challenges and complexities. In this paper, we conducted a systematic literature review (SLR) of cybersecurity for 5G and beyond-enabled IoT. By developing a taxonomy to classify and characterize existing research, we identified and analyzed strategies, key patterns, mechanisms, performance evaluation, validation parameters and challenges of cybersecurity and resilience for 5G and beyond-enabled IoT in existing studies. We used “Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA)” recommendations for this SLR. Through our search in scientific databases, 4449 records published between 2017 and 2023 were initially identified, which were then reduced to 558 records after title and abstract screening to be considered for the eligibility check process. After screening the full-text, 79 articles were finalized for thorough analysis. The findings of this study suggest that 35% of the included studies focus on authentication and access control as security aspects, 59% studies are based on combination of both network layer and application layer as main operation layer, and 34% of the included studies use real-time implementation for validation purpose while the remaining studies utilize simulation or theoretical analysis. Our SLR also highlights open research challenges of 5G and beyond-enabled IoT cybersecurity and suggests a tentative solution for each challenge, which can be a focus of future research. Finally, key limitations of our SLR and threats to validity are addressed.

第五代(5G)及以后的物联网(IoT)可为交通、医疗保健和能源等不同应用提供远程监控功能。5G 及更先进的技术在物联网应用中具有高速度和低延迟等优势。然而,由于网络的软化和虚拟化,它们很容易受到网络安全威胁,从而带来更多的安全挑战和复杂性。在本文中,我们对 5G 及更先进的物联网网络安全进行了系统的文献综述(SLR)。通过制定分类标准对现有研究进行分类和特征描述,我们确定并分析了现有研究中有关 5G 及未来物联网网络安全和弹性的策略、关键模式、机制、性能评估、验证参数和挑战。本 SLR 采用了 "系统综述和元分析首选报告项目(PRISMA)"建议。通过在科学数据库中的搜索,我们初步确定了 4449 条在 2017 年至 2023 年间发表的记录,经过标题和摘要筛选后,这些记录减少到 558 条,以便进行资格检查。在筛选全文后,最终确定了 79 篇文章进行深入分析。研究结果表明,35% 的收录研究侧重于作为安全方面的身份验证和访问控制,59% 的研究基于网络层和应用层作为主要操作层的组合,34% 的收录研究使用实时实施进行验证,而其余研究则使用模拟或理论分析。我们的 SLR 还强调了 5G 和超越 5G 的物联网网络安全的公开研究挑战,并针对每个挑战提出了暂定解决方案,这些解决方案可作为未来研究的重点。最后,还讨论了我们的 SLR 的主要局限性以及对有效性的威胁。
{"title":"IoT cybersecurity in 5G and beyond: a systematic literature review","authors":"Sandeep Pirbhulal, Sabarathinam Chockalingam, Ankur Shukla, Habtamu Abie","doi":"10.1007/s10207-024-00865-5","DOIUrl":"https://doi.org/10.1007/s10207-024-00865-5","url":null,"abstract":"<p>The 5th generation (5G) and beyond use Internet of Things (IoT) to offer the feature of remote monitoring for different applications such as transportation, healthcare, and energy. There are several advantages of 5G and beyond for IoT applications like high speed and low latency. However, they are prone to cybersecurity threats due to networks softwarization and virtualization, thus raising additional security challenges and complexities. In this paper, we conducted a systematic literature review (SLR) of cybersecurity for 5G and beyond-enabled IoT. By developing a taxonomy to classify and characterize existing research, we identified and analyzed strategies, key patterns, mechanisms, performance evaluation, validation parameters and challenges of cybersecurity and resilience for 5G and beyond-enabled IoT in existing studies. We used “Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA)” recommendations for this SLR. Through our search in scientific databases, 4449 records published between 2017 and 2023 were initially identified, which were then reduced to 558 records after title and abstract screening to be considered for the eligibility check process. After screening the full-text, 79 articles were finalized for thorough analysis. The findings of this study suggest that 35% of the included studies focus on authentication and access control as security aspects, 59% studies are based on combination of both network layer and application layer as main operation layer, and 34% of the included studies use real-time implementation for validation purpose while the remaining studies utilize simulation or theoretical analysis. Our SLR also highlights open research challenges of 5G and beyond-enabled IoT cybersecurity and suggests a tentative solution for each challenge, which can be a focus of future research. Finally, key limitations of our SLR and threats to validity are addressed.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"66 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141171681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Decentralised identity federations using blockchain 使用区块链的去中心化身份联盟
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-16 DOI: 10.1007/s10207-024-00864-6
Mirza Kamrul Bashar Shuhan, Syed Md. Hasnayeen, Tanmoy Krishna Das, Md. Nazmus Sakib, Md Sadek Ferdous

