首页 > 最新文献

International journal of network security & its applications最新文献

英文 中文
Large-Scale Social Network Privacy Protection Method for Protecting K-Core 保护K-Core的大规模社交网络隐私保护方法
Pub Date : 2021-07-01 DOI: 10.6633/IJNS.202107_23(4).07
Jian Li, Xiaolin Zhang, Jiao Liu, Gao Lu, Huanxiang Zhang, Yu Feng
Social network analysis has many important applications and methods which depend on the sharing and publishing of graphs. For example, link privacy requires limiting the probability of an adversary identifying a target sensitive link between two individuals in the published social network graph. However, the existing link privacy protection methods have low processing power for large-scale graph data and less consideration of community protection in the publishing graphs. Therefore, aiming at sensitive link privacy protection, a large-scale social network privacy protection model to protect K-Core (PPMPK) was proposed. The large-scale social network graph was processed to ensure that the core number and the community structure of the nodes were unchanged based on the Pregel parallel graph processing model. Extensive experiments on the real data sets showed that the proposed method could effectively process the large-scale graph data and protect the data availability of the published graphs, especially in community protection.
社会网络分析有许多重要的应用和方法都依赖于图表的共享和发布。例如,链接隐私要求限制攻击者在公开的社交网络图中识别两个个体之间的目标敏感链接的概率。然而,现有的链路隐私保护方法对大规模图数据的处理能力较低,并且在发布图时较少考虑社区保护。因此,针对敏感链接隐私保护,提出了一种保护K-Core的大规模社交网络隐私保护模型(PPMPK)。基于Pregel并行图处理模型,对大规模社交网络图进行处理,保证节点的核数和社区结构不变。在实际数据集上进行的大量实验表明,该方法可以有效地处理大规模图数据,并保护已发布图的数据可用性,特别是在社区保护方面。
{"title":"Large-Scale Social Network Privacy Protection Method for Protecting K-Core","authors":"Jian Li, Xiaolin Zhang, Jiao Liu, Gao Lu, Huanxiang Zhang, Yu Feng","doi":"10.6633/IJNS.202107_23(4).07","DOIUrl":"https://doi.org/10.6633/IJNS.202107_23(4).07","url":null,"abstract":"Social network analysis has many important applications and methods which depend on the sharing and publishing of graphs. For example, link privacy requires limiting the probability of an adversary identifying a target sensitive link between two individuals in the published social network graph. However, the existing link privacy protection methods have low processing power for large-scale graph data and less consideration of community protection in the publishing graphs. Therefore, aiming at sensitive link privacy protection, a large-scale social network privacy protection model to protect K-Core (PPMPK) was proposed. The large-scale social network graph was processed to ensure that the core number and the community structure of the nodes were unchanged based on the Pregel parallel graph processing model. Extensive experiments on the real data sets showed that the proposed method could effectively process the large-scale graph data and protect the data availability of the published graphs, especially in community protection.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"20 1","pages":"612-622"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84002837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Research on Dynamic Social Network Anonymity Technology for Protecting Community Structure 面向社区结构保护的动态社会网络匿名技术研究
Pub Date : 2021-07-01 DOI: 10.6633/IJNS.202107_23(4).04
Lin Na, Xiaolin Zhang, Wang Yongping, Jian Li, Li-Xin Liu
The dynamic change of vertex degree in a dynamic social network will lead to vertex identity disclosure given the deficiencies in current privacy protection methods, such as the destruction of community structure and low data processing capability of a single workstation. The dynamic social network degree sequence anonymity (DSNDSA) method to protect community structure is proposed. The method obtains the grouping and anonymous results based on a compressed binary tree constructed by a new method called a multidimensional vector. Dummy vertices are added in parallel to construct anonymous graphs. Distributed to merge dummy vertices method based on the community is designed to reduce the number of vertices added to satisfy the anonymity model. A divide and the agglomerate algorithm is expanded for community detection. The experimental results show that the proposed algorithm based on GraphX can overcome the defects of the traditional algorithm in community protection while meeting the requirement of anonymity.
