首页 > 最新文献

IET Information Security最新文献

英文 中文
AEDroid: Adaptive Enhanced Android Malware Detection-Based on Interpretability of Deep Learning AEDroid:基于深度学习可解释性的自适应增强Android恶意软件检测
IF 2.6 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-11-24 DOI: 10.1049/ise2/5572223
Pengfei Liu, Guangquan Xu, Jian Sun, Wenxia Wang, Jie Chen

As the most widely used operating system in the world, Android has naturally become the main target of malicious hackers. The current research on Android malware detection relies on manually defined sensitive API feature sets. With the continuous innovation and change of malicious behavior, new threats and attack methods have emerged. If we still rely on the original sensitive API set, malicious applications will not be discovered. To address this issue, we do not use the existing sensitive API feature set but instead design a key activation mechanism (KAM) based on convolutional neural networks (CNNs) to obtain sensitive API. We use this mechanism to automatically mine API features that play an important role in determining maliciousness from application datasets. And we use the API group (ApiG) obtained through this mechanism for template generalization, and obtain a method called AEDroid that can delay model aging. By analyzing these API features, it was found that they not only cover the existing sensitive API feature types but also include sensitive APIs for seven new types of malicious behavior. The experimental results show that with the addition of the newly discovered sensitive API, the Android malware detection rate has increased by more than 5%, especially on newly emerged malicious datasets, where the effect is more pronounced.

作为世界上使用最广泛的操作系统,Android自然成为了恶意黑客的主要攻击目标。目前Android恶意软件检测的研究依赖于手动定义的敏感API特性集。随着恶意行为的不断创新和变化,新的威胁和攻击方式不断涌现。如果我们仍然依赖原始的敏感API集,则不会发现恶意应用程序。为了解决这个问题,我们没有使用现有的敏感API特征集,而是设计了一种基于卷积神经网络(cnn)的密钥激活机制(KAM)来获取敏感API。我们使用这种机制来自动挖掘API特性,这些特性在从应用程序数据集中确定恶意方面起着重要作用。并利用该机制得到的API组(ApiG)进行模板泛化,得到一种可以延缓模型老化的AEDroid方法。通过对这些API特性的分析,发现它们不仅涵盖了现有的敏感API特性类型,还包含了针对7种新型恶意行为的敏感API。实验结果表明,随着新发现的敏感API的加入,Android恶意软件的检测率提高了5%以上,特别是对新出现的恶意数据集,效果更加明显。
{"title":"AEDroid: Adaptive Enhanced Android Malware Detection-Based on Interpretability of Deep Learning","authors":"Pengfei Liu,&nbsp;Guangquan Xu,&nbsp;Jian Sun,&nbsp;Wenxia Wang,&nbsp;Jie Chen","doi":"10.1049/ise2/5572223","DOIUrl":"https://doi.org/10.1049/ise2/5572223","url":null,"abstract":"<p>As the most widely used operating system in the world, Android has naturally become the main target of malicious hackers. The current research on Android malware detection relies on manually defined sensitive API feature sets. With the continuous innovation and change of malicious behavior, new threats and attack methods have emerged. If we still rely on the original sensitive API set, malicious applications will not be discovered. To address this issue, we do not use the existing sensitive API feature set but instead design a key activation mechanism (KAM) based on convolutional neural networks (CNNs) to obtain sensitive API. We use this mechanism to automatically mine API features that play an important role in determining maliciousness from application datasets. And we use the API group (ApiG) obtained through this mechanism for template generalization, and obtain a method called AEDroid that can delay model aging. By analyzing these API features, it was found that they not only cover the existing sensitive API feature types but also include sensitive APIs for seven new types of malicious behavior. The experimental results show that with the addition of the newly discovered sensitive API, the Android malware detection rate has increased by more than 5%, especially on newly emerged malicious datasets, where the effect is more pronounced.</p>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"2025 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2025-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/ise2/5572223","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145626146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Constructing Efficient Identity-Based Signatures on Lattices 构造基于格的高效身份签名
IF 2.6 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-11-19 DOI: 10.1049/ise2/6684889
Huiwen Jia, Ying Liu, Chunming Tang, Lin Wang

In this work, we explore the recent developments related to lattice-based signature and preimage sampling, and specify a compact identity-based signature (IBS) on an ideal lattice for practical use. Specifically, we first propose an ellipsoid version of the G + G signature scheme (Asiacrypt 2023) that achieves slightly better signature size and higher security. Then, by adapting a specific preimage sampling algorithm to the modified G + G signature, we obtain an efficient IBS scheme. In addition, we prove its security in the quantum random oracle model (QROM), following the paradigm introduced by Zhangdry (Crypto 2012). Finally, a complete specification of the IBS, featuring three distinct parameter sets, is accompanied by a proof-of-concept implementation. We believe that the combination of the preimage sampling with the Fiat–Shamir transformation holds potential for application in the other advanced digital signature schemes.

