首页 > 最新文献

International Journal of Information Security最新文献

英文 中文
Optimized common features selection and deep-autoencoder (OCFSDA) for lightweight intrusion detection in Internet of things 用于物联网轻量级入侵检测的优化通用特征选择和深度自动编码器(OCFSDA)
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-30 DOI: 10.1007/s10207-024-00855-7
Uneneibotejit Otokwala, Andrei Petrovski, Harsha Kalutarage

Embedded systems, including the Internet of things (IoT), play a crucial role in the functioning of critical infrastructure. However, these devices face significant challenges such as memory footprint, technical challenges, privacy concerns, performance trade-offs and vulnerability to cyber-attacks. One approach to address these concerns is minimising computational overhead and adopting lightweight intrusion detection techniques. In this study, we propose a highly efficient model called optimized common features selection and deep-autoencoder (OCFSDA) for lightweight intrusion detection in IoT environments. The proposed OCFSDA model incorporates feature selection, data compression, pruning, and deparameterization. We deployed the model on a Raspberry Pi4 using the TFLite interpreter by leveraging optimisation and inferencing with semi-supervised learning. Using the MQTT-IoT-IDS2020 and CIC-IDS2017 datasets, our experimental results demonstrate a remarkable reduction in the computation cost in terms of time and memory use. Notably, the model achieved an overall average accuracies of 99% and 97%, along with comparable performance on other important metrics such as precision, recall, and F1-score. Moreover, the model accomplished the classification tasks within 0.30 and 0.12 s using only 2KB of memory.

嵌入式系统,包括物联网(IoT),在关键基础设施的运行中发挥着至关重要的作用。然而,这些设备面临着内存占用、技术挑战、隐私问题、性能权衡和易受网络攻击等重大挑战。解决这些问题的方法之一是尽量减少计算开销,并采用轻量级入侵检测技术。在本研究中,我们针对物联网环境中的轻量级入侵检测提出了一种名为 "优化通用特征选择和深度自动编码器(OCFSDA)"的高效模型。所提出的 OCFSDA 模型融合了特征选择、数据压缩、剪枝和去参数化等功能。我们在 Raspberry Pi4 上使用 TFLite 解释器部署了该模型,利用半监督学习进行优化和推理。使用 MQTT-IoT-IDS2020 和 CIC-IDS2017 数据集,我们的实验结果表明在时间和内存使用方面显著降低了计算成本。值得注意的是,该模型的总体平均准确率分别达到了 99% 和 97%,在其他重要指标(如精确度、召回率和 F1 分数)上的表现也不相上下。此外,该模型仅用 2KB 内存就在 0.30 秒和 0.12 秒内完成了分类任务。
{"title":"Optimized common features selection and deep-autoencoder (OCFSDA) for lightweight intrusion detection in Internet of things","authors":"Uneneibotejit Otokwala, Andrei Petrovski, Harsha Kalutarage","doi":"10.1007/s10207-024-00855-7","DOIUrl":"https://doi.org/10.1007/s10207-024-00855-7","url":null,"abstract":"<p>Embedded systems, including the Internet of things (IoT), play a crucial role in the functioning of critical infrastructure. However, these devices face significant challenges such as memory footprint, technical challenges, privacy concerns, performance trade-offs and vulnerability to cyber-attacks. One approach to address these concerns is minimising computational overhead and adopting lightweight intrusion detection techniques. In this study, we propose a highly efficient model called optimized common features selection and deep-autoencoder (OCFSDA) for lightweight intrusion detection in IoT environments. The proposed OCFSDA model incorporates feature selection, data compression, pruning, and deparameterization. We deployed the model on a Raspberry Pi4 using the TFLite interpreter by leveraging optimisation and inferencing with semi-supervised learning. Using the MQTT-IoT-IDS2020 and CIC-IDS2017 datasets, our experimental results demonstrate a remarkable reduction in the computation cost in terms of time and memory use. Notably, the model achieved an overall average accuracies of 99% and 97%, along with comparable performance on other important metrics such as precision, recall, and F1-score. Moreover, the model accomplished the classification tasks within 0.30 and 0.12 s using only 2KB of memory.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"85 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140835179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unmasking the common traits: an ensemble approach for effective malware detection 揭示共同特征:有效检测恶意软件的集合方法
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-30 DOI: 10.1007/s10207-024-00854-8
Parthajit Borah, Upasana Sarmah, D. K. Bhattacharyya, J. K. Kalita

Malware detection has become a critical aspect of ensuring the security and integrity of computer systems. With the ever-evolving landscape of malicious software, developing effective detection methods is of utmost importance. This study focuses on the identification of important features for malware detection methods, aiming to enhance the accuracy and efficiency of such systems. In this work, we propose an ensemble approach called FRAMC to identify the key features that contribute significantly to the detection of malware. The effectiveness of FRAMC is assessed using different types of classifiers on a number of real-world malware datasets. The outcomes of our analysis demonstrate that the proposed approach excels in terms of performance when compared to other methods.