鉴于当前隐私保护方法存在的破坏社区结构、单工作站数据处理能力低等缺陷,动态社交网络中顶点度的动态变化将导致顶点身份的泄露。提出了动态社会网络度序列匿名(DSNDSA)保护社区结构的方法。该方法利用一种新的多维向量方法构造的压缩二叉树,得到分组和匿名结果。虚拟顶点被并行添加以构建匿名图。设计了基于社区的分布式虚拟顶点合并方法,以减少添加的顶点数量以满足匿名模型。扩展了一种用于社团检测的分割聚类算法。实验结果表明,本文提出的基于GraphX的算法在满足匿名性要求的同时,克服了传统算法在团体保护方面的缺陷。
{"title":"Research on Dynamic Social Network Anonymity Technology for Protecting Community Structure","authors":"Lin Na, Xiaolin Zhang, Wang Yongping, Jian Li, Li-Xin Liu","doi":"10.6633/IJNS.202107_23(4).04","DOIUrl":"https://doi.org/10.6633/IJNS.202107_23(4).04","url":null,"abstract":"The dynamic change of vertex degree in a dynamic social network will lead to vertex identity disclosure given the deficiencies in current privacy protection methods, such as the destruction of community structure and low data processing capability of a single workstation. The dynamic social network degree sequence anonymity (DSNDSA) method to protect community structure is proposed. The method obtains the grouping and anonymous results based on a compressed binary tree constructed by a new method called a multidimensional vector. Dummy vertices are added in parallel to construct anonymous graphs. Distributed to merge dummy vertices method based on the community is designed to reduce the number of vertices added to satisfy the anonymity model. A divide and the agglomerate algorithm is expanded for community detection. The experimental results show that the proposed algorithm based on GraphX can overcome the defects of the traditional algorithm in community protection while meeting the requirement of anonymity.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"43 1","pages":"576-587"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75563045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Deep Learning Classification Methods Applied to Tabular Cybersecurity Benchmarks 深度学习分类方法在表格网络安全基准测试中的应用
Pub Date : 2021-05-31 DOI: 10.5121/IJNSA.2021.13301
David Noever, S. M. Noever
This research recasts the network attack dataset from UNSW-NB15 as an intrusion detection problem in image space. Using one-hot-encodings, the resulting grayscale thumbnails provide a quarter-million examples for deep learning algorithms. Applying the MobileNetV2’s convolutional neural network architecture, the work demonstrates a 97% accuracy in distinguishing normal and attack traffic. Further class refinements to 9 individual attack families (exploits, worms, shellcodes) show an overall 54% accuracy. Using feature importance rank, a random forest solution on subsets shows the most important source-destination factors and the least important ones as mainly obscure protocols. It further extends the image classification problem to other cybersecurity benchmarks such as malware signatures extracted from binary headers, with an 80% overall accuracy to detect computer viruses as portable executable files (headers only). Both novel image datasets are available to the research community on Kaggle.
