首页 > 最新文献

Computers & Security最新文献

英文 中文
SKT-IDS: Unknown attack detection method based on Sigmoid Kernel Transformation and encoder–decoder architecture SKT-IDS:基于西格码核变换和编码器-解码器架构的未知攻击检测方法
IF 4.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-13 DOI: 10.1016/j.cose.2024.104056

Intrusion Detection Systems (IDS) are crucial in cybersecurity for monitoring network traffic and identifying potential attacks. Existing IDS research largely focuses on known attack detection, leaving a significant gap in research regarding unknown attack detection, where achieving a balance between false alarm rate (identifying normal traffic as attack traffic) and recall rate of unknown attack detection remains challenging. To address these gaps, we propose a novel IDS based on Sigmoid Kernel Transformation and Encoder-Decoder architecture, namely SKT-IDS, where SKT stands for Sigmoid Kernel Transformation. We start with pre-training an attention-based encoder for coarse-grained intrusion detection. Then, we use this encoder to build an encoder–decoder model specifically for 0-day attack detection, training it solely on known traffic using the cosine similarity loss function. To enhance detection, we introduce a Sigmoid Kernel Transformation for feature engineering, improving the discriminative ability between normal traffic and 0-day attacks. Finally, we conducted a series of ablation and comparative experiments on the NSL-KDD and CSE-CIC-IDS2018 datasets, confirming the effectiveness of our proposed method. With a false alarm rate of 1%, we achieved recall rates for unknown attack detection of 65% and 69% on the two datasets, respectively, demonstrating significant performance improvements compared to existing state-of-the-art models.

入侵检测系统(IDS)是网络安全中监控网络流量和识别潜在攻击的关键。现有的入侵检测系统研究主要集中在已知攻击检测方面,在未知攻击检测方面的研究还存在很大差距,要在误报率(将正常流量识别为攻击流量)和未知攻击检测的召回率之间取得平衡仍具有挑战性。为了弥补这些差距,我们提出了一种基于西格码核变换和编码器-解码器架构的新型 IDS,即 SKT-IDS,其中 SKT 代表西格码核变换。我们首先预训练一个基于注意力的编码器,用于粗粒度入侵检测。然后,我们使用该编码器建立一个专门用于 0 天攻击检测的编码器-解码器模型,仅使用余弦相似性损失函数对已知流量进行训练。为了增强检测能力,我们引入了西格莫德核变换用于特征工程,从而提高了正常流量和 0 天攻击之间的区分能力。最后,我们在 NSL-KDD 和 CSE-CIC-IDS2018 数据集上进行了一系列消减和对比实验,证实了我们提出的方法的有效性。在误报率为 1% 的情况下,我们在这两个数据集上的未知攻击检测召回率分别达到了 65% 和 69%,与现有的最先进模型相比,性能有了显著提高。
{"title":"SKT-IDS: Unknown attack detection method based on Sigmoid Kernel Transformation and encoder–decoder architecture","authors":"","doi":"10.1016/j.cose.2024.104056","DOIUrl":"10.1016/j.cose.2024.104056","url":null,"abstract":"<div><p>Intrusion Detection Systems (IDS) are crucial in cybersecurity for monitoring network traffic and identifying potential attacks. Existing IDS research largely focuses on known attack detection, leaving a significant gap in research regarding unknown attack detection, where achieving a balance between false alarm rate (identifying normal traffic as attack traffic) and recall rate of unknown attack detection remains challenging. To address these gaps, we propose a novel IDS based on Sigmoid Kernel Transformation and Encoder-Decoder architecture, namely SKT-IDS, where SKT stands for Sigmoid Kernel Transformation. We start with pre-training an attention-based encoder for coarse-grained intrusion detection. Then, we use this encoder to build an encoder–decoder model specifically for 0-day attack detection, training it solely on known traffic using the cosine similarity loss function. To enhance detection, we introduce a Sigmoid Kernel Transformation for feature engineering, improving the discriminative ability between normal traffic and 0-day attacks. Finally, we conducted a series of ablation and comparative experiments on the NSL-KDD and CSE-CIC-IDS2018 datasets, confirming the effectiveness of our proposed method. With a false alarm rate of 1%, we achieved recall rates for unknown attack detection of 65% and 69% on the two datasets, respectively, demonstrating significant performance improvements compared to existing state-of-the-art models.</p></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":null,"pages":null},"PeriodicalIF":4.8,"publicationDate":"2024-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142002014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generation and deployment of honeytokens in relational databases for cyber deception 在关系数据库中生成和部署蜜罐,用于网络欺骗
IF 4.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-10 DOI: 10.1016/j.cose.2024.104032

Despite considerable investments in database security, global statistics indicate an exponential increase in data breaches. Organizations are often unaware of data breaches for weeks, months, or even years. Sufficient for adversaries to compromise and ex-filtrate business or mission-critical data. Recent research suggests using honeytokens for early detection of data breaches in organizations. Existing honeytoken generation methods rely on regular expressions, rule mining, constraint satisfaction, or representation learning, which are complex and limited to a few attributes. We created a framework for generating and deploying honeytokens in relational databases that actively monitor sensitive records and quickly detect data breaches and their misuse. To generate the honeytoken we have used the hierarchical machine learning algorithm which uses a recursive technique to model the parent–child relationships of multi-table databases. The proposed method enables the organization to take remedial action to reduce the impact of data breaches and complement existing database security solutions.

