首页 > 最新文献

信息安全(英文)最新文献

英文 中文
A Secure Image Steganography Using Advanced Encryption Standard and Discrete Cosine Transform 基于高级加密标准和离散余弦变换的安全图像隐写
Pub Date : 2019-06-14 DOI: 10.4236/JIS.2019.103007
Ashraful Tauhid, M. Tasnim, Saima Noor, Nuruzzaman Faruqui, M. Yousuf
Cryptography and Steganography are two prominent techniques to obtain secure communication over the shared media like the Internet. Steganography is slightly ahead of cryptography because of its stealthy characteristics. In this paper, a new method has been proposed which combines cryptography and steganography to ensure even more secure communication. The Advanced Encryption Standard (AES) in spatial domain of the carrier/cover image and Least Significant Bit (LSB) replacement in the transformed domain of the same image has been used after performing a Discrete Cosine Transform (DCT) on the pixels. An additional layer of security has been introduced by applying XOR operation on the AES encrypted message with the pixel values of the carrier image. The Peak Signal to Noise Ratio (PSNR) of the proposed algorithm is better than most of the similar algorithms. With better PSNR, the proposed method depicts a three layer of security of the information and error free decryption.
密码学和隐写术是在互联网等共享媒体上获得安全通信的两种突出技术。隐写术由于其隐秘的特性而略微领先于密码学。本文提出了一种将密码学和隐写术相结合的新方法,以确保更安全的通信。在对像素执行离散余弦变换(DCT)之后,使用了载体/覆盖图像的空间域中的高级加密标准(AES)和同一图像的变换域中的最低有效位(LSB)替换。通过对具有载体图像的像素值的AES加密消息应用XOR运算,引入了额外的安全层。该算法的峰值信噪比(PSNR)优于大多数同类算法。由于具有更好的PSNR,该方法描述了信息的三层安全性和无错误解密。
{"title":"A Secure Image Steganography Using Advanced Encryption Standard and Discrete Cosine Transform","authors":"Ashraful Tauhid, M. Tasnim, Saima Noor, Nuruzzaman Faruqui, M. Yousuf","doi":"10.4236/JIS.2019.103007","DOIUrl":"https://doi.org/10.4236/JIS.2019.103007","url":null,"abstract":"Cryptography and Steganography are two prominent techniques to obtain secure communication over the shared media like the Internet. Steganography is slightly ahead of cryptography because of its stealthy characteristics. In this paper, a new method has been proposed which combines cryptography and steganography to ensure even more secure communication. The Advanced Encryption Standard (AES) in spatial domain of the carrier/cover image and Least Significant Bit (LSB) replacement in the transformed domain of the same image has been used after performing a Discrete Cosine Transform (DCT) on the pixels. An additional layer of security has been introduced by applying XOR operation on the AES encrypted message with the pixel values of the carrier image. The Peak Signal to Noise Ratio (PSNR) of the proposed algorithm is better than most of the similar algorithms. With better PSNR, the proposed method depicts a three layer of security of the information and error free decryption.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44665441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Android Security and Its Rooting—A Possible Improvement of Its Security Architecture 安卓系统的安全性及其根源——安全体系结构的可能改进
Pub Date : 2019-04-01 DOI: 10.4236/JIS.2019.102005
Nick Rahimi, J. Nolen, B. Gupta
The advent of technology brought forth a myriad of developments that have streamlined the manner through which people operate. With the growing need to be at the forefront of communication and information, people have resorted to the use of mobile phones with a great percentile preferring android oriented systems. Similarly, the systems are susceptible to the various threats posed by technology with due summations showing that security flaws and unauthorized access to sensitive data pose a huge threat to the overarching efficacy of the android systems. The research presented lays a primal focus on how users can improve intrinsic android features through the use of Google services, rooting, custom kernels and ROM techniques. The research also focused on how Android security features can be improved when using or installing applications. Results indicate that the rooting process is the most conclusive and safest scheme. Summations drawn are indicative of the fact that system security is a moot research topic that requires further research into how it can be improved.