本研究将UNSW-NB15的网络攻击数据集重构为图像空间中的入侵检测问题。使用单热编码,生成的灰度缩略图为深度学习算法提供了25万个示例。应用MobileNetV2的卷积神经网络架构,该工作证明了区分正常流量和攻击流量的准确率为97%。对9个单独的攻击家族(漏洞利用、蠕虫、shellcode)进行进一步的分类改进,总体准确率为54%。利用特征重要性排序,对子集进行随机森林求解,显示出最重要的源-目的因素和最不重要的因素,主要是模糊协议。它进一步将图像分类问题扩展到其他网络安全基准,例如从二进制标头中提取的恶意软件签名,将计算机病毒检测为可移植可执行文件(仅标头)的总体准确率为80%。这两个新的图像数据集都可以在Kaggle上的研究社区中获得。
{"title":"Deep Learning Classification Methods Applied to Tabular Cybersecurity Benchmarks","authors":"David Noever, S. M. Noever","doi":"10.5121/IJNSA.2021.13301","DOIUrl":"https://doi.org/10.5121/IJNSA.2021.13301","url":null,"abstract":"This research recasts the network attack dataset from UNSW-NB15 as an intrusion detection problem in image space. Using one-hot-encodings, the resulting grayscale thumbnails provide a quarter-million examples for deep learning algorithms. Applying the MobileNetV2’s convolutional neural network architecture, the work demonstrates a 97% accuracy in distinguishing normal and attack traffic. Further class refinements to 9 individual attack families (exploits, worms, shellcodes) show an overall 54% accuracy. Using feature importance rank, a random forest solution on subsets shows the most important source-destination factors and the least important ones as mainly obscure protocols. It further extends the image classification problem to other cybersecurity benchmarks such as malware signatures extracted from binary headers, with an 80% overall accuracy to detect computer viruses as portable executable files (headers only). Both novel image datasets are available to the research community on Kaggle.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"74 1","pages":"1-13"},"PeriodicalIF":0.0,"publicationDate":"2021-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80648114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Survey on Federated Identity Management Systems Limitation and Solutions 联邦身份管理系统的局限性及解决方案综述
Pub Date : 2021-05-31 DOI: 10.5121/IJNSA.2021.13304
Maha Aldosary, Norah Alqahtani
An efficient identity management system has become one of the fundamental requirements for ensuring safe, secure, and transparent use of identifiable information and attributes. Federated Identity Management (FIdM) allows users to distribute their identity information across security domains which increases the portability of their digital identities, and it is considered a promising approach to facilitate secure resource sharing among collaborating participants in heterogeneous IT environments. However, it also raises new architectural challenges and significant security and privacy issues that need to be mitigated. In this paper, we provide a comparison between FIdM architectures, presented the limitations and risks in FIdM system, and discuss the results and proposed solutions.
高效的身份管理系统已成为确保安全、可靠、透明地使用可识别信息和属性的基本要求之一。联邦身份管理(FIdM)允许用户跨安全域分发他们的身份信息,这增加了他们的数字身份的可移植性,它被认为是一种很有前途的方法,可以促进异构it环境中协作参与者之间的安全资源共享。然而,它也提出了新的架构挑战以及需要缓解的重大安全和隐私问题。在本文中,我们提供了FIdM体系结构之间的比较,提出了FIdM系统的局限性和风险,并讨论了结果和提出的解决方案。
{"title":"A Survey on Federated Identity Management Systems Limitation and Solutions","authors":"Maha Aldosary, Norah Alqahtani","doi":"10.5121/IJNSA.2021.13304","DOIUrl":"https://doi.org/10.5121/IJNSA.2021.13304","url":null,"abstract":"An efficient identity management system has become one of the fundamental requirements for ensuring safe, secure, and transparent use of identifiable information and attributes. Federated Identity Management (FIdM) allows users to distribute their identity information across security domains which increases the portability of their digital identities, and it is considered a promising approach to facilitate secure resource sharing among collaborating participants in heterogeneous IT environments. However, it also raises new architectural challenges and significant security and privacy issues that need to be mitigated. In this paper, we provide a comparison between FIdM architectures, presented the limitations and risks in FIdM system, and discuss the results and proposed solutions.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"30 1","pages":"43-59"},"PeriodicalIF":0.0,"publicationDate":"2021-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83415338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information-Centric Blockchain Technology for the Smart Grid 面向智能电网的信息中心区块链技术
Pub Date : 2021-05-31 DOI: 10.5121/IJNSA.2021.13303
Lanqin Sang, H. Hexmoor
This paper proposes an application of blockchain technology for securing the infrastructure of the modern power grid - an Information-Centric design for the blockchain network. In this design, all the transactions in the blockchain network are classified into different groups, and each group has a group number. A sender’s identity is encrypted by the control centre’s public key; energy data is encrypted by the subscriber’s public key, and by a receiver’s public key if this transaction is for a specific receiver; a valid signature is created via a group message and the group publisher’s private key. Our implementation of the design demonstrated the proposal is applicable, publisher’s identities are protected, data sources are hidden, data privacy is maintained, and data consistency is preserved.