在这项工作中,我们探讨了与基于格的签名和预像采样相关的最新发展,并在理想格上指定了一个紧凑的基于身份的签名(IBS)以供实际使用。具体来说,我们首先提出了一个椭球版本的G + G签名方案(Asiacrypt 2023),该方案实现了略好的签名大小和更高的安全性。然后,通过对改进的G + G签名采用特定的预像采样算法,得到了一种高效的IBS方案。此外,我们遵循Zhangdry (Crypto 2012)引入的范式,在量子随机oracle模型(QROM)中证明了其安全性。最后,IBS的完整规范,具有三个不同的参数集,伴随着概念验证的实现。我们认为,将预像采样与Fiat-Shamir变换相结合在其他高级数字签名方案中具有应用潜力。
{"title":"Constructing Efficient Identity-Based Signatures on Lattices","authors":"Huiwen Jia,&nbsp;Ying Liu,&nbsp;Chunming Tang,&nbsp;Lin Wang","doi":"10.1049/ise2/6684889","DOIUrl":"10.1049/ise2/6684889","url":null,"abstract":"<p>In this work, we explore the recent developments related to lattice-based signature and preimage sampling, and specify a compact identity-based signature (IBS) on an ideal lattice for practical use. Specifically, we first propose an ellipsoid version of the G + G signature scheme (Asiacrypt 2023) that achieves slightly better signature size and higher security. Then, by adapting a specific preimage sampling algorithm to the modified G + G signature, we obtain an efficient IBS scheme. In addition, we prove its security in the quantum random oracle model (QROM), following the paradigm introduced by Zhangdry (Crypto 2012). Finally, a complete specification of the IBS, featuring three distinct parameter sets, is accompanied by a proof-of-concept implementation. We believe that the combination of the preimage sampling with the Fiat–Shamir transformation holds potential for application in the other advanced digital signature schemes.</p>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"2025 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2025-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/ise2/6684889","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145572310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Construction of Repairable Threshold Key Sharing Schemes Based on Resolvable Balanced Incomplete Block Design 基于可解析平衡不完全块设计的可修阈值密钥共享方案构建
IF 2.6 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-11-14 DOI: 10.1049/ise2/7128106
Xiuli Wang, Ni Jin, Yangmei Deng

In this paper, we construct two repairable threshold schemes (RTSs) using a resolvable balanced incomplete block design (RBIBD). First, a resolvable transversal design is given by mutually orthogonal Latin squares. Further, a RBIBD is obtained through the filling hole method, and two repairable key sharing threshold schemes based on the Ramp threshold scheme are constructed based on this design. Finally, the information rate, the repairing degree and the communication complexity of two RTSs are calculated, and the performance of the schemes is analyzed. Compared with the existing schemes, the results show that two schemes constructed in this paper have a higher information rate, a larger repairing degree and lower communication complexity.

本文采用可解析平衡不完全块设计(RBIBD)构造了两种可修复阈值方案(RTSs)。首先,用相互正交的拉丁方给出了一个可解的横向设计。在此基础上,通过填充孔法获得了RBIBD,并基于Ramp阈值方案构造了两种可修复的密钥共享阈值方案。最后,计算了两种RTSs的信息率、修复度和通信复杂度,并对两种方案的性能进行了分析。结果表明,本文构建的两种方案具有更高的信息率、更大的修复程度和更低的通信复杂度。
{"title":"Construction of Repairable Threshold Key Sharing Schemes Based on Resolvable Balanced Incomplete Block Design","authors":"Xiuli Wang,&nbsp;Ni Jin,&nbsp;Yangmei Deng","doi":"10.1049/ise2/7128106","DOIUrl":"https://doi.org/10.1049/ise2/7128106","url":null,"abstract":"<p>In this paper, we construct two repairable threshold schemes (RTSs) using a resolvable balanced incomplete block design (RBIBD). First, a resolvable transversal design is given by mutually orthogonal Latin squares. Further, a RBIBD is obtained through the filling hole method, and two repairable key sharing threshold schemes based on the Ramp threshold scheme are constructed based on this design. Finally, the information rate, the repairing degree and the communication complexity of two RTSs are calculated, and the performance of the schemes is analyzed. Compared with the existing schemes, the results show that two schemes constructed in this paper have a higher information rate, a larger repairing degree and lower communication complexity.</p>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"2025 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2025-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/ise2/7128106","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145521966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient and Intelligent Interest-Based Personalized Search Over Encrypted Outsourced Data in Clouds 基于兴趣的云加密外包数据的高效智能个性化搜索
IF 2.6 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-11-11 DOI: 10.1049/ise2/3355214
Guoxiu Liu, Geng Yang, Ji Ma, Hongjun Zhai, Qiang Zhou

