Selfish mining is a sneaky way that some people cheat in blockchain networks or distributed digital ledger systems. They do it by mining a block in secret and keeping it hidden. Then, when the secret chain of these miners’ are longer than the real one, they show it to everyone, and the blockchain system selects the longest chain as the valid chain. This leads to the network adopting the longest chain as the valid one, resulting in the effort put into mining by other miners becoming futile. By doing this, selfish miners in the blockchain network have a high potential to get more rewards. This behavior goes against the rules of blockchain networks, where everyone is supposed to play by the same rules and have an equal chance of getting rewards. This prejudiced action of selfish miners have motivated us to investigate systematically the existing methods that are being used to address the selfish mining attacks. Therefore, we conducted a SLR (systematic literature review) of 29 papers using the Kitchenham methodology and put that into PRISMA framework. This study aims to investigate methods for detecting and mitigating selfish mining attacks, their limitations, and future directions.
{"title":"Selfish mining attack in blockchain: a systematic literature review","authors":"Nadisha Madhushanie, Sugandima Vidanagamachchi, Nalin Arachchilage","doi":"10.1007/s10207-024-00849-5","DOIUrl":"https://doi.org/10.1007/s10207-024-00849-5","url":null,"abstract":"<p>Selfish mining is a sneaky way that some people cheat in blockchain networks or distributed digital ledger systems. They do it by mining a block in secret and keeping it hidden. Then, when the secret chain of these miners’ are longer than the real one, they show it to everyone, and the blockchain system selects the longest chain as the valid chain. This leads to the network adopting the longest chain as the valid one, resulting in the effort put into mining by other miners becoming futile. By doing this, selfish miners in the blockchain network have a high potential to get more rewards. This behavior goes against the rules of blockchain networks, where everyone is supposed to play by the same rules and have an equal chance of getting rewards. This prejudiced action of selfish miners have motivated us to investigate systematically the existing methods that are being used to address the selfish mining attacks. Therefore, we conducted a SLR (systematic literature review) of 29 papers using the Kitchenham methodology and put that into PRISMA framework. This study aims to investigate methods for detecting and mitigating selfish mining attacks, their limitations, and future directions.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"94 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140579870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-04DOI: 10.1007/s10207-024-00847-7
Joaquín Navajas-Adán, Eulàlia Badia-Gelabert, Laura Jiménez-Saurina, Mª Jesús Marijuán-Martín, Rafael Mayo-García
Information and Communication Technologies and Internet networks are present in all aspects of social reality and are essential elements in research, development and innovation centers (R&D&I). Cyber-security is crucial for the progress of the research activities developed in these centers, especially given the exponential growth of cyber-attacks and incidents. The present study aims to assess from a socio-technical approach, how a serious cyber-attack on a Spanish research center has affected staff’s perceptions of information and communication systems (ICT) security. This study employed a mixed-methods research strategy, combining quantitative and qualitative methods to provide a comprehensive and nuanced understanding of ICT security perceptions among employees. First a quantitative scale was administered to 1,321 employees 3 years before the cyber-attack and 4 months afterward, to measure ICT security perceptions. Then, qualitative techniques (semi-structured interviews, focus groups, and micro-ethnography) were applied to gain a deeper understanding of the arguments underpinning cyber-security at the center after the attack. The results show that the event had an impact on employees’ perceptions, increasing the perceived importance of ICT security, with positive behavioral changes noted, but with doubts about their sustainability over time. Also, the need for cyber-security governance was critically contrasted with organizational reality. Finally, the compatibility of science and cyber-security was a central dilemma, which seems to confront antagonistic poles (research and security ICT) and justify the non-compliance with security protocols by part of the staff.
