网络攻击与特征特刊

IF 0.5 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING International Journal of Information Security and Privacy Pub Date : 2016-01-02 DOI:10.1080/15536548.2016.1139422
D. Agrawal
{"title":"网络攻击与特征特刊","authors":"D. Agrawal","doi":"10.1080/15536548.2016.1139422","DOIUrl":null,"url":null,"abstract":"Emergence of Internet of Things (IoT) has enlarged the scope of the network even in daily life, and today many household items are being served or connected together. Due to such infiltration of networking, the need for security and secured communication has become increasingly important. Security simply means protection from any potential harm to valuable assets (data and/or information) or deterrence of malicious behavior. In contrast, secured communication implies two communicating entities should not be heard or modified by any third person. That type of communication means the encrypted shared information between two entities cannot be interpreted by anyone else as information is encoded by the sender that can be easily decoded by the intended receiver. If transmission is achieved in multi-hop fashion, the paths should not be traceable by unauthorized entities. Other than spoken face-to-face interaction, it can be generalized that no communication is guaranteed to be secure; despite trying to provide all technical support, the sheer volume of communication could limit the amount of surveillance. This Special Issue addresses some of these issues in wired communication. This Special Issue contains three articles dealing with different aspects of attacks. These outbreaks are possible by intruders and phishing attacks sending an email to the victim that appears to be from a legitimate organization. The idea is to obtain the victim’s credentials at some false webpage or install some spyware on the victim’s machine. This type of attack has become one of the most serious threats to all Internet users. Several approaches have been considered in the literature. The first article deals with a comprehensive solution to detect and filter the various types of phishing attacks. These attacks include email phishing that an attacker can easily perform by copying any legitimate website, whereas detection of phishing attacks is not as easy as it appears. Such an attack can be initiated when an attacker sends a spoofed email with embedded malicious links to a user to update their account information that appears to be legitimate. More attention is being paid to the use of phishing links on the Internet in sending promotional and monetary e-mails to attract the users. Strengths and associated weakness of different approaches have been considered and recent developments have been included. The scope of future research has also been outlined in this article. The growth of on-line social networks has been explosive, even though maintaining privacy is becoming important both in Industry and Academia. Most of the existing works on the privacypreserved online social networks are based on static graphs. Users’ social interests are used to form “channel subscriptions”. Exploring a social actor’s subscribed channel sizes and the frequency of joining/leaving the channels can be used to indicate multiple relations among social actors that represent evolving social subscription networks (ESSN) as a hypergraph. But, due to the unique structure, ESSN is vulnerable to both spatial and temporal attacks. The way sparse data is partitioned into several anonymous groups does affect its utility. An adversary may still be able to identify some nodes even if they may have the same node rank sequence. Nodes subscribing to different channels could lead to inappropriate grouping. To avoid this, the second article first compresses and coarsely partitions the data space and then employs a new concept of equivalent channels that helps in anonymization of ESSN. For protecting privacy, K-anonymization needs to be confirmed for the whole network such that the members of each group are indistinguishable. The second article entitled, “Privacy-preserved","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":"8 1","pages":"1 - 2"},"PeriodicalIF":0.5000,"publicationDate":"2016-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Special Issue on Attacks and Distinct Features in Networks\",\"authors\":\"D. Agrawal\",\"doi\":\"10.1080/15536548.2016.1139422\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Emergence of Internet of Things (IoT) has enlarged the scope of the network even in daily life, and today many household items are being served or connected together. Due to such infiltration of networking, the need for security and secured communication has become increasingly important. Security simply means protection from any potential harm to valuable assets (data and/or information) or deterrence of malicious behavior. In contrast, secured communication implies two communicating entities should not be heard or modified by any third person. That type of communication means the encrypted shared information between two entities cannot be interpreted by anyone else as information is encoded by the sender that can be easily decoded by the intended