As the information society advances swiftly, individuals and corporations are producing vast quantities of data daily. Cloud computing presents considerable strengths in storing and applying this data. Yet, challenges related to data security and privacy within cloud computing are obstructing its continued expansion. To guarantee data confidentiality, data owners (DOs) employ conventional cryptographic techniques to encrypt information prior to delegating it to cloud servers. However, this makes efficient search difficult to achieve. Searchable encryption (SE) can effectively alleviate this dilemma. However, most existing SE schemes have not fully considered spelling errors and semantic extension of keywords. At the same time, users’ personalized characteristics are not considered in the search process, and personalized retrieval services cannot be supported on encrypted data. The study designs an efficient and intelligent personalized search (EIPS) scheme based on user’s interest, which can intelligently conduct multikeyword precise search and fuzzy semantic search based on user’s interest model, and return accurate top-k search results. Our contribution consists of three aspects. First, this scheme combines precise search, fuzzy search, semantic expansion, and personalized search technology to realize intelligent personalized multikeyword search. Second, the use of vector cross matching and short-circuit matching effectively improves retrieval efficiency. Third, considering the protection of data privacy, a hybrid cloud server architecture was employed. Specifically, the user interest model (UIM) is stored on a private cloud server (PRCS), and the sorting of search results is also completed on the PRCS. This setting not only ensures the security of user data and computing operations but also reduces the burden on users. The security analysis results indicate that EIPS can ensure the privacy of data and users. The experimental results also show that this scheme has high efficiency while providing personalized search results for users.

随着信息社会的飞速发展,个人和企业每天都在产生大量的数据。云计算在存储和应用这些数据方面表现出相当大的优势。然而,云计算内部与数据安全和隐私相关的挑战阻碍了云计算的持续发展。为了保证数据的机密性,数据所有者(DOs)在将信息委托给云服务器之前使用传统的加密技术对信息进行加密。然而,这使得高效搜索难以实现。可搜索加密(SE)可以有效地缓解这种困境。然而,大多数现有的SE方案没有充分考虑关键字的拼写错误和语义扩展。同时,在搜索过程中没有考虑用户的个性化特征,无法对加密数据进行个性化检索服务。本研究设计了一种高效智能的基于用户兴趣的个性化搜索(EIPS)方案,可以基于用户兴趣模型智能地进行多关键词精确搜索和模糊语义搜索,并返回精确的top-k搜索结果。我们的贡献包括三个方面。首先,该方案结合了精确搜索、模糊搜索、语义扩展和个性化搜索技术,实现了智能个性化多关键词搜索。其次,利用矢量交叉匹配和短路匹配有效地提高了检索效率。第三,考虑到数据隐私的保护,采用混合云服务器架构。具体来说,用户兴趣模型(UIM)存储在私有云服务器(PRCS)上,搜索结果的排序也在PRCS上完成。这样既保证了用户数据和计算操作的安全,又减轻了用户的负担。安全性分析结果表明,EIPS可以保证数据和用户的隐私。实验结果也表明,该方案在为用户提供个性化搜索结果的同时,具有较高的效率。
{"title":"An Efficient and Intelligent Interest-Based Personalized Search Over Encrypted Outsourced Data in Clouds","authors":"Guoxiu Liu,&nbsp;Geng Yang,&nbsp;Ji Ma,&nbsp;Hongjun Zhai,&nbsp;Qiang Zhou","doi":"10.1049/ise2/3355214","DOIUrl":"https://doi.org/10.1049/ise2/3355214","url":null,"abstract":"<p>As the information society advances swiftly, individuals and corporations are producing vast quantities of data daily. Cloud computing presents considerable strengths in storing and applying this data. Yet, challenges related to data security and privacy within cloud computing are obstructing its continued expansion. To guarantee data confidentiality, data owners (DOs) employ conventional cryptographic techniques to encrypt information prior to delegating it to cloud servers. However, this makes efficient search difficult to achieve. Searchable encryption (SE) can effectively alleviate this dilemma. However, most existing SE schemes have not fully considered spelling errors and semantic extension of keywords. At the same time, users’ personalized characteristics are not considered in the search process, and personalized retrieval services cannot be supported on encrypted data. The study designs an efficient and intelligent personalized search (EIPS) scheme based on user’s interest, which can intelligently conduct multikeyword precise search and fuzzy semantic search based on user’s interest model, and return accurate top-<i>k</i> search results. Our contribution consists of three aspects. First, this scheme combines precise search, fuzzy search, semantic expansion, and personalized search technology to realize intelligent personalized multikeyword search. Second, the use of vector cross matching and short-circuit matching effectively improves retrieval efficiency. Third, considering the protection of data privacy, a hybrid cloud server architecture was employed. Specifically, the user interest model (UIM) is stored on a private cloud server (PRCS), and the sorting of search results is also completed on the PRCS. This setting not only ensures the security of user data and computing operations but also reduces the burden on users. The security analysis results indicate that EIPS can ensure the privacy of data and users. The experimental results also show that this scheme has high efficiency while providing personalized search results for users.</p>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"2025 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2025-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/ise2/3355214","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145521721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Anomaly Detection in an Open Set Environment Using Reinforcement Learning 基于强化学习的开放集环境异常检测
IF 2.6 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-11-11 DOI: 10.1049/ise2/7990749
Dharani Kanta Roy, Hemanta Kumar Kalita

