首页 > 最新文献

International journal of network security & its applications最新文献

英文 中文
Understanding Traffic Patterns of Covid-19 IoC in Huge Academic Backbone Network SINET 了解新型冠状病毒IoC在大型学术骨干网SINET中的流量模式
Pub Date : 2021-11-30 DOI: 10.5121/ijnsa.2021.13603
R. Ando, Y. Kadobayashi, H. Takakura, Hiroshi Itoh
Recently, APT (Advanced Persistent Threats) groups are using the COVID-19 pandemic as part of their cyber operations. In response to cyber threat actors, IoCs (Indicators of Compromise) are being provided to help us take some countermeasures. In this paper, we analyse how the coronavirus-based cyber attack unfolded on the academic infrastructure network SINET (The Science Information Network) based on the passive measurement with IoC. SINET is Japan's academic information infrastructure network. To extract and analyze the traffic patterns of the COVID-19 attacker group, we implemented a data flow pipeline for handling huge session traffic data observed on SINET. The data flow pipeline provides three functions: (1) identification the direction of the traffic, (2) filtering the port numbers, and (3) generation of the time series data. From the output of our pipeline, it is clear that the attacker's traffic can be broken down into several patterns. To name a few, we have witnessed (1) huge burstiness (port 25: FTP and high port applications), (3) diurnal patterns (port 443: SSL), and (3) periodic patterns with low amplitude (port 25: SMTP) We can conclude that some unveiled patterns by our pipeline are informative to handling security operations of the academic backbone network. Particularly, we have found burstiness of high port and unknown applications with the number of session data ranging from 10,000 to 35,000. For understanding the traffic patterns on SINET, our data flow pipeline can utilize any IoC based on the list of IP address for traffic ingress/egress identification and port filtering.
最近,APT(高级持续威胁)组织正在利用COVID-19大流行作为其网络运营的一部分。为了应对网络威胁行为者,我们提供了ioc(妥协指标)来帮助我们采取一些对策。本文基于IoC被动测量,分析了基于冠状病毒的网络攻击是如何在学术基础网络SINET(科学信息网络)上展开的。SINET是日本的学术信息基础设施网络。为了提取和分析COVID-19攻击组的流量模式,我们实现了一个数据流管道,用于处理在SINET上观察到的大量会话流量数据。数据流管道提供三个功能:(1)识别流量方向;(2)过滤端口号;(3)生成时间序列数据。从我们管道的输出可以清楚地看出,攻击者的流量可以被分解成几个模式。举几个例子,我们见证了(1)巨大的突发(端口25:FTP和高端口应用程序),(3)每日模式(端口443:SSL)和(3)低振幅的周期性模式(端口25:SMTP)。我们可以得出结论,我们的管道揭示的一些模式对处理学术骨干网络的安全操作有帮助。特别是,我们发现高端口和未知应用程序的会话数据数量从10,000到35,000不等。为了理解SINET上的流量模式,我们的数据流管道可以利用基于IP地址列表的任何IoC来进行流量的入口/出口识别和端口过滤。
{"title":"Understanding Traffic Patterns of Covid-19 IoC in Huge Academic Backbone Network SINET","authors":"R. Ando, Y. Kadobayashi, H. Takakura, Hiroshi Itoh","doi":"10.5121/ijnsa.2021.13603","DOIUrl":"https://doi.org/10.5121/ijnsa.2021.13603","url":null,"abstract":"Recently, APT (Advanced Persistent Threats) groups are using the COVID-19 pandemic as part of their cyber operations. In response to cyber threat actors, IoCs (Indicators of Compromise) are being provided to help us take some countermeasures. In this paper, we analyse how the coronavirus-based cyber attack unfolded on the academic infrastructure network SINET (The Science Information Network) based on the passive measurement with IoC. SINET is Japan's academic information infrastructure network. To extract and analyze the traffic patterns of the COVID-19 attacker group, we implemented a data flow pipeline for handling huge session traffic data observed on SINET. The data flow pipeline provides three functions: (1) identification the direction of the traffic, (2) filtering the port numbers, and (3) generation of the time series data. From the output of our pipeline, it is clear that the attacker's traffic can be broken down into several patterns. To name a few, we have witnessed (1) huge burstiness (port 25: FTP and high port applications), (3) diurnal patterns (port 443: SSL), and (3) periodic patterns with low amplitude (port 25: SMTP) We can conclude that some unveiled patterns by our pipeline are informative to handling security operations of the academic backbone network. Particularly, we have found burstiness of high port and unknown applications with the number of session data ranging from 10,000 to 35,000. For understanding the traffic patterns on SINET, our data flow pipeline can utilize any IoC based on the list of IP address for traffic ingress/egress identification and port filtering.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"6 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79463868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Can Blockchain be a Solution to IoT Technical and Security Issues 区块链能否成为物联网技术和安全问题的解决方案