Federated Identity Management offers numerous economic benefits and convenience to Service Providers and users alike. In such federations, the Identity Provider (IdP) is the solitary entity responsible for managing user credentials and generating assertions for the users, who are requesting access to a service provider’s resource. This makes the IdP centralised and exhibits a single point of failure for the federation, making the federation prone to catastrophic damages. The paper presents our effort in designing and implementing a decentralised system in establishing an identity federation. In its attempt to decentralise the IdP in the federation, the proposed system relies on blockchain technology, thereby, mitigating the single point of failure shortcoming of existing identity federations and is designed using a set of requirements. In this article, we explore different aspects of designing and developing the system, present its protocol flow, analyse its performance, and evaluate its security using ProVerif, a state-of-the-art formal protocol verification tool.

联盟身份管理为服务提供商和用户带来了众多经济效益和便利。在这种联盟中,身份供应商(IdP)是负责管理用户凭证和为请求访问服务供应商资源的用户生成断言的唯一实体。这就使得身份提供者(IdP)集中化,成为联盟的单点故障,使联盟容易遭受灾难性破坏。本文介绍了我们在设计和实施分散系统以建立身份联盟方面所做的努力。在尝试对联盟中的身份标识符进行去中心化的过程中,所提议的系统依赖于区块链技术,从而减轻了现有身份联盟的单点故障缺陷,并且是根据一系列要求设计的。在本文中,我们将探讨设计和开发该系统的各个方面,介绍其协议流程,分析其性能,并使用最先进的形式协议验证工具 ProVerif 评估其安全性。
{"title":"Decentralised identity federations using blockchain","authors":"Mirza Kamrul Bashar Shuhan, Syed Md. Hasnayeen, Tanmoy Krishna Das, Md. Nazmus Sakib, Md Sadek Ferdous","doi":"10.1007/s10207-024-00864-6","DOIUrl":"https://doi.org/10.1007/s10207-024-00864-6","url":null,"abstract":"<p>Federated Identity Management offers numerous economic benefits and convenience to Service Providers and users alike. In such federations, the Identity Provider (IdP) is the solitary entity responsible for managing user credentials and generating assertions for the users, who are requesting access to a service provider’s resource. This makes the IdP centralised and exhibits a single point of failure for the federation, making the federation prone to catastrophic damages. The paper presents our effort in designing and implementing a decentralised system in establishing an identity federation. In its attempt to decentralise the IdP in the federation, the proposed system relies on blockchain technology, thereby, mitigating the single point of failure shortcoming of existing identity federations and is designed using a set of requirements. In this article, we explore different aspects of designing and developing the system, present its protocol flow, analyse its performance, and evaluate its security using ProVerif, a state-of-the-art formal protocol verification tool.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"31 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141061627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Two-stage advanced persistent threat (APT) attack on an IEC 61850 power grid substation 针对 IEC 61850 电网变电站的两阶段高级持续性威胁 (APT) 攻击
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-14 DOI: 10.1007/s10207-024-00856-6
Aida Akbarzadeh, Laszlo Erdodi, Siv Hilde Houmb, Tore Geir Soltvedt

Advanced Persistent Threats (APTs) are stealthy, multi-step attacks tailored to a specific target. Often described as ’low and slow’, APTs remain undetected until the consequences of the cyber-attack become evident, usually in the form of damage to the physical world, as seen with the Stuxnet attack, or manipulation of an industrial process, as was the case in the Ukraine Power Grid attacks. Given the increasing sophistication and targeted nature of cyber-attacks, especially APTs, this paper delves into the substantial threats APTs pose to critical infrastructures, focusing on power grid substations. Through a detailed case study, we present and explore a 2-stage APT attack on an IEC 61850 power grid substation, employing a Hardware-in-the-Loop (HIL) testbed to simulate real-world conditions. More specifically, this paper discusses two significant experiments conducted to assess vulnerabilities in the control protocols used in IEC 61850 substations: IEC 60870-5-104 and IEC 61850. The integration of findings from these experiments revealed a number of previously undiscussed potential threats to power grid infrastructure that could arise from attacking one or more substations. To better address these potential threats, the paper proposes an extension to the Industrial Control System (ICS) kill chain that explicitly accounts for the consequences of attacks on the physical aspects of Cyber-Physical Systems (CPSs).