In this research, we attempt to develop unknown anomaly detection models using a large-scale unlabeled dataset and a limited number of partially labeled anomalies, addressing an important but mostly unsolved anomaly detection problem. This is a common situation in many important applications. Currently used related methods work with unlabeled data in an unsupervised manner or fit only a small number of anomalies, often without all the anomalies. Here, we present a new decision-making method using the deep Q network (DQN) and the neutrosophic soft expert set (NSES) to actively search for new sets of anomalies that exist outside the boundaries of the labeled training data. The Jaccard similarity algorithm is used to calculate the distance between two states. This approach learns to find a balance between finding new anomaly classes and using its current data model. Consequently, it can increase detection accuracy by using the labeled anomaly data without limiting the types of anomalies it requires to a given anomalous case. Then, the gradient-based marine predator (GMP) algorithm—a hybrid of the marine predator algorithm (MPA) and the gradient-based optimizer (GBO)—is applied, and the parameters of the DQN model are adjusted at each iteration. This has major practical implications because abnormalities are inherently unobservable in nature and can be costly to ignore. Comprehensive tests on three real-world datasets demonstrate that our strategy performs noticeably better than five state-of-the-art competing approaches.

在本研究中,我们尝试使用大规模未标记数据集和有限数量的部分标记异常开发未知异常检测模型,解决一个重要但大多未解决的异常检测问题。这是许多重要应用程序中的常见情况。目前使用的相关方法以无监督的方式处理未标记的数据或仅拟合少量异常,通常没有所有异常。在这里,我们提出了一种新的决策方法,使用深度Q网络(DQN)和中性软专家集(NSES)来主动搜索存在于标记训练数据边界之外的新异常集。采用Jaccard相似度算法计算两种状态之间的距离。这种方法学习在寻找新的异常类和使用其当前数据模型之间找到平衡。因此,它可以通过使用标记的异常数据来提高检测精度,而不会将异常类型限制在给定的异常情况下。然后,采用基于梯度的海洋捕食者(GMP)算法——海洋捕食者算法(MPA)和基于梯度的优化器(GBO)的混合算法,并在每次迭代时调整DQN模型的参数。这具有重要的实际意义,因为异常在本质上是不可观察的,忽略异常可能代价高昂。对三个真实世界数据集的综合测试表明,我们的策略明显优于五种最先进的竞争方法。
{"title":"Anomaly Detection in an Open Set Environment Using Reinforcement Learning","authors":"Dharani Kanta Roy,&nbsp;Hemanta Kumar Kalita","doi":"10.1049/ise2/7990749","DOIUrl":"https://doi.org/10.1049/ise2/7990749","url":null,"abstract":"<p>In this research, we attempt to develop unknown anomaly detection models using a large-scale unlabeled dataset and a limited number of partially labeled anomalies, addressing an important but mostly unsolved anomaly detection problem. This is a common situation in many important applications. Currently used related methods work with unlabeled data in an unsupervised manner or fit only a small number of anomalies, often without all the anomalies. Here, we present a new decision-making method using the deep Q network (DQN) and the neutrosophic soft expert set (NSES) to actively search for new sets of anomalies that exist outside the boundaries of the labeled training data. The Jaccard similarity algorithm is used to calculate the distance between two states. This approach learns to find a balance between finding new anomaly classes and using its current data model. Consequently, it can increase detection accuracy by using the labeled anomaly data without limiting the types of anomalies it requires to a given anomalous case. Then, the gradient-based marine predator (GMP) algorithm—a hybrid of the marine predator algorithm (MPA) and the gradient-based optimizer (GBO)—is applied, and the parameters of the DQN model are adjusted at each iteration. This has major practical implications because abnormalities are inherently unobservable in nature and can be costly to ignore. Comprehensive tests on three real-world datasets demonstrate that our strategy performs noticeably better than five state-of-the-art competing approaches.</p>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"2025 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2025-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/ise2/7990749","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145521728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Security Defense and Economic Assessment Algorithm for mmWave-Vehicular Network Based on Deep Reinforcement Learning 一种基于深度强化学习的毫米波车联网安全防御与经济评估新算法
IF 2.6 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-11-11 DOI: 10.1049/ise2/4367746
Juan Zhang, Kholod D. Alsufiani, Shebnam M. Sefat, Suliman Alsuhibany, Abdullah Sultan Al-Shammre