尽管在数据库安全方面进行了大量投资,但全球统计数据表明,数据泄露事件呈指数级增长。企业往往在数周、数月甚至数年后才意识到数据泄露。这足以让对手破坏和窃取业务或关键任务数据。最近的研究建议使用蜜令牌来及早检测组织内的数据泄露。现有的 "蜜罐 "生成方法依赖于正则表达式、规则挖掘、约束满足或表示学习,这些方法都很复杂,而且仅限于少数属性。我们创建了一个在关系数据库中生成和部署 "蜜罐 "的框架,它能主动监控敏感记录,快速检测数据泄露及其滥用。为了生成 "蜜罐",我们使用了分层机器学习算法,该算法使用递归技术为多表数据库的父子关系建模。所提出的方法使企业能够采取补救措施,减少数据泄露的影响,并补充现有的数据库安全解决方案。
{"title":"Generation and deployment of honeytokens in relational databases for cyber deception","authors":"","doi":"10.1016/j.cose.2024.104032","DOIUrl":"10.1016/j.cose.2024.104032","url":null,"abstract":"<div><p>Despite considerable investments in database security, global statistics indicate an exponential increase in data breaches. Organizations are often unaware of data breaches for weeks, months, or even years. Sufficient for adversaries to compromise and ex-filtrate business or mission-critical data. Recent research suggests using honeytokens for early detection of data breaches in organizations. Existing honeytoken generation methods rely on regular expressions, rule mining, constraint satisfaction, or representation learning, which are complex and limited to a few attributes. We created a framework for generating and deploying honeytokens in relational databases that actively monitor sensitive records and quickly detect data breaches and their misuse. To generate the honeytoken we have used the hierarchical machine learning algorithm which uses a recursive technique to model the parent–child relationships of multi-table databases. The proposed method enables the organization to take remedial action to reduce the impact of data breaches and complement existing database security solutions.</p></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":null,"pages":null},"PeriodicalIF":4.8,"publicationDate":"2024-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141978111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PHP-based malicious webshell detection based on abstract syntax tree simplification and explicit duration recurrent networks 基于抽象语法树简化和显式持续时间递归网络的 PHP 恶意 webhell 检测
IF 4.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-10 DOI: 10.1016/j.cose.2024.104049

Malicious webshells are the most common attack scripts used by attackers in web penetration. Attackers typically obfuscate strings of PHP-based malicious webshells and encrypt communication traffic to bypass security devices. In this case, the opcode sequences of the PHP-based malicious webshells become excessively long and contain many irrelevant features, which affect the efficacy of the detection method. This study proposes a new PHP-based malicious webshell detection method. The proposed method introduces three simplification strategies for the three main types of nodes in the abstract syntax trees of PHP scripts to reduce the length and noise of opcode sequences of PHP-based malicious webshells. An explicit duration recurrent network (EDRN), a recurrent neural network based on an extended hidden semi-Markov model, is used to detect malicious webshells. Word2vec is adopted to convert the opcode sequences of the PHP scripts into vectors that serve as the input for the EDRN. Experiments were conducted using public datasets collected from GitHub. The experimental results indicated that EDRN outperformed popular recurrent neural networks. The proposed method demonstrated superior performance compared with several state-of-the-art approaches and mainstream tools, achieving an accuracy of 0.993, an F1 score of 0.990, and a recall rate of 0.991. When only 20% of the datasets were used for training, the proposed method achieved accuracy, recall, and F1 scores of 0.985, 0.983, and 0.980, respectively, significantly outperforming existing approaches.