Pub Date : 2021-11-30 DOI: 10.5121/ijnsa.2021.13609
Adanma Cecilia Eberendu, Titus Ifeanyi Chinebu
The Internet of Things (IoT) is a growing trend in technology that interconnects millions of physical devices from any location anytime. Currently, IoT devices have become an integral part of human lives, as such organizations are deeply concerned with its security and technical issues. Blockchain system comprises a distributed digital ledger which is shared among community of users on the Internet; validated and recorded transactions in the ledger which cannot be altered or removed. We presented the challenges of IoT devices and how blockchain can be used to alleviate these problems. An outline of how to integrate blockchain with IoT was tackled, highlighting the challenges of IoT and how blockchain can remedy the issues. It was concluded that blockchain has the capability to curb the challenges posed by IoT devices.
物联网(IoT)是一种不断发展的技术趋势,它可以随时随地连接数百万个物理设备。目前,物联网设备已经成为人类生活中不可或缺的一部分,因为这些组织非常关注其安全和技术问题。区块链系统包括一个分布式数字账本,该账本在互联网上由用户社区共享;在分类帐中验证和记录的交易不能更改或删除。我们介绍了物联网设备的挑战,以及如何使用区块链来缓解这些问题。会议概述了如何将区块链与物联网集成,强调了物联网面临的挑战以及区块链如何解决这些问题。结论是,区块链有能力遏制物联网设备带来的挑战。
{"title":"Can Blockchain be a Solution to IoT Technical and Security Issues","authors":"Adanma Cecilia Eberendu, Titus Ifeanyi Chinebu","doi":"10.5121/ijnsa.2021.13609","DOIUrl":"https://doi.org/10.5121/ijnsa.2021.13609","url":null,"abstract":"The Internet of Things (IoT) is a growing trend in technology that interconnects millions of physical devices from any location anytime. Currently, IoT devices have become an integral part of human lives, as such organizations are deeply concerned with its security and technical issues. Blockchain system comprises a distributed digital ledger which is shared among community of users on the Internet; validated and recorded transactions in the ledger which cannot be altered or removed. We presented the challenges of IoT devices and how blockchain can be used to alleviate these problems. An outline of how to integrate blockchain with IoT was tackled, highlighting the challenges of IoT and how blockchain can remedy the issues. It was concluded that blockchain has the capability to curb the challenges posed by IoT devices.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"118 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77475216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improve Security in Smart Cities Based on IoT, Solve Cyber Electronic Attacks with Technology by using Packet Tracer 基于物联网提升智慧城市安全,利用数据包追踪技术解决网络电子攻击
Pub Date : 2021-11-30 DOI: 10.5121/ijnsa.2021.13605
Raed Al-hamarneh
Smart cities are expected to significantly improve people's quality of life, promote sustainable development, and enhance the efficiency of operations. With the implementation of many smart devices, c problems have become a serious challenge that needs strong treatments, especially the cyber-attack, which most countries suffer from it. My study focuses on the security of smart city systems, which include equipment like air conditioning, alarm systems, lighting, and doors. Some of the difficulties that arise daily may be found in the garage. This research aims to come up with a simulation of smart devices that can be and reduce cyber attach. Use of Cisco Packet tracer Features Simulated smart home and c devices are monitored. Simulation results show that smart objects can be connected to the home portal and objects can be successfullymonitored which leads to the idea of real-life implementation and see. In my research make manysolutions for attachingissues,which was great, and apply some wirelessprotocol.
