首页 > 最新文献

信息安全(英文)最新文献

英文 中文
Measuring the Impact of DoS Attack on Availability: Empirical Study Based on Accessibility 度量DoS攻击对可用性的影响:基于可访问性的实证研究
Pub Date : 2022-01-01 DOI: 10.4236/jis.2022.132004
Suhail Qadir, Uzair Bashir
Information Security is determined by three well know security parameters i.e. Confidentiality, Integrity and Availability. Availability is an important pillar when it comes to security of an information system. It is dependent upon the reliability, timeliness and accessibility of the Information System. This paper presents an analytical view of the fact that when Accessibility is degraded during the presence of an ongoing attack, the other factors reliability and timeliness can also get affected, therefore creating a degrading impact on the overall Availability of the system, which eventually leads to the Denial of Service Attack and therefore affecting the security of the System.
信息安全由三个众所周知的安全参数决定,即机密性、完整性和可用性。当谈到信息系统的安全性时,可用性是一个重要的支柱。这取决于信息系统的可靠性、及时性和可及性。本文分析了当可访问性在持续攻击期间降级时,其他因素的可靠性和及时性也会受到影响,从而对系统的整体可用性产生降级影响,最终导致拒绝服务攻击,从而影响系统的安全性。
{"title":"Measuring the Impact of DoS Attack on Availability: Empirical Study Based on Accessibility","authors":"Suhail Qadir, Uzair Bashir","doi":"10.4236/jis.2022.132004","DOIUrl":"https://doi.org/10.4236/jis.2022.132004","url":null,"abstract":"Information Security is determined by three well know security parameters i.e. Confidentiality, Integrity and Availability. Availability is an important pillar when it comes to security of an information system. It is dependent upon the reliability, timeliness and accessibility of the Information System. This paper presents an analytical view of the fact that when Accessibility is degraded during the presence of an ongoing attack, the other factors reliability and timeliness can also get affected, therefore creating a degrading impact on the overall Availability of the system, which eventually leads to the Denial of Service Attack and therefore affecting the security of the System.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70334742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Analysis of a Privacy-Preserving Identity-Based Encryption Architecture 一种保护隐私的基于身份的加密体系结构的安全性分析
Pub Date : 2022-01-01 DOI: 10.4236/jis.2022.134018
C. Adams
Identity-Based Encryption (IBE) has seen limited adoption, largely due to the absolute trust that must be placed in the private key generator (PKG)—an authority that computes the private keys for all the users in the environment. Several constructions have been proposed to reduce the trust required in the PKG (and thus preserve the privacy of users), but these have generally relied on unrealistic assumptions regarding non-collusion between various entities in the system. Unfortunately, these constructions have not significantly improved IBE adoption rates in real-world environments. In this paper, we present a construction that reduces trust in the PKG without unrealistic non-collusion assumptions. We achieve this by incorporating a novel combination of digital credential technology and bilinear maps, and making use of multiple random-ly-chosen entities to complete certain tasks. The main result and primary contri-bution of this paper are a thorough security analysis of this proposed construction, examining the various entity types, attacker models, and collusion oppor-tunities in this environment. We show that this construction can prevent, or at least mitigate, all considered attacks. We conclude that our construction ap-pears to be effective in preserving user privacy and we hope that this construction and its security analysis will encourage greater use of IBE in real-world environments.