恶意软件检测已成为确保计算机系统安全性和完整性的一个重要方面。随着恶意软件的不断发展,开发有效的检测方法至关重要。本研究侧重于识别恶意软件检测方法的重要特征,旨在提高此类系统的准确性和效率。在这项工作中,我们提出了一种名为 "FRAMC "的集合方法,用于识别对恶意软件检测有重大贡献的关键特征。我们在一些真实世界的恶意软件数据集上使用不同类型的分类器对 FRAMC 的有效性进行了评估。我们的分析结果表明,与其他方法相比,所提出的方法在性能方面表现出色。
{"title":"Unmasking the common traits: an ensemble approach for effective malware detection","authors":"Parthajit Borah, Upasana Sarmah, D. K. Bhattacharyya, J. K. Kalita","doi":"10.1007/s10207-024-00854-8","DOIUrl":"https://doi.org/10.1007/s10207-024-00854-8","url":null,"abstract":"<p>Malware detection has become a critical aspect of ensuring the security and integrity of computer systems. With the ever-evolving landscape of malicious software, developing effective detection methods is of utmost importance. This study focuses on the identification of important features for malware detection methods, aiming to enhance the accuracy and efficiency of such systems. In this work, we propose an ensemble approach called FRAMC to identify the key features that contribute significantly to the detection of malware. The effectiveness of FRAMC is assessed using different types of classifiers on a number of real-world malware datasets. The outcomes of our analysis demonstrate that the proposed approach excels in terms of performance when compared to other methods.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"73 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140835251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
C2-Eye: framework for detecting command and control (C2) connection of supply chain attacks C2-Eye:检测供应链攻击的指挥与控制(C2)连接的框架
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-29 DOI: 10.1007/s10207-024-00850-y
Raja Zeeshan Haider, Baber Aslam, Haider Abbas, Zafar Iqbal

Supply chain attacks are potent cyber attacks for widespread ramifications by compromising supply chains. Supply chain attacks are difficult to detect as the malware is installed through trustworthy supply chains, missing signs of infection and making deployed security controls ineffective. Recent increases in supply chain attacks warrant a Zero-trust model and innovative solutions for detecting supply chain attacks. Supply chain malware need to establish a Command and Control (C2) connection as a communication link with the attacker to proceed on the privileged pathway. Discovery of the C2 channel between the attacker and supply chain malware can lead to detection of the attack. The most promising technique for detecting supply chain attacks is monitoring host-based indicators and correlating these with associated network activity for early discovery of C2 connection. Proposed framework has introduced a novel approach of detecting C2 over DNS by incorporating host-based activity with corresponding network activity coupled with threat intelligence. C2-Eye integrates process-specific host-based features, correlated network activity, DNS metadata, DNS semantic analysis, and real time threat intelligence from publicly available resources for detecting C2 of supply chain attacks. Besides, C2-Eye monitors the exploitation of C2 channel for probable data exfiltration. C2-Eye has introduced a distinctive featureset with 22 novel features specific to supply chain attack, enabling detection of the attack with F1-score of 98.70%.