智慧城市有望显著改善人们的生活质量,促进可持续发展,提高运营效率。随着许多智能设备的实施,c问题已经成为一个严重的挑战,需要强有力的治疗,特别是网络攻击,大多数国家都遭受它。我的研究重点是智能城市系统的安全,包括空调、报警系统、照明和门等设备。每天出现的一些困难可能会在车库里发现。这项研究的目的是模拟智能设备,可以减少网络攻击。使用思科数据包跟踪功能模拟智能家居和c设备进行监控。仿真结果表明,智能对象可以连接到家庭门户,并且可以成功地监控对象,从而产生了现实生活中实施和查看的想法。在我的研究中,提出了许多解决方案的连接问题,这是伟大的,并应用了一些无线协议。
{"title":"Improve Security in Smart Cities Based on IoT, Solve Cyber Electronic Attacks with Technology by using Packet Tracer","authors":"Raed Al-hamarneh","doi":"10.5121/ijnsa.2021.13605","DOIUrl":"https://doi.org/10.5121/ijnsa.2021.13605","url":null,"abstract":"Smart cities are expected to significantly improve people's quality of life, promote sustainable development, and enhance the efficiency of operations. With the implementation of many smart devices, c problems have become a serious challenge that needs strong treatments, especially the cyber-attack, which most countries suffer from it. My study focuses on the security of smart city systems, which include equipment like air conditioning, alarm systems, lighting, and doors. Some of the difficulties that arise daily may be found in the garage. This research aims to come up with a simulation of smart devices that can be and reduce cyber attach. Use of Cisco Packet tracer Features Simulated smart home and c devices are monitored. Simulation results show that smart objects can be connected to the home portal and objects can be successfullymonitored which leads to the idea of real-life implementation and see. In my research make manysolutions for attachingissues,which was great, and apply some wirelessprotocol.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"31 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84564496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving Security and Fairness in Federated Learning Systems 提高联邦学习系统的安全性和公平性
Pub Date : 2021-11-30 DOI: 10.5121/ijnsa.2021.13604
Andrew R. Short, Τheofanis G. Orfanoudakis, Helen C. Leligou
The ever-increasing use of Artificial Intelligence applications has made apparent that the quality of the training datasets affects the performance of the models. To this end, Federated Learning aims to engage multiple entities to contribute to the learning process with locally maintained data, without requiring them to share the actual datasets. Since the parameter server does not have access to the actual training datasets, it becomes challenging to offer rewards to users by directly inspecting the dataset quality. Instead, this paper focuses on ways to strengthen user engagement by offering “fair” rewards, proportional to the model improvement (in terms of accuracy) they offer. Furthermore, to enable objective judgment of the quality of contribution, we devise a point system to record user performance assisted by blockchain technologies. More precisely, we have developed a verification algorithm that evaluates the performance of users’ contributions by comparing the resulting accuracy of the global model against a verification dataset and we demonstrate how this metric can be used to offer security improvements in a Federated Learning process. Further on, we implement the solution in a simulation environment in order to assess the feasibility and collect baseline results using datasets of varying quality.
人工智能应用的不断增长表明,训练数据集的质量会影响模型的性能。为此,联邦学习的目标是让多个实体参与到本地维护数据的学习过程中,而不需要它们共享实际的数据集。由于参数服务器无法访问实际的训练数据集,因此通过直接检查数据集质量来为用户提供奖励变得具有挑战性。相反,本文关注的是通过提供“公平”奖励来增强用户粘性的方法,这些奖励与他们提供的模型改进(就准确性而言)成正比。此外,为了客观判断贡献的质量,我们设计了一个记分系统,在区块链技术的帮助下记录用户的表现。更准确地说,我们开发了一种验证算法,通过将全局模型的结果准确性与验证数据集进行比较来评估用户贡献的性能,并演示了如何使用该度量来在联邦学习过程中提供安全性改进。此外,我们在模拟环境中实现该解决方案,以评估可行性并使用不同质量的数据集收集基线结果。
{"title":"Improving Security and Fairness in Federated Learning Systems","authors":"Andrew R. Short, Τheofanis G. Orfanoudakis, Helen C. Leligou","doi":"10.5121/ijnsa.2021.13604","DOIUrl":"https://doi.org/10.5121/ijnsa.2021.13604","url":null,"abstract":"The ever-increasing use of Artificial Intelligence applications has made apparent that the quality of the training datasets affects the performance of the models. To this end, Federated Learning aims to engage multiple entities to contribute to the learning process with locally maintained data, without requiring them to share the actual datasets. Since the parameter server does not have access to the actual training datasets, it becomes challenging to offer rewards to users by directly inspecting the dataset quality. Instead, this paper focuses on ways to strengthen user engagement by offering “fair” rewards, proportional to the model improvement (in terms of accuracy) they offer. Furthermore, to enable objective judgment of the quality of contribution, we devise a point system to record user performance assisted by blockchain technologies. More precisely, we have developed a verification algorithm that evaluates the performance of users’ contributions by comparing the resulting accuracy of the global model against a verification dataset and we demonstrate how this metric can be used to offer security improvements in a Federated Learning process. Further on, we implement the solution in a simulation environment in order to assess the feasibility and collect baseline results using datasets of varying quality.