本文提出了b区块链技术在现代电网基础设施安全中的应用——以信息为中心的b区块链网络设计。在本设计中,区块链网络中的所有事务被划分为不同的组,每组有一个组号。发送方的身份由控制中心的公钥加密;能源数据由订阅者的公钥加密,如果此交易是针对特定的接收者,则由接收者的公钥加密;通过组消息和组发布者的私钥创建有效签名。我们的设计实现表明该方案是适用的,发布者的身份得到了保护,数据源被隐藏,数据隐私得到了维护,数据一致性得到了保持。
{"title":"Information-Centric Blockchain Technology for the Smart Grid","authors":"Lanqin Sang, H. Hexmoor","doi":"10.5121/IJNSA.2021.13303","DOIUrl":"https://doi.org/10.5121/IJNSA.2021.13303","url":null,"abstract":"This paper proposes an application of blockchain technology for securing the infrastructure of the modern power grid - an Information-Centric design for the blockchain network. In this design, all the transactions in the blockchain network are classified into different groups, and each group has a group number. A sender’s identity is encrypted by the control centre’s public key; energy data is encrypted by the subscriber’s public key, and by a receiver’s public key if this transaction is for a specific receiver; a valid signature is created via a group message and the group publisher’s private key. Our implementation of the design demonstrated the proposal is applicable, publisher’s identities are protected, data sources are hidden, data privacy is maintained, and data consistency is preserved.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"12 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82039325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Effect Man-In the Middle on the Network Performance in Various Attack Strategies 各种攻击策略中中间人对网络性能的影响
Pub Date : 2021-05-27 DOI: 10.5121/IJNSA.2021.13302
Iyas Alodat
In this paper, we examined the effect on network performance of the various strategies an attacker could adopt to launch Man-In The Middle (MITM) attacks on the wireless network, such as fleet or random strategies. In particular, we're focusing on some of those goals for MITM attackers - message delay, message dropping. According to simulation data, these attacks have a significant effect on legitimate nodes in the network, causing vast amounts of infected packets, end-to-end delays, and significant packet loss.
在本文中,我们研究了攻击者在无线网络上发起中间人攻击(MITM)时可能采用的各种策略对网络性能的影响,例如舰队或随机策略。我们特别关注MITM攻击者的一些目标——消息延迟、消息丢失。仿真数据表明,这些攻击对网络中的合法节点影响较大,造成大量感染报文、端到端延迟和大量丢包。
{"title":"Effect Man-In the Middle on the Network Performance in Various Attack Strategies","authors":"Iyas Alodat","doi":"10.5121/IJNSA.2021.13302","DOIUrl":"https://doi.org/10.5121/IJNSA.2021.13302","url":null,"abstract":"In this paper, we examined the effect on network performance of the various strategies an attacker could adopt to launch Man-In The Middle (MITM) attacks on the wireless network, such as fleet or random strategies. In particular, we're focusing on some of those goals for MITM attackers - message delay, message dropping. According to simulation data, these attacks have a significant effect on legitimate nodes in the network, causing vast amounts of infected packets, end-to-end delays, and significant packet loss.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"08 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82323237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Literature Survey and Analysis on Social Engineering Defense Mechanisms and Infosec Policies 社会工程防御机制与信息安全政策的文献综述与分析
Pub Date : 2021-03-31 DOI: 10.5121/IJNSA.2021.13204
Dalal N. Alharthi, A. Regan
Social engineering attacks can be severe and hard to detect. Therefore, to prevent such attacks, organizations should be aware of social engineering defense mechanisms and security policies. To that end, the authors developed a taxonomy of social engineering defense mechanisms, designed a survey to measure employee awareness of these mechanisms, proposed a model of Social Engineering InfoSec Policies (SE-IPs), and designed a survey to measure the incorporation level of these SE-IPs. After analyzing the data from the first survey, the authors found that more than half of employees are not aware of social engineering attacks. The paper also analyzed a second set of survey data, which found that on average, organizations incorporated just over fifty percent of the identified formal SE-IPs. Such worrisome results show that organizations are vulnerable to social engineering attacks, and serious steps need to be taken to elevate awareness against these emerging security threats.