技术的出现带来了无数的发展,简化了人们的操作方式。随着人们越来越需要站在通信和信息的前沿,人们开始使用手机,其中很大一部分人更喜欢面向安卓系统。同样,这些系统容易受到技术带来的各种威胁,适当的总结表明,安全缺陷和未经授权访问敏感数据对安卓系统的总体效能构成了巨大威胁。该研究主要关注用户如何通过使用谷歌服务、生根、自定义内核和ROM技术来改进android的固有功能。这项研究还集中在如何在使用或安装应用程序时改进安卓的安全功能上。结果表明,生根过程是最确定和最安全的方案。得出的总结表明,系统安全性是一个悬而未决的研究课题,需要进一步研究如何改进。
{"title":"Android Security and Its Rooting—A Possible Improvement of Its Security Architecture","authors":"Nick Rahimi, J. Nolen, B. Gupta","doi":"10.4236/JIS.2019.102005","DOIUrl":"https://doi.org/10.4236/JIS.2019.102005","url":null,"abstract":"The advent of technology brought forth a myriad of developments that have streamlined the manner through which people operate. With the growing need to be at the forefront of communication and information, people have resorted to the use of mobile phones with a great percentile preferring android oriented systems. Similarly, the systems are susceptible to the various threats posed by technology with due summations showing that security flaws and unauthorized access to sensitive data pose a huge threat to the overarching efficacy of the android systems. The research presented lays a primal focus on how users can improve intrinsic android features through the use of Google services, rooting, custom kernels and ROM techniques. The research also focused on how Android security features can be improved when using or installing applications. Results indicate that the rooting process is the most conclusive and safest scheme. Summations drawn are indicative of the fact that system security is a moot research topic that requires further research into how it can be improved.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49188651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Associated Risks in Mobile Applications Permissions 移动应用程序权限中的相关风险
Pub Date : 2019-03-26 DOI: 10.4236/JIS.2019.102004
Mohammed Al Jutail, M. Al-Akhras, Abdulaziz A. Albesher
Mobile applications affect user’s privacy based on the granted application’s permissions as attackers exploit mobile application permissions in Android and other mobile operating systems. This research divides permissions based on Google’s classification of dangerous permissions into three groups. The first group contains the permissions that can access user’s private data such as reading call log. The second group contains the permissions that can modify user’s data such as modifying the numbers in contacts. The third group contains the remaining permissions which can track the location, and use the microphone and other sensitive issues that can spy on the user. This research is supported by a study that was conducted on 100 participants in Saudi Arabia to show the level of users’ awareness of associated risks in mobile applications permissions. Associations among the collected data are also analyzed. This research fills the gap in user’s awareness by providing best practices in addition to developing a new mobile application to help users decide whether an application is safe to be installed and used or not. This application is called “Sparrow” and is available in Google Play Store.
攻击者利用Android等移动操作系统的移动应用权限,通过授予应用权限来影响用户的隐私。本研究基于谷歌对危险权限的分类,将权限分为三组。第一组包含可以访问用户的私人数据的权限,例如读取呼叫记录。第二组包含修改用户数据的权限,例如修改联系人中的号码。第三组包含剩余的权限,可以跟踪位置,使用麦克风和其他可以监视用户的敏感问题。这项研究得到了一项研究的支持,该研究对沙特阿拉伯的100名参与者进行了调查,以显示用户对移动应用程序权限相关风险的认识水平。还分析了所收集数据之间的关联。这项研究除了开发新的移动应用程序外,还提供了最佳实践,以帮助用户确定应用程序是否可以安全安装和使用,从而填补了用户意识上的空白。这个应用程序被称为“麻雀”,可在b谷歌Play商店。
{"title":"Associated Risks in Mobile Applications Permissions","authors":"Mohammed Al Jutail, M. Al-Akhras, Abdulaziz A. Albesher","doi":"10.4236/JIS.2019.102004","DOIUrl":"https://doi.org/10.4236/JIS.2019.102004","url":null,"abstract":"Mobile applications affect user’s privacy based on the granted application’s permissions as attackers exploit mobile application permissions in Android and other mobile operating systems. This research divides permissions based on Google’s classification of dangerous permissions into three groups. The first group contains the permissions that can access user’s private data such as reading call log. The second group contains the permissions that can modify user’s data such as modifying the numbers in contacts. The third group contains the remaining permissions which can track the location, and use the microphone and other sensitive issues that can spy on the user. This research is supported by a study that was conducted on 100 participants in Saudi Arabia to show the level of users’ awareness of associated risks in mobile applications permissions. Associations among the collected data are also analyzed. This research fills the gap in user’s awareness by providing best practices in addition to developing a new mobile application to help users decide whether an application is safe to be installed and used or not. This application is called “Sparrow” and is available in Google Play Store.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45648992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Security of Password Hashing in Cloud 云中密码哈希的安全性
Pub Date : 2019-02-28 DOI: 10.4236/jis.2019.102003
P. Kamal
Though the History of using password in computing can be traced back to as far as mid of last century little focus has been implied on how to securely store and retrieve password to authenticate and authorize services to the end users. In this paper the current security of various password hashing schemes that are in use today will be investigated through practical proof of concept-GPU based, password hash dump cracking using the power of cloud computing. We will be providing comparison on different password hashing cracking time using the cloud GPU power in AWS. The focus of this paper is to show the possible use of cloud computing in cracking hash dumps and the way to countermeasures them by using secure hashing algorithm and using complex passwords.