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"95 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86162608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Comparative Review of Malware Analysis Methodologies 恶意软件分析方法的比较回顾
Pub Date : 2021-11-30 DOI: 10.5121/ijnsa.2021.13608
Ioannis G. Kiachidis, Dimitrios A. Baltatzis
To fight against the evolution of malware and its development, the specific methodologies that are applied by the malware analysts are crucial. Yet, this is something often overlooked in the relevant bibliography or in the formal and informal training of the relevant professionals. There are only two generic and allencompassing structured methodologies for Malware Analysis (MA) – SAMA and MARE. The question is whether they are adequate and there is no need for another one or whether there is no such need at all. This paper will try to answer the above and it will contribute in the following ways: it will present, compare and dissect those two malware analysis methodologies, it will present their capacity for analysing modern malware by applying them on a random modern specimen and finally, it will conclude on whether there is a procedural optimization for malware analysis over the evolution of these two methodologies.
为了对抗恶意软件的演变及其发展,恶意软件分析人员所应用的特定方法至关重要。然而,在有关的参考书目或有关专业人员的正式和非正式培训中,这一点经常被忽视。恶意软件分析(MA)只有两种通用的、包罗万象的结构化方法——SAMA和MARE。问题是它们是否足够,是否不需要另一个,或者是否根本没有这种需要。本文将尝试回答上述问题,它将以以下方式做出贡献:它将呈现,比较和剖析这两种恶意软件分析方法,它将通过将它们应用于随机的现代样本来呈现它们分析现代恶意软件的能力,最后,它将得出结论,在这两种方法的演变中是否存在恶意软件分析的程序优化。
{"title":"Comparative Review of Malware Analysis Methodologies","authors":"Ioannis G. Kiachidis, Dimitrios A. Baltatzis","doi":"10.5121/ijnsa.2021.13608","DOIUrl":"https://doi.org/10.5121/ijnsa.2021.13608","url":null,"abstract":"To fight against the evolution of malware and its development, the specific methodologies that are applied by the malware analysts are crucial. Yet, this is something often overlooked in the relevant bibliography or in the formal and informal training of the relevant professionals. There are only two generic and allencompassing structured methodologies for Malware Analysis (MA) – SAMA and MARE. The question is whether they are adequate and there is no need for another one or whether there is no such need at all. This paper will try to answer the above and it will contribute in the following ways: it will present, compare and dissect those two malware analysis methodologies, it will present their capacity for analysing modern malware by applying them on a random modern specimen and finally, it will conclude on whether there is a procedural optimization for malware analysis over the evolution of these two methodologies.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"39 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85340145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information and Communication Security Mechanisms For Microservices-based Systems 基于微服务的系统的信息和通信安全机制
Pub Date : 2021-11-01 DOI: 10.5121/ijnsa.2021.13607
Lenin Leines-Vite, J. C. Pérez-Arriaga, X. Limón
Security has become paramount in modern software services as more and more security breaches emerge, impacting final users and organizations alike. Trends like the Microservice Architecture bring new security challenges related to communication, system design, development, and operation. The literature presents a plethora of security-related solutions for microservices-based systems, but the spread of information difficult practitioners' adoption of novel security related solutions. In this study, we aim to present a catalogue and discussion of security solutions based on algorithms, protocols, standards, or implementations; supporting principles or characteristics of information security, considering the three possible states of data, according to the McCumber Cube. Our research follows a Systematic Literature Review, synthesizing the results with a meta-aggregation process. We identified a total of 30 primary studies, yielding 75 security solutions for the communication of microservices.