高级持续性威胁(APT)是针对特定目标的隐蔽、多步骤攻击。APT 通常被描述为 "低速而缓慢",在网络攻击的后果显现之前一直未被发现,通常表现为对物理世界的破坏(如 Stuxnet 攻击)或对工业流程的操纵(如乌克兰电网攻击)。鉴于网络攻击(尤其是 APT)的复杂性和针对性日益增强,本文将以电网变电站为重点,深入探讨 APT 对关键基础设施构成的重大威胁。通过详细的案例研究,我们介绍并探讨了针对 IEC 61850 电网变电站的两阶段 APT 攻击,采用了硬件在环 (HIL) 测试平台来模拟真实世界的条件。更具体地说,本文讨论了为评估 IEC 61850 变电站使用的控制协议中的漏洞而进行的两项重要实验:IEC 60870-5-104 和 IEC 61850。这些实验结果的整合揭示了许多以前未曾讨论过的潜在威胁,攻击一个或多个变电站可能会对电网基础设施造成威胁。为了更好地应对这些潜在威胁,本文提出了对工业控制系统 (ICS) 杀伤链的扩展,明确说明了对网络物理系统 (CPS) 物理方面的攻击所造成的后果。
{"title":"Two-stage advanced persistent threat (APT) attack on an IEC 61850 power grid substation","authors":"Aida Akbarzadeh, Laszlo Erdodi, Siv Hilde Houmb, Tore Geir Soltvedt","doi":"10.1007/s10207-024-00856-6","DOIUrl":"https://doi.org/10.1007/s10207-024-00856-6","url":null,"abstract":"<p>Advanced Persistent Threats (APTs) are stealthy, multi-step attacks tailored to a specific target. Often described as ’low and slow’, APTs remain undetected until the consequences of the cyber-attack become evident, usually in the form of damage to the physical world, as seen with the Stuxnet attack, or manipulation of an industrial process, as was the case in the Ukraine Power Grid attacks. Given the increasing sophistication and targeted nature of cyber-attacks, especially APTs, this paper delves into the substantial threats APTs pose to critical infrastructures, focusing on power grid substations. Through a detailed case study, we present and explore a 2-stage APT attack on an IEC 61850 power grid substation, employing a Hardware-in-the-Loop (HIL) testbed to simulate real-world conditions. More specifically, this paper discusses two significant experiments conducted to assess vulnerabilities in the control protocols used in IEC 61850 substations: IEC 60870-5-104 and IEC 61850. The integration of findings from these experiments revealed a number of previously undiscussed potential threats to power grid infrastructure that could arise from attacking one or more substations. To better address these potential threats, the paper proposes an extension to the Industrial Control System (ICS) kill chain that explicitly accounts for the consequences of attacks on the physical aspects of Cyber-Physical Systems (CPSs).</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"155 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140928822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Non-Alpha-Num: a novel architecture for generating adversarial examples for bypassing NLP-based clickbait detection mechanisms Non-Alpha-Num:绕过基于 NLP 的点击诱饵检测机制生成对抗性示例的新型架构
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-13 DOI: 10.1007/s10207-024-00861-9
Ashish Bajaj, Dinesh Kumar Vishwakarma

The vast majority of online media rely heavily on the revenues generated by their readers’ views, and due to the abundance of such outlets, they must compete for reader attention. It is a common practise for publishers to employ attention-grabbing headlines as a means to entice users to visit their websites. These headlines, commonly referred to as clickbaits, strategically leverage the curiosity gap experienced by users, enticing them to click on hyperlinks that frequently fail to meet their expectations. Therefore, the identification of clickbaits is a significant NLP application. Previous studies have demonstrated that language models can effectively detect clickbaits. Deep learning models have attained great success in text-based assignments, but these are vulnerable to adversarial modifications. These attacks involve making undetectable alterations to a small number of words or characters in order to create a deceptive text that misleads the machine into making incorrect predictions. The present work introduces “Non-Alpha-Num”, a newly proposed textual adversarial assault that functions in a black box setting, operating at the character level. The primary goal is to manipulate a certain NLP model in a manner that the alterations made to the input data are undetectable by human observers. A series of comprehensive tests were conducted to evaluate the efficacy of the suggested attack approach on several widely-used models, including Word-CNN, BERT, DistilBERT, ALBERTA, RoBERTa, and XLNet. These models were fine-tuned using the clickbait dataset, which is commonly employed for clickbait detection purposes. The empirical evidence suggests that the attack model being offered routinely achieves much higher attack success rates (ASR) and produces high-quality adversarial instances in comparison to traditional adversarial manipulations. The findings suggest that the clickbait detection system has the potential to be circumvented, which might have significant implications for current policy efforts.