社会工程攻击可能很严重,而且很难检测到。因此,为了防止此类攻击,组织应该了解社会工程防御机制和安全策略。为此,作者制定了社会工程防御机制的分类,设计了一项调查来衡量员工对这些机制的认识,提出了社会工程信息安全政策(se - ip)模型,并设计了一项调查来衡量这些se - ip的纳入水平。在分析了第一次调查的数据后,作者发现超过一半的员工不知道社会工程攻击。该论文还分析了第二组调查数据,发现平均而言,组织将超过50%的已确定的正式se - ip纳入其中。这些令人担忧的结果表明,组织很容易受到社会工程攻击,需要采取严肃的步骤来提高对这些新出现的安全威胁的认识。
{"title":"A Literature Survey and Analysis on Social Engineering Defense Mechanisms and Infosec Policies","authors":"Dalal N. Alharthi, A. Regan","doi":"10.5121/IJNSA.2021.13204","DOIUrl":"https://doi.org/10.5121/IJNSA.2021.13204","url":null,"abstract":"Social engineering attacks can be severe and hard to detect. Therefore, to prevent such attacks, organizations should be aware of social engineering defense mechanisms and security policies. To that end, the authors developed a taxonomy of social engineering defense mechanisms, designed a survey to measure employee awareness of these mechanisms, proposed a model of Social Engineering InfoSec Policies (SE-IPs), and designed a survey to measure the incorporation level of these SE-IPs. After analyzing the data from the first survey, the authors found that more than half of employees are not aware of social engineering attacks. The paper also analyzed a second set of survey data, which found that on average, organizations incorporated just over fifty percent of the identified formal SE-IPs. Such worrisome results show that organizations are vulnerable to social engineering attacks, and serious steps need to be taken to elevate awareness against these emerging security threats.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"29 1","pages":"41-61"},"PeriodicalIF":0.0,"publicationDate":"2021-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84335222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Comparison of Malware Classification Methods using Convolutional Neural Network based on API Call Stream 基于API调用流的卷积神经网络恶意软件分类方法比较
Pub Date : 2021-03-31 DOI: 10.5121/IJNSA.2021.13201
Matthew Schofield, Gülsüm Alicioğlu, Bo Sun, Russell Binaco, Paul Turner, Cameron Thatcher, Alex Lam, Anthony F. Breitzman
Malicious software is constantly being developed and improved, so detection and classification of malwareis an ever-evolving problem. Since traditional malware detection techniques fail to detect new/unknown malware, machine learning algorithms have been used to overcome this disadvantage. We present a Convolutional Neural Network (CNN) for malware type classification based on the API (Application Program Interface) calls. This research uses a database of 7107 instances of API call streams and 8 different malware types:Adware, Backdoor, Downloader, Dropper, Spyware, Trojan, Virus,Worm. We used a 1-Dimensional CNN by mapping API calls as categorical and term frequency-inverse document frequency (TF-IDF) vectors and compared the results to other classification techniques.The proposed 1-D CNN outperformed other classification techniques with 91% overall accuracy for both categorical and TFIDF vectors.