随着越来越多的安全漏洞出现,最终用户和组织都受到影响,安全性在现代软件服务中变得至关重要。微服务架构等趋势带来了与通信、系统设计、开发和操作相关的新的安全挑战。文献为基于微服务的系统提供了大量与安全相关的解决方案,但信息的传播使从业者难以采用新的安全相关解决方案。在本研究中,我们的目标是提供基于算法、协议、标准或实现的安全解决方案的目录和讨论;根据McCumber Cube,考虑数据的三种可能状态,支持信息安全的原则或特征。我们的研究遵循系统文献综述,综合结果与元聚合过程。我们总共确定了30项主要研究,为微服务的通信提供了75种安全解决方案。
{"title":"Information and Communication Security Mechanisms For Microservices-based Systems","authors":"Lenin Leines-Vite, J. C. Pérez-Arriaga, X. Limón","doi":"10.5121/ijnsa.2021.13607","DOIUrl":"https://doi.org/10.5121/ijnsa.2021.13607","url":null,"abstract":"Security has become paramount in modern software services as more and more security breaches emerge, impacting final users and organizations alike. Trends like the Microservice Architecture bring new security challenges related to communication, system design, development, and operation. The literature presents a plethora of security-related solutions for microservices-based systems, but the spread of information difficult practitioners' adoption of novel security related solutions. In this study, we aim to present a catalogue and discussion of security solutions based on algorithms, protocols, standards, or implementations; supporting principles or characteristics of information security, considering the three possible states of data, according to the McCumber Cube. Our research follows a Systematic Literature Review, synthesizing the results with a meta-aggregation process. We identified a total of 30 primary studies, yielding 75 security solutions for the communication of microservices.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"25 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79118051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comments on A Remote User Authentication Scheme for Multi-server 5G Networks 一种面向多服务器5G网络的远程用户认证方案
Pub Date : 2021-09-01 DOI: 10.6633/IJNS.202109_23(5).14
Jiaqing Mo, Zhongwang Hu
{"title":"Comments on A Remote User Authentication Scheme for Multi-server 5G Networks","authors":"Jiaqing Mo, Zhongwang Hu","doi":"10.6633/IJNS.202109_23(5).14","DOIUrl":"https://doi.org/10.6633/IJNS.202109_23(5).14","url":null,"abstract":"","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"51 1","pages":"878-882"},"PeriodicalIF":0.0,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76655057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A New Fast Matching Method for Dummy K-anonymous Location Privacy Protection in Location Based Services 一种基于位置服务的虚拟k -匿名位置隐私保护快速匹配方法
Pub Date : 2021-09-01 DOI: 10.6633/IJNS.202109_23(5).16
Xiaohui Zhu, Renlong Qi
This paper proposes a dummy k-anonymous location privacy protection based on a fast-matching method that adopts the space coordinate transformation algorithm. First, the 2-D coordinates are converted to binary Morton code. With the fast matching method, non-adjacent position points distributed in different grids are selected as candidate sets of dummy positions. Then, the semantic similarity of place name information of position points in the candidate sets is calculated using the edit distance, and k-1 position points with the smallest semantic similarity are selected as dummy positions. While satisfying the semantic l-diversity and physical dispersion, this method can improve the generation efficiency of dummy locations and further improve the quality of location service.