绝大多数网络媒体在很大程度上依赖于读者浏览量带来的收入,而由于此类媒体数量众多,它们必须争夺读者的注意力。出版商通常会采用吸引眼球的标题来吸引用户访问其网站。这些标题通常被称为 "点击广告"(clickbaits),它们策略性地利用用户的好奇心缺口,吸引他们点击那些经常不符合他们期望的超链接。因此,识别点击广告是一项重要的 NLP 应用。以往的研究表明,语言模型可以有效地检测点击广告。深度学习模型在基于文本的任务中取得了巨大成功,但这些模型容易受到对抗性修改的影响。这些攻击涉及对少量单词或字符进行难以察觉的修改,以创建欺骗性文本,误导机器做出不正确的预测。本作品介绍的 "Non-Alpha-Num "是一种新提出的文本对抗攻击,它在黑盒环境下运行,在字符层面上操作。其主要目标是以人类观察者无法察觉的方式操纵特定的 NLP 模型,从而改变输入数据。我们进行了一系列综合测试,以评估建议的攻击方法在几个广泛使用的模型上的有效性,包括 Word-CNN、BERT、DistilBERT、ALBERTA、RoBERTa 和 XLNet。这些模型都使用了常用于点击诱饵检测的点击诱饵数据集进行了微调。经验证据表明,与传统的对抗操作相比,所提供的攻击模型通常能实现更高的攻击成功率(ASR),并产生高质量的对抗实例。研究结果表明,点击诱饵检测系统有可能被规避,这可能会对当前的政策努力产生重大影响。
{"title":"Non-Alpha-Num: a novel architecture for generating adversarial examples for bypassing NLP-based clickbait detection mechanisms","authors":"Ashish Bajaj, Dinesh Kumar Vishwakarma","doi":"10.1007/s10207-024-00861-9","DOIUrl":"https://doi.org/10.1007/s10207-024-00861-9","url":null,"abstract":"<p>The vast majority of online media rely heavily on the revenues generated by their readers’ views, and due to the abundance of such outlets, they must compete for reader attention. It is a common practise for publishers to employ attention-grabbing headlines as a means to entice users to visit their websites. These headlines, commonly referred to as clickbaits, strategically leverage the curiosity gap experienced by users, enticing them to click on hyperlinks that frequently fail to meet their expectations. Therefore, the identification of clickbaits is a significant NLP application. Previous studies have demonstrated that language models can effectively detect clickbaits. Deep learning models have attained great success in text-based assignments, but these are vulnerable to adversarial modifications. These attacks involve making undetectable alterations to a small number of words or characters in order to create a deceptive text that misleads the machine into making incorrect predictions. The present work introduces “<i>Non-Alpha-Num</i>”, a newly proposed textual adversarial assault that functions in a black box setting, operating at the character level. The primary goal is to manipulate a certain NLP model in a manner that the alterations made to the input data are undetectable by human observers. A series of comprehensive tests were conducted to evaluate the efficacy of the suggested attack approach on several widely-used models, including Word-CNN, BERT, DistilBERT, ALBERTA, RoBERTa, and XLNet. These models were fine-tuned using the clickbait dataset, which is commonly employed for clickbait detection purposes. The empirical evidence suggests that the attack model being offered routinely achieves much higher attack success rates (ASR) and produces high-quality adversarial instances in comparison to traditional adversarial manipulations. The findings suggest that the clickbait detection system has the potential to be circumvented, which might have significant implications for current policy efforts.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"200 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140942065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Integrating AI-driven threat intelligence and forecasting in the cyber security exercise content generation lifecycle 将人工智能驱动的威胁情报和预测纳入网络安全演习内容生成生命周期
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-10 DOI: 10.1007/s10207-024-00860-w
Alexandros Zacharis, Vasilios Katos, Constantinos Patsakis

The escalating complexity and impact of cyber threats require organisations to rehearse responses to cyber-attacks by routinely conducting cyber security exercises. However, the effectiveness of these exercises is limited by the exercise planners’ ability to replicate real-world scenarios in a timely manner that is, most importantly, tailored to the training audience and sector impacted. To address this issue, we propose the integration of AI-driven sectorial threat intelligence and forecasting to identify emerging and relevant threats and anticipate their impact in different industries. By incorporating such automated analysis and forecasting into the design of cyber security exercises, organisations can simulate real-world scenarios more accurately and assess their ability to respond to emerging threats. Fundamentally, our approach enhances the effectiveness of cyber security exercises by tailoring the scenarios to reflect the threats that are more relevant and imminent to the sector of the targeted organisation, thereby enhancing its preparedness for cyber attacks. To assess the efficacy of our forecasting methodology, we conducted a survey with domain experts and report their feedback and evaluation of the proposed methodology.