恶意软件不断发展和改进,因此恶意软件的检测和分类是一个不断发展的问题。由于传统的恶意软件检测技术无法检测到新的/未知的恶意软件,机器学习算法被用来克服这一缺点。提出了一种基于API(应用程序接口)调用的卷积神经网络(CNN)进行恶意软件类型分类。本研究使用了一个包含7107个API调用流实例的数据库和8种不同的恶意软件类型:广告软件、后门软件、下载软件、丢弃软件、间谍软件、特洛伊木马、病毒、蠕虫。我们通过将API调用映射为分类和词频率逆文档频率(TF-IDF)向量来使用一维CNN,并将结果与其他分类技术进行比较。本文提出的1-D CNN在分类向量和TFIDF向量上的总体准确率均达到91%,优于其他分类技术。
{"title":"Comparison of Malware Classification Methods using Convolutional Neural Network based on API Call Stream","authors":"Matthew Schofield, Gülsüm Alicioğlu, Bo Sun, Russell Binaco, Paul Turner, Cameron Thatcher, Alex Lam, Anthony F. Breitzman","doi":"10.5121/IJNSA.2021.13201","DOIUrl":"https://doi.org/10.5121/IJNSA.2021.13201","url":null,"abstract":"Malicious software is constantly being developed and improved, so detection and classification of malwareis an ever-evolving problem. Since traditional malware detection techniques fail to detect new/unknown malware, machine learning algorithms have been used to overcome this disadvantage. We present a Convolutional Neural Network (CNN) for malware type classification based on the API (Application Program Interface) calls. This research uses a database of 7107 instances of API call streams and 8 different malware types:Adware, Backdoor, Downloader, Dropper, Spyware, Trojan, Virus,Worm. We used a 1-Dimensional CNN by mapping API calls as categorical and term frequency-inverse document frequency (TF-IDF) vectors and compared the results to other classification techniques.The proposed 1-D CNN outperformed other classification techniques with 91% overall accuracy for both categorical and TFIDF vectors.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"67 1","pages":"1-19"},"PeriodicalIF":0.0,"publicationDate":"2021-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89871339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Applying the Health Belief Model to Cardiac Implanted Medical Device Patients 健康信念模型在心脏植入医疗器械患者中的应用
Pub Date : 2021-03-31 DOI: 10.5121/IJNSA.2021.13203
George W. Jackson, Shawon S. M. Rahman
Wireless Implanted Medical Devices (WIMD) are helping millions of users experience a better quality of life. Because of their many benefits, these devices are experiencing dramatic growth in usage, application, and complexity. However, this rapid growth has precipitated an equally rapid growth of cybersecurity risks and threats. While it is apparent from the literature WIMD cybersecurity is a shared responsibility among manufacturers, healthcare providers, and patients; what explained what role patients should play in WIMD cybersecurity and how patients should be empowered to assume this role. The health belief model (HBM) was applied as the theoretical framework for a multiple case study which examined the question: How are the cybersecurity risks and threats related to wireless implanted medical devices being communicated to patients who have or will have these devices implanted in their bodies? The subjects of this multiple case study were sixteen cardiac device specialists in the U.S., each possessing at least one year of experience working directly with cardiac implanted medical device (CIMD) patients, who actively used cardiac device home monitoring systems. The HBM provides a systematic framework suitable for the proposed research. Because of its six-decade history of validity and its extraordinary versatility, the health belief model, more efficiently than any other model considered, provides a context for understanding and interpreting the results of this study. Thus, the theoretical contribution of this research is to apply the HBM in a setting where it has never been applied before, WIMD patient cybersecurity awareness. This analysis (using a multiple case study) will demonstrate how the HBM can assist the health practitioners, regulators, manufacturers, security practitioners, and the research community in better understanding the factors, which support WIMD patient cybersecurity awareness and subsequent adherence to cybersecurity best practices.
无线植入医疗设备(WIMD)正在帮助数百万用户体验更好的生活质量。由于这些设备具有许多优点,因此它们的使用量、应用程序和复杂性都在急剧增长。然而,这种快速增长也导致了网络安全风险和威胁的快速增长。虽然从文献中可以明显看出,WIMD网络安全是制造商、医疗保健提供者和患者的共同责任;解释了患者在WIMD网络安全中应该扮演什么角色,以及患者应该如何被授权承担这一角色。健康信念模型(HBM)被用作一个多案例研究的理论框架,该研究调查了以下问题:如何将与无线植入医疗设备相关的网络安全风险和威胁传达给已经或将植入这些设备的患者?这个多案例研究的对象是美国的16位心脏设备专家,每位专家都至少有一年直接与心脏植入医疗设备(CIMD)患者一起工作的经验,这些患者积极使用心脏设备家庭监测系统。HBM为提出的研究提供了一个系统的框架。由于其六十年的有效性和非凡的多功能性,健康信念模型比任何其他模型都更有效,为理解和解释本研究的结果提供了一个背景。因此,本研究的理论贡献在于将HBM应用于以前从未应用过的环境中,即WIMD患者网络安全意识。本分析(使用多个案例研究)将展示HBM如何帮助卫生从业人员、监管机构、制造商、安全从业人员和研究界更好地理解支持WIMD患者网络安全意识和随后遵守网络安全最佳实践的因素。