{"title":"Perceptions and dilemmas around cyber-security in a Spanish research center after a cyber-attack","authors":"Joaquín Navajas-Adán, Eulàlia Badia-Gelabert, Laura Jiménez-Saurina, Mª Jesús Marijuán-Martín, Rafael Mayo-García","doi":"10.1007/s10207-024-00847-7","DOIUrl":"https://doi.org/10.1007/s10207-024-00847-7","url":null,"abstract":"<p>Information and Communication Technologies and Internet networks are present in all aspects of social reality and are essential elements in research, development and innovation centers (R&D&I). Cyber-security is crucial for the progress of the research activities developed in these centers, especially given the exponential growth of cyber-attacks and incidents. The present study aims to assess from a socio-technical approach, how a serious cyber-attack on a Spanish research center has affected staff’s perceptions of information and communication systems (ICT) security. This study employed a mixed-methods research strategy, combining quantitative and qualitative methods to provide a comprehensive and nuanced understanding of ICT security perceptions among employees. First a quantitative scale was administered to 1,321 employees 3 years before the cyber-attack and 4 months afterward, to measure ICT security perceptions. Then, qualitative techniques (semi-structured interviews, focus groups, and micro-ethnography) were applied to gain a deeper understanding of the arguments underpinning cyber-security at the center after the attack. The results show that the event had an impact on employees’ perceptions, increasing the perceived importance of ICT security, with positive behavioral changes noted, but with doubts about their sustainability over time. Also, the need for cyber-security governance was critically contrasted with organizational reality. Finally, the compatibility of science and cyber-security was a central dilemma, which seems to confront antagonistic poles (research and security ICT) and justify the non-compliance with security protocols by part of the staff.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"42 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140579882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-03DOI: 10.1007/s10207-024-00813-3
Ramesh Upreti, Pedro G. Lind, Ahmed Elmokashfi, Anis Yazidi
Artificial intelligence-based algorithms are widely adopted in critical applications such as healthcare and autonomous vehicles. Mitigating the security and privacy issues of AI models, and enhancing their trustworthiness have become of paramount importance. We present a detailed investigation of existing security, privacy, and defense techniques and strategies to make machine learning more secure and trustworthy. We focus on the new paradigm of machine learning called federated learning, where one aims to develop machine learning models involving different partners (data sources) that do not need to share data and information with each other. In particular, we discuss how federated learning bridges security and privacy, how it guarantees privacy requirements of AI applications, and then highlight challenges that need to be addressed in the future. Finally, after having surveyed the high-level concepts of trustworthy AI and its different components and identifying present research trends addressing security, privacy, and trustworthiness separately, we discuss possible interconnections and dependencies between these three fields. All in all, we provide some insight to explain how AI researchers should focus on building a unified solution combining security, privacy, and trustworthy AI in the future.
{"title":"Trustworthy machine learning in the context of security and privacy","authors":"Ramesh Upreti, Pedro G. Lind, Ahmed Elmokashfi, Anis Yazidi","doi":"10.1007/s10207-024-00813-3","DOIUrl":"https://doi.org/10.1007/s10207-024-00813-3","url":null,"abstract":"<p>Artificial intelligence-based algorithms are widely adopted in critical applications such as healthcare and autonomous vehicles. Mitigating the security and privacy issues of AI models, and enhancing their trustworthiness have become of paramount importance. We present a detailed investigation of existing security, privacy, and defense techniques and strategies to make machine learning more secure and trustworthy. We focus on the new paradigm of machine learning called federated learning, where one aims to develop machine learning models involving different partners (data sources) that do not need to share data and information with each other. In particular, we discuss how federated learning bridges security and privacy, how it guarantees privacy requirements of AI applications, and then highlight challenges that need to be addressed in the future. Finally, after having surveyed the high-level concepts of trustworthy AI and its different components and identifying present research trends addressing security, privacy, and trustworthiness separately, we discuss possible interconnections and dependencies between these three fields. All in all, we provide some insight to explain how AI researchers should focus on building a unified solution combining security, privacy, and trustworthy AI in the future.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"18 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140579756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-02DOI: 10.1007/s10207-024-00839-7
Hossein Abedi Khorasgani, Noman Mohammed, Yang Wang
With the increasing popularity of machine learning (ML) in image processing, privacy concerns have emerged as a significant issue in deploying and using ML services. However, current privacy protection approaches often require computationally expensive training from scratch or extensive fine-tuning of models, posing significant barriers to the development of privacy-conscious models, particularly for smaller organizations seeking to comply with data privacy laws. In this paper, we address the privacy challenges in computer vision by investigating the effectiveness of two recent fine-tuning methods, Model Reprogramming and Low-Rank Adaptation. We adapt these techniques to provide attribute protection for pre-trained models, minimizing computational overhead and training time. Specifically, we modify the models to produce privacy-preserving latent representations of images that cannot be used to identify unintended attributes. We integrate these methods into an adversarial min–max framework, allowing us to conceal sensitive information from feature outputs without extensive modifications to the pre-trained model, but rather focusing on a small set of new parameters. We demonstrate the effectiveness of our methods by conducting experiments on the CelebA dataset, achieving state-of-the-art performance while significantly reducing computational complexity and cost. Our research provides a valuable contribution to the field of computer vision and privacy, offering practical solutions to enhance the privacy of machine learning services without compromising efficiency.