尽管在计算中使用密码的历史可以追溯到上世纪中叶,但很少有人关注如何安全地存储和检索密码,以向最终用户验证和授权服务。在本文中,将通过利用云计算的力量,通过基于GPU的概念验证、密码哈希转储破解,研究当今使用的各种密码哈希方案的当前安全性。我们将使用AWS中的云GPU功能提供不同密码哈希破解时间的比较。本文的重点是展示云计算在破解哈希转储中的可能用途,以及通过使用安全哈希算法和复杂密码来对抗它们的方法。
{"title":"Security of Password Hashing in Cloud","authors":"P. Kamal","doi":"10.4236/jis.2019.102003","DOIUrl":"https://doi.org/10.4236/jis.2019.102003","url":null,"abstract":"Though the History of using password in computing can be traced back to as far as mid of last century little focus has been implied on how to securely store and retrieve password to authenticate and authorize services to the end users. In this paper the current security of various password hashing schemes that are in use today will be investigated through practical proof of concept-GPU based, password hash dump cracking using the power of cloud computing. We will be providing comparison on different password hashing cracking time using the cloud GPU power in AWS. The focus of this paper is to show the possible use of cloud computing in cracking hash dumps and the way to countermeasures them by using secure hashing algorithm and using complex passwords.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46845811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
The Hazards of Misusing the Smart Contract: An AHP Approach to Its Risk 滥用智能合约的危害:一种AHP风险分析方法
Pub Date : 2019-01-23 DOI: 10.4236/jis.2019.101002
Romulo Luciano
This article explores four critical groups of systematic risk embedded in smart contract employment using the analytic hierarchy process (AHP). The four principal risk analysis groups include: 1) transparency in the light of corporate governance 2) IT security 3) contract management automation and 4) legality. The AHP assists both decision-makers and stakeholders alike in the evaluation process essential for identifying potential technological constraints posed within a permissioned blockchain environment using peer-to-peer format in the absence of digital currency. Based upon critical assessment, the AHP methodology enables pairwise comparisons among different features and consequently increases the knowledge regarding these attributes in light of the software’s risk assessment.
本文使用层次分析法(AHP)探讨了智能合约雇佣中嵌入的四个关键系统风险组。四个主要风险分析小组包括:1)公司治理的透明度2)IT安全3)合同管理自动化和4)合法性。AHP在评估过程中帮助决策者和利益相关者,这对于在没有数字货币的情况下使用对等格式识别许可区块链环境中潜在的技术约束至关重要。基于关键评估,AHP方法能够在不同特征之间进行成对比较,从而根据软件的风险评估增加有关这些属性的知识。
{"title":"The Hazards of Misusing the Smart Contract: An AHP Approach to Its Risk","authors":"Romulo Luciano","doi":"10.4236/jis.2019.101002","DOIUrl":"https://doi.org/10.4236/jis.2019.101002","url":null,"abstract":"This article explores four critical groups of systematic risk embedded in smart contract employment using the analytic hierarchy process (AHP). The four principal risk analysis groups include: 1) transparency in the light of corporate governance 2) IT security 3) contract management automation and 4) legality. The AHP assists both decision-makers and stakeholders alike in the evaluation process essential for identifying potential technological constraints posed within a permissioned blockchain environment using peer-to-peer format in the absence of digital currency. Based upon critical assessment, the AHP methodology enables pairwise comparisons among different features and consequently increases the knowledge regarding these attributes in light of the software’s risk assessment.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44310516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Implementation of Network Intrusion Detection System Using Soft Computing Algorithms (Self Organizing Feature Map and Genetic Algorithm) 利用软计算算法(自组织特征映射和遗传算法)实现网络入侵检测系统
Pub Date : 2019-01-01 DOI: 10.4236/JIS.2019.101001
J. T. Hounsou, Thierry Nsabimana, Jules Degila
In today’s world, computer network is evolving very rapidly. Most public or/and private companies set up their own local networks system for the purpose of promoting communication and data sharing within the companies. Unfortunately, their data and local networks system are under risks. With the advanced computer networks, the unauthorized users attempt to access their local networks system so as to compromise the integrity, confidentiality and availability of resources. Multiple methods and approaches have to be applied to protect their data and local networks system against malicious attacks. The main aim of our paper is to provide an intrusion detection system based