receiver. If transmission is achieved in multi-hop fashion, the paths should not be traceable by unauthorized entities. Other than spoken face-to-face interaction, it can be generalized that no communication is guaranteed to be secure; despite trying to provide all technical support, the sheer volume of communication could limit the amount of surveillance. This Special Issue addresses some of these issues in wired communication. This Special Issue contains three articles dealing with different aspects of attacks. These outbreaks are possible by intruders and phishing attacks sending an email to the victim that appears to be from a legitimate organization. The idea is to obtain the victim’s credentials at some false webpage or install some spyware on the victim’s machine. This type of attack has become one of the most serious threats to all Internet users. Several approaches have been considered in the literature. The first article deals with a comprehensive solution to detect and filter the various types of phishing attacks. These attacks include email phishing that an attacker can easily perform by copying any legitimate website, whereas detection of phishing attacks is not as easy as it appears. Such an attack can be initiated when an attacker sends a spoofed email with embedded malicious links to a user to update their account information that appears to be legitimate. More attention is being paid to the use of phishing links on the Internet in sending promotional and monetary e-mails to attract the users. Strengths and associated weakness of different approaches have been considered and recent developments have been included. The scope of future research has also been outlined in this article. The growth of on-line social networks has been explosive, even though maintaining privacy is becoming important both in Industry and Academia. Most of the existing works on the privacypreserved online social networks are based on static graphs. Users’ social interests are used to form “channel subscriptions”. Exploring a social actor’s subscribed channel sizes and the frequency of joining/leaving the channels can be used to indicate multiple relations among social actors that represent evolving social subscription networks (ESSN) as a hypergraph. But, due to the unique structure, ESSN is vulnerable to both spatial and temporal attacks. The way sparse data is partitioned into several anonymous groups does affect its utility. An adversary may still be able to identify some nodes even if they may have the same node rank sequence. Nodes subscribing to different channels could lead to inappropriate grouping. To avoid this, the second article first compresses and coarsely partitions the data space and then employs a new concept of equivalent channels that helps in anonymization of ESSN. For protecting privacy, K-anonymization needs to be confirmed for the whole network such that the members of each group are indistinguishable. The second article entitled, “Privacy-preserved\",\"PeriodicalId\":44332,\"journal\":{\"name\":\"International Journal of Information Security and Privacy\",\"volume\":\"8 1\",\"pages\":\"1 - 2\"},\"PeriodicalIF\":0.5000,\"publicationDate\":\"2016-01-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Information Security and Privacy\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1080/15536548.2016.1139422\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"COMPUTER SCIENCE, SOFTWARE ENGINEERING\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Information Security and Privacy","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1080/15536548.2016.1139422","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, SOFTWARE ENGINEERING","Score":null,"Total":0}
引用次数: 0

摘要

物联网(IoT)的出现扩大了网络的范围,甚至在日常生活中,今天许多家庭物品都被服务或连接在一起。由于网络的这种渗透,对安全和安全通信的需求变得越来越重要。安全仅仅意味着防止对有价值资产(数据和/或信息)的任何潜在损害,或阻止恶意行为。相比之下,安全通信意味着两个通信实体不应被任何第三方听到或修改。这种类型的通信意味着两个实体之间加密的共享信息不能被其他任何人解释,因为信息是由发送方编码的,可以很容易地被预期的接收方解码。如果传输是以多跳方式实现的,则未经授权的实体不应该跟踪路径。除了口头的面对面交流,可以概括地说,没有任何交流是保证安全的;尽管试图提供所有技术支持,但庞大的通信量可能会限制监控的数量。本期专题讨论了有线通信中的一些问题。本期特刊包含三篇文章,讨论攻击的不同方面。这些爆发可能是由入侵者和网络钓鱼攻击向受害者发送看似来自合法组织的电子邮件造成的。这个想法是在一些虚假的网页上获取受害者的凭据,或者在受害者的机器上安装一些间谍软件。这种类型的攻击已经成为对所有互联网用户最严重的威胁之一。文献中考虑了几种方法。第一篇文章讨论了一个全面的解决方案,用于检测和过滤各种类型的网络钓鱼攻击。这些攻击包括电子邮件网络钓鱼,攻击者可以通过复制任何合法网站轻松执行,而检测网络钓鱼攻击并不像看起来那么容易。当攻击者向用户发送带有嵌入恶意链接的欺骗电子邮件,以更新其看似合法的帐户信息时,就可以发起此类攻击。越来越多的人注意到利用互联网上的钓鱼链接发送促销和金钱电子邮件来吸引用户。已经考虑了不同方法的优点和相关缺点,并包括了最近的发展。本文还概述了未来的研究范围。在线社交网络呈爆炸式增长,尽管保护隐私在工业界和学术界都变得越来越重要。现有的大多数关于隐私保护的在线社交网络的研究都是基于静态图形的。用户的社会兴趣被用来形成“频道订阅”。探索一个社会参与者的订阅渠道规模和加入/离开渠道的频率可以用来表明社会参与者之间的多重关系,这些关系代表了一个超图的不断发展的社会订阅网络(ESSN)。但是,由于其独特的结构,ESSN容易受到空间和时间攻击。将稀疏数据划分为几个匿名组的方式确实会影响其效用。攻击者可能仍然能够识别一些节点,即使它们可能具有相同的节点秩序列。订阅不同通道的节点可能导致不适当的分组。为了避免这种情况,第二篇文章首先对数据空间进行压缩和粗略分区,然后采用等效通道的新概念,这有助于ESSN的匿名化。为了保护隐私,需要对整个网络进行k匿名化确认,使每个组的成员无法区分。第二篇文章题为“保护隐私”
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Special Issue on Attacks and Distinct Features in Networks