随着机器学习(ML)在图像处理领域的日益普及,隐私问题已成为部署和使用 ML 服务的一个重要问题。然而,当前的隐私保护方法往往需要从头开始进行计算成本高昂的训练,或者对模型进行大量微调,这对开发具有隐私意识的模型造成了巨大障碍,尤其是对那些寻求遵守数据隐私法的小型组织而言。在本文中,我们通过研究最近推出的两种微调方法--模型重编程(Model Reprogramming)和低级别自适应(Low-Rank Adaptation)的有效性,来应对计算机视觉领域的隐私挑战。我们调整这些技术,为预先训练好的模型提供属性保护,最大限度地减少计算开销和训练时间。具体来说,我们对模型进行了修改,以生成保护隐私的图像潜在表征,这些表征不能用于识别非预期属性。我们将这些方法整合到对抗性最小最大框架中,这样就可以在不对预先训练的模型进行大量修改的情况下,从特征输出中隐藏敏感信息,而只需关注一小部分新参数。我们在 CelebA 数据集上进行了实验,证明了我们方法的有效性,在大幅降低计算复杂度和成本的同时,实现了最先进的性能。我们的研究为计算机视觉和隐私领域做出了有价值的贡献,为在不影响效率的情况下增强机器学习服务的隐私性提供了实用的解决方案。
{"title":"Attribute inference privacy protection for pre-trained models","authors":"Hossein Abedi Khorasgani, Noman Mohammed, Yang Wang","doi":"10.1007/s10207-024-00839-7","DOIUrl":"https://doi.org/10.1007/s10207-024-00839-7","url":null,"abstract":"<p>With the increasing popularity of machine learning (ML) in image processing, privacy concerns have emerged as a significant issue in deploying and using ML services. However, current privacy protection approaches often require computationally expensive training from scratch or extensive fine-tuning of models, posing significant barriers to the development of privacy-conscious models, particularly for smaller organizations seeking to comply with data privacy laws. In this paper, we address the privacy challenges in computer vision by investigating the effectiveness of two recent fine-tuning methods, Model Reprogramming and Low-Rank Adaptation. We adapt these techniques to provide attribute protection for pre-trained models, minimizing computational overhead and training time. Specifically, we modify the models to produce privacy-preserving latent representations of images that cannot be used to identify unintended attributes. We integrate these methods into an adversarial min–max framework, allowing us to conceal sensitive information from feature outputs without extensive modifications to the pre-trained model, but rather focusing on a small set of new parameters. We demonstrate the effectiveness of our methods by conducting experiments on the CelebA dataset, achieving state-of-the-art performance while significantly reducing computational complexity and cost. Our research provides a valuable contribution to the field of computer vision and privacy, offering practical solutions to enhance the privacy of machine learning services without compromising efficiency.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"44 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140580160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-25DOI: 10.1007/s10207-024-00840-0
Rahul Dwivedi
This study employs various bibliometric analysis techniques to examine the intellectual structure of the International Journal of Information Security from 2007 to 2023. The aim is to identify the most cited journals, underlying research themes within the article corpus, and gradual changes in the research themes over time. “Lecture Notes on Computer Science” is the most referenced knowledge source. Underlying research themes were identified based on mapping the bibliographically coupled articles on to the knowledge areas from the Cyber Security Body of Knowledge using template analysis. Applied Cryptography is the most prominent knowledge area, followed by Privacy, and Network Security. Additionally, research on distributed systems security and Web & Mobile Security were emerging topics of interest. Qualitative and quantitative comparisons between open-access and regular articles suggested a few notable differences in author keywords but no differences in the number of citations received. Furthermore, regression analysis found a negative correlation between citation counts with the length of the article abstract and article title and a positive correlation with page count, being published in a special issue, and if at least the affiliation of one of the authors is different from others. Finally, prominent authors, articles, institutions, and countries published in this journal were also identified.