网络威胁的复杂性和影响不断升级,要求各组织通过定期开展网络安全演习来演练应对网络攻击的措施。然而,这些演习的有效性受限于演习策划者及时复制真实世界场景的能力,而最重要的是,这种能力是针对培训受众和受影响部门量身定制的。为解决这一问题,我们建议整合人工智能驱动的行业威胁情报和预测,以识别新出现的相关威胁并预测其对不同行业的影响。通过将这种自动分析和预测纳入网络安全演习的设计中,组织可以更准确地模拟真实世界的场景,并评估其应对新兴威胁的能力。从根本上说,我们的方法通过定制情景来反映与目标组织所在行业更相关、更紧迫的威胁,从而提高网络安全演习的有效性,增强其应对网络攻击的能力。为了评估我们的预测方法的有效性,我们对领域专家进行了调查,并报告了他们对建议方法的反馈和评价。
{"title":"Integrating AI-driven threat intelligence and forecasting in the cyber security exercise content generation lifecycle","authors":"Alexandros Zacharis, Vasilios Katos, Constantinos Patsakis","doi":"10.1007/s10207-024-00860-w","DOIUrl":"https://doi.org/10.1007/s10207-024-00860-w","url":null,"abstract":"<p>The escalating complexity and impact of cyber threats require organisations to rehearse responses to cyber-attacks by routinely conducting cyber security exercises. However, the effectiveness of these exercises is limited by the exercise planners’ ability to replicate real-world scenarios in a timely manner that is, most importantly, tailored to the training audience and sector impacted. To address this issue, we propose the integration of AI-driven sectorial threat intelligence and forecasting to identify emerging and relevant threats and anticipate their impact in different industries. By incorporating such automated analysis and forecasting into the design of cyber security exercises, organisations can simulate real-world scenarios more accurately and assess their ability to respond to emerging threats. Fundamentally, our approach enhances the effectiveness of cyber security exercises by tailoring the scenarios to reflect the threats that are more relevant and imminent to the sector of the targeted organisation, thereby enhancing its preparedness for cyber attacks. To assess the efficacy of our forecasting methodology, we conducted a survey with domain experts and report their feedback and evaluation of the proposed methodology.\u0000</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"127 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140928873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoTvulCode: AI-enabled vulnerability detection in software products designed for IoT applications IoTvulCode:在为物联网应用设计的软件产品中进行人工智能漏洞检测
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-09 DOI: 10.1007/s10207-024-00848-6
Guru Prasad Bhandari, Gebremariam Assres, Nikola Gavric, Andrii Shalaginov, Tor-Morten Grønli

The proliferation of the Internet of Things (IoT) paradigm has ushered in a new era of connectivity and convenience. Consequently, rapid IoT expansion has introduced unprecedented security challenges , among which source code vulnerabilities present a significant risk. Recently, machine learning (ML) has been increasingly used to detect source code vulnerabilities. However, there has been a lack of attention to IoT-specific frameworks regarding both tools and datasets. This paper addresses potential source code vulnerabilities in some of the most commonly used IoT frameworks. Hence, we introduce IoTvulCode - a novel framework consisting of a dataset-generating tool and ML-enabled methods for detecting source code vulnerabilities and weaknesses as well as the initial release of an IoT vulnerability dataset. Our framework contributes to improving the existing coding practices, leading to a more secure IoT infrastructure. Additionally, IoTvulCode provides a solid basis for the IoT research community to further explore the topic.