{"title":"Applying the Health Belief Model to Cardiac Implanted Medical Device Patients","authors":"George W. Jackson, Shawon S. M. Rahman","doi":"10.5121/IJNSA.2021.13203","DOIUrl":"https://doi.org/10.5121/IJNSA.2021.13203","url":null,"abstract":"Wireless Implanted Medical Devices (WIMD) are helping millions of users experience a better quality of life. Because of their many benefits, these devices are experiencing dramatic growth in usage, application, and complexity. However, this rapid growth has precipitated an equally rapid growth of cybersecurity risks and threats. While it is apparent from the literature WIMD cybersecurity is a shared responsibility among manufacturers, healthcare providers, and patients; what explained what role patients should play in WIMD cybersecurity and how patients should be empowered to assume this role. The health belief model (HBM) was applied as the theoretical framework for a multiple case study which examined the question: How are the cybersecurity risks and threats related to wireless implanted medical devices being communicated to patients who have or will have these devices implanted in their bodies? The subjects of this multiple case study were sixteen cardiac device specialists in the U.S., each possessing at least one year of experience working directly with cardiac implanted medical device (CIMD) patients, who actively used cardiac device home monitoring systems. The HBM provides a systematic framework suitable for the proposed research. Because of its six-decade history of validity and its extraordinary versatility, the health belief model, more efficiently than any other model considered, provides a context for understanding and interpreting the results of this study. Thus, the theoretical contribution of this research is to apply the HBM in a setting where it has never been applied before, WIMD patient cybersecurity awareness. This analysis (using a multiple case study) will demonstrate how the HBM can assist the health practitioners, regulators, manufacturers, security practitioners, and the research community in better understanding the factors, which support WIMD patient cybersecurity awareness and subsequent adherence to cybersecurity best practices.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"40 1","pages":"31-39"},"PeriodicalIF":0.0,"publicationDate":"2021-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78604210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Enhanced Differential Private Protection Method Based on Adaptive Iterative Wiener Filtering in Discrete Time Series 离散时间序列中基于自适应迭代维纳滤波的增强差分私保护方法
Pub Date : 2021-03-01 DOI: 10.6633/IJNS.202103_23(2).19
Dan zheng, Lei Meng, Shoulin Yin, Hang Li
Although many proposed researches on differential privacy protection in correlation time series have made great progress, there are still some problems. Because different methods are based on different models and rules. There is no uniform attack model, their privacy protection intensity cannot be compared and measured horizontally. This paper designs an attack model for the differential privacy in correlation time series based on adaptive iterative wiener filtering. Experimental results show that the attack model is effective and provides an uniform measurement for the privacy protection with different methods.
尽管许多关于相关时间序列差分隐私保护的研究已经取得了很大的进展,但仍然存在一些问题。因为不同的方法基于不同的模型和规则。没有统一的攻击模式,它们的隐私保护强度无法横向比较和衡量。设计了一种基于自适应迭代维纳滤波的相关时间序列差分隐私攻击模型。实验结果表明,该攻击模型是有效的,为不同方法的隐私保护提供了统一的衡量标准。
{"title":"An Enhanced Differential Private Protection Method Based on Adaptive Iterative Wiener Filtering in Discrete Time Series","authors":"Dan zheng, Lei Meng, Shoulin Yin, Hang Li","doi":"10.6633/IJNS.202103_23(2).19","DOIUrl":"https://doi.org/10.6633/IJNS.202103_23(2).19","url":null,"abstract":"Although many proposed researches on differential privacy protection in correlation time series have made great progress, there are still some problems. Because different methods are based on different models and rules. There is no uniform attack model, their privacy protection intensity cannot be compared and measured horizontally. This paper designs an attack model for the differential privacy in correlation time series based on adaptive iterative wiener filtering. Experimental results show that the attack model is effective and provides an uniform measurement for the privacy protection with different methods.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"73 1","pages":"351-358"},"PeriodicalIF":0.0,"publicationDate":"2021-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82875928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
International journal of network security & its applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1