恶意 webshell 是攻击者在网络渗透中最常用的攻击脚本。攻击者通常会混淆基于 PHP 的恶意 webshell 字符串并加密通信流量,以绕过安全设备。在这种情况下,基于 PHP 的恶意 webshell 的操作码序列会变得过长,并包含许多不相关的特征,从而影响检测方法的效果。本研究提出了一种新的基于 PHP 的恶意 webhell 检测方法。该方法针对 PHP 脚本抽象语法树中的三种主要节点类型引入了三种简化策略,以减少基于 PHP 的恶意 webhell 的操作码序列长度和噪声。显式持续时间递归网络(EDRN)是一种基于扩展隐式半马尔可夫模型的递归神经网络,用于检测恶意 webhell。采用 Word2vec 将 PHP 脚本的操作码序列转换成向量,作为 EDRN 的输入。实验使用了从 GitHub 收集的公共数据集。实验结果表明,EDRN 的性能优于流行的递归神经网络。与几种最先进的方法和主流工具相比,所提出的方法表现出卓越的性能,准确率达到 0.993,F1 分数达到 0.990,召回率达到 0.991。当仅使用 20% 的数据集进行训练时,所提出的方法的准确率、召回率和 F1 分数分别达到了 0.985、0.983 和 0.980,明显优于现有方法。
{"title":"PHP-based malicious webshell detection based on abstract syntax tree simplification and explicit duration recurrent networks","authors":"","doi":"10.1016/j.cose.2024.104049","DOIUrl":"10.1016/j.cose.2024.104049","url":null,"abstract":"<div><p>Malicious webshells are the most common attack scripts used by attackers in web penetration. Attackers typically obfuscate strings of PHP-based malicious webshells and encrypt communication traffic to bypass security devices. In this case, the opcode sequences of the PHP-based malicious webshells become excessively long and contain many irrelevant features, which affect the efficacy of the detection method. This study proposes a new PHP-based malicious webshell detection method. The proposed method introduces three simplification strategies for the three main types of nodes in the abstract syntax trees of PHP scripts to reduce the length and noise of opcode sequences of PHP-based malicious webshells. An explicit duration recurrent network (EDRN), a recurrent neural network based on an extended hidden semi-Markov model, is used to detect malicious webshells. Word2vec is adopted to convert the opcode sequences of the PHP scripts into vectors that serve as the input for the EDRN. Experiments were conducted using public datasets collected from GitHub. The experimental results indicated that EDRN outperformed popular recurrent neural networks. The proposed method demonstrated superior performance compared with several state-of-the-art approaches and mainstream tools, achieving an accuracy of 0.993, an F1 score of 0.990, and a recall rate of 0.991. When only 20% of the datasets were used for training, the proposed method achieved accuracy, recall, and F1 scores of 0.985, 0.983, and 0.980, respectively, significantly outperforming existing approaches.</p></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":null,"pages":null},"PeriodicalIF":4.8,"publicationDate":"2024-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141978112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fault-tolerant security-efficiency combined authentication scheme for manned-unmanned teaming 用于有人-无人小组的容错安全-高效组合认证方案
IF 4.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-09 DOI: 10.1016/j.cose.2024.104052

Manned-unmanned teaming (MUM-T) is an emerging network system which interconnects manned aerial vehicles (MAVs) with unmanned aerial vehicles (UAVs) to enhance mission effectiveness and reduce workloads. Like other wireless systems, MUM-T is prone to attacks from the open communication channel. Therefore, an authentication scheme is required to establish secure and trusted communication between the MAV and the UAV. However, existing schemes fail to provide adequate security features and necessary efficiency, mostly due to their incomprehensive threat modeling and improper use of authentication techniques. Moreover, traditional centralized architecture of the authentication server leads to the single point of failure (SPOF) problem, which jeopardizes the robustness and scalability of MUM-T. In this paper, we propose a fault-tolerant authentication scheme for MUM-T that will solve these problems. To enhance its security, we construct a new threat model consisting of adversary's capabilities, security features, and security challenges to ensure the security of a scheme under combination attacks. To preserve the highest possible efficiency, we propose the design principle of using lightweight primitives for authentication and applying public key operations in key establishment. To address the SPOF problem, we employ a distributed fault-tolerant mechanism to share registration information within authentication servers and defend against faulty nodes. As is demonstrated by the security proof and performance comparison, our scheme succeeds in improving security and reducing overall costs, which provides a better solution than existing schemes.