基于身份的加密(IBE)的采用有限,这主要是由于必须对私钥生成器(PKG)给予绝对信任——一个为环境中所有用户计算私钥的权威机构。已经提出了几种结构来减少PKG中所需的信任(从而保护用户的隐私),但这些通常依赖于关于系统中各个实体之间不串通的不切实际的假设。不幸的是,这些结构并没有显著提高IBE在实际环境中的采用率。在本文中,我们提出了一种结构,可以在不存在不切实际的非合谋假设的情况下降低PKG中的信任。我们通过结合数字凭证技术和双线性地图的新颖组合来实现这一目标,并利用多个随机选择的实体来完成某些任务。本文的主要成果和主要贡献是对该提议的结构进行了全面的安全分析,检查了该环境中的各种实体类型、攻击者模型和合谋机会。我们展示了这种构造可以防止,或者至少减轻所有被认为的攻击。我们得出的结论是,我们的构造在保护用户隐私方面似乎是有效的,我们希望这种构造及其安全性分析将鼓励在实际环境中更多地使用IBE。
{"title":"Security Analysis of a Privacy-Preserving Identity-Based Encryption Architecture","authors":"C. Adams","doi":"10.4236/jis.2022.134018","DOIUrl":"https://doi.org/10.4236/jis.2022.134018","url":null,"abstract":"Identity-Based Encryption (IBE) has seen limited adoption, largely due to the absolute trust that must be placed in the private key generator (PKG)—an authority that computes the private keys for all the users in the environment. Several constructions have been proposed to reduce the trust required in the PKG (and thus preserve the privacy of users), but these have generally relied on unrealistic assumptions regarding non-collusion between various entities in the system. Unfortunately, these constructions have not significantly improved IBE adoption rates in real-world environments. In this paper, we present a construction that reduces trust in the PKG without unrealistic non-collusion assumptions. We achieve this by incorporating a novel combination of digital credential technology and bilinear maps, and making use of multiple random-ly-chosen entities to complete certain tasks. The main result and primary contri-bution of this paper are a thorough security analysis of this proposed construction, examining the various entity types, attacker models, and collusion oppor-tunities in this environment. We show that this construction can prevent, or at least mitigate, all considered attacks. We conclude that our construction ap-pears to be effective in preserving user privacy and we hope that this construction and its security analysis will encourage greater use of IBE in real-world environments.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70334966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Knowledge Management Strategy for Handling Cyber Attacks in E-Commerce with Computer Security Incident Response Team (CSIRT) 与电脑保安事故应变小组(CSIRT)合作处理电子贸易网络攻击的知识管理策略
Pub Date : 2022-01-01 DOI: 10.4236/jis.2022.134016
Fauziyah Fauziyah, Zhao Wang, Gabriel Joy
{"title":"Knowledge Management Strategy for Handling Cyber Attacks in E-Commerce with Computer Security Incident Response Team (CSIRT)","authors":"Fauziyah Fauziyah, Zhao Wang, Gabriel Joy","doi":"10.4236/jis.2022.134016","DOIUrl":"https://doi.org/10.4236/jis.2022.134016","url":null,"abstract":"","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70334958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Economics of Sharing Unclassified Cyber Threat Intelligence by Government Agencies and Departments 政府机构和部门共享非机密网络威胁情报的经济学
Pub Date : 2022-01-01 DOI: 10.4236/jis.2022.133006
J. Dykstra, Lawrence A. Gordon, Martin P. Loeb, Lei Zhou
{"title":"The Economics of Sharing Unclassified Cyber Threat Intelligence by Government Agencies and Departments","authors":"J. Dykstra, Lawrence A. Gordon, Martin P. Loeb, Lei Zhou","doi":"10.4236/jis.2022.133006","DOIUrl":"https://doi.org/10.4236/jis.2022.133006","url":null,"abstract":"","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70334763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Authoritative and Unbiased Responses to Geographic Queries 对地理查询的权威和公正的回应
Pub Date : 2022-01-01 DOI: 10.4236/jis.2022.133007
M. Ramkumar, Naresh Adhikari
{"title":"Authoritative and Unbiased Responses to Geographic Queries","authors":"M. Ramkumar, Naresh Adhikari","doi":"10.4236/jis.2022.133007","DOIUrl":"https://doi.org/10.4236/jis.2022.133007","url":null,"abstract":"","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70334799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On the LWE Cryptosystem with More General Disturbance 具有更一般扰动的LWE密码系统
Pub Date : 2022-01-01 DOI: 10.4236/jis.2022.133008
