首页 > 最新文献

International journal of network security & its applications最新文献

英文 中文
Invertible Neural Network for Inference Pipeline Anomaly Detection 基于可逆神经网络的推理管道异常检测
Pub Date : 2023-09-28 DOI: 10.5121/ijnsa.2023.15501
Malgorzata Schwab, Ashis Biswas
This study combines research in machine learning and system engineering practices to conceptualize a paradigm-enhancing trustworthiness of a machine learning inference pipeline. We explore the topic of reversibility in deep neural networks and introduce its anomaly detection capabilities to build a framework of integrity verification checkpoints across the inference pipeline of a deployed model. We leverage previous findings and principles regarding several types of autoencoders, deep generative maximumlikelihood training and invertibility of neural networks to propose an improved network architecture for anomaly detection. We hypothesize and experimentally confirm that an Invertible Neural Network (INN) trained as a convolutional autoencoder is a superior alternative naturally suited to solve that task. This remarkable INN’s ability to reconstruct data from its compressed representation and to solve inverse problems is then generalized and applied in the field of Trustworthy AI to achieve integrity verification of an inference pipeline through the concept of an INN-based Trusted Neural Network (TNN) nodes placed around the mission critical parts of the system, as well as the end-to-end outcome verification. This work aspires to enhance robustness and reliability of applications employing artificial intelligence, which are playing increasingly noticeable role in highly consequential decision-making processes across many industries and problem domains. INNs are invertible by construction and tractably trained simultaneously in both directions. This feature has untapped potential to improve the explainability of machine learning pipelines in support of their trustworthiness and is a topic of our current studies.
本研究结合机器学习和系统工程实践的研究,概念化了一个范式增强的机器学习推理管道的可信度。我们探讨了深度神经网络中的可逆性主题,并引入了其异常检测功能,以便在部署模型的推理管道上构建完整性验证检查点框架。我们利用先前关于几种类型的自动编码器、深度生成最大似然训练和神经网络可逆性的发现和原则,提出了一种改进的异常检测网络架构。我们假设并通过实验证实,作为卷积自编码器训练的可逆神经网络(INN)是解决该任务的最佳选择。这种非凡的INN从其压缩表示中重构数据并解决逆问题的能力随后被推广并应用于可信人工智能领域,通过放置在系统关键任务部分周围的基于INN的可信神经网络(TNN)节点的概念,以及端到端结果验证,实现推理管道的完整性验证。这项工作旨在提高应用程序的鲁棒性和可靠性,人工智能在许多行业和问题领域的高度重要的决策过程中发挥着越来越显著的作用。INNs的构造是可逆的,并且可以在两个方向上同时训练。该特性在提高机器学习管道的可解释性以支持其可信度方面具有未开发的潜力,并且是我们当前研究的主题。
{"title":"Invertible Neural Network for Inference Pipeline Anomaly Detection","authors":"Malgorzata Schwab, Ashis Biswas","doi":"10.5121/ijnsa.2023.15501","DOIUrl":"https://doi.org/10.5121/ijnsa.2023.15501","url":null,"abstract":"This study combines research in machine learning and system engineering practices to conceptualize a paradigm-enhancing trustworthiness of a machine learning inference pipeline. We explore the topic of reversibility in deep neural networks and introduce its anomaly detection capabilities to build a framework of integrity verification checkpoints across the inference pipeline of a deployed model. We leverage previous findings and principles regarding several types of autoencoders, deep generative maximumlikelihood training and invertibility of neural networks to propose an improved network architecture for anomaly detection. We hypothesize and experimentally confirm that an Invertible Neural Network (INN) trained as a convolutional autoencoder is a superior alternative naturally suited to solve that task. This remarkable INN’s ability to reconstruct data from its compressed representation and to solve inverse problems is then generalized and applied in the field of Trustworthy AI to achieve integrity verification of an inference pipeline through the concept of an INN-based Trusted Neural Network (TNN) nodes placed around the mission critical parts of the system, as well as the end-to-end outcome verification. This work aspires to enhance robustness and reliability of applications employing artificial intelligence, which are playing increasingly noticeable role in highly consequential decision-making processes across many industries and problem domains. INNs are invertible by construction and tractably trained simultaneously in both directions. This feature has untapped potential to improve the explainability of machine learning pipelines in support of their trustworthiness and is a topic of our current studies.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135469964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SPDZ-Based Optimistic Fair Multi-Party Computation Detection 基于spdz的乐观公平多方计算检测
Pub Date : 2023-09-28 DOI: 10.5121/ijnsa.2023.15502
Chung-Li Wang
The fairness of multi-party computation has been investigated for long time. Classic results demonstrate that fair exchange can be achieved by utilizing cryptographic tools, as most of them are based on garbled circuits. For the secret-sharing schemes, such as SPDZ, it may incur significant overhead to simply apply a fair escrow scheme, since it encrypts all the shares of delivered results. To address this issue, we design a twolevel secret-sharing mechanism. The escrow encryption is only for the first level of sharing and performed in preprocessing. The second level of sharing is used for computation and always handled by plaintexts, such that the online phase is still efficient. Our work also employs a semi-trusted third party (TTP) which provide optimistic escrow for output delivery. The verification and delivery procedures prevent the malicious parties from corrupting the outcome or aborting, when there is at least one honest party. Furthermore, the TTP has no knowledge of output, so even if he is malicious and colluding, we only lose fairness. The escrow decryption is needed only when misconduct is detected for opening the first-level shares.