有人无人协同飞行(MUM-T)是一种新兴的网络系统,它将有人驾驶飞行器(MAV)与无人驾驶飞行器(UAV)互联,以提高任务效率并减少工作量。与其他无线系统一样,MUM-T 容易受到来自开放通信信道的攻击。因此,需要一种验证方案来建立无人机与无人飞行器之间安全可信的通信。然而,现有方案无法提供足够的安全功能和必要的效率,主要原因是威胁建模不全面和认证技术使用不当。此外,传统的集中式认证服务器架构会导致单点故障(SPOF)问题,从而危及 MUM-T 的鲁棒性和可扩展性。本文提出的 MUM-T 容错验证方案将解决这些问题。为了提高方案的安全性,我们构建了一个由对手能力、安全特征和安全挑战组成的新威胁模型,以确保方案在组合攻击下的安全性。为了保持尽可能高的效率,我们提出了使用轻量级基元进行身份验证和在密钥建立中应用公钥操作的设计原则。为解决 SPOF 问题,我们采用了分布式容错机制,在认证服务器内部共享注册信息,并防御故障节点。安全证明和性能比较表明,我们的方案既提高了安全性,又降低了总体成本,比现有方案提供了更好的解决方案。
{"title":"Fault-tolerant security-efficiency combined authentication scheme for manned-unmanned teaming","authors":"","doi":"10.1016/j.cose.2024.104052","DOIUrl":"10.1016/j.cose.2024.104052","url":null,"abstract":"<div><p>Manned-unmanned teaming (MUM-T) is an emerging network system which interconnects manned aerial vehicles (MAVs) with unmanned aerial vehicles (UAVs) to enhance mission effectiveness and reduce workloads. Like other wireless systems, MUM-T is prone to attacks from the open communication channel. Therefore, an authentication scheme is required to establish secure and trusted communication between the MAV and the UAV. However, existing schemes fail to provide adequate security features and necessary efficiency, mostly due to their incomprehensive threat modeling and improper use of authentication techniques. Moreover, traditional centralized architecture of the authentication server leads to the single point of failure (SPOF) problem, which jeopardizes the robustness and scalability of MUM-T. In this paper, we propose a fault-tolerant authentication scheme for MUM-T that will solve these problems. To enhance its security, we construct a new threat model consisting of adversary's capabilities, security features, and security challenges to ensure the security of a scheme under combination attacks. To preserve the highest possible efficiency, we propose the design principle of using lightweight primitives for authentication and applying public key operations in key establishment. To address the SPOF problem, we employ a distributed fault-tolerant mechanism to share registration information within authentication servers and defend against faulty nodes. As is demonstrated by the security proof and performance comparison, our scheme succeeds in improving security and reducing overall costs, which provides a better solution than existing schemes.</p></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":null,"pages":null},"PeriodicalIF":4.8,"publicationDate":"2024-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141985168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Corrigendum to “Model-agnostic Adversarial Example Detection via High-Frequency Amplification” [Computers & Security, Volume 141, June 2024, 103791] 通过高频放大进行模型失真对抗性示例检测》勘误表[《计算机与安全》,第 141 卷,2024 年 6 月,103791]
IF 4.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-08 DOI: 10.1016/j.cose.2024.104006
{"title":"Corrigendum to “Model-agnostic Adversarial Example Detection via High-Frequency Amplification” [Computers & Security, Volume 141, June 2024, 103791]","authors":"","doi":"10.1016/j.cose.2024.104006","DOIUrl":"10.1016/j.cose.2024.104006","url":null,"abstract":"","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":null,"pages":null},"PeriodicalIF":4.8,"publicationDate":"2024-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0167404824003110/pdfft?md5=4f4c4aa41e530322b10065f2456e0d8d&pid=1-s2.0-S0167404824003110-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142095126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
COVER: Enhancing virtualization obfuscation through dynamic scheduling using flash controller-based secure module 封面:利用基于闪存控制器的安全模块,通过动态调度增强虚拟化混淆功能
IF 4.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-08 DOI: 10.1016/j.cose.2024.104038

Virtualization obfuscation is a very effective method used to protect programs from malicious analysis by obscuring their code. Due to the fixed scheduling structures, typical virtualization obfuscation schemes can be compromised by automated analysis tools. To enhance the protection strength of virtualization obfuscation, additional protection techniques of the virtualization structure have been proposed. However, previously proposed solutions incur significant performance overhead or require a strong assumption in software-protection techniques. We present COVER, a novel virtualization obfuscation technique in conjunction with the flash controller. COVER enhances the obfuscation and protects the secret parameters of the virtualization structure with a flash controller-based secure module. We implement a prototype of COVER and describe a prototype implementation of a flash controller-based secure module on a Solid State Drive (SSD). We demonstrate COVER’s efficacy against various code analysis methods, and evaluate COVER’s performance using a set of real-world applications. The evaluation results demonstrate that COVER effectively protects the secret parameters of the virtualization structure and increases the effort involved in deobfuscation. Compared with two commercial obfuscators, COVER provides additional protection strength without incurring significantly more overhead in terms of runtime and code size.

虚拟化混淆是一种非常有效的方法,可通过掩盖代码来保护程序免遭恶意分析。由于调度结构固定,典型的虚拟化混淆方案会被自动分析工具破解。为了增强虚拟化混淆的保护强度,有人提出了虚拟化结构的附加保护技术。然而,以前提出的解决方案会产生巨大的性能开销,或者需要对软件保护技术进行强有力的假设。我们提出的 COVER 是一种与闪存控制器相结合的新型虚拟化混淆技术。COVER 通过基于闪存控制器的安全模块,增强了混淆功能并保护了虚拟化结构的秘密参数。我们实现了 COVER 的原型,并描述了基于闪存控制器的安全模块在固态硬盘(SSD)上的原型实现。我们针对各种代码分析方法演示了 COVER 的功效,并使用一组实际应用评估了 COVER 的性能。评估结果表明,COVER 有效地保护了虚拟化结构的秘密参数,并增加了解混淆的工作量。与两款商业混淆器相比,COVER 提供了额外的保护强度,但在运行时间和代码大小方面并没有产生明显更多的开销。
{"title":"COVER: Enhancing virtualization obfuscation through dynamic scheduling using flash controller-based secure module","authors":"","doi":"10.1016/j.cose.2024.104038","DOIUrl":"10.1016/j.cose.2024.104038","url":null,"abstract":"<div><p>Virtualization obfuscation is a very effective method used to protect programs from malicious analysis by obscuring their code. Due to the fixed scheduling structures, typical virtualization obfuscation schemes can be compromised by automated analysis tools. To enhance the protection strength of virtualization obfuscation, additional protection techniques of the virtualization structure have been proposed. However, previously proposed solutions incur significant performance overhead or require a strong assumption in software-protection techniques. We present COVER, a novel virtualization obfuscation technique in conjunction with the flash controller. COVER enhances the obfuscation and protects the secret parameters of the virtualization structure with a flash controller-based secure module. We implement a prototype of COVER and describe a prototype implementation of a flash controller-based secure module on a Solid State Drive (SSD). We demonstrate COVER’s efficacy against various code analysis methods, and evaluate COVER’s performance using a set of real-world applications. The evaluation results demonstrate that COVER effectively protects the secret parameters of the virtualization structure and increases the effort involved in deobfuscation. Compared with two commercial obfuscators, COVER provides additional protection strength without incurring significantly more overhead in terms of runtime and code size.</p></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":null,"pages":null},"PeriodicalIF":4.8,"publicationDate":"2024-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141978110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unveiling vulnerabilities in deep learning-based malware detection: Differential privacy driven adversarial attacks 揭示基于深度学习的恶意软件检测中的漏洞:差异隐私驱动的对抗性攻击
IF 4.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-08 DOI: 10.1016/j.cose.2024.104035