{"title":"International journal of information security: a bibliometric study, 2007–2023","authors":"Rahul Dwivedi","doi":"10.1007/s10207-024-00840-0","DOIUrl":"https://doi.org/10.1007/s10207-024-00840-0","url":null,"abstract":"<p>This study employs various bibliometric analysis techniques to examine the intellectual structure of the International Journal of Information Security from 2007 to 2023. The aim is to identify the most cited journals, underlying research themes within the article corpus, and gradual changes in the research themes over time. “Lecture Notes on Computer Science” is the most referenced knowledge source. Underlying research themes were identified based on mapping the bibliographically coupled articles on to the knowledge areas from the Cyber Security Body of Knowledge using template analysis. Applied Cryptography is the most prominent knowledge area, followed by Privacy, and Network Security. Additionally, research on distributed systems security and Web & Mobile Security were emerging topics of interest. Qualitative and quantitative comparisons between open-access and regular articles suggested a few notable differences in author keywords but no differences in the number of citations received. Furthermore, regression analysis found a negative correlation between citation counts with the length of the article abstract and article title and a positive correlation with page count, being published in a special issue, and if at least the affiliation of one of the authors is different from others. Finally, prominent authors, articles, institutions, and countries published in this journal were also identified.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"28 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140301315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the domain of cyber-physical systems, wireless sensor networks (WSNs) play a pivotal role as infrastructures, encompassing both stationary and mobile sensors. These sensors self-organize and establish multi-hop connections for communication, collectively sensing, gathering, processing, and transmitting data about their surroundings. Despite their significance, WSNs face rapid and detrimental attacks that can disrupt functionality. Existing intrusion detection methods for WSNs encounter challenges such as low detection rates, computational overhead, and false alarms. These issues stem from sensor node resource constraints, data redundancy, and high correlation within the network. To address these challenges, we propose an innovative intrusion detection approach that integrates machine learning (ML) techniques with the Synthetic Minority Oversampling Technique Tomek Link (SMOTE-TomekLink) algorithm. This blend synthesizes minority instances and eliminates Tomek links, resulting in a balanced dataset that significantly enhances detection accuracy in WSNs. Additionally, we incorporate feature scaling through standardization to render input features consistent and scalable, facilitating more precise training and detection. To counteract imbalanced WSN datasets, we employ the SMOTE-Tomek resampling technique, mitigating overfitting and underfitting issues. Our comprehensive evaluation, using the wireless sensor network dataset (WSN-DS) containing 374,661 records, identifies the optimal model for intrusion detection in WSNs. The standout outcome of our research is the remarkable performance of our model. In binary classification scenarios, it achieves an accuracy rate of 99.78%, and in multiclass classification scenarios, it attains an exceptional accuracy rate of 99.92%. These findings underscore the efficiency and superiority of our proposal in the context of WSN intrusion detection, showcasing its effectiveness in detecting and mitigating intrusions in WSNs.