供应链攻击是通过破坏供应链而造成广泛影响的强大网络攻击。供应链攻击难以检测,因为恶意软件是通过可信的供应链安装的,错过了感染迹象,使已部署的安全控制失效。最近,供应链攻击的增加要求采用 "零信任 "模式和创新解决方案来检测供应链攻击。供应链恶意软件需要建立一个指挥与控制(C2)连接,作为与攻击者之间的通信链路,才能通过特权途径继续攻击。发现攻击者与供应链恶意软件之间的 C2 通道可导致对攻击的检测。检测供应链攻击的最有前途的技术是监控基于主机的指标,并将这些指标与相关网络活动关联起来,以尽早发现 C2 连接。所提出的框架通过将基于主机的活动与相应的网络活动和威胁情报相结合,引入了一种通过 DNS 检测 C2 的新方法。C2-Eye 集成了特定进程的主机特征、相关网络活动、DNS 元数据、DNS 语义分析和来自公开资源的实时威胁情报,用于检测供应链中的 C2 攻击。此外,C2-Eye 还能监控 C2 通道的利用情况,以防数据外泄。C2-Eye 引入了一个独特的特征集,其中包括 22 个针对供应链攻击的新特征,使攻击检测的 F1 分数达到 98.70%。
{"title":"C2-Eye: framework for detecting command and control (C2) connection of supply chain attacks","authors":"Raja Zeeshan Haider, Baber Aslam, Haider Abbas, Zafar Iqbal","doi":"10.1007/s10207-024-00850-y","DOIUrl":"https://doi.org/10.1007/s10207-024-00850-y","url":null,"abstract":"<p>Supply chain attacks are potent cyber attacks for widespread ramifications by compromising supply chains. Supply chain attacks are difficult to detect as the malware is installed through trustworthy supply chains, missing signs of infection and making deployed security controls ineffective. Recent increases in supply chain attacks warrant a Zero-trust model and innovative solutions for detecting supply chain attacks. Supply chain malware need to establish a Command and Control (C2) connection as a communication link with the attacker to proceed on the privileged pathway. Discovery of the C2 channel between the attacker and supply chain malware can lead to detection of the attack. The most promising technique for detecting supply chain attacks is monitoring host-based indicators and correlating these with associated network activity for early discovery of C2 connection. Proposed framework has introduced a novel approach of detecting C2 over DNS by incorporating host-based activity with corresponding network activity coupled with threat intelligence. C2-Eye integrates process-specific host-based features, correlated network activity, DNS metadata, DNS semantic analysis, and real time threat intelligence from publicly available resources for detecting C2 of supply chain attacks. Besides, C2-Eye monitors the exploitation of C2 channel for probable data exfiltration. C2-Eye has introduced a distinctive featureset with 22 novel features specific to supply chain attack, enabling detection of the attack with F1-score of 98.70%.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"32 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140810703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Perceptions of organizational responsibility for cybersecurity in Saudi Arabia: a moderated mediation analysis 沙特阿拉伯对组织网络安全责任的看法:调节性中介分析
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-26 DOI: 10.1007/s10207-024-00859-3
Ahmed M. Asfahani

The study aims to explore the crucial interaction between organizational responsibility and employee behavior in cybersecurity, particularly in the distinct setting of Saudi Arabia. It investigates how organizational responsibility perceptions impact employee attitudes and practices towards cybersecurity. The research utilizes a mixed theoretical framework, incorporating stewardship theory, protection motivation theory, and the theory of planned behavior. It examines the intricate link between organizational leadership, policies, and individual responses to cybersecurity threats through a comprehensive survey conducted among Saudi employees. The study discovers that employees’ perceptions of organizational responsibility greatly influence their cybersecurity behavior. It also finds that employee attitudes towards cybersecurity act as a mediator in this relationship. Contrary to expectations, personal experiences with cybersecurity incidents do not significantly moderate these relationships. This underlines the complex and culture-specific nature of cybersecurity compliance in organizational contexts. This research uniquely contributes to the understanding of cybersecurity behavior within organizations, particularly highlighting the need for policies that align with both organizational objectives and individual behaviors in culturally specific environments like Saudi Arabia. It offers novel insights into the less pronounced impact of personal cybersecurity experiences on organizational-employee dynamics in cybersecurity compliance.

本研究旨在探讨网络安全中组织责任与员工行为之间的重要互动关系,特别是在沙特阿拉伯的独特环境中。研究调查了组织责任认知如何影响员工对网络安全的态度和实践。研究采用了混合理论框架,其中包含管理理论、保护动机理论和计划行为理论。研究通过对沙特员工进行全面调查,研究了组织领导力、政策和个人对网络安全威胁的反应之间错综复杂的联系。研究发现,员工对组织责任的认知在很大程度上影响着他们的网络安全行为。研究还发现,员工对网络安全的态度在这种关系中起着中介作用。与预期相反,网络安全事件的个人经历并不能显著调节这些关系。这凸显了组织环境中网络安全合规性的复杂性和文化特定性。这项研究为了解组织内的网络安全行为做出了独特的贡献,特别是强调了在沙特阿拉伯这样的特定文化环境中,需要制定既符合组织目标又符合个人行为的政策。它还提供了新颖的见解,说明个人网络安全经验对组织-员工网络安全合规动态的影响并不明显。
{"title":"Perceptions of organizational responsibility for cybersecurity in Saudi Arabia: a moderated mediation analysis","authors":"Ahmed M. Asfahani","doi":"10.1007/s10207-024-00859-3","DOIUrl":"https://doi.org/10.1007/s10207-024-00859-3","url":null,"abstract":"<p>The study aims to explore the crucial interaction between organizational responsibility and employee behavior in cybersecurity, particularly in the distinct setting of Saudi Arabia. It investigates how organizational responsibility perceptions impact employee attitudes and practices towards cybersecurity. The research utilizes a mixed theoretical framework, incorporating stewardship theory, protection motivation theory, and the theory of planned behavior. It examines the intricate link between organizational leadership, policies, and individual responses to cybersecurity threats through a comprehensive survey conducted among Saudi employees. The study discovers that employees’ perceptions of organizational responsibility greatly influence their cybersecurity behavior. It also finds that employee attitudes towards cybersecurity act as a mediator in this relationship. Contrary to expectations, personal experiences with cybersecurity incidents do not significantly moderate these relationships. This underlines the complex and culture-specific nature of cybersecurity compliance in organizational contexts. This research uniquely contributes to the understanding of cybersecurity behavior within organizations, particularly highlighting the need for policies that align with both organizational objectives and individual behaviors in culturally specific environments like Saudi Arabia. It offers novel insights into the less pronounced impact of personal cybersecurity experiences on organizational-employee dynamics in cybersecurity compliance.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"12 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140799558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An online intrusion detection method for industrial control systems based on extended belief rule base 基于扩展信念规则库的工业控制系统在线入侵检测方法
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-26 DOI: 10.1007/s10207-024-00845-9
Guangyu Qian, Jinyuan Li, Wei He, Wei Zhang, You Cao