The exponential increase of Android malware creates a severe threat, motivating the development of machine learning and especially deep learning-based classifiers to detect and mitigate malicious applications. However, these classifiers are susceptible to adversarial attacks that manipulate input data to deceive the classifier and compromise performance. This paper investigates the vulnerability of deep learning-based Android malware classifiers against two adversarial attacks: Data Poisoning with Noise Injection (DP-NI) and Gradient-based Data Poisoning (GDP). In these attacks, we explore the utilization of differential privacy techniques by attackers aiming to compromise the effectiveness of deep learning based Android malware classifiers. We propose and evaluate a novel defense mechanism, Differential Privacy-Based Noise Clipping (DP-NC), designed to enhance the robustness of Android malware classifiers against these adversarial attacks. By leveraging deep neural networks and adversarial training techniques, DP-NC demonstrates remarkable efficacy in mitigating the impact of both DP-NI and GDP attacks. Through extensive experimentation on three diverse Android datasets (Drebin, Contagio, and Genome), we evaluate the performance of DP-NC against proposed adversarial attacks. Our results show that DP-NC significantly reduces the false-positive rate and improves classification accuracy across all datasets and attack scenarios. For instance, our findings on the Drebin dataset reveal a significant decrease in accuracy to 51% and 30% after applying DP-NI and GDP techniques, respectively. However, upon applying the DP-NC defense mechanism, the accuracy in both cases improved to approximately 70%. Furthermore, employing DP-NC defense against DP-NI and GDP attacks leads to a notable reduction in false positive rates by 45.46% and 7.67%, respectively. Similar results have been obtained in two other datasets, Contagio and Genome. These results underscore the effectiveness of DP-NC in enhancing the robustness of deep learning-based Android malware classifiers against adversarial attacks.

安卓恶意软件的指数级增长造成了严重威胁,促使人们开发机器学习,特别是基于深度学习的分类器,以检测和减少恶意应用程序。然而,这些分类器很容易受到对抗攻击的影响,对抗攻击会操纵输入数据来欺骗分类器,从而影响分类器的性能。本文研究了基于深度学习的安卓恶意软件分类器在两种对抗性攻击面前的脆弱性:带噪声注入的数据中毒(DP-NI)和基于梯度的数据中毒(GDP)。在这些攻击中,我们探索了攻击者利用差异隐私技术来破坏基于深度学习的安卓恶意软件分类器的有效性。我们提出并评估了一种新型防御机制--基于差异隐私的噪声剪切(DP-NC),旨在增强安卓恶意软件分类器对这些对抗性攻击的鲁棒性。通过利用深度神经网络和对抗性训练技术,DP-NC 在减轻 DP-NI 和 GDP 攻击的影响方面表现出了显著的功效。通过在三个不同的安卓数据集(Drebin、Contagio 和 Genome)上进行广泛的实验,我们评估了 DP-NC 对抗所提出的恶意攻击的性能。结果表明,在所有数据集和攻击场景中,DP-NC 都能显著降低误报率,提高分类准确性。例如,我们对 Drebin 数据集的研究结果表明,在应用 DP-NI 和 GDP 技术后,准确率分别大幅下降至 51% 和 30%。然而,在应用 DP-NC 防御机制后,这两种情况下的准确率都提高到了约 70%。此外,针对 DP-NI 和 GDP 攻击采用 DP-NC 防御后,误报率分别显著降低了 45.46% 和 7.67%。在其他两个数据集 Contagio 和 Genome 中也获得了类似的结果。这些结果凸显了 DP-NC 在增强基于深度学习的安卓恶意软件分类器抵御对抗性攻击的鲁棒性方面的有效性。
{"title":"Unveiling vulnerabilities in deep learning-based malware detection: Differential privacy driven adversarial attacks","authors":"","doi":"10.1016/j.cose.2024.104035","DOIUrl":"10.1016/j.cose.2024.104035","url":null,"abstract":"<div><p>The exponential increase of Android malware creates a severe threat, motivating the development of machine learning and especially deep learning-based classifiers to detect and mitigate malicious applications. However, these classifiers are susceptible to adversarial attacks that manipulate input data to deceive the classifier and compromise performance. This paper investigates the vulnerability of deep learning-based Android malware classifiers against two adversarial attacks: Data Poisoning with Noise Injection (DP-NI) and Gradient-based Data Poisoning (GDP). In these attacks, we explore the utilization of differential privacy techniques by attackers aiming to compromise the effectiveness of deep learning based Android malware classifiers. We propose and evaluate a novel defense mechanism, Differential Privacy-Based Noise Clipping (DP-NC), designed to enhance the robustness of Android malware classifiers against these adversarial attacks. By leveraging deep neural networks and adversarial training techniques, DP-NC demonstrates remarkable efficacy in mitigating the impact of both DP-NI and GDP attacks. Through extensive experimentation on <em>three</em> diverse Android datasets (Drebin, Contagio, and Genome), we evaluate the performance of DP-NC against proposed adversarial attacks. Our results show that DP-NC significantly reduces the false-positive rate and improves classification accuracy across all datasets and attack scenarios. For instance, our findings on the Drebin dataset reveal a significant decrease in accuracy to 51% and 30% after applying DP-NI and GDP techniques, respectively. However, upon applying the DP-NC defense mechanism, the accuracy in both cases improved to approximately 70%. Furthermore, employing DP-NC defense against DP-NI and GDP attacks leads to a notable reduction in false positive rates by 45.46% and 7.67%, respectively. Similar results have been obtained in two other datasets, Contagio and Genome. These results underscore the effectiveness of DP-NC in enhancing the robustness of deep learning-based Android malware classifiers against adversarial attacks.</p></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":null,"pages":null},"PeriodicalIF":4.8,"publicationDate":"2024-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141985169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A privacy-aware authentication and usage-controlled access protocol for IIoT decentralized data marketplace 面向物联网分散数据市场的隐私感知认证和使用受控访问协议
IF 4.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-08 DOI: 10.1016/j.cose.2024.104050