This article proposes a novel algorithm to address the security issues in millimeter-wave Internet-of-vehicles (mmWave-IoV). The main idea is to provide a new solution to eliminate eavesdropping in dynamic mmWave-IoV infrastructure. For this purpose, a secure multiagent cooperative communication algorithm based on deep deterministic policy gradient (DDPG) and dueling double deep Q network (D3QN) is proposed. The eavesdropper reception signal quality is reduced by using the cooperative jamming of the road side unit (RSU). The total secrecy rate of all authentic vehicles is used as the optimization problem with the objective to maximize it using the jamming RSUs, joint beam connections of vehicular users and base station, and the transmit power and jamming direction of cooperative RSUs. A real-time, continuous, and discrete fusion-based decision-making strategy is deployed by creating an RSU agent utilizing the capabilities of the DDPG-D3QN algorithm and a vehicular user agent used in D3QN. Simulation results show that the proposed algorithm has superior performance as compared with existing algorithms.

本文提出一种新的算法来解决毫米波车联网(mmWave-IoV)中的安全问题。其主要思想是提供一种新的解决方案,以消除动态毫米波-车联网基础设施中的窃听。为此,提出了一种基于深度确定性策略梯度(DDPG)和双深Q网络(D3QN)的安全多智能体协作通信算法。利用路旁单元(RSU)的协同干扰降低了窃听器接收信号的质量。利用干扰rsu、车辆用户与基站的联合波束连接以及合作rsu的发射功率和干扰方向,将所有真实车辆的总保密率作为优化问题,以使其最大化为目标。通过利用DDPG-D3QN算法和D3QN中使用的车载用户代理创建RSU代理,部署了实时、连续和离散的基于融合的决策策略。仿真结果表明,与现有算法相比,该算法具有更好的性能。
{"title":"A Novel Security Defense and Economic Assessment Algorithm for mmWave-Vehicular Network Based on Deep Reinforcement Learning","authors":"Juan Zhang,&nbsp;Kholod D. Alsufiani,&nbsp;Shebnam M. Sefat,&nbsp;Suliman Alsuhibany,&nbsp;Abdullah Sultan Al-Shammre","doi":"10.1049/ise2/4367746","DOIUrl":"https://doi.org/10.1049/ise2/4367746","url":null,"abstract":"<p>This article proposes a novel algorithm to address the security issues in millimeter-wave Internet-of-vehicles (mmWave-IoV). The main idea is to provide a new solution to eliminate eavesdropping in dynamic mmWave-IoV infrastructure. For this purpose, a secure multiagent cooperative communication algorithm based on deep deterministic policy gradient (DDPG) and dueling double deep Q network (D3QN) is proposed. The eavesdropper reception signal quality is reduced by using the cooperative jamming of the road side unit (RSU). The total secrecy rate of all authentic vehicles is used as the optimization problem with the objective to maximize it using the jamming RSUs, joint beam connections of vehicular users and base station, and the transmit power and jamming direction of cooperative RSUs. A real-time, continuous, and discrete fusion-based decision-making strategy is deployed by creating an RSU agent utilizing the capabilities of the DDPG-D3QN algorithm and a vehicular user agent used in D3QN. Simulation results show that the proposed algorithm has superior performance as compared with existing algorithms.</p>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"2025 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2025-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/ise2/4367746","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145521722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bad Padding: A Highly Stealthy Backdoor Attack Using Steganography at the Padding Stage 不良填充:在填充阶段使用隐写术的高度隐身后门攻击
IF 2.6 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-11-10 DOI: 10.1049/ise2/8880733
Zhuowei Niu, Qindong Sun, Kai Lin, Mingkai Ding

Backdoor attacks have significantly threatened the models of natural language processing (NLP). However, most textual backdoor attacks exhibit low levels of stealthiness, making them susceptible to detection and removal by defense strategies. In order to improve the performance and stealthiness of such backdoor attacks, this article introduces a novel backdoor attack named Bad Padding (BPad) based on steganography. BPad employs a word-substitution steganographic method to hide triggers in sentences, thereby generating poisoned data. To ensure a high level of stealthiness for these poisoned samples, BPad developed a word substitution strategy that enhances both the diversity of the substituted words and the contextual coherence of the sentences. BPad also modifies the preprocessing stage by extracting triggers from the sentences and padding them as tokens at the end, effectively amplifying the impact of the trigger and making it easier for the model to learn the shortcut from the trigger to the target label, thereby achieving the injection of a backdoor. This article uses various metrics to present experimental measures of the attack performance and stealthiness of BPad. The results find that BPad achieved competitive results compared to baseline methods in non-defense scenarios and outperforms baseline methods under both training and inference defense. Besides that, the attack samples generated by BPad demonstrate strong stealthiness in terms of semantic coherence, perplexity, and grammaticality.