Intrusion detection in industrial control systems (ICS) is crucial for maintaining the security of physical information systems. However, the existing models predominantly rely on black-box approaches, which exhibit limitations in result credibility and the ability to adapt to complex and dynamic environments. Consequently, this paper proposes an online updatable extended belief rule base model (O-EBRB) for intrusion detection in ICS. Firstly, an industrial intrusion detection model rooted in the extended belief rule base (EBRB) is established. This model excels in concurrently processing both quantitative and qualitative data, ensuring the reliability of its outcomes. Subsequently, a novel domain-based rule update methodology for integrating new observation data is proposed. By incorporating or merging fresh data into the original model, it enhances the model’s adaptability in dynamic settings. Finally, employing the domain-based rule weight calculation approach, the model continues to effectively compute model parameters even with the continuous expansion of rules. Through extensive experimentation on two real-world industrial intrusion detection datasets, the results demonstrate the effectiveness of the proposed model in handling information and its robust performance in dynamic environments.

工业控制系统(ICS)中的入侵检测对于维护物理信息系统的安全至关重要。然而,现有模型主要依赖于黑盒方法,在结果可信度和适应复杂多变环境的能力方面存在局限性。因此,本文提出了一种在线可更新扩展信念规则库模型(O-EBRB),用于工业控制系统的入侵检测。首先,建立了一个植根于扩展信念规则库(EBRB)的工业入侵检测模型。该模型能同时处理定量和定性数据,确保其结果的可靠性。随后,提出了一种新颖的基于领域的规则更新方法,用于整合新的观测数据。通过将新数据纳入或合并到原始模型中,增强了模型在动态环境中的适应性。最后,采用基于领域的规则权重计算方法,即使规则不断扩展,模型也能继续有效地计算模型参数。通过在两个真实世界的工业入侵检测数据集上进行大量实验,结果证明了所提出的模型在处理信息方面的有效性及其在动态环境中的鲁棒性能。
{"title":"An online intrusion detection method for industrial control systems based on extended belief rule base","authors":"Guangyu Qian, Jinyuan Li, Wei He, Wei Zhang, You Cao","doi":"10.1007/s10207-024-00845-9","DOIUrl":"https://doi.org/10.1007/s10207-024-00845-9","url":null,"abstract":"<p>Intrusion detection in industrial control systems (ICS) is crucial for maintaining the security of physical information systems. However, the existing models predominantly rely on black-box approaches, which exhibit limitations in result credibility and the ability to adapt to complex and dynamic environments. Consequently, this paper proposes an online updatable extended belief rule base model (O-EBRB) for intrusion detection in ICS. Firstly, an industrial intrusion detection model rooted in the extended belief rule base (EBRB) is established. This model excels in concurrently processing both quantitative and qualitative data, ensuring the reliability of its outcomes. Subsequently, a novel domain-based rule update methodology for integrating new observation data is proposed. By incorporating or merging fresh data into the original model, it enhances the model’s adaptability in dynamic settings. Finally, employing the domain-based rule weight calculation approach, the model continues to effectively compute model parameters even with the continuous expansion of rules. Through extensive experimentation on two real-world industrial intrusion detection datasets, the results demonstrate the effectiveness of the proposed model in handling information and its robust performance in dynamic environments.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"14 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140799707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Validation and extension of two domain-specific information privacy competency models 验证和扩展两个特定领域的信息隐私能力模型
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-22 DOI: 10.1007/s10207-024-00843-x
Aikaterini Soumelidou, Aggeliki Tsohou