Data is ubiquitous, powerful and valuable today. With vast instalments of Industrial Internet-of-Things (IIoT) infrastructure, data is in abundance albeit sitting in organizational silos. Data Marketplaces have emerged to allow monetization of data by trading it with interested buyers. While centralized marketplaces are common, they are controlled by few and are non-transparent. Decentralized data marketplaces allow the democratization of rates, trading terms and fine control to participants. However, in such a marketplace, ensuring privacy and security is crucial. Existing data exchange schemes depend on a trusted third party for key management during authentication and rely on a ‘one-time-off’ approach to authorization. This paper proposes a user-empowered, privacy-aware, authentication and usage-controlled access protocol for IIoT data marketplace. The proposed protocol leverages the concept of Self-Sovereign Identity (SSI) and is based on the standards of Decentralized Identifier (DID) and Verifiable Credential (VC). DIDs empower buyers and give them complete control over their identities. The buyers authenticate and prove claims to access data securely using VC. The proposed protocol also implements a dynamic user-revocation policy. Usage-controlled based access provides secure ongoing authorization during data exchange. A detailed performance and security analysis is provided to show its feasibility.

如今,数据无处不在、功能强大且价值不菲。随着工业物联网(IIoT)基础设施的大量投入使用,尽管数据还处于组织孤岛状态,但数据已经非常丰富。数据市场应运而生,通过与感兴趣的买家进行交易,实现数据货币化。虽然集中式市场很常见,但它们由少数人控制,而且不透明。去中心化的数据市场可以使费率、交易条款和对参与者的精细控制民主化。然而,在这样的市场中,确保隐私和安全至关重要。现有的数据交换方案在验证过程中依赖于可信的第三方进行密钥管理,并依赖于 "一次性 "授权方法。本文为物联网数据市场提出了一种用户授权、隐私感知、身份验证和使用受控的访问协议。所提出的协议利用了自主身份(SSI)概念,并基于去中心化标识符(DID)和可验证凭证(VC)标准。DID 赋予买方权力,让他们完全控制自己的身份。买方使用 VC 验证和证明其主张,以安全地访问数据。拟议的协议还实施了动态用户撤销政策。基于使用控制的访问可在数据交换过程中提供安全的持续授权。详细的性能和安全分析表明了该协议的可行性。
{"title":"A privacy-aware authentication and usage-controlled access protocol for IIoT decentralized data marketplace","authors":"","doi":"10.1016/j.cose.2024.104050","DOIUrl":"10.1016/j.cose.2024.104050","url":null,"abstract":"<div><p>Data is ubiquitous, powerful and valuable today. With vast instalments of Industrial Internet-of-Things (IIoT) infrastructure, data is in abundance albeit sitting in organizational silos. Data Marketplaces have emerged to allow monetization of data by trading it with interested buyers. While centralized marketplaces are common, they are controlled by few and are non-transparent. Decentralized data marketplaces allow the democratization of rates, trading terms and fine control to participants. However, in such a marketplace, ensuring privacy and security is crucial. Existing data exchange schemes depend on a trusted third party for key management during authentication and rely on a ‘one-time-off’ approach to authorization. This paper proposes a user-empowered, privacy-aware, authentication and usage-controlled access protocol for IIoT data marketplace. The proposed protocol leverages the concept of Self-Sovereign Identity (SSI) and is based on the standards of Decentralized Identifier (DID) and Verifiable Credential (VC). DIDs empower buyers and give them complete control over their identities. The buyers authenticate and prove claims to access data securely using VC. The proposed protocol also implements a dynamic user-revocation policy. Usage-controlled based access provides secure ongoing authorization during data exchange. A detailed performance and security analysis is provided to show its feasibility.</p></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":null,"pages":null},"PeriodicalIF":4.8,"publicationDate":"2024-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0167404824003559/pdfft?md5=4bcaa81538fe727188ac85b3de1115a4&pid=1-s2.0-S0167404824003559-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142002275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoTPredictor: A security framework for predicting IoT device behaviours and detecting malicious devices against cyber attacks IoTPredictor:用于预测物联网设备行为和检测恶意设备以防范网络攻击的安全框架
IF 4.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-08 DOI: 10.1016/j.cose.2024.104037