多方计算的公平性问题已经研究了很长时间。经典结果表明,利用加密工具可以实现公平交换,因为大多数加密工具都是基于乱码电路的。对于秘密共享方案,比如SPDZ,简单地应用公平的托管方案可能会产生巨大的开销,因为它会加密交付结果的所有份额。为了解决这个问题,我们设计了一个两级的秘密共享机制。托管加密仅用于第一层共享,并在预处理中执行。第二级共享用于计算,并且总是由明文处理,这样在线阶段仍然是有效的。我们的工作还采用了一个半可信的第三方(TTP),它为输出交付提供了乐观的托管。当至少有一个诚实方存在时,验证和交付过程可以防止恶意方破坏结果或中止。此外,TTP不知道输出,所以即使他恶意串通,我们也只会失去公平。只有当检测到打开第一级共享的不当行为时,才需要托管解密。
{"title":"SPDZ-Based Optimistic Fair Multi-Party Computation Detection","authors":"Chung-Li Wang","doi":"10.5121/ijnsa.2023.15502","DOIUrl":"https://doi.org/10.5121/ijnsa.2023.15502","url":null,"abstract":"The fairness of multi-party computation has been investigated for long time. Classic results demonstrate that fair exchange can be achieved by utilizing cryptographic tools, as most of them are based on garbled circuits. For the secret-sharing schemes, such as SPDZ, it may incur significant overhead to simply apply a fair escrow scheme, since it encrypts all the shares of delivered results. To address this issue, we design a twolevel secret-sharing mechanism. The escrow encryption is only for the first level of sharing and performed in preprocessing. The second level of sharing is used for computation and always handled by plaintexts, such that the online phase is still efficient. Our work also employs a semi-trusted third party (TTP) which provide optimistic escrow for output delivery. The verification and delivery procedures prevent the malicious parties from corrupting the outcome or aborting, when there is at least one honest party. Furthermore, the TTP has no knowledge of output, so even if he is malicious and colluding, we only lose fairness. The escrow decryption is needed only when misconduct is detected for opening the first-level shares.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"157 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135469965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring the Effectiveness of VPN Architecture in Enhancing Network Security for Mobile Networks: An Investigation Study 探索VPN架构在增强移动网络安全方面的有效性:一项调查研究
Pub Date : 2023-09-28 DOI: 10.5121/ijnsa.2023.15503
Khawla Azwee, Mokhtar Alkhattali, Mostafa Dow
The rapid development of technology in communications has transformed the operations of companies and institutions, paving the way for increased productivity, revenue growth, and enhanced customer service. Multimedia calls and other modern communication technologies boost mobile network, thus their utilization is critical to moving the business forward. However, these widely used networks are also vulnerable to security threats, leading network vendors and technicians to implement various techniques to ensure network safety. As the need to safeguard technologies grow and there has been a significant increase in growth the idea of a virtual private network (VPN) emerged as a key strategy for tackling the threat to network security. the authors suggested looking into this issue and presenting the findings of a study that contained insightful observations from the literature reviews that served as the primary source of research besides questionnaire responses as opinions from those who have experience in the network industry and its security. Through this research, it became evident that several technologies and approaches exist to safeguard networks, but the Transport Layer Security (TLS) architecture stood out as a superior solution, particularly for mobile networks.