on soft computing algorithms such as Self Organizing Feature Map Artificial Neural Network and Genetic Algorithm to network intrusion detection system. KDD Cup 99 and 1998 DARPA dataset were employed for training and testing the intrusion detection rules. However, GA’s traditional Fitness Function was improved in order to evaluate the efficiency and effectiveness of the algorithm in classifying network attacks from KDD Cup 99 and 1998 DARPA dataset. SOFM ANN and GA training parameters were discussed and implemented for performance evaluation. The experimental results demonstrated that SOFM ANN achieved better performance than GA, where in SOFM ANN high attack detection rate is 99.98%, 99.89%, 100%, 100%, 100% and low false positive rate is 0.01%, 0.1%, 0%, 0%, 0% for DoS, R2L, Probe, U2R attacks, and Normal traffic respectively.
当今世界,计算机网络发展非常迅速。大多数公营或/及私营公司都设立了自己的本地网络系统,以促进公司内部的通讯和数据共享。不幸的是,他们的数据和本地网络系统处于危险之中。随着先进的计算机网络,未经授权的用户试图访问本地网络系统,从而损害资源的完整性、保密性和可用性。必须采用多种方法和途径来保护他们的数据和本地网络系统免受恶意攻击。本文的主要目的是为网络入侵检测系统提供一种基于自组织特征映射、人工神经网络和遗传算法等软计算算法的入侵检测系统。采用KDD Cup 99和1998年DARPA数据集训练和测试入侵检测规则。然而,为了评估算法对KDD Cup 99和1998 DARPA数据集的网络攻击分类的效率和有效性,对遗传算法的传统适应度函数进行了改进。讨论并实现了SOFM、ANN和GA训练参数的性能评价。实验结果表明,SOFM神经网络的性能优于遗传算法,SOFM神经网络对DoS攻击、R2L攻击、Probe攻击、U2R攻击和Normal流量的高检测率分别为99.98%、99.89%、100%、100%、100%,低误报率分别为0.01%、0.1%、0%、0%、0%。
{"title":"Implementation of Network Intrusion Detection System Using Soft Computing Algorithms (Self Organizing Feature Map and Genetic Algorithm)","authors":"J. T. Hounsou, Thierry Nsabimana, Jules Degila","doi":"10.4236/JIS.2019.101001","DOIUrl":"https://doi.org/10.4236/JIS.2019.101001","url":null,"abstract":"In today’s world, computer network is evolving very rapidly. Most public or/and private companies set up their own local networks system for the purpose of promoting communication and data sharing within the companies. Unfortunately, their data and local networks system are under risks. With the advanced computer networks, the unauthorized users attempt to access their local networks system so as to compromise the integrity, confidentiality and availability of resources. Multiple methods and approaches have to be applied to protect their data and local networks system against malicious attacks. The main aim of our paper is to provide an intrusion detection system based on soft computing algorithms such as Self Organizing Feature Map Artificial Neural Network and Genetic Algorithm to network intrusion detection system. KDD Cup 99 and 1998 DARPA dataset were employed for training and testing the intrusion detection rules. However, GA’s traditional Fitness Function was improved in order to evaluate the efficiency and effectiveness of the algorithm in classifying network attacks from KDD Cup 99 and 1998 DARPA dataset. SOFM ANN and GA training parameters were discussed and implemented for performance evaluation. The experimental results demonstrated that SOFM ANN achieved better performance than GA, where in SOFM ANN high attack detection rate is 99.98%, 99.89%, 100%, 100%, 100% and low false positive rate is 0.01%, 0.1%, 0%, 0%, 0% for DoS, R2L, Probe, U2R attacks, and Normal traffic respectively.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70334656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Ontology-Based Cyber Security Policy Implementation in Saudi Arabia 基于本体论的沙特阿拉伯网络安全政策实施
Pub Date : 2018-10-26 DOI: 10.4236/jis.2018.94021
A. M. Talib, Fahad Omar Alomary, H. Alwadi, Rawan Albusayli
Cyber security is an important element of national security and the safekeeping of a nation’s constituency and assets. In Saudi Arabia, the point of interest on cyber security is particularly outstanding due to the fact that Saudi Arabia has a highly cyber attacks all over the Arab countries. This paper displays on contemporary studies done in Saudi Arabia in regards to cyber security policy coverage. The point of interest of this paper is the use of ontology to identify and suggest a formal, encoded description of the cyber security strategic environment, and propose the development of ontology to be able to permit the implementation of the sort of policy. The intention of the ontology is to become aware of and constitute the multi-layered company of gamers and their related roles and obligations within the cyber security environment. This could make contributions in large part to the improvement, implementation and rollout of a country wide cyber security policy in Saudi Arabia.