The purpose of this paper is to validate two domain-specific information privacy competency models (IPCMs); the first for online consumers and the second for users of mobile applications (apps). For the validation of the competency models, we conducted qualitative research, using interviews to collect feedback by a group of nine information privacy experts. Regarding the evaluation, the experts commented largely positively for the structure and content of the IPCMs, as well as for the extent to which they achieve the intended goals. They also provided several points for improvements, which resulted in enhancing the quality of both IPCMs. The validation of the domain-specific demonstrated that this is the first study to empirically examine the privacy competencies that users of specific technological contexts should hold. The IPCMs can be used not only by educators and privacy policy makers for the design of privacy interventions, but also by e-commerce and mobile-apps providers, who could gain important insights into the way that they can be more reliable for their users. Both consumers and users of mobile-apps could benefit from IPCMs by acquiring the necessary privacy competencies through training programs for the protection of their information privacy.

本文旨在验证两个特定领域的信息隐私能力模型(IPCMs);第一个模型针对在线消费者,第二个模型针对移动应用程序(Apps)用户。为了验证能力模型,我们进行了定性研究,通过访谈收集了九位信息隐私专家的反馈意见。在评估方面,专家们对 IPCM 的结构和内容以及实现预期目标的程度给予了积极评价。他们还提出了若干改进意见,从而提高了两个 IPCM 的质量。对特定领域的验证表明,这是首次对特定技术环境下用户应具备的隐私能力进行实证研究。IPCMs 不仅可供教育工作者和隐私政策制定者用于设计隐私干预措施,还可供电子商务和移动应用程序提供商使用,他们可以从中获得重要启示,从而为用户提供更可靠的服务。移动应用程序的消费者和用户都可以从 IPCMs 中受益,通过培训计划获得必要的隐私保护能力,从而保护自己的信息隐私。
{"title":"Validation and extension of two domain-specific information privacy competency models","authors":"Aikaterini Soumelidou, Aggeliki Tsohou","doi":"10.1007/s10207-024-00843-x","DOIUrl":"https://doi.org/10.1007/s10207-024-00843-x","url":null,"abstract":"<p>The purpose of this paper is to validate two domain-specific information privacy competency models (IPCMs); the first for online consumers and the second for users of mobile applications (apps). For the validation of the competency models, we conducted qualitative research, using interviews to collect feedback by a group of nine information privacy experts. Regarding the evaluation, the experts commented largely positively for the structure and content of the IPCMs, as well as for the extent to which they achieve the intended goals. They also provided several points for improvements, which resulted in enhancing the quality of both IPCMs. The validation of the domain-specific demonstrated that this is the first study to empirically examine the privacy competencies that users of specific technological contexts should hold. The IPCMs can be used not only by educators and privacy policy makers for the design of privacy interventions, but also by e-commerce and mobile-apps providers, who could gain important insights into the way that they can be more reliable for their users. Both consumers and users of mobile-apps could benefit from IPCMs by acquiring the necessary privacy competencies through training programs for the protection of their information privacy.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"137 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140635618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A generic framework for blockchain-assisted on-chain auditing for off-chain storage 区块链辅助链上审计离链存储的通用框架
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-18 DOI: 10.1007/s10207-024-00846-8
Saeed Banaeian Far, Maryam Rajabzadeh Asaar, Afrooz Haghbin

In recent times, blockchain-based data auditing protocols have emerged as a cutting-edge area of study. Nevertheless, a conspicuous dearth of a generic framework upon which to ground such protocols is evident. This study introduces a pioneering and all-encompassing framework, designated as “Blockchain-assisted On-chain Auditing for Off-chain Storage” (BA2OC). The BA2OC framework operates without the reliance on a predefined auditor for the auditing process or a centralized verifier for the verification of on-chain auditing. It is conceivable that BA2OC forms the cornerstone of public data auditing protocols underpinned by blockchain technology. This framework bestows evidence of data ownership, ensures data integrity, facilitates public verification, supports batch verification, and bolsters the security against cyber threats through the utilization of cryptographic tools. The analysis underscores the comprehensive nature of the BA2OC framework, which positions it as the linchpin of blockchain-based public auditing protocols. Following a parametric evaluation of the BA2OC framework, this study takes into account real-world considerations, such as the utilization of the RSA cryptosystem and Android-based smartphones, to proffer a concrete protocol. The investigation further demonstrates that the BA2OC framework minimizes communication overhead while maintaining operational efficiency.