物联网(IoT)模式的普及开创了一个连接和便利的新时代。因此,物联网的快速发展带来了前所未有的安全挑战,其中源代码漏洞是一个重大风险。最近,机器学习(ML)被越来越多地用于检测源代码漏洞。然而,在工具和数据集方面,物联网特定框架一直缺乏关注。本文探讨了一些最常用的物联网框架中潜在的源代码漏洞。因此,我们介绍了 IoTvulCode--一个由数据集生成工具和支持 ML 的方法组成的新型框架,用于检测源代码漏洞和弱点,并首次发布了一个物联网漏洞数据集。我们的框架有助于改进现有的编码实践,从而建立更安全的物联网基础设施。此外,IoTvulCode 还为物联网研究界进一步探索该主题奠定了坚实的基础。
{"title":"IoTvulCode: AI-enabled vulnerability detection in software products designed for IoT applications","authors":"Guru Prasad Bhandari, Gebremariam Assres, Nikola Gavric, Andrii Shalaginov, Tor-Morten Grønli","doi":"10.1007/s10207-024-00848-6","DOIUrl":"https://doi.org/10.1007/s10207-024-00848-6","url":null,"abstract":"<p>The proliferation of the Internet of Things (IoT) paradigm has ushered in a new era of connectivity and convenience. Consequently, rapid IoT expansion has introduced unprecedented security challenges , among which source code vulnerabilities present a significant risk. Recently, machine learning (ML) has been increasingly used to detect source code vulnerabilities. However, there has been a lack of attention to IoT-specific frameworks regarding both tools and datasets. This paper addresses potential source code vulnerabilities in some of the most commonly used IoT frameworks. Hence, we introduce <i>IoTvulCode </i>- a novel framework consisting of a dataset-generating tool and ML-enabled methods for detecting source code vulnerabilities and weaknesses as well as the initial release of an IoT vulnerability dataset. Our framework contributes to improving the existing coding practices, leading to a more secure IoT infrastructure. Additionally, <i>IoTvulCode </i>provides a solid basis for the IoT research community to further explore the topic.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"16 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140928757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic vulnerability severity calculator for industrial control systems 工业控制系统动态漏洞严重性计算器
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-08 DOI: 10.1007/s10207-024-00858-4
Pavlos Cheimonidis, Konstantinos Rantos

The convergence of information and communication technologies has introduced new and advanced capabilities to Industrial Control Systems. However, concurrently, it has heightened their vulnerability to cyber attacks. Consequently, the imperative for new security methods has emerged as a critical need for these organizations to effectively identify and mitigate potential threats. This paper introduces an innovative approach by proposing a dynamic vulnerability severity calculator. Our methodology encompasses the analysis of environmental topology and the effectiveness of deployed security mechanisms, coupled with the utilization of the Common Vulnerability Scoring System framework to adjust detected vulnerabilities based on the specific environment. Moreover, it evaluates the quantity of vulnerabilities and their interdependencies within each asset. Additionally, our approach integrates these factors into a comprehensive Fuzzy Cognitive Map model, incorporating attack paths to holistically assess the overall vulnerability score. To validate the efficacy of our proposed method, we present a relative case study alongside several modified scenarios, demonstrating its effectiveness in practical applications.

信息和通信技术的融合为工业控制系统带来了全新的先进功能。但与此同时,工业控制系统也更容易受到网络攻击。因此,这些组织迫切需要新的安全方法来有效识别和减轻潜在威胁。本文提出了一种创新方法,即动态漏洞严重性计算器。我们的方法包括分析环境拓扑结构和已部署安全机制的有效性,同时利用通用漏洞评分系统框架,根据具体环境调整检测到的漏洞。此外,它还能评估每个资产中的漏洞数量及其相互依赖性。此外,我们的方法还将这些因素整合到一个全面的模糊认知地图模型中,并结合攻击路径来全面评估整体漏洞得分。为了验证我们提出的方法的有效性,我们提出了一个相关案例研究和几个修改过的场景,证明了该方法在实际应用中的有效性。
{"title":"Dynamic vulnerability severity calculator for industrial control systems","authors":"Pavlos Cheimonidis, Konstantinos Rantos","doi":"10.1007/s10207-024-00858-4","DOIUrl":"https://doi.org/10.1007/s10207-024-00858-4","url":null,"abstract":"<p>The convergence of information and communication technologies has introduced new and advanced capabilities to Industrial Control Systems. However, concurrently, it has heightened their vulnerability to cyber attacks. Consequently, the imperative for new security methods has emerged as a critical need for these organizations to effectively identify and mitigate potential threats. This paper introduces an innovative approach by proposing a dynamic vulnerability severity calculator. Our methodology encompasses the analysis of environmental topology and the effectiveness of deployed security mechanisms, coupled with the utilization of the Common Vulnerability Scoring System framework to adjust detected vulnerabilities based on the specific environment. Moreover, it evaluates the quantity of vulnerabilities and their interdependencies within each asset. Additionally, our approach integrates these factors into a comprehensive Fuzzy Cognitive Map model, incorporating attack paths to holistically assess the overall vulnerability score. To validate the efficacy of our proposed method, we present a relative case study alongside several modified scenarios, demonstrating its effectiveness in practical applications.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"22 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140929220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An improved and efficient coercion-resistant measure for electronic voting system 电子投票系统的改进型高效抗胁迫措施
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-07 DOI: 10.1007/s10207-024-00852-w
Tzer-Long Chen, Chia-Hui Liu, Ya-Hui Ou, Yao-Min Huang, Zhen-Yu Wu