后门攻击已经严重威胁到自然语言处理(NLP)模型。然而,大多数文本后门攻击表现出低水平的隐蔽性,使它们容易被防御策略检测和移除。为了提高此类后门攻击的性能和隐蔽性,本文提出了一种基于隐写术的后门攻击方法——坏填充(Bad Padding, BPad)。BPad采用单词替换隐写方法隐藏句子中的触发器,从而生成有毒数据。为了确保这些有毒样本的高度隐蔽性,BPad开发了一种单词替换策略,增强了替换单词的多样性和句子的上下文一致性。BPad还对预处理阶段进行了修改,从句子中提取触发器,并在最后填充它们作为标记,有效地放大了触发器的影响,使模型更容易学习到从触发器到目标标签的捷径,从而实现了后门的注入。本文使用各种指标对BPad的攻击性能和隐身性进行了实验测量。结果发现,在非防御场景下,BPad与基线方法相比取得了较好的效果,在训练和推理防御场景下均优于基线方法。此外,BPad生成的攻击样本在语义连贯、困惑性和语法性方面都表现出较强的隐蔽性。
{"title":"Bad Padding: A Highly Stealthy Backdoor Attack Using Steganography at the Padding Stage","authors":"Zhuowei Niu,&nbsp;Qindong Sun,&nbsp;Kai Lin,&nbsp;Mingkai Ding","doi":"10.1049/ise2/8880733","DOIUrl":"https://doi.org/10.1049/ise2/8880733","url":null,"abstract":"<p>Backdoor attacks have significantly threatened the models of natural language processing (NLP). However, most textual backdoor attacks exhibit low levels of stealthiness, making them susceptible to detection and removal by defense strategies. In order to improve the performance and stealthiness of such backdoor attacks, this article introduces a novel backdoor attack named Bad Padding (BPad) based on steganography. BPad employs a word-substitution steganographic method to hide triggers in sentences, thereby generating poisoned data. To ensure a high level of stealthiness for these poisoned samples, BPad developed a word substitution strategy that enhances both the diversity of the substituted words and the contextual coherence of the sentences. BPad also modifies the preprocessing stage by extracting triggers from the sentences and padding them as tokens at the end, effectively amplifying the impact of the trigger and making it easier for the model to learn the shortcut from the trigger to the target label, thereby achieving the injection of a backdoor. This article uses various metrics to present experimental measures of the attack performance and stealthiness of BPad. The results find that BPad achieved competitive results compared to baseline methods in non-defense scenarios and outperforms baseline methods under both training and inference defense. Besides that, the attack samples generated by BPad demonstrate strong stealthiness in terms of semantic coherence, perplexity, and grammaticality.</p>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"2025 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2025-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/ise2/8880733","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145521432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Thorough Review of Security in Information-Centric Networking 信息中心网络安全研究综述
IF 2.6 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-10-31 DOI: 10.1049/ise2/5178335
Ado Adamou Abba Ari, Youssoufa Hara Soukolsou, Sammy Salim Daissinta Baidi, Moussa Aboubakar, Nabila Labraoui, Alidou Mohamadou, Ousmane Thiare

The rapid evolution of technology has revealed the limitations of host-centric or IP address–based networks. To overcome these limitations, a new communication paradigm has emerged: the information-centric networking (ICN), which focuses on content (data) regardless of its location in the network. This new vision of networking addresses issues such as security and address space limitations inherent in the traditional IP address-centric paradigm. Unlike its predecessor, ICN is based on content naming rather than IP addresses. ICN offers advantages such as improved quality of service, reduced data delivery time, enhanced data availability, and strengthened security. However, with these benefits come new vulnerabilities, particularly in content naming and caching. It is, therefore, crucial to understand the attacks specific to ICN. In this study, we first present an overview of the two network paradigms and fundamental security concepts, then, examine the various attacks in the ICN paradigm. We propose a taxonomy of these attacks and outline future research directions to address emerging security challenges.