近来,基于区块链的数据审计协议已成为一个前沿研究领域。然而,作为此类协议基础的通用框架明显缺乏。本研究引入了一个开创性的全方位框架,命名为 "区块链辅助链上审计与链下存储"(BA2OC)。BA2OC 框架无需依赖预定义的审计员来执行审计流程,也无需依赖中心化验证器来验证链上审计。可以想象,BA2OC 将成为以区块链技术为支撑的公共数据审计协议的基石。该框架可提供数据所有权证据,确保数据完整性,促进公共验证,支持批量验证,并通过利用加密工具加强安全,抵御网络威胁。分析强调了 BA2OC 框架的全面性,将其定位为基于区块链的公共审计协议的关键。在对 BA2OC 框架进行参数评估后,本研究考虑了现实世界中的各种因素,如使用 RSA 密码系统和基于 Android 的智能手机,从而提出了一个具体的协议。调查进一步证明,BA2OC 框架在保持运行效率的同时最大限度地减少了通信开销。
{"title":"A generic framework for blockchain-assisted on-chain auditing for off-chain storage","authors":"Saeed Banaeian Far, Maryam Rajabzadeh Asaar, Afrooz Haghbin","doi":"10.1007/s10207-024-00846-8","DOIUrl":"https://doi.org/10.1007/s10207-024-00846-8","url":null,"abstract":"<p>In recent times, blockchain-based data auditing protocols have emerged as a cutting-edge area of study. Nevertheless, a conspicuous dearth of a generic framework upon which to ground such protocols is evident. This study introduces a pioneering and all-encompassing framework, designated as “Blockchain-assisted On-chain Auditing for Off-chain Storage” (<i>BA2OC</i>). The <i>BA2OC</i> framework operates without the reliance on a predefined auditor for the auditing process or a centralized verifier for the verification of on-chain auditing. It is conceivable that <i>BA2OC</i> forms the cornerstone of public data auditing protocols underpinned by blockchain technology. This framework bestows evidence of data ownership, ensures data integrity, facilitates public verification, supports batch verification, and bolsters the security against cyber threats through the utilization of cryptographic tools. The analysis underscores the comprehensive nature of the <i>BA2OC</i> framework, which positions it as the linchpin of blockchain-based public auditing protocols. Following a parametric evaluation of the <i>BA2OC</i> framework, this study takes into account real-world considerations, such as the utilization of the RSA cryptosystem and Android-based smartphones, to proffer a concrete protocol. The investigation further demonstrates that the <i>BA2OC</i> framework minimizes communication overhead while maintaining operational efficiency.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"5 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140624966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing security in QCA-based circuits using optimal key gate placement 利用最佳键门布局增强基于 QCA 电路的安全性
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-17 DOI: 10.1007/s10207-024-00842-y
M. Amutha, K. R. Kavitha

Quantum-dot Cellular Automata (QCA) is an emerging nanotechnology that explores the potential of using quantum effects to build compact and energy-efficient computational devices. The hardware attacks on QCA primarily target understanding the physical structure and operation of these nanotechnological circuits. The circuits like cryptographic processors hold sensitive data that needs protection from third-party attacks. Logic locking is a hardware protection technique that adds additional gates to the original circuits to prevent circuits from these attacks. In this work, a new logic locking approach is proposed for QCA based circuits. The new configurable logic gate or key gate is introduced for logic locking. This gate can be configured to either wire or inverter based on key gate inputs. Further, the metaheuristic optimization based optimal key gate placement algorithm proposed to achieve higher security with minimum key gate placement. The proposed approach is verified in QCA benchmark circuits using QCA-Designer. Results shows that the proposed achieves maximum security with minimal gate replacements.