The integrity of electronic voting systems is critical in safeguarding the democratic process worldwide. This study addresses the twin challenges of bribery and coercion that undermine most existing electronic voting systems. Recognizing the limitations of current security measures, which fail to protect voter autonomy even after the disclosure of voting secrets, we propose an innovative level-five secure e-voting system. By integrating an additional setup phase, our system maintains voter volition, ensuring security even when key secrets are compromised. Utilizing cryptographic techniques, blind signatures, and subliminal channels in conjunction with smart card PIN mechanisms, our approach not only bolsters system security but also enhances its potential for widespread adoption. This work underscores the importance of advanced cryptographic methods in developing coercion-resistant electronic voting systems that prioritize voter privacy and choice.

电子投票系统的完整性对于保障全球民主进程至关重要。贿赂和胁迫是破坏大多数现有电子投票系统的双重挑战,本研究就是要解决这两个问题。我们认识到现有安全措施的局限性,这些措施即使在投票秘密泄露后也无法保护选民的自主权,因此我们提出了一种创新的五级安全电子投票系统。通过整合一个额外的设置阶段,我们的系统能保持选民的自主性,即使在关键机密被泄露的情况下也能确保安全。利用密码技术、盲签名和潜意识通道以及智能卡 PIN 机制,我们的方法不仅增强了系统的安全性,还提高了其广泛应用的潜力。这项工作强调了先进加密方法在开发抗胁迫电子投票系统中的重要性,该系统优先考虑选民的隐私和选择。
{"title":"An improved and efficient coercion-resistant measure for electronic voting system","authors":"Tzer-Long Chen, Chia-Hui Liu, Ya-Hui Ou, Yao-Min Huang, Zhen-Yu Wu","doi":"10.1007/s10207-024-00852-w","DOIUrl":"https://doi.org/10.1007/s10207-024-00852-w","url":null,"abstract":"<p>The integrity of electronic voting systems is critical in safeguarding the democratic process worldwide. This study addresses the twin challenges of bribery and coercion that undermine most existing electronic voting systems. Recognizing the limitations of current security measures, which fail to protect voter autonomy even after the disclosure of voting secrets, we propose an innovative level-five secure e-voting system. By integrating an additional setup phase, our system maintains voter volition, ensuring security even when key secrets are compromised. Utilizing cryptographic techniques, blind signatures, and subliminal channels in conjunction with smart card PIN mechanisms, our approach not only bolsters system security but also enhances its potential for widespread adoption. This work underscores the importance of advanced cryptographic methods in developing coercion-resistant electronic voting systems that prioritize voter privacy and choice.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"15 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140888070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluating the merits and constraints of cryptography-steganography fusion: a systematic analysis 评估密码学与加密学融合的优点和制约因素:系统分析
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-05 DOI: 10.1007/s10207-024-00853-9
Indy Haverkamp, Dipti K. Sarmah

In today's interconnected world, safeguarding digital data's confidentiality and security is crucial. Cryptography and steganography are two primary methods used for information security. While these methods have diverse applications, there is ongoing exploration into the potential benefits of merging them. This review focuses on journal articles from 2010 onwards and conference papers from 2018 onwards that integrate steganography and cryptography in practical applications. The results are gathered through different databases like Scopus, IEEE, and Web of Science. Our approach involves gaining insights into real-world applications explored in the existing literature and categorizing them based on domains and technological areas. Furthermore, we comprehensively analyze the advantages and limitations associated with these implementations, examining them from three evaluation perspectives: security, performance, and user experience. This categorization offers guidance for future research in unexplored areas, while the evaluation perspectives provide essential considerations for analyzing real-world implementations.