{"title":"MLSTL-WSN: machine learning-based intrusion detection using SMOTETomek in WSNs","authors":"Md. Alamin Talukder, Selina Sharmin, Md Ashraf Uddin, Md Manowarul Islam, Sunil Aryal","doi":"10.1007/s10207-024-00833-z","DOIUrl":"https://doi.org/10.1007/s10207-024-00833-z","url":null,"abstract":"<p>In the domain of cyber-physical systems, wireless sensor networks (WSNs) play a pivotal role as infrastructures, encompassing both stationary and mobile sensors. These sensors self-organize and establish multi-hop connections for communication, collectively sensing, gathering, processing, and transmitting data about their surroundings. Despite their significance, WSNs face rapid and detrimental attacks that can disrupt functionality. Existing intrusion detection methods for WSNs encounter challenges such as low detection rates, computational overhead, and false alarms. These issues stem from sensor node resource constraints, data redundancy, and high correlation within the network. To address these challenges, we propose an innovative intrusion detection approach that integrates machine learning (ML) techniques with the Synthetic Minority Oversampling Technique Tomek Link (SMOTE-TomekLink) algorithm. This blend synthesizes minority instances and eliminates Tomek links, resulting in a balanced dataset that significantly enhances detection accuracy in WSNs. Additionally, we incorporate feature scaling through standardization to render input features consistent and scalable, facilitating more precise training and detection. To counteract imbalanced WSN datasets, we employ the SMOTE-Tomek resampling technique, mitigating overfitting and underfitting issues. Our comprehensive evaluation, using the wireless sensor network dataset (WSN-DS) containing 374,661 records, identifies the optimal model for intrusion detection in WSNs. The standout outcome of our research is the remarkable performance of our model. In binary classification scenarios, it achieves an accuracy rate of 99.78%, and in multiclass classification scenarios, it attains an exceptional accuracy rate of 99.92%. These findings underscore the efficiency and superiority of our proposal in the context of WSN intrusion detection, showcasing its effectiveness in detecting and mitigating intrusions in WSNs.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"30 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140168587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-19DOI: 10.1007/s10207-024-00832-0
Ala Mughaid, Ibrahim Obeidat, Laith Abualigah, Shadi Alzubi, Mohammad Sh. Daoud, Hazem Migdady
Users of computer networks may benefit from cloud computing, which is a fairly new abstraction that offers features like processing as well as the sharing and storing of data. As a result of the services it provides, cloud computing is drawing significant investments from across the world. Despite this, Cloud Computing Security continues to be one of the most important issues for businesses and consumers that use cloud computing systems. A few of the security flaws that are associated with cloud computing were passed down from earlier computer systems. In contrast, the other flaws were brought about by the distinctive qualities and design of cloud computing. The newly developed platform has measures that restrict data access to just those users who are authorized to do so. Using the user’s identification and authentication/authorization information, a third-party service is responsible for managing access to the data. This service checks on all requests. Sensitive information and facts pertaining to users are encrypted both while in transit and while being stored. The platform was put into operation, analysed, and compared to other cloud platforms that were already in existence in terms of how effective it was in comparison to other platforms. When compared to the other security platforms, the findings demonstrated that this platform performed as anticipated in a relatively short amount of time and offered robust protection against the acts of an intruder.