网络安全是国家安全以及国家选区和资产安全的重要组成部分。在沙特阿拉伯,由于沙特阿拉伯在整个阿拉伯国家都有高度的网络攻击,因此对网络安全的关注点尤为突出。本文展示了沙特阿拉伯在网络安全政策覆盖方面进行的当代研究。本文的兴趣点是使用本体来识别和建议网络安全战略环境的形式化、编码化描述,并提出本体的开发,以允许该类策略的实施。本体论的目的是意识到并构成游戏玩家的多层公司,以及他们在网络安全环境中的相关角色和义务。这在很大程度上有助于沙特阿拉伯改进、实施和推出全国范围的网络安全政策。
{"title":"Ontology-Based Cyber Security Policy Implementation in Saudi Arabia","authors":"A. M. Talib, Fahad Omar Alomary, H. Alwadi, Rawan Albusayli","doi":"10.4236/jis.2018.94021","DOIUrl":"https://doi.org/10.4236/jis.2018.94021","url":null,"abstract":"Cyber security is an important element of national security and the safekeeping of a nation’s constituency and assets. In Saudi Arabia, the point of interest on cyber security is particularly outstanding due to the fact that Saudi Arabia has a highly cyber attacks all over the Arab countries. This paper displays on contemporary studies done in Saudi Arabia in regards to cyber security policy coverage. The point of interest of this paper is the use of ontology to identify and suggest a formal, encoded description of the cyber security strategic environment, and propose the development of ontology to be able to permit the implementation of the sort of policy. The intention of the ontology is to become aware of and constitute the multi-layered company of gamers and their related roles and obligations within the cyber security environment. This could make contributions in large part to the improvement, implementation and rollout of a country wide cyber security policy in Saudi Arabia.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43868006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
SecSPS: A Secure and Privacy-Preserving Framework for Smart Parking Systems SecSPS:智能停车系统的安全和隐私保护框架
Pub Date : 2018-10-15 DOI: 10.4236/JIS.2018.94020
Ali Alqazzaz, Ibrahim Alrashdi, E. Aloufi, M. Zohdy, Hua Ming
Smart parking systems are a crucial component of the “smart city” concept, especially in the age of the Internet of Things (IoT). They aim to take the stress out of finding a vacant parking spot in city centers, due to the increasing number of cars, especially during peak hours. To realize the concept of smart parking, IoT-enabling technologies must be utilized, as the traditional way of developing smart parking solutions entails a lack of scalability, compatibility with IoT-constrained devices, security, and privacy awareness. In this paper, we propose a secure and privacy-preserving framework for smart parking systems. The framework relies on the publish/subscribe communication model for exchanging a huge volume of data with a large number of clients. On one hand, it provides functional services, including parking vacancy detection, real-time information for drivers about parking availability, driver guidance, and parking reservation. On the other hand, it provides security approaches on both the network and application layers. In addition, it supports mutual authentication mechanisms between entities to ensure device/ data authenticity, and provide security protection for users. That makes our proposed framework resilient to various types of security attacks, such as replay, phishing, and man-in-the-middle attacks. Finally, we analyze the performance of our framework, which is suitable for IoT devices, in terms of computation and network overhead.