通信技术的快速发展改变了公司和机构的运作方式,为提高生产力、收入增长和增强客户服务铺平了道路。多媒体呼叫和其他现代通信技术促进了移动网络的发展,因此它们的利用对推动业务发展至关重要。然而,这些广泛使用的网络也容易受到安全威胁,导致网络供应商和技术人员实施各种技术来确保网络安全。随着保护技术需求的增长和增长的显著增加,虚拟专用网络(VPN)的想法成为解决网络安全威胁的关键策略。作者建议研究这个问题,并提出一项研究的结果,该研究包含了从文献综述中得出的有见地的观察结果,这些文献综述是研究的主要来源,此外还有问卷调查的回答,作为那些在网络行业及其安全方面有经验的人的意见。通过这项研究,很明显有几种技术和方法可以保护网络,但传输层安全(TLS)架构作为一种卓越的解决方案脱颖而出,特别是对于移动网络。
{"title":"Exploring the Effectiveness of VPN Architecture in Enhancing Network Security for Mobile Networks: An Investigation Study","authors":"Khawla Azwee, Mokhtar Alkhattali, Mostafa Dow","doi":"10.5121/ijnsa.2023.15503","DOIUrl":"https://doi.org/10.5121/ijnsa.2023.15503","url":null,"abstract":"The rapid development of technology in communications has transformed the operations of companies and institutions, paving the way for increased productivity, revenue growth, and enhanced customer service. Multimedia calls and other modern communication technologies boost mobile network, thus their utilization is critical to moving the business forward. However, these widely used networks are also vulnerable to security threats, leading network vendors and technicians to implement various techniques to ensure network safety. As the need to safeguard technologies grow and there has been a significant increase in growth the idea of a virtual private network (VPN) emerged as a key strategy for tackling the threat to network security. the authors suggested looking into this issue and presenting the findings of a study that contained insightful observations from the literature reviews that served as the primary source of research besides questionnaire responses as opinions from those who have experience in the network industry and its security. Through this research, it became evident that several technologies and approaches exist to safeguard networks, but the Transport Layer Security (TLS) architecture stood out as a superior solution, particularly for mobile networks.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135470170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A NOVEL ALERT CORRELATION TECHNIQUE FOR FILTERING NETWORK ATTACKS 一种过滤网络攻击的报警关联技术
Pub Date : 2023-05-27 DOI: 10.5121/ijnsa.2023.15303
Jane Kinanu Kiruki, Geoffrey Muchiri Muketha, Gabriel Kamau
An alert correlation is a high-level alert evaluation technique for managing large volumes of irrelevant and redundant intrusion alerts raised by Intrusion Detection Systems (IDSs).Recent trends show that pure intrusion detection no longer can satisfy the security needs of organizations. One problem with existing alert correlation techniques is that they group related alerts together without putting their severity into consideration. This paper proposes a novel alert correlation technique that can filter unnecessary and low impact alerts from a large volume of intrusion. The proposed technique is based on a supervised feature selection method that usesclass type to define the correlation between alerts. Alerts of similar class type are identified using a class label. Class types are further classified based on their metric ranks of low, medium and high level. Findings show that the technique is able detect and report high level intrusions.