Emergence of Internet of Things (IoT) has enlarged the scope of the network even in daily life, and today many household items are being served or connected together. Due to such infiltration of networking, the need for security and secured communication has become increasingly important. Security simply means protection from any potential harm to valuable assets (data and/or information) or deterrence of malicious behavior. In contrast, secured communication implies two communicating entities should not be heard or modified by any third person. That type of communication means the encrypted shared information between two entities cannot be interpreted by anyone else as information is encoded by the sender that can be easily decoded by the intended receiver. If transmission is achieved in multi-hop fashion, the paths should not be traceable by unauthorized entities. Other than spoken face-to-face interaction, it can be generalized that no communication is guaranteed to be secure; despite trying to provide all technical support, the sheer volume of communication could limit the amount of surveillance. This Special Issue addresses some of these issues in wired communication. This Special Issue contains three articles dealing with different aspects of attacks. These outbreaks are possible by intruders and phishing attacks sending an email to the victim that appears to be from a legitimate organization. The idea is to obtain the victim’s credentials at some false webpage or install some spyware on the victim’s machine. This type of attack has become one of the most serious threats to all Internet users. Several approaches have been considered in the literature. The first article deals with a comprehensive solution to detect and filter the various types of phishing attacks. These attacks include email phishing that an attacker can easily perform by copying any legitimate website, whereas detection of phishing attacks is not as easy as it appears. Such an attack can be initiated when an attacker sends a spoofed email with embedded malicious links to a user to update their account information that appears to be legitimate. More attention is being paid to the use of phishing links on the Internet in sending promotional and monetary e-mails to attract the users. Strengths and associated weakness of different approaches have been considered and recent developments have been included. The scope of future research has also been outlined in this article. The growth of on-line social networks has been explosive, even though maintaining privacy is becoming important both in Industry and Academia. Most of the existing works on the privacypreserved online social networks are based on static graphs. Users’ social interests are used to form “channel subscriptions”. Exploring a social actor’s subscribed channel sizes and the frequency of joining/leaving the channels can be used to indicate multiple relations among social actors that represent evolving social subscription networks (ESSN) as a hypergraph. But, due to the unique structure, ESSN is vulnerable to both spatial and temporal attacks. The way sparse data is partitioned into several anonymous groups does affect its utility. An adversary may still be able to identify some nodes even if they may have the same node rank sequence. Nodes subscribing to different channels could lead to inappropriate grouping. To avoid this, the second article first compresses and coarsely partitions the data space and then employs a new concept of equivalent channels that helps in anonymization of ESSN. For protecting privacy, K-anonymization needs to be confirmed for the whole network such that the members of each group are indistinguishable. The second article entitled, “Privacy-preserved
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
International Journal of Information Security and Privacy
International Journal of Information Security and Privacy COMPUTER SCIENCE, SOFTWARE ENGINEERING-
CiteScore
2.50
自引率
0.00%
发文量
73
期刊介绍: As information technology and the Internet become more and more ubiquitous and pervasive in our daily lives, there is an essential need for a more thorough understanding of information security and privacy issues and concerns. The International Journal of Information Security and Privacy (IJISP) creates and fosters a forum where research in the theory and practice of information security and privacy is advanced. IJISP publishes high quality papers dealing with a wide range of issues, ranging from technical, legal, regulatory, organizational, managerial, cultural, ethical and human aspects of information security and privacy, through a balanced mix of theoretical and empirical research articles, case studies, book reviews, tutorials, and editorials. This journal encourages submission of manuscripts that present research frameworks, methods, methodologies, theory development and validation, case studies, simulation results and analysis, technological architectures, infrastructure issues in design, and implementation and maintenance of secure and privacy preserving initiatives.
期刊最新文献
Adaptive Personalized Randomized Response Method Based on Local Differential Privacy A Novel CNN-LSTM Fusion-Based Intrusion Detection Method for Industrial Internet A System Dynamics Approach to Evaluate Advanced Persistent Threat Vectors Trust and Voice Biometrics Authentication for Internet of Things “Every Dog Has His Day”
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1