智能停车系统是“智慧城市”概念的重要组成部分,特别是在物联网(IoT)时代。他们的目标是减轻在市中心找停车位的压力,因为汽车数量不断增加,尤其是在高峰时段。为了实现智能停车的概念,必须利用支持物联网的技术,因为开发智能停车解决方案的传统方式缺乏可扩展性、与物联网受限设备的兼容性、安全性和隐私意识。在本文中,我们提出了一个安全且隐私保护的智能停车系统框架。该框架依赖于发布/订阅通信模型来与大量客户端交换大量数据。一方面,提供车位空缺检测、实时车位信息、驾驶员引导、车位预约等功能服务;另一方面,它提供了网络层和应用层的安全方法。同时支持实体之间的相互认证机制,保证设备/数据的真实性,为用户提供安全保护。这使得我们提出的框架能够抵御各种类型的安全攻击,例如重播、网络钓鱼和中间人攻击。最后,我们从计算和网络开销方面分析了我们的框架的性能,该框架适用于物联网设备。
{"title":"SecSPS: A Secure and Privacy-Preserving Framework for Smart Parking Systems","authors":"Ali Alqazzaz, Ibrahim Alrashdi, E. Aloufi, M. Zohdy, Hua Ming","doi":"10.4236/JIS.2018.94020","DOIUrl":"https://doi.org/10.4236/JIS.2018.94020","url":null,"abstract":"Smart parking systems are a crucial component of the “smart city” concept, especially in the age of the Internet of Things (IoT). They aim to take the stress out of finding a vacant parking spot in city centers, due to the increasing number of cars, especially during peak hours. To realize the concept of smart parking, IoT-enabling technologies must be utilized, as the traditional way of developing smart parking solutions entails a lack of scalability, compatibility with IoT-constrained devices, security, and privacy awareness. In this paper, we propose a secure and privacy-preserving framework for smart parking systems. The framework relies on the publish/subscribe communication model for exchanging a huge volume of data with a large number of clients. On one hand, it provides functional services, including parking vacancy detection, real-time information for drivers about parking availability, driver guidance, and parking reservation. On the other hand, it provides security approaches on both the network and application layers. In addition, it supports mutual authentication mechanisms between entities to ensure device/ data authenticity, and provide security protection for users. That makes our proposed framework resilient to various types of security attacks, such as replay, phishing, and man-in-the-middle attacks. Finally, we analyze the performance of our framework, which is suitable for IoT devices, in terms of computation and network overhead.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48679166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Generating Rule-Based Signatures for Detecting Polymorphic Variants Using Data Mining and Sequence Alignment Approaches 使用数据挖掘和序列比对方法生成用于检测多态变体的基于规则的签名
Pub Date : 2018-10-11 DOI: 10.4236/JIS.2018.94019
Vijay Naidu, Jacqueline L. Whalley, A. Narayanan
Antiviral software systems (AVSs) have problems in detecting polymorphic variants of viruses without specific signatures for such variants. Previous alignment-based approaches for automatic signature extraction have shown how signatures can be generated from consensuses found in polymorphic variant code. Such sequence alignment approaches required variable length viral code to be extended through gap insertions into much longer equal length code for signature extraction through data mining of consensuses. Non-nested generalized exemplars (NNge) are used in this paper in an attempt to further improve the automatic detection of polymorphic variants. The important contribution of this paper is to compare a variable length data mining technique using viral source code to the previously used equal length data mining technique obtained through sequence alignment. This comparison was achieved by conducting three different experiments (i.e. Experiments I-III). Although Experiments I and II generated unique and effective syntactic signatures, Experiment III generated the most effective signatures with an average detection rate of over 93%. The implications are that future, syntactic-based smart AVSs may be able to generate effective signatures automatically from malware code by adopting data mining and alignment techniques to cover for both known and unknown polymorphic variants and without the need for semantic (run-time) analysis.