警报关联是一种高级警报评估技术,用于管理入侵检测系统(ids)产生的大量无关和冗余的入侵警报。最近的趋势表明,单纯的入侵检测已经不能满足企业的安全需求。现有警报关联技术的一个问题是,它们将相关警报分组在一起,而不考虑其严重性。本文提出了一种新的警报关联技术,可以从大量入侵中过滤出不必要的、影响较小的警报。该技术基于一种监督特征选择方法,该方法使用类类型来定义警报之间的相关性。使用类标签标识类似类类型的警报。类类型根据其低、中、高的度量等级进一步分类。结果表明,该技术能够检测和报告高级别入侵。
{"title":"A NOVEL ALERT CORRELATION TECHNIQUE FOR FILTERING NETWORK ATTACKS","authors":"Jane Kinanu Kiruki, Geoffrey Muchiri Muketha, Gabriel Kamau","doi":"10.5121/ijnsa.2023.15303","DOIUrl":"https://doi.org/10.5121/ijnsa.2023.15303","url":null,"abstract":"An alert correlation is a high-level alert evaluation technique for managing large volumes of irrelevant and redundant intrusion alerts raised by Intrusion Detection Systems (IDSs).Recent trends show that pure intrusion detection no longer can satisfy the security needs of organizations. One problem with existing alert correlation techniques is that they group related alerts together without putting their severity into consideration. This paper proposes a novel alert correlation technique that can filter unnecessary and low impact alerts from a large volume of intrusion. The proposed technique is based on a supervised feature selection method that usesclass type to define the correlation between alerts. Alerts of similar class type are identified using a class label. Class types are further classified based on their metric ranks of low, medium and high level. Findings show that the technique is able detect and report high level intrusions.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135950868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Offline Signature Recognition via Convolutional Neural Network and Multiple Classifiers 基于卷积神经网络和多分类器的离线签名识别
Pub Date : 2022-01-31 DOI: 10.5121/ijnsa.2022.14103
F. Alsuhimat, F. Mohamad
One of the most important processes used by companies to safeguard the security of information and prevent it from unauthorized access or penetration is the signature process. As businesses and individuals move into the digital age, a computerized system that can discern between genuine and faked signatures is crucial for protecting people's authorization and determining what permissions they have. In this paper, we used Pre-Trained CNN for extracts features from genuine and forged signatures, and three widely used classification algorithms, SVM (Support Vector Machine), NB (Naive Bayes) and KNN (k-nearest neighbors), these algorithms are compared to calculate the run time, classification error, classification loss, and accuracy for test-set consist of signature images (genuine and forgery). Three classifiers have been applied using (UTSig) dataset; where run time, classification error, classification loss and accuracy were calculated for each classifier in the verification phase, the results showed that the SVM and KNN got the best accuracy (76.21), while the SVM got the best run time (0.13) result among other classifiers, therefore the SVM classifier got the best result among the other classifiers in terms of our measures.
公司用来保护信息安全并防止未经授权的访问或渗透的最重要的过程之一是签名过程。随着企业和个人进入数字时代,一个能够辨别真假签名的计算机化系统对于保护人们的授权和确定他们拥有的权限至关重要。本文利用Pre-Trained CNN对真伪签名进行特征提取,并与支持向量机(SVM)、朴素贝叶斯(NB)和k近邻(KNN)三种常用的分类算法进行比较,计算由真伪签名图像组成的测试集的运行时间、分类误差、分类损失和准确率。使用(UTSig)数据集应用了三种分类器;在验证阶段,计算了每个分类器的运行时间、分类误差、分类损失和准确率,结果表明SVM和KNN在所有分类器中准确率最高(76.21),而SVM在所有分类器中运行时间最高(0.13),因此在我们的度量中,SVM分类器在所有分类器中获得了最好的结果。
{"title":"Offline Signature Recognition via Convolutional Neural Network and Multiple Classifiers","authors":"F. Alsuhimat, F. Mohamad","doi":"10.5121/ijnsa.2022.14103","DOIUrl":"https://doi.org/10.5121/ijnsa.2022.14103","url":null,"abstract":"One of the most important processes used by companies to safeguard the security of information and prevent it from unauthorized access or penetration is the signature process. As businesses and individuals move into the digital age, a computerized system that can discern between genuine and faked signatures is crucial for protecting people's authorization and determining what permissions they have. In this paper, we used Pre-Trained CNN for extracts features from genuine and forged signatures, and three widely used classification algorithms, SVM (Support Vector Machine), NB (Naive Bayes) and KNN (k-nearest neighbors), these algorithms are compared to calculate the run time, classification error, classification loss, and accuracy for test-set consist of signature images (genuine and forgery). Three classifiers have been applied using (UTSig) dataset; where run time, classification error, classification loss and accuracy were calculated for each classifier in the verification phase, the results showed that the SVM and KNN got the best accuracy (76.21), while the SVM got the best run time (0.13) result among other classifiers, therefore the SVM classifier got the best result among the other classifiers in terms of our measures.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"201 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76005611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Secure DNA Cryptosystem based on Steganography and Indexing Cipher 基于隐写和索引密码的安全DNA密码系统
Pub Date : 2022-01-31 DOI: 10.5121/ijnsa.2022.14104
T. Barakat, Nahed Mahmoud, Ihab A. Ali, Mohamed Hamdi
One of the essential challenges nowadays; is how to secure data with the increase of its volume as well as its transmission rate. The most frequent approach used to give a high degree of protection, preserve data from hackers, and accomplish multilayer security is steganography combined with encryption. DNA (Deoxyribonucleic Acid) is considered as a new promising carrier for data security while achieving powerful security and maximum protection. In this paper, a secure DNA cryptosystem model which combines steganography with encryption is introduced and categorized into two layers. The original data are hidden in the first layer into a reference DNA based on the insertion method to obtain a fake DNA sequence. In the second layer, this fake DNA sequence, which is the first layer's output, is encrypted using an indexing cipher to produce an encrypted message in the form of indexes. The proposed model guarantees multilayer security to the secret data with high performance and low-time wasting. It addresses the long-generation key problem of the DNA cryptography. The experimental results assess and validate the theoretical security analysis and model performance.