Zhiyong Zheng, Kun Tian
{"title":"On the LWE Cryptosystem with More General Disturbance","authors":"Zhiyong Zheng, Kun Tian","doi":"10.4236/jis.2022.133008","DOIUrl":"https://doi.org/10.4236/jis.2022.133008","url":null,"abstract":"","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70334810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Systematic Review of Graphical Visual Methods in Honeypot Attack Data Analysis 蜜罐攻击数据分析中图形可视化方法的系统综述
Pub Date : 2022-01-01 DOI: 10.4236/jis.2022.134012
Gbenga Ikuomenisan, Y. Morgan
{"title":"Systematic Review of Graphical Visual Methods in Honeypot Attack Data Analysis","authors":"Gbenga Ikuomenisan, Y. Morgan","doi":"10.4236/jis.2022.134012","DOIUrl":"https://doi.org/10.4236/jis.2022.134012","url":null,"abstract":"","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70334869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Low-Density Parity-Check Codes: Research Status and Development Direction 低密度奇偶校验码:研究现状与发展方向
Pub Date : 2022-01-01 DOI: 10.4236/jis.2022.134014
Jie Xu, Zhiyong Zheng, Kun Tian
{"title":"Low-Density Parity-Check Codes: Research Status and Development Direction","authors":"Jie Xu, Zhiyong Zheng, Kun Tian","doi":"10.4236/jis.2022.134014","DOIUrl":"https://doi.org/10.4236/jis.2022.134014","url":null,"abstract":"","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70334921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Study on the Instability of Information Systems and Security Risks in the Public Administration: Case of Burkina Faso Public Administration 信息系统不稳定性与公共行政安全风险研究——以布基纳法索公共行政为例
Pub Date : 2022-01-01 DOI: 10.4236/jis.2022.132005
Yanogo Kiswendsida Jean Hermann
The purpose of this research is to show the instability and the security risks of the information system in Burkina-Faso public administration. In this paper, witnessing unsatisfactory services such as government messaging (mailer.gov.bf) as well as G-cloud services which are the government cloud were studied. The behavior of user agents on the administration’s IT infra-structures which could expose the information system to security risks was also studied. The expected result shows evidence of the weakness of the public administration information system and provides some recommenda-tion.
本研究的目的是显示布基纳法索公共行政信息系统的不稳定性和安全风险。本文对政府信息服务(mail .gov.bf)和政府云服务G-cloud进行了研究。研究了用户代理在管理IT基础设施上的行为,这些行为可能使信息系统暴露于安全风险中。预期结果显示了公共行政信息系统的不足,并提出了一些建议。
{"title":"Study on the Instability of Information Systems and Security Risks in the Public Administration: Case of Burkina Faso Public Administration","authors":"Yanogo Kiswendsida Jean Hermann","doi":"10.4236/jis.2022.132005","DOIUrl":"https://doi.org/10.4236/jis.2022.132005","url":null,"abstract":"The purpose of this research is to show the instability and the security risks of the information system in Burkina-Faso public administration. In this paper, witnessing unsatisfactory services such as government messaging (mailer.gov.bf) as well as G-cloud services which are the government cloud were studied. The behavior of user agents on the administration’s IT infra-structures which could expose the information system to security risks was also studied. The expected result shows evidence of the weakness of the public administration information system and provides some recommenda-tion.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70334754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Generalization of NTRUEncrypt —Cryptosystem Based on Ideal Lattice 基于理想格的NTRUEncrypt -密码系统的推广
Pub Date : 2022-01-01 DOI: 10.4236/jis.2022.133010
Zhiyong Zheng, Fengxia Liu, Wen-Tzeng Huang, Jie Xu, Kun Tian
{"title":"A Generalization of NTRUEncrypt —Cryptosystem Based on Ideal Lattice","authors":"Zhiyong Zheng, Fengxia Liu, Wen-Tzeng Huang, Jie Xu, Kun Tian","doi":"10.4236/jis.2022.133010","DOIUrl":"https://doi.org/10.4236/jis.2022.133010","url":null,"abstract":"","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70334853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
信息安全(英文)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1