反病毒软件系统(AVS)在检测病毒的多态变体时存在问题,而没有针对这些变体的特定签名。以前用于自动签名提取的基于比对的方法已经表明了如何从多态变体代码中发现的一致性中生成签名。这种序列比对方法需要通过间隙插入将可变长度的病毒代码扩展到更长的等长代码中,以便通过共识的数据挖掘提取签名。本文使用了非嵌套广义样本(NNge),试图进一步改进多态变体的自动检测。本文的重要贡献是将使用病毒源代码的可变长度数据挖掘技术与以前使用的通过序列比对获得的等长数据挖掘技术进行比较。这种比较是通过进行三个不同的实验(即实验i-III)来实现的。尽管实验一和实验二产生了独特有效的句法签名,但实验三产生了最有效的签名,平均检测率超过93%。其含义是,通过采用数据挖掘和对齐技术来覆盖已知和未知的多态变体,未来基于句法的智能AVS可能能够从恶意软件代码中自动生成有效的签名,而无需进行语义(运行时)分析。
{"title":"Generating Rule-Based Signatures for Detecting Polymorphic Variants Using Data Mining and Sequence Alignment Approaches","authors":"Vijay Naidu, Jacqueline L. Whalley, A. Narayanan","doi":"10.4236/JIS.2018.94019","DOIUrl":"https://doi.org/10.4236/JIS.2018.94019","url":null,"abstract":"Antiviral software systems (AVSs) have problems in detecting polymorphic variants of viruses without specific signatures for such variants. Previous alignment-based approaches for automatic signature extraction have shown how signatures can be generated from consensuses found in polymorphic variant code. Such sequence alignment approaches required variable length viral code to be extended through gap insertions into much longer equal length code for signature extraction through data mining of consensuses. Non-nested generalized exemplars (NNge) are used in this paper in an attempt to further improve the automatic detection of polymorphic variants. The important contribution of this paper is to compare a variable length data mining technique using viral source code to the previously used equal length data mining technique obtained through sequence alignment. This comparison was achieved by conducting three different experiments (i.e. Experiments I-III). Although Experiments I and II generated unique and effective syntactic signatures, Experiment III generated the most effective signatures with an average detection rate of over 93%. The implications are that future, syntactic-based smart AVSs may be able to generate effective signatures automatically from malware code by adopting data mining and alignment techniques to cover for both known and unknown polymorphic variants and without the need for semantic (run-time) analysis.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42761151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Social Engineering Threat and Defense: A Literature Survey 社会工程的威胁与防御:文献综述
Pub Date : 2018-09-18 DOI: 10.4236/JIS.2018.94018
Islam Abdalla Mohamed Abass
This article surveys the literature on social engineering. There are lots of security application and hardware in market; still there are several methods that can be used to breach the information security defenses of an organization or individual. Social engineering attacks are interested in gaining information that may be used to carry out actions such as identity theft, stealing password or gaining information for another type of attack. The threat lies with the combinations of social engineering with another type of attacks like Phishing and Watering hole attack which make it hard to defense against. This research aims to investigate the impact of modern Social Engineering on the organization or individual. It describes the categories of Social Engineering, and how the attacker takes advantage of human behavior. At the same time, I also discuss the direct and indirect attack of social engineering and the defense mechanism against this attack.
本文综述了有关社会工程的文献。市场上有大量的安全应用和硬件;仍然有几种方法可以用来破坏组织或个人的信息安全防御。社会工程攻击感兴趣的是获取可能用于实施身份盗窃、窃取密码或获取其他类型攻击信息等行动的信息。威胁在于社会工程与另一种类型的攻击相结合,如网络钓鱼和水洞攻击,使其难以防御。本研究旨在探讨现代社会工程对组织或个人的影响。它描述了社会工程的类别,以及攻击者如何利用人类行为。同时,我还讨论了社会工程的直接和间接攻击以及对这种攻击的防御机制。
{"title":"Social Engineering Threat and Defense: A Literature Survey","authors":"Islam Abdalla Mohamed Abass","doi":"10.4236/JIS.2018.94018","DOIUrl":"https://doi.org/10.4236/JIS.2018.94018","url":null,"abstract":"This article surveys the literature on social engineering. There are lots of security application and hardware in market; still there are several methods that can be used to breach the information security defenses of an organization or individual. Social engineering attacks are interested in gaining information that may be used to carry out actions such as identity theft, stealing password or gaining information for another type of attack. The threat lies with the combinations of social engineering with another type of attacks like Phishing and Watering hole attack which make it hard to defense against. This research aims to investigate the impact of modern Social Engineering on the organization or individual. It describes the categories of Social Engineering, and how the attacker takes advantage of human behavior. At the same time, I also discuss the direct and indirect attack of social engineering and the defense mechanism against this attack.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46077424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
期刊
信息安全(英文)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1