{"title":"Intelligent cybersecurity approach for data protection in cloud computing based Internet of Things","authors":"Ala Mughaid, Ibrahim Obeidat, Laith Abualigah, Shadi Alzubi, Mohammad Sh. Daoud, Hazem Migdady","doi":"10.1007/s10207-024-00832-0","DOIUrl":"https://doi.org/10.1007/s10207-024-00832-0","url":null,"abstract":"<p>Users of computer networks may benefit from cloud computing, which is a fairly new abstraction that offers features like processing as well as the sharing and storing of data. As a result of the services it provides, cloud computing is drawing significant investments from across the world. Despite this, Cloud Computing Security continues to be one of the most important issues for businesses and consumers that use cloud computing systems. A few of the security flaws that are associated with cloud computing were passed down from earlier computer systems. In contrast, the other flaws were brought about by the distinctive qualities and design of cloud computing. The newly developed platform has measures that restrict data access to just those users who are authorized to do so. Using the user’s identification and authentication/authorization information, a third-party service is responsible for managing access to the data. This service checks on all requests. Sensitive information and facts pertaining to users are encrypted both while in transit and while being stored. The platform was put into operation, analysed, and compared to other cloud platforms that were already in existence in terms of how effective it was in comparison to other platforms. When compared to the other security platforms, the findings demonstrated that this platform performed as anticipated in a relatively short amount of time and offered robust protection against the acts of an intruder.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"153 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140168445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-16DOI: 10.1007/s10207-024-00836-w
Mohammed Nasereddin, Raad Al-Qassas
This paper introduces a new approach for examining and analyzing fileless malware artifacts in computer memory. The proposed approach offers the distinct advantage of conducting a comprehensive live analysis of memory without the need for periodic memory dumping. Once a new process arrives, log files are collected by monitoring the Event Tracing for Windows facility as well as listing the executables of the active process for violation detection. The proposed approach significantly reduces detection time and minimizes resource consumption by adopting parallel computing (programming), where the main software (Master) divides the work, organizes the process of searching for artifacts, and distributes tasks to several agents. A dataset of 17411 malware samples is used in the assessment of the new approach. It provided satisfactory and reliable results in dealing with at least six different process injection techniques including classic DLL injection, reflective DLL injection, process hollowing, hook injection, registry modifications, and .NET DLL injection. The detection accuracy rate has reached (99.93%) with a false-positive rate of (0.068%). Moreover, the accuracy was monitored in the case of launching several malwares using different process injection techniques simultaneously, and the detector was able to detect them efficiently. Also, it achieved a detection time with an average of 0.052 msec per detected malware.
{"title":"A new approach for detecting process injection attacks using memory analysis","authors":"Mohammed Nasereddin, Raad Al-Qassas","doi":"10.1007/s10207-024-00836-w","DOIUrl":"https://doi.org/10.1007/s10207-024-00836-w","url":null,"abstract":"<p>This paper introduces a new approach for examining and analyzing fileless malware artifacts in computer memory. The proposed approach offers the distinct advantage of conducting a comprehensive live analysis of memory without the need for periodic memory dumping. Once a new process arrives, log files are collected by monitoring the Event Tracing for Windows facility as well as listing the executables of the active process for violation detection. The proposed approach significantly reduces detection time and minimizes resource consumption by adopting parallel computing (programming), where the main software (Master) divides the work, organizes the process of searching for artifacts, and distributes tasks to several agents. A dataset of 17411 malware samples is used in the assessment of the new approach. It provided satisfactory and reliable results in dealing with at least six different process injection techniques including classic DLL injection, reflective DLL injection, process hollowing, hook injection, registry modifications, and .NET DLL injection. The detection accuracy rate has reached <span>(99.93%)</span> with a false-positive rate of <span>(0.068%)</span>. Moreover, the accuracy was monitored in the case of launching several malwares using different process injection techniques simultaneously, and the detector was able to detect them efficiently. Also, it achieved a detection time with an average of 0.052 msec per detected malware.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"1 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140153016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-15DOI: 10.1007/s10207-024-00835-x
Eric Hilario, Sami Azam, Jawahar Sundaram, Khwaja Imran Mohammed, Bharanidharan Shanmugam
This paper examines the role of Generative AI (GenAI) and Large Language Models (LLMs) in penetration testing exploring the benefits, challenges, and risks associated with cyber security applications. Through the use of generative artificial intelligence, penetration testing becomes more creative, test environments are customised, and continuous learning and adaptation is achieved. We examined how GenAI (ChatGPT 3.5) helps penetration testers with options and suggestions during the five stages of penetration testing. The effectiveness of the GenAI tool was tested using a publicly available vulnerable machine from VulnHub. It was amazing how quickly they responded at each stage and provided better pentesting report. In this article, we discuss potential risks, unintended consequences, and uncontrolled AI development associated with pentesting.