Securing Internet of Things (IoT) devices is paramount to mitigate unauthorised access and potential cyber threats, safeguarding the integrity of transmitted and processed data within interconnected devices. Identifying malicious IoT devices necessitates vigilant monitoring of network traffic, behaviour analysis, and implementing security measures, including Anomaly Detection Systems (ADSs), Intrusion Detection Systems (IDSs), and regular firmware updates. Traditional security approaches need to be revised for safeguarding IoT systems due to their inherent limitations in accommodating the resource-constrained nature of these devices.

We introduce IoTPredictor, an advanced security approach designed to predict and detect malicious activities in IoT devices. Leveraging Hidden Markov Models (HMMs), IoTPredictor integrates an ADS to proactively detect and thwart attacks within the complex IoT-fog computing landscape. Our conceptual approach begins with categorising IoT devices into genuine, compromised, and counterfeit. We propose an HMM-based state transition model that captures potential transitions between states, such as normal, compromised, or counterfeit operations. We introduce an algorithm for estimating probabilities associated with next-state predictions to facilitate predictive analysis. Furthermore, we present a formal approach for analysing communications between different states, enhancing the precision of the security framework. To validate the effectiveness of IoTPredictor, we conduct a series of experiments and provide a comprehensive evaluation. The results demonstrate the robustness and efficiency of our proposed security framework in predicting and preventing malicious activities, thereby contributing to the overall security enhancement of IoT devices within the complex IoT-fog computing network.

确保物联网(IoT)设备的安全,对于减少未经授权的访问和潜在的网络威胁、保障互联设备内传输和处理数据的完整性至关重要。要识别恶意物联网设备,就必须对网络流量进行警惕性监控、行为分析并实施安全措施,包括异常检测系统 (ADS)、入侵检测系统 (IDS) 和定期固件更新。传统的安全方法在保护物联网系统方面存在固有的局限性,无法适应这些设备资源受限的特性,因此需要对这些方法进行修改。利用隐马尔可夫模型(HMMs),IoTPredictor 集成了一个 ADS,可在复杂的物联网雾计算环境中主动检测和挫败攻击。我们的概念方法首先是将物联网设备分为真品、受损和仿冒品。我们提出了基于 HMM 的状态转换模型,该模型可捕捉状态之间的潜在转换,如正常、受损或伪造操作。我们引入了一种算法,用于估算与下一状态预测相关的概率,以促进预测分析。此外,我们还提出了一种分析不同状态之间通信的正式方法,从而提高了安全框架的精确度。为了验证 IoTPredictor 的有效性,我们进行了一系列实验并提供了综合评估。结果证明了我们提出的安全框架在预测和预防恶意活动方面的稳健性和高效性,从而有助于在复杂的物联网雾计算网络中全面提高物联网设备的安全性。
{"title":"IoTPredictor: A security framework for predicting IoT device behaviours and detecting malicious devices against cyber attacks","authors":"","doi":"10.1016/j.cose.2024.104037","DOIUrl":"10.1016/j.cose.2024.104037","url":null,"abstract":"<div><p>Securing Internet of Things (IoT) devices is paramount to mitigate unauthorised access and potential cyber threats, safeguarding the integrity of transmitted and processed data within interconnected devices. Identifying malicious IoT devices necessitates vigilant monitoring of network traffic, behaviour analysis, and implementing security measures, including Anomaly Detection Systems (ADSs), Intrusion Detection Systems (IDSs), and regular firmware updates. Traditional security approaches need to be revised for safeguarding IoT systems due to their inherent limitations in accommodating the resource-constrained nature of these devices.</p><p>We introduce <em>IoTPredictor</em>, an advanced security approach designed to predict and detect malicious activities in IoT devices. Leveraging Hidden Markov Models (HMMs), <em>IoTPredictor</em> integrates an ADS to proactively detect and thwart attacks within the complex IoT-fog computing landscape. Our conceptual approach begins with categorising IoT devices into genuine, compromised, and counterfeit. We propose an HMM-based state transition model that captures potential transitions between states, such as normal, compromised, or counterfeit operations. We introduce an algorithm for estimating probabilities associated with next-state predictions to facilitate predictive analysis. Furthermore, we present a formal approach for analysing communications between different states, enhancing the precision of the security framework. To validate the effectiveness of <em>IoTPredictor</em>, we conduct a series of experiments and provide a comprehensive evaluation. The results demonstrate the robustness and efficiency of our proposed security framework in predicting and preventing malicious activities, thereby contributing to the overall security enhancement of IoT devices within the complex IoT-fog computing network.</p></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":null,"pages":null},"PeriodicalIF":4.8,"publicationDate":"2024-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0167404824003420/pdfft?md5=157c55c24e672dac3c64152d41a0f049&pid=1-s2.0-S0167404824003420-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141964023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Like teacher, like pupil: Transferring backdoors via feature-based knowledge distillation 有其师必有其徒:通过基于特征的知识提炼转移后门
IF 4.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-08 DOI: 10.1016/j.cose.2024.104041