量子点蜂窝自动机(Quantum-dot Cellular Automata,QCA)是一种新兴的纳米技术,它探索了利用量子效应构建紧凑型高能效计算设备的潜力。对 QCA 的硬件攻击主要针对了解这些纳米电路的物理结构和运行。像密码处理器这样的电路保存着敏感数据,需要防止第三方攻击。逻辑锁定是一种硬件保护技术,它在原有电路的基础上增加了额外的门,以防止电路受到这些攻击。在这项工作中,针对基于 QCA 的电路提出了一种新的逻辑锁定方法。逻辑锁定引入了新的可配置逻辑门或关键门。该门可根据键门输入配置为导线或反相器。此外,还提出了基于元搜索优化的最佳密钥门放置算法,以最小的密钥门放置实现更高的安全性。使用 QCA-Designer 在 QCA 基准电路中验证了所提出的方法。结果表明,所提出的方法以最小的门替换实现了最大的安全性。
{"title":"Enhancing security in QCA-based circuits using optimal key gate placement","authors":"M. Amutha, K. R. Kavitha","doi":"10.1007/s10207-024-00842-y","DOIUrl":"https://doi.org/10.1007/s10207-024-00842-y","url":null,"abstract":"<p>Quantum-dot Cellular Automata (QCA) is an emerging nanotechnology that explores the potential of using quantum effects to build compact and energy-efficient computational devices. The hardware attacks on QCA primarily target understanding the physical structure and operation of these nanotechnological circuits. The circuits like cryptographic processors hold sensitive data that needs protection from third-party attacks. Logic locking is a hardware protection technique that adds additional gates to the original circuits to prevent circuits from these attacks. In this work, a new logic locking approach is proposed for QCA based circuits. The new configurable logic gate or key gate is introduced for logic locking. This gate can be configured to either wire or inverter based on key gate inputs. Further, the metaheuristic optimization based optimal key gate placement algorithm proposed to achieve higher security with minimum key gate placement. The proposed approach is verified in QCA benchmark circuits using QCA-Designer. Results shows that the proposed achieves maximum security with minimal gate replacements.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"171 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140609997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Anomaly detection for early ransomware and spyware warning in nuclear power plant systems based on FusionGuard 基于 FusionGuard 对核电站系统中的勒索软件和间谍软件进行早期预警的异常检测
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-13 DOI: 10.1007/s10207-024-00841-z
Abdullah Hamad N. Almoqbil

Securing critical infrastructure, particularly nuclear power plants, against emerging cyber threats necessitates innovative cybersecurity approaches. This research introduces FusionGuard, a hybrid machine learning-based anomaly detection system designed for early warnings of ransomware and spyware intrusions within nuclear power plant systems. Meticulously tailored to the unique characteristics of nuclear power plant networks, FusionGuard leverages diverse datasets encompassing normal operational behavior and historical threat data. Through cutting-edge machine learning algorithms, the system dynamically adapts to the network's baseline behavior, effectively identifying deviations indicative of ransomware or spyware activities. Rigorous experimentation and validation using real-world data and simulated attack scenarios affirm FusionGuard's proficiency in detecting anomalous behavior with remarkable accuracy and minimal false positives. The research also explores the system's scalability and adaptability to evolving attack vectors, fortifying the cybersecurity posture of nuclear power plant systems in a dynamic threat landscape. In summary, FusionGuard promises to fortify the security of nuclear power plant systems against ransomware and spyware threats by capitalizing on machine learning and anomaly detection. Serving as a sentinel, the system issues timely alerts and enables proactive responses, contributing substantively to the ongoing discourse on protecting essential systems in high-stakes environments.

要确保关键基础设施(尤其是核电站)免受新出现的网络威胁,就必须采用创新的网络安全方法。本研究介绍了 FusionGuard,这是一种基于机器学习的混合异常检测系统,旨在对核电站系统中的勒索软件和间谍软件入侵发出预警。FusionGuard 针对核电站网络的独特性进行了精心定制,利用了包括正常操作行为和历史威胁数据在内的各种数据集。通过尖端的机器学习算法,该系统可动态适应网络的基线行为,有效识别表明勒索软件或间谍软件活动的偏差。使用真实数据和模拟攻击场景进行的严格实验和验证证实,FusionGuard 能够非常准确地检测异常行为,误报率极低。研究还探讨了系统的可扩展性和对不断变化的攻击载体的适应性,从而在动态威胁环境中强化核电站系统的网络安全态势。总之,FusionGuard 利用机器学习和异常检测技术,有望加强核电站系统的安全,抵御勒索软件和间谍软件的威胁。作为一个哨兵,该系统能及时发出警报并做出积极主动的响应,为当前保护高风险环境中的重要系统的讨论做出实质性贡献。
{"title":"Anomaly detection for early ransomware and spyware warning in nuclear power plant systems based on FusionGuard","authors":"Abdullah Hamad N. Almoqbil","doi":"10.1007/s10207-024-00841-z","DOIUrl":"https://doi.org/10.1007/s10207-024-00841-z","url":null,"abstract":"<p>Securing critical infrastructure, particularly nuclear power plants, against emerging cyber threats necessitates innovative cybersecurity approaches. This research introduces FusionGuard, a hybrid machine learning-based anomaly detection system designed for early warnings of ransomware and spyware intrusions within nuclear power plant systems. Meticulously tailored to the unique characteristics of nuclear power plant networks, FusionGuard leverages diverse datasets encompassing normal operational behavior and historical threat data. Through cutting-edge machine learning algorithms, the system dynamically adapts to the network's baseline behavior, effectively identifying deviations indicative of ransomware or spyware activities. Rigorous experimentation and validation using real-world data and simulated attack scenarios affirm FusionGuard's proficiency in detecting anomalous behavior with remarkable accuracy and minimal false positives. The research also explores the system's scalability and adaptability to evolving attack vectors, fortifying the cybersecurity posture of nuclear power plant systems in a dynamic threat landscape. In summary, FusionGuard promises to fortify the security of nuclear power plant systems against ransomware and spyware threats by capitalizing on machine learning and anomaly detection. Serving as a sentinel, the system issues timely alerts and enables proactive responses, contributing substantively to the ongoing discourse on protecting essential systems in high-stakes environments.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"49 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140579964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adversarial attack detection framework based on optimized weighted conditional stepwise adversarial network 基于优化加权条件逐步对抗网络的对抗攻击检测框架
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-12 DOI: 10.1007/s10207-024-00844-w
Kousik Barik, Sanjay Misra, Luis Fernandez-Sanz