技术的快速发展揭示了以主机为中心或基于IP地址的网络的局限性。为了克服这些限制,出现了一种新的通信范式:以信息为中心的网络(ICN),其重点是内容(数据),而不管其在网络中的位置。这种网络的新愿景解决了传统的以IP地址为中心的范例中固有的安全性和地址空间限制等问题。与它的前身不同,ICN基于内容命名而不是IP地址。ICN具有提高服务质量、缩短数据传递时间、增强数据可用性和增强安全性等优势。然而,伴随着这些好处而来的是新的漏洞,特别是在内容命名和缓存方面。因此,了解针对ICN的攻击至关重要。在本研究中,我们首先概述了两种网络范式和基本安全概念,然后研究了ICN范式中的各种攻击。我们提出了这些攻击的分类,并概述了未来的研究方向,以应对新出现的安全挑战。
{"title":"A Thorough Review of Security in Information-Centric Networking","authors":"Ado Adamou Abba Ari,&nbsp;Youssoufa Hara Soukolsou,&nbsp;Sammy Salim Daissinta Baidi,&nbsp;Moussa Aboubakar,&nbsp;Nabila Labraoui,&nbsp;Alidou Mohamadou,&nbsp;Ousmane Thiare","doi":"10.1049/ise2/5178335","DOIUrl":"https://doi.org/10.1049/ise2/5178335","url":null,"abstract":"<p>The rapid evolution of technology has revealed the limitations of host-centric or IP address–based networks. To overcome these limitations, a new communication paradigm has emerged: the information-centric networking (ICN), which focuses on content (data) regardless of its location in the network. This new vision of networking addresses issues such as security and address space limitations inherent in the traditional IP address-centric paradigm. Unlike its predecessor, ICN is based on content naming rather than IP addresses. ICN offers advantages such as improved quality of service, reduced data delivery time, enhanced data availability, and strengthened security. However, with these benefits come new vulnerabilities, particularly in content naming and caching. It is, therefore, crucial to understand the attacks specific to ICN. In this study, we first present an overview of the two network paradigms and fundamental security concepts, then, examine the various attacks in the ICN paradigm. We propose a taxonomy of these attacks and outline future research directions to address emerging security challenges.</p>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"2025 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2025-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/ise2/5178335","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145407054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ProvADShield: A Multimodel Ensemble Defender Against Adversarial Attacks on Provenance Graph Host Intrusion Detector ProvADShield:一种针对源图主机入侵检测器对抗性攻击的多模型集成防御器
IF 2.6 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-10-31 DOI: 10.1049/ise2/8625988
Mingqi Lv, Kehan Qian, Tieming Chen, Tiantian Zhu, Jinyin Chen

HID (host intrusion detection) is a security mechanism for detecting malicious activities performed in a host (e.g., a server, an edge device). Recent research has recast HID as a provenance graph learning problem thanks to the advancement in deep learning techniques, especially the GNNs (graph neural networks). Although the provenance graph learning based HID methods show promise, they are vulnerable to adversarial attacks, where the attackers can bypass the HID models by carefully modifying their attack behaviors. In this paper, we reveal that an adversarial sample generated against one HID model may not be necessarily able to attack another HID model, and we further explore the success rate of adversarial attacks between different HID models by evaluating the mutual transferability. Based on the evaluation, we propose ProvADShield, a framework designed to defend against adversarial attacks on provenance graph learning based HID models. The core idea of ProvADShield is to combine multiple HID models by leveraging the mutual transferability. We evaluate ProvADShield based on a provenance dataset collected and made public by our team. The experiment results show that ProvADShield outperforms state-of-the-art defense systems against adversarial attacks.

HID(主机入侵检测)是一种安全机制,用于检测在主机(例如,服务器,边缘设备)中执行的恶意活动。由于深度学习技术的进步,特别是gnn(图神经网络),最近的研究将HID重新定义为一个来源图学习问题。尽管基于来源图学习的HID方法显示出前景,但它们容易受到对抗性攻击,攻击者可以通过仔细修改攻击行为来绕过HID模型。本文揭示了针对一个HID模型生成的对抗样本不一定能够攻击另一个HID模型,并通过评估相互可转移性进一步探讨了不同HID模型之间对抗攻击的成功率。基于评估,我们提出了ProvADShield框架,该框架旨在防御基于出处图学习的HID模型的对抗性攻击。ProvADShield的核心思想是利用相互可移植性将多个HID模型组合在一起。我们基于我们团队收集并公开的来源数据集评估ProvADShield。实验结果表明,ProvADShield在对抗对抗性攻击方面优于最先进的防御系统。
{"title":"ProvADShield: A Multimodel Ensemble Defender Against Adversarial Attacks on Provenance Graph Host Intrusion Detector","authors":"Mingqi Lv,&nbsp;Kehan Qian,&nbsp;Tieming Chen,&nbsp;Tiantian Zhu,&nbsp;Jinyin Chen","doi":"10.1049/ise2/8625988","DOIUrl":"https://doi.org/10.1049/ise2/8625988","url":null,"abstract":"<p>HID (host intrusion detection) is a security mechanism for detecting malicious activities performed in a host (e.g., a server, an edge device). Recent research has recast HID as a provenance graph learning problem thanks to the advancement in deep learning techniques, especially the GNNs (graph neural networks). Although the provenance graph learning based HID methods show promise, they are vulnerable to adversarial attacks, where the attackers can bypass the HID models by carefully modifying their attack behaviors. In this paper, we reveal that an adversarial sample generated against one HID model may not be necessarily able to attack another HID model, and we further explore the success rate of adversarial attacks between different HID models by evaluating the mutual transferability. Based on the evaluation, we propose ProvADShield, a framework designed to defend against adversarial attacks on provenance graph learning based HID models. The core idea of ProvADShield is to combine multiple HID models by leveraging the mutual transferability. We evaluate ProvADShield based on a provenance dataset collected and made public by our team. The experiment results show that ProvADShield outperforms state-of-the-art defense systems against adversarial attacks.</p>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"2025 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2025-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/ise2/8625988","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145407055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Interpretable Network Intrusion Detection Model via Decision Tree Enhanced Deep Attention Network 基于决策树增强深度注意网络的可解释网络入侵检测模型
IF 2.6 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-10-29 DOI: 10.1049/ise2/5552833
Mingqi Lv, Shengduo Gan, Kang Xu, Tieming Chen, Tiantian Zhu, Jinyin Chen