当今最重要的挑战之一;随着数据量的增加和传输速率的提高,如何保证数据的安全。用于提供高度保护、保护数据免受黑客攻击和实现多层安全的最常用方法是隐写术与加密相结合。DNA(脱氧核糖核酸)被认为是一种新的有前途的数据安全载体,同时具有强大的安全性和最大的保护作用。本文提出了一种隐写与加密相结合的安全DNA密码系统模型,并将其分为两层。根据插入法将第一层原始数据隐藏到参考DNA中,得到假DNA序列。在第二层中,这个假的DNA序列(即第一层的输出)使用索引密码进行加密,以生成索引形式的加密消息。该模型保证了机密数据的多层安全性,具有高性能和低耗时的特点。它解决了DNA密码的长生成密钥问题。实验结果验证了理论安全性分析和模型性能。
{"title":"A Secure DNA Cryptosystem based on Steganography and Indexing Cipher","authors":"T. Barakat, Nahed Mahmoud, Ihab A. Ali, Mohamed Hamdi","doi":"10.5121/ijnsa.2022.14104","DOIUrl":"https://doi.org/10.5121/ijnsa.2022.14104","url":null,"abstract":"One of the essential challenges nowadays; is how to secure data with the increase of its volume as well as its transmission rate. The most frequent approach used to give a high degree of protection, preserve data from hackers, and accomplish multilayer security is steganography combined with encryption. DNA (Deoxyribonucleic Acid) is considered as a new promising carrier for data security while achieving powerful security and maximum protection. In this paper, a secure DNA cryptosystem model which combines steganography with encryption is introduced and categorized into two layers. The original data are hidden in the first layer into a reference DNA based on the insertion method to obtain a fake DNA sequence. In the second layer, this fake DNA sequence, which is the first layer's output, is encrypted using an indexing cipher to produce an encrypted message in the form of indexes. The proposed model guarantees multilayer security to the secret data with high performance and low-time wasting. It addresses the long-generation key problem of the DNA cryptography. The experimental results assess and validate the theoretical security analysis and model performance.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"28 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78848682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enablers to Boost Blockchain Adoption in EU 推动欧盟区块链采用的推动者
Pub Date : 2022-01-31 DOI: 10.5121/ijnsa.2022.14102
Artemis C. Voulkidis, T. Zahariadis, A. Papadakis, Charalambos Ipektsidis
This paper describes a framework to facilitate the adoption of the Blockchain technology and streamline the development of decentralised applications (DAPPs). It describes four enablers, as self-contained core modules, offering specific, key functionality using the Blockchain technology. The enabler functionality includes a) Blockchain-based ID management allowing for authentication and authorization, b) the storage of data in the IPFS distributed filesystem with guarantees of data integrity and authenticity, c) the trustworthy registration of entities, services, and bindings, d) the performance of trustworthy negotiations towards external marketplaces with the support of the Blockchain. The design and interactions of the enablers are described using sequence diagrams. The usage of the functionality provided by the enablers is also being evaluated. In parallel, we present the application of the Blockchain technology, mainly in the context of EU project Block.IS in three economic areas agriculture, finance, and logistics. We provide and discuss a digest of the decentralised applications designed and developed over a period of approximately 3 years (2019-2021). Key areas of interest, processes, workflows, and assets where Blockchain technology has been applied are described. Findings, in terms of Blockchain application, challenges and technical selections as well as third-party tools are also identified and discussed.