Artificial Intelligence (AI)-based IDS systems are susceptible to adversarial attacks and face challenges such as complex evaluation methods, elevated false positive rates, absence of effective validation, and time-intensive processes. This study proposes a WCSAN-PSO framework to detect adversarial attacks in IDS based on a weighted conditional stepwise adversarial network (WCSAN) with a particle swarm optimization (PSO) algorithm and SVC (support vector classifier) for classification. The Principal component analysis (PCA) and the least absolute shrinkage and selection operator (LASSO) are used for feature selection and extraction. The PSO algorithm optimizes the parameters of the generator and discriminator in WCSAN to improve the adversarial training of IDS. The study presented three distinct scenarios with quantitative evaluation, and the proposed framework is evaluated with adversarial training in balanced and imbalanced data. Compared with existing studies, the proposed framework accomplished an accuracy of 99.36% in normal and 98.55% in malicious traffic in adversarial attacks. This study presents a comprehensive overview for researchers interested in adversarial attacks and their significance in computer security.

基于人工智能(AI)的 IDS 系统容易受到对抗性攻击,并面临评估方法复杂、误报率高、缺乏有效验证和时间密集型流程等挑战。本研究基于加权条件逐步对抗网络(WCSAN)、粒子群优化(PSO)算法和支持向量分类器(SVC),提出了一种 WCSAN-PSO 框架来检测 IDS 中的对抗性攻击。主成分分析(PCA)和最小绝对收缩与选择算子(LASSO)用于特征选择和提取。PSO 算法优化了 WCSAN 中生成器和判别器的参数,以改进 IDS 的对抗训练。研究提出了三种不同的定量评估场景,并在平衡数据和不平衡数据的对抗训练中对所提出的框架进行了评估。与现有研究相比,所提出的框架在对抗性攻击中对正常流量和恶意流量的准确率分别达到了 99.36% 和 98.55%。本研究为对对抗性攻击及其在计算机安全中的重要性感兴趣的研究人员提供了一个全面的概述。
{"title":"Adversarial attack detection framework based on optimized weighted conditional stepwise adversarial network","authors":"Kousik Barik, Sanjay Misra, Luis Fernandez-Sanz","doi":"10.1007/s10207-024-00844-w","DOIUrl":"https://doi.org/10.1007/s10207-024-00844-w","url":null,"abstract":"<p>Artificial Intelligence (AI)-based IDS systems are susceptible to adversarial attacks and face challenges such as complex evaluation methods, elevated false positive rates, absence of effective validation, and time-intensive processes. This study proposes a WCSAN-PSO framework to detect adversarial attacks in IDS based on a weighted conditional stepwise adversarial network (WCSAN) with a particle swarm optimization (PSO) algorithm and SVC (support vector classifier) for classification. The Principal component analysis (PCA) and the least absolute shrinkage and selection operator (LASSO) are used for feature selection and extraction. The PSO algorithm optimizes the parameters of the generator and discriminator in WCSAN to improve the adversarial training of IDS. The study presented three distinct scenarios with quantitative evaluation, and the proposed framework is evaluated with adversarial training in balanced and imbalanced data. Compared with existing studies, the proposed framework accomplished an accuracy of 99.36% in normal and 98.55% in malicious traffic in adversarial attacks. This study presents a comprehensive overview for researchers interested in adversarial attacks and their significance in computer security.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"44 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140579865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Information Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1