Network intrusion detection (NID) plays a crucial role in cybersecurity by identifying network attacks from network traffic. In recent years, the deep learning technique has become a tendency for the NID problem. However, a major drawback of deep learning is the lack of interpretability, making NID systems (NIDSs) difficult to diagnose and response to the detected network attacks. At the same time, the existing interpretable deep learning techniques cannot adapt to the NID problem due to its specific challenges, including the cross-feature effect and the absence of self-interpretable features. To this end, this article proposes a decision Tree enhanced deep Attention Network (TAN), an interpretable deep learning model specifically designed for the NID problem by integrating a decision tree (DT) into a deep attention network. TAN utilizes a DT to extract self-interpretable features and then uses a deep hierarchical attention network to capture the cross-feature effect and pinpoint the most important self-interpretable features. A series of experiments and case studies were performed on public datasets, including KDD99, NSL-KDD, UNSW-NB15, and CICIDS2017. The results indicate that TAN achieves competitive detection performance compared to existing deep learning models, while offering a more intuitive interpretation.

网络入侵检测(NID)通过识别网络流量中的网络攻击,在网络安全中发挥着至关重要的作用。近年来,深度学习技术已成为解决NID问题的一种趋势。然而,深度学习的一个主要缺点是缺乏可解释性,使得nids系统(nids)难以诊断和响应检测到的网络攻击。同时,现有的可解释深度学习技术由于其特有的挑战而无法适应NID问题,包括交叉特征效应和缺乏自解释特征。为此,本文提出了一个决策树增强深度注意网络(TAN),这是一个专门为NID问题设计的可解释深度学习模型,通过将决策树(DT)集成到深度注意网络中。TAN利用DT提取自解释特征,然后利用深度分层注意网络捕捉交叉特征效应,精确定位最重要的自解释特征。在KDD99、NSL-KDD、UNSW-NB15和CICIDS2017等公共数据集上进行了一系列实验和案例研究。结果表明,与现有的深度学习模型相比,TAN实现了具有竞争力的检测性能,同时提供了更直观的解释。
{"title":"An Interpretable Network Intrusion Detection Model via Decision Tree Enhanced Deep Attention Network","authors":"Mingqi Lv,&nbsp;Shengduo Gan,&nbsp;Kang Xu,&nbsp;Tieming Chen,&nbsp;Tiantian Zhu,&nbsp;Jinyin Chen","doi":"10.1049/ise2/5552833","DOIUrl":"https://doi.org/10.1049/ise2/5552833","url":null,"abstract":"<p>Network intrusion detection (NID) plays a crucial role in cybersecurity by identifying network attacks from network traffic. In recent years, the deep learning technique has become a tendency for the NID problem. However, a major drawback of deep learning is the lack of interpretability, making NID systems (NIDSs) difficult to diagnose and response to the detected network attacks. At the same time, the existing interpretable deep learning techniques cannot adapt to the NID problem due to its specific challenges, including the cross-feature effect and the absence of self-interpretable features. To this end, this article proposes a decision Tree enhanced deep Attention Network (TAN), an interpretable deep learning model specifically designed for the NID problem by integrating a decision tree (DT) into a deep attention network. TAN utilizes a DT to extract self-interpretable features and then uses a deep hierarchical attention network to capture the cross-feature effect and pinpoint the most important self-interpretable features. A series of experiments and case studies were performed on public datasets, including KDD99, NSL-KDD, UNSW-NB15, and CICIDS2017. The results indicate that TAN achieves competitive detection performance compared to existing deep learning models, while offering a more intuitive interpretation.</p>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"2025 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2025-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/ise2/5552833","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145406855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IET Information Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1