本文描述了一个框架,以促进区块链技术的采用,并简化分散式应用程序(DAPPs)的开发。它描述了四个使能器,作为自包含的核心模块,使用区块链技术提供特定的关键功能。启用功能包括a)基于区块链的ID管理,允许身份验证和授权,b)在IPFS分布式文件系统中存储数据,保证数据的完整性和真实性,c)实体、服务和绑定的可信注册,d)在区块链的支持下对外部市场进行可信的谈判。启用程序的设计和交互使用序列图进行描述。推动者提供的功能的使用情况也在评估之中。同时,我们介绍了区块链技术的应用,主要是在欧盟项目Block的背景下。农业、金融和物流是三大经济领域。我们提供并讨论了在大约3年(2019-2021)期间设计和开发的去中心化应用程序摘要。描述了区块链技术应用的关键领域、过程、工作流和资产。在区块链应用方面的发现、挑战和技术选择以及第三方工具也被确定和讨论。
{"title":"Enablers to Boost Blockchain Adoption in EU","authors":"Artemis C. Voulkidis, T. Zahariadis, A. Papadakis, Charalambos Ipektsidis","doi":"10.5121/ijnsa.2022.14102","DOIUrl":"https://doi.org/10.5121/ijnsa.2022.14102","url":null,"abstract":"This paper describes a framework to facilitate the adoption of the Blockchain technology and streamline the development of decentralised applications (DAPPs). It describes four enablers, as self-contained core modules, offering specific, key functionality using the Blockchain technology. The enabler functionality includes a) Blockchain-based ID management allowing for authentication and authorization, b) the storage of data in the IPFS distributed filesystem with guarantees of data integrity and authenticity, c) the trustworthy registration of entities, services, and bindings, d) the performance of trustworthy negotiations towards external marketplaces with the support of the Blockchain. The design and interactions of the enablers are described using sequence diagrams. The usage of the functionality provided by the enablers is also being evaluated. In parallel, we present the application of the Blockchain technology, mainly in the context of EU project Block.IS in three economic areas agriculture, finance, and logistics. We provide and discuss a digest of the decentralised applications designed and developed over a period of approximately 3 years (2019-2021). Key areas of interest, processes, workflows, and assets where Blockchain technology has been applied are described. Findings, in terms of Blockchain application, challenges and technical selections as well as third-party tools are also identified and discussed.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"63 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80179324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
System End-User Actions as a Threat to Information System Security 系统终端用户行为对信息系统安全的威胁
Pub Date : 2021-11-30 DOI: 10.5121/ijnsa.2021.13606
Paulus Kautwima, Titus Haiduwa, K. Sai, V. Hashiyana, N. Suresh
As universities migrate online due to the advent of Covid-19, there is a need for enhanced security in information systems in the institution of higher learning. Many opted to invest in technological approaches to mitigate cybersecurity threats; however, the most common types of cybersecurity breaches happen due to the human factor, well known as end-user error or actions. Thus, this study aimed to identify and explore possible end-user errors in academia and the resulting vulnerabilities and threats that could affect the integrity of the university's information system. The study further presented state-of-the-art humanoriented security threats countermeasures to compliment universities' cybersecurity plans. Countermeasures include well-tailored ICT policies, incident response procedures, and education to protect themselves from security events (disruption, distortion, and exploitation). Adopted is a mixedmethod research approach with a qualitative research design to guide the study. An open-ended questionnaire and semi-structured interviews were used as data collection tools. Findings showed that system end-user errors remain the biggest security threat to information systems security in institutions of higher learning. Indeed errors make information systems vulnerable to certain cybersecurity attacks and, when exploited, put legitimate users, institutional network, and its computers at risk of contracting viruses, worms, Trojan, and expose it to spam, phishing, e-mail fraud, and other modern security attacks such as DDoS, session hijacking, replay attack and many more. Understanding that technology has failed to fully protect systems, specific recommendations are provided for the institution of higher education to consider improving employee actions and minimizing security incidents in their eLearning platforms, post Covid-19.