With the widespread adoption of edge computing, compressing deep neural networks (DNNs) via knowledge distillation (KD) has emerged as a popular technique for resource-limited scenarios. Among various KD methods, feature-based KD, which leverages the feature representations from intermediate layers of the teacher model to supervise the training of the student model, has shown superior performance and enjoyed wide application. However, users often overlook potential backdoor threats when using knowledge distillation (KD) to extract knowledge. To address the issue, this paper mainly contributes to three aspects: (1) we try the first step of exploring the security risks in feature-based KD, where implanted backdoors in teacher models can survive and transfer to student models. (2) We propose a backdoor attack method targeting feature distillation, achieved by encoding backdoor knowledge into specific neuron activation layers. Specifically, we optimize triggers to induce consistent feature map values in the teacher model and transfer the backdoor knowledge to student models through these features. We also design an adaptive defense method against this attack. (3) Extensive experiments on four common datasets and six sets of different teacher and student models validate that our attack outperforms the state-of-the-art (SOTA) baselines, with an average attack success rate of (×1.5). Additionally, we discuss effective defense methods against such backdoor attacks.

随着边缘计算的广泛应用,通过知识提炼(KD)压缩深度神经网络(DNN)已成为资源有限场景下的一种流行技术。在各种知识蒸馏方法中,基于特征的知识蒸馏(利用教师模型中间层的特征表示来监督学生模型的训练)表现出了卓越的性能,并得到了广泛的应用。然而,用户在使用知识提炼(KD)提取知识时往往会忽视潜在的后门威胁。针对这一问题,本文主要从三个方面进行了探讨:(1)我们首先尝试探索了基于特征的知识提炼中的安全风险,即教师模型中植入的后门会存活并转移到学生模型中。(2)我们提出了一种针对特征提炼的后门攻击方法,通过将后门知识编码到特定的神经元激活层来实现。具体来说,我们通过优化触发器来诱导教师模型中一致的特征图值,并通过这些特征将后门知识转移到学生模型中。我们还设计了一种针对这种攻击的自适应防御方法。(3) 在四个常见数据集和六组不同的教师和学生模型上进行的大量实验验证了我们的攻击优于最先进的(SOTA)基线,平均攻击成功率为(∼×1.5)。此外,我们还讨论了针对此类后门攻击的有效防御方法。
{"title":"Like teacher, like pupil: Transferring backdoors via feature-based knowledge distillation","authors":"","doi":"10.1016/j.cose.2024.104041","DOIUrl":"10.1016/j.cose.2024.104041","url":null,"abstract":"<div><p>With the widespread adoption of edge computing, compressing deep neural networks (DNNs) via knowledge distillation (KD) has emerged as a popular technique for resource-limited scenarios. Among various KD methods, feature-based KD, which leverages the feature representations from intermediate layers of the teacher model to supervise the training of the student model, has shown superior performance and enjoyed wide application. However, users often overlook potential backdoor threats when using knowledge distillation (KD) to extract knowledge. To address the issue, this paper mainly contributes to three aspects: (1) we try the first step of exploring the security risks in feature-based KD, where implanted backdoors in teacher models can survive and transfer to student models. (2) We propose a backdoor attack method targeting feature distillation, achieved by encoding backdoor knowledge into specific neuron activation layers. Specifically, we optimize triggers to induce consistent feature map values in the teacher model and transfer the backdoor knowledge to student models through these features. We also design an adaptive defense method against this attack. (3) Extensive experiments on four common datasets and six sets of different teacher and student models validate that our attack outperforms the state-of-the-art (SOTA) baselines, with an average attack success rate of (<span><math><mrow><mo>∼</mo><mo>×</mo><mn>1</mn><mo>.</mo><mn>5</mn></mrow></math></span>). Additionally, we discuss effective defense methods against such backdoor attacks.</p></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":null,"pages":null},"PeriodicalIF":4.8,"publicationDate":"2024-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142047864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computers & Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1