本文提出了一种基于空间坐标变换算法的快速匹配方法的虚拟k-匿名位置隐私保护。首先,将二维坐标转换为二进制莫顿码。采用快速匹配方法,选取分布在不同网格中的非相邻位置点作为虚拟位置的候选集。然后,利用编辑距离计算候选集中位置点地名信息的语义相似度,选择语义相似度最小的k-1个位置点作为虚拟位置。该方法在满足语义l-分集和物理离散的同时,提高了虚拟位置的生成效率,进一步提高了位置服务的质量。
{"title":"A New Fast Matching Method for Dummy K-anonymous Location Privacy Protection in Location Based Services","authors":"Xiaohui Zhu, Renlong Qi","doi":"10.6633/IJNS.202109_23(5).16","DOIUrl":"https://doi.org/10.6633/IJNS.202109_23(5).16","url":null,"abstract":"This paper proposes a dummy k-anonymous location privacy protection based on a fast-matching method that adopts the space coordinate transformation algorithm. First, the 2-D coordinates are converted to binary Morton code. With the fast matching method, non-adjacent position points distributed in different grids are selected as candidate sets of dummy positions. Then, the semantic similarity of place name information of position points in the candidate sets is calculated using the edit distance, and k-1 position points with the smallest semantic similarity are selected as dummy positions. While satisfying the semantic l-diversity and physical dispersion, this method can improve the generation efficiency of dummy locations and further improve the quality of location service.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"30 1","pages":"888-894"},"PeriodicalIF":0.0,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91272609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Identity-based Proxy Re-encryption Scheme in Blockchain-assisted Decentralized Storage System 区块链辅助去中心化存储系统中基于身份的高效代理重加密方案
Pub Date : 2021-09-01 DOI: 10.6633/IJNS.202109_23(5).05
He Jiayu, Dong Zheng, Rui-Fang Guo, Chen Yushuang, Kemeng Li, Xiaoling Tao
{"title":"Efficient Identity-based Proxy Re-encryption Scheme in Blockchain-assisted Decentralized Storage System","authors":"He Jiayu, Dong Zheng, Rui-Fang Guo, Chen Yushuang, Kemeng Li, Xiaoling Tao","doi":"10.6633/IJNS.202109_23(5).05","DOIUrl":"https://doi.org/10.6633/IJNS.202109_23(5).05","url":null,"abstract":"","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"9 1","pages":"776-790"},"PeriodicalIF":0.0,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75932072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Robust Cybersecurity Topic Classification Tool 一个健壮的网络安全主题分类工具
Pub Date : 2021-08-30 DOI: 10.5121/ijnsa.2022.14101
Elijah Pelofske, L. Liebrock, V. Urias
In this research, we use user defined labels from three internet text sources (Reddit, StackExchange, Arxiv) to train 21 different machine learning models for the topic classification task of detecting cybersecurity discussions in natural English text. We analyze the false positive and false negative rates of each of the 21 model’s in cross validation experiments. Then we present a Cybersecurity Topic Classification (CTC) tool, which takes the majority vote of the 21 trained machine learning models as the decision mechanism for detecting cybersecurity related text. We also show that the majority vote mechanism of the CTC tool provides lower false negative and false positive rates on average than any of the 21 individual models. We show that the CTC tool is scalable to the hundreds of thousands of documents with a wall clock time on the order of hours.
在这项研究中,我们使用来自三个互联网文本源(Reddit, StackExchange, Arxiv)的用户定义标签来训练21种不同的机器学习模型,用于检测自然英语文本中的网络安全讨论的主题分类任务。我们在交叉验证实验中分析了21个模型的假阳性和假阴性率。然后,我们提出了一个网络安全主题分类(CTC)工具,该工具将21个训练好的机器学习模型的多数投票作为检测网络安全相关文本的决策机制。我们还表明,CTC工具的多数投票机制平均提供的假阴性和假阳性率低于21个单独模型中的任何一个。我们展示了CTC工具可以扩展到成千上万的文档,时钟时间在几个小时左右。
{"title":"A Robust Cybersecurity Topic Classification Tool","authors":"Elijah Pelofske, L. Liebrock, V. Urias","doi":"10.5121/ijnsa.2022.14101","DOIUrl":"https://doi.org/10.5121/ijnsa.2022.14101","url":null,"abstract":"In this research, we use user defined labels from three internet text sources (Reddit, StackExchange, Arxiv) to train 21 different machine learning models for the topic classification task of detecting cybersecurity discussions in natural English text. We analyze the false positive and false negative rates of each of the 21 model’s in cross validation experiments. Then we present a Cybersecurity Topic Classification (CTC) tool, which takes the majority vote of the 21 trained machine learning models as the decision mechanism for detecting cybersecurity related text. We also show that the majority vote mechanism of the CTC tool provides lower false negative and false positive rates on average than any of the 21 individual models. We show that the CTC tool is scalable to the hundreds of thousands of documents with a wall clock time on the order of hours.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"347 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82983107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
International journal of network security & its applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1