由于新冠肺炎疫情的到来,大学纷纷转向网络,因此需要加强高等院校信息系统的安全性。许多企业选择投资技术手段来缓解网络安全威胁;然而,最常见的网络安全漏洞类型是由于人为因素造成的,即最终用户错误或操作。因此,本研究旨在识别和探索学术界可能出现的最终用户错误,以及由此产生的可能影响大学信息系统完整性的漏洞和威胁。该研究进一步提出了最先进的以人为本的安全威胁对策,以配合大学的网络安全计划。对策包括量身定制的ICT政策、事件响应程序和教育,以保护自己免受安全事件(中断、扭曲和利用)的影响。采用混合方法研究方法,采用定性研究设计来指导研究。采用开放式问卷和半结构化访谈作为数据收集工具。调查结果显示,系统终端用户错误仍然是高校信息系统安全的最大安全威胁。事实上,错误使信息系统容易受到某些网络安全攻击,一旦被利用,就会使合法用户、机构网络及其计算机面临感染病毒、蠕虫、木马的风险,并使其暴露于垃圾邮件、网络钓鱼、电子邮件欺诈和其他现代安全攻击,如DDoS、会话劫持、重放攻击等等。了解到技术无法完全保护系统,本文为高等教育机构提供了具体建议,以考虑在2019冠状病毒病后改善员工行为并最大限度地减少其电子学习平台中的安全事件。
{"title":"System End-User Actions as a Threat to Information System Security","authors":"Paulus Kautwima, Titus Haiduwa, K. Sai, V. Hashiyana, N. Suresh","doi":"10.5121/ijnsa.2021.13606","DOIUrl":"https://doi.org/10.5121/ijnsa.2021.13606","url":null,"abstract":"As universities migrate online due to the advent of Covid-19, there is a need for enhanced security in information systems in the institution of higher learning. Many opted to invest in technological approaches to mitigate cybersecurity threats; however, the most common types of cybersecurity breaches happen due to the human factor, well known as end-user error or actions. Thus, this study aimed to identify and explore possible end-user errors in academia and the resulting vulnerabilities and threats that could affect the integrity of the university's information system. The study further presented state-of-the-art humanoriented security threats countermeasures to compliment universities' cybersecurity plans. Countermeasures include well-tailored ICT policies, incident response procedures, and education to protect themselves from security events (disruption, distortion, and exploitation). Adopted is a mixedmethod research approach with a qualitative research design to guide the study. An open-ended questionnaire and semi-structured interviews were used as data collection tools. Findings showed that system end-user errors remain the biggest security threat to information systems security in institutions of higher learning. Indeed errors make information systems vulnerable to certain cybersecurity attacks and, when exploited, put legitimate users, institutional network, and its computers at risk of contracting viruses, worms, Trojan, and expose it to spam, phishing, e-mail fraud, and other modern security attacks such as DDoS, session hijacking, replay attack and many more. Understanding that technology has failed to fully protect systems, specific recommendations are provided for the institution of higher education to consider improving employee actions and minimizing security incidents in their eLearning platforms, post Covid-19.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"69 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84175995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Malicious Javascript Detection based on Clustering Techniques 基于聚类技术的恶意Javascript检测
Pub Date : 2021-11-30 DOI: 10.5121/ijnsa.2021.13602
N. Hong Son, Ha Thanh Dung
Malicious JavaScript code is still a problem for website and web users. The complication and equivocation of this code make the detection which is based on signatures of antivirus programs becomes ineffective. So far, the alternative methods using machine learning have achieved encouraging results, and have detected malicious JavaScript code with high accuracy. However, according to the supervised learning method, the models, which are introduced, depend on the number of labeled symbols and require significant computational resources to activate. The rapid growth of malicious JavaScript is a real challenge to the solutions based on supervised learning due to the lacking of experience in detecting new forms of malicious JavaScript code. In this paper, we deal with the challenge by the method of detecting malicious JavaScript based on clustering techniques. The known symbols that will be analyzed, the characteristics which are extracted, and a detection processing technique applied on output clusters are included in the model. This method is not computationally complicated, as well as the typical case experiments gave positive results; specifically, it has detected new forms of malicious JavaScript code.