{"title":"Generative AI for pentesting: the good, the bad, the ugly","authors":"Eric Hilario, Sami Azam, Jawahar Sundaram, Khwaja Imran Mohammed, Bharanidharan Shanmugam","doi":"10.1007/s10207-024-00835-x","DOIUrl":"https://doi.org/10.1007/s10207-024-00835-x","url":null,"abstract":"<p>This paper examines the role of Generative AI (GenAI) and Large Language Models (LLMs) in penetration testing exploring the benefits, challenges, and risks associated with cyber security applications. Through the use of generative artificial intelligence, penetration testing becomes more creative, test environments are customised, and continuous learning and adaptation is achieved. We examined how GenAI (ChatGPT 3.5) helps penetration testers with options and suggestions during the five stages of penetration testing. The effectiveness of the GenAI tool was tested using a publicly available vulnerable machine from VulnHub. It was amazing how quickly they responded at each stage and provided better pentesting report. In this article, we discuss potential risks, unintended consequences, and uncontrolled AI development associated with pentesting.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"12 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140152972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-15DOI: 10.1007/s10207-024-00831-1
Abstract
Physical-layer Key Generation (PKG) is the major candidate for use in secure wireless communications and Internet of Things (IoT) systems. Using Deep Learning (DL) and the Band Feature Mapping (BFM) method leads to reciprocal features, which is an essential requirement for the key generation in Orthogonal Frequency-Division Multiplexing Frequency Division Duplexing systems. Additionally, randomness and spatial de-correlation are two other essential requirements of secure PKG schemes. When the distance of an eavesdropper from a legal user is short, the eavesdropper can experience a correlated fading and generate the secret key.Other works assume that the adversary is far away from legitimate users, whereas the proposed scheme allows the adversary to approach the legitimate users without sacrificing the security Conventional DL-based BFM includes an offline training stage using a pre-collected dataset. To solve the spatial correlation problem, this paper simultaneously uses the concepts of physical layer security and adversarial training. Moreover, a DL-based adversary in the PKG model is considered which has not been studied yet. Simulation results confirm the effectiveness of the proposed Adversarial DL (ADL) key generation scheme in terms of Key Error Rate and Key Generation Rate. Our results show that using the proposed training strategy the illegal user can only generate a random key with an error rate of about 0.5. In the meantime, this method maintains the performance of the generated key by the legal users under a certain level. The mentioned features make ADL key generation scheme an appealing candidate for applications, such as secure cloud-based communications, low-size networks, and resource-constrained IoT.
{"title":"Spatial de-correlation of generated keys from wireless channels using adversarial deep learning","authors":"","doi":"10.1007/s10207-024-00831-1","DOIUrl":"https://doi.org/10.1007/s10207-024-00831-1","url":null,"abstract":"<h3>Abstract</h3> <p>Physical-layer Key Generation (PKG) is the major candidate for use in secure wireless communications and Internet of Things (IoT) systems. Using Deep Learning (DL) and the Band Feature Mapping (BFM) method leads to reciprocal features, which is an essential requirement for the key generation in Orthogonal Frequency-Division Multiplexing Frequency Division Duplexing systems. Additionally, randomness and spatial de-correlation are two other essential requirements of secure PKG schemes. When the distance of an eavesdropper from a legal user is short, the eavesdropper can experience a correlated fading and generate the secret key.Other works assume that the adversary is far away from legitimate users, whereas the proposed scheme allows the adversary to approach the legitimate users without sacrificing the security Conventional DL-based BFM includes an offline training stage using a pre-collected dataset. To solve the spatial correlation problem, this paper simultaneously uses the concepts of physical layer security and adversarial training. Moreover, a DL-based adversary in the PKG model is considered which has not been studied yet. Simulation results confirm the effectiveness of the proposed Adversarial DL (ADL) key generation scheme in terms of Key Error Rate and Key Generation Rate. Our results show that using the proposed training strategy the illegal user can only generate a random key with an error rate of about 0.5. In the meantime, this method maintains the performance of the generated key by the legal users under a certain level. The mentioned features make ADL key generation scheme an appealing candidate for applications, such as secure cloud-based communications, low-size networks, and resource-constrained IoT.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"57 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140152900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}