在当今这个相互联系的世界里,保护数字数据的机密性和安全性至关重要。密码学和隐写术是信息安全的两种主要方法。虽然这两种方法的应用多种多样,但人们一直在探索将它们合并的潜在好处。本综述侧重于 2010 年以来的期刊论文和 2018 年以来的会议论文,这些文章和论文将隐写术和密码学结合在实际应用中。研究结果通过 Scopus、IEEE 和 Web of Science 等不同数据库收集。我们的方法包括深入了解现有文献中探讨的现实世界应用,并根据领域和技术领域对其进行分类。此外,我们还全面分析了这些实施方案的优势和局限性,并从安全、性能和用户体验三个评估角度对其进行了研究。这种分类为未来在未开发领域的研究提供了指导,而评估视角则为分析现实世界的实现提供了必要的考虑因素。
{"title":"Evaluating the merits and constraints of cryptography-steganography fusion: a systematic analysis","authors":"Indy Haverkamp, Dipti K. Sarmah","doi":"10.1007/s10207-024-00853-9","DOIUrl":"https://doi.org/10.1007/s10207-024-00853-9","url":null,"abstract":"<p>In today's interconnected world, safeguarding digital data's confidentiality and security is crucial. Cryptography and steganography are two primary methods used for information security. While these methods have diverse applications, there is ongoing exploration into the potential benefits of merging them. This review focuses on journal articles from 2010 onwards and conference papers from 2018 onwards that integrate steganography and cryptography in practical applications. The results are gathered through different databases like Scopus, IEEE, and Web of Science. Our approach involves gaining insights into real-world applications explored in the existing literature and categorizing them based on domains and technological areas. Furthermore, we comprehensively analyze the advantages and limitations associated with these implementations, examining them from three evaluation perspectives: security, performance, and user experience. This categorization offers guidance for future research in unexplored areas, while the evaluation perspectives provide essential considerations for analyzing real-world implementations.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"17 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140887843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A cyber defense system against phishing attacks with deep learning game theory and LSTM-CNN with African vulture optimization algorithm (AVOA) 利用深度学习博弈论和带有非洲秃鹫优化算法(AVOA)的 LSTM-CNN 对抗网络钓鱼攻击的网络防御系统
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-05 DOI: 10.1007/s10207-024-00851-x
Mustafa Ahmed Elberri, Ümit Tokeşer, Javad Rahebi, Jose Manuel Lopez-Guede

Phishing attacks pose a significant threat to online security, utilizing fake websites to steal sensitive user information. Deep learning techniques, particularly convolutional neural networks (CNNs), have emerged as promising tools for detecting phishing attacks. However, traditional CNN-based image classification methods face limitations in effectively identifying fake pages. To address this challenge, we propose an image-based coding approach for detecting phishing attacks using a CNN-LSTM hybrid model. This approach combines SMOTE, an enhanced GAN based on the Autoencoder network, and swarm intelligence algorithms to balance the dataset, select informative features, and generate grayscale images. Experiments on three benchmark datasets demonstrate that the proposed method achieves superior accuracy, precision, and sensitivity compared to other techniques, effectively identifying phishing attacks and enhancing online security.

网络钓鱼攻击利用虚假网站窃取用户的敏感信息,对网络安全构成重大威胁。深度学习技术,尤其是卷积神经网络(CNN),已成为检测网络钓鱼攻击的有效工具。然而,基于 CNN 的传统图像分类方法在有效识别虚假网页方面存在局限性。为了应对这一挑战,我们提出了一种基于图像的编码方法,利用 CNN-LSTM 混合模型来检测网络钓鱼攻击。这种方法结合了 SMOTE、基于 Autoencoder 网络的增强型 GAN 和蜂群智能算法,以平衡数据集、选择信息特征并生成灰度图像。在三个基准数据集上进行的实验表明,与其他技术相比,所提出的方法在准确度、精确度和灵敏度方面都更胜一筹,能有效识别网络钓鱼攻击,提高在线安全性。
{"title":"A cyber defense system against phishing attacks with deep learning game theory and LSTM-CNN with African vulture optimization algorithm (AVOA)","authors":"Mustafa Ahmed Elberri, Ümit Tokeşer, Javad Rahebi, Jose Manuel Lopez-Guede","doi":"10.1007/s10207-024-00851-x","DOIUrl":"https://doi.org/10.1007/s10207-024-00851-x","url":null,"abstract":"<p>Phishing attacks pose a significant threat to online security, utilizing fake websites to steal sensitive user information. Deep learning techniques, particularly convolutional neural networks (CNNs), have emerged as promising tools for detecting phishing attacks. However, traditional CNN-based image classification methods face limitations in effectively identifying fake pages. To address this challenge, we propose an image-based coding approach for detecting phishing attacks using a CNN-LSTM hybrid model. This approach combines SMOTE, an enhanced GAN based on the Autoencoder network, and swarm intelligence algorithms to balance the dataset, select informative features, and generate grayscale images. Experiments on three benchmark datasets demonstrate that the proposed method achieves superior accuracy, precision, and sensitivity compared to other techniques, effectively identifying phishing attacks and enhancing online security.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"63 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140887833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Information Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1