恶意JavaScript代码对网站和网络用户来说仍然是一个问题。该代码的复杂性和模糊性使得基于反病毒程序签名的检测变得无效。到目前为止,使用机器学习的替代方法已经取得了令人鼓舞的结果,并且已经以很高的准确率检测到恶意JavaScript代码。然而,根据监督学习方法,引入的模型依赖于标记符号的数量,并且需要大量的计算资源来激活。由于缺乏检测新形式恶意JavaScript代码的经验,恶意JavaScript的快速增长对基于监督学习的解决方案构成了真正的挑战。本文采用基于聚类技术的恶意JavaScript检测方法来应对这一挑战。该模型包含了要分析的已知符号、提取的特征以及应用于输出簇的检测处理技术。该方法计算简单,典型案例实验结果良好;具体来说,它已经检测到新形式的恶意JavaScript代码。
{"title":"Malicious Javascript Detection based on Clustering Techniques","authors":"N. Hong Son, Ha Thanh Dung","doi":"10.5121/ijnsa.2021.13602","DOIUrl":"https://doi.org/10.5121/ijnsa.2021.13602","url":null,"abstract":"Malicious JavaScript code is still a problem for website and web users. The complication and equivocation of this code make the detection which is based on signatures of antivirus programs becomes ineffective. So far, the alternative methods using machine learning have achieved encouraging results, and have detected malicious JavaScript code with high accuracy. However, according to the supervised learning method, the models, which are introduced, depend on the number of labeled symbols and require significant computational resources to activate. The rapid growth of malicious JavaScript is a real challenge to the solutions based on supervised learning due to the lacking of experience in detecting new forms of malicious JavaScript code. In this paper, we deal with the challenge by the method of detecting malicious JavaScript based on clustering techniques. The known symbols that will be analyzed, the characteristics which are extracted, and a detection processing technique applied on output clusters are included in the model. This method is not computationally complicated, as well as the typical case experiments gave positive results; specifically, it has detected new forms of malicious JavaScript code.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"3 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88912586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection Method for Classifying Malicious Firmware 恶意固件分类检测方法
Pub Date : 2021-11-30 DOI: 10.5121/ijnsa.2021.13601
David Noever, Samantha E. Miller Noever
A malicious firmware update may prove devastating to the embedded devices both that make up the Internet of Things (IoT) and that typically lack the same security verifications now applied to full operating systems. This work converts the binary headers of 40,000 firmware examples from bytes into 1024-pixel thumbnail images to train a deep neural network. The aim is to distinguish benign and malicious variants using modern deep learning methods without needing detailed functional or forensic analysis tools. One outcome of this image conversion enables contact with the vast machine learning literature already applied to handle digit recognition (MNIST). Another result indicates that greater than 90% accurate classifications prove possible using image-based convolutional neural networks (CNN) when combined with transfer learning methods. The envisioned CNN application would intercept firmware updates before their distribution to IoT networks and score their likelihood of containing malicious variants. To explain how the model makes classification decisions, the research applies traditional statistical methods such as both single and ensembles of decision trees with identifiable pixel or byte values that contribute the malicious or benign determination.
恶意固件更新可能会对构成物联网(IoT)的嵌入式设备造成毁灭性破坏,这些设备通常缺乏与完整操作系统相同的安全验证。这项工作将40,000个固件示例的二进制头从字节转换为1024像素的缩略图,以训练深度神经网络。目的是使用现代深度学习方法区分良性和恶意变体,而不需要详细的功能或法医分析工具。这种图像转换的一个结果是能够与已经应用于处理数字识别(MNIST)的大量机器学习文献接触。另一个结果表明,使用基于图像的卷积神经网络(CNN)与迁移学习方法相结合,可以实现超过90%的准确率分类。设想中的CNN应用程序将在固件更新分发到物联网网络之前拦截固件更新,并对其包含恶意变体的可能性进行评分。为了解释模型如何进行分类决策,该研究应用了传统的统计方法,例如具有可识别的像素或字节值的决策树的单个和集合,这些决策树有助于恶意或良性的决定。
{"title":"Detection Method for Classifying Malicious Firmware","authors":"David Noever, Samantha E. Miller Noever","doi":"10.5121/ijnsa.2021.13601","DOIUrl":"https://doi.org/10.5121/ijnsa.2021.13601","url":null,"abstract":"A malicious firmware update may prove devastating to the embedded devices both that make up the Internet of Things (IoT) and that typically lack the same security verifications now applied to full operating systems. This work converts the binary headers of 40,000 firmware examples from bytes into 1024-pixel thumbnail images to train a deep neural network. The aim is to distinguish benign and malicious variants using modern deep learning methods without needing detailed functional or forensic analysis tools. One outcome of this image conversion enables contact with the vast machine learning literature already applied to handle digit recognition (MNIST). Another result indicates that greater than 90% accurate classifications prove possible using image-based convolutional neural networks (CNN) when combined with transfer learning methods. The envisioned CNN application would intercept firmware updates before their distribution to IoT networks and score their likelihood of containing malicious variants. To explain how the model makes classification decisions, the research applies traditional statistical methods such as both single and ensembles of decision trees with identifiable pixel or byte values that contribute the malicious or benign determination.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"47 10 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89638412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International journal of network security & its applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1