International Journal of Information Security and Privacy最新文献

筛选
英文 中文
Information Security Situation in Blockchain for Secure SDN Based on Big Data in Smart Communities 基于大数据的智慧社区安全SDN区块链信息安全现状
IF 0.8
International Journal of Information Security and Privacy Pub Date : 2022-04-01 DOI: 10.4018/ijisp.308315
Feilu Hang, Linjiang Xie, Zhenhong Zhang, W. Guo, Hanruo Li
{"title":"Information Security Situation in Blockchain for Secure SDN Based on Big Data in Smart Communities","authors":"Feilu Hang, Linjiang Xie, Zhenhong Zhang, W. Guo, Hanruo Li","doi":"10.4018/ijisp.308315","DOIUrl":"https://doi.org/10.4018/ijisp.308315","url":null,"abstract":"In the internet of things (IoT) and big data, the global information society is entering a new phase where consumers, networks, and perception devices work together more intimately. Software-defined networks (SDN) offer lower latency and massive connectivity for intelligent devices (IoT) for the internet of things. Smart communities are one of the most important applications of the blockchain. SDN technology is used to provide residents with smart services. Situational awareness for information security offers a distinct, high-level security perspective based on security alarm occurrences. However, contemporary information security warning data has become too complicated and varied than a simple analysis is almost impossible. In addition to enhancing IoT security's monitoring, emergency response, and forecasting capabilities, this article presents an IoT-assisted information security situation awareness framework (IoT-ISSAF). SDN model has been validated through simulation as being able to accurately assess the current state of network security in blockchain.","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":" ","pages":""},"PeriodicalIF":0.8,"publicationDate":"2022-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48469475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network Anomalies Detection Approach Based on Weighted Voting 基于加权投票的网络异常检测方法
IF 0.8
International Journal of Information Security and Privacy Pub Date : 2022-01-01 DOI: 10.4018/ijisp.2022010105
S. Sakulin, Alexander Alfimtsev, K. Kvitchenko, Leonid Dobkacz, Yuri Kalgin, Igor I. Lychkov
{"title":"Network Anomalies Detection Approach Based on Weighted Voting","authors":"S. Sakulin, Alexander Alfimtsev, K. Kvitchenko, Leonid Dobkacz, Yuri Kalgin, Igor I. Lychkov","doi":"10.4018/ijisp.2022010105","DOIUrl":"https://doi.org/10.4018/ijisp.2022010105","url":null,"abstract":"To avoid information systems malfunction, their integrity disruption, availability violation as well as data confidentiality, it is necessary to detect anomalies in information system operation as quickly as possible. The anomalies are usually caused by malicious activity – information systems attacks. However, the current approaches to detect anomalies in information systems functioning have never been perfect. In particular, statistical and signature-based techniques do not allow detection of anomalies based on modifications of well-known attacks, dynamic approaches based on machine learning techniques result in false responses and frequent anomaly miss-outs. Therefore, various hybrid solutions are being frequently offered on the basis of those two approaches. The paper suggests a hybrid approach to detect anomalies by combining computationally efficient classifiers of machine learning with accuracy increase due to weighted voting. Pilot evaluation of the developed approach proved its feasibility for anomaly detection systems.","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":"16 1","pages":"1-17"},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70458921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Information Security and Privacy: 27th Australasian Conference, ACISP 2022, Wollongong, NSW, Australia, November 28–30, 2022, Proceedings 信息安全和隐私:第27届澳大利亚会议,ACISP 2022,卧龙岗,新南威尔士州,澳大利亚,2022年11月28日至30日,会议录
IF 0.8
International Journal of Information Security and Privacy Pub Date : 2022-01-01 DOI: 10.1007/978-3-031-22301-3
{"title":"Information Security and Privacy: 27th Australasian Conference, ACISP 2022, Wollongong, NSW, Australia, November 28–30, 2022, Proceedings","authors":"","doi":"10.1007/978-3-031-22301-3","DOIUrl":"https://doi.org/10.1007/978-3-031-22301-3","url":null,"abstract":"","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":"50 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82161869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved Feature-Level Fusion-Based Biometric System for Genuine and Imposter Identification 改进的基于特征级融合的真伪识别生物识别系统
IF 0.8
International Journal of Information Security and Privacy Pub Date : 2022-01-01 DOI: 10.4018/ijisp.307068
R. BharathM., K. A. R. Rao
{"title":"Improved Feature-Level Fusion-Based Biometric System for Genuine and Imposter Identification","authors":"R. BharathM., K. A. R. Rao","doi":"10.4018/ijisp.307068","DOIUrl":"https://doi.org/10.4018/ijisp.307068","url":null,"abstract":"","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":"16 1","pages":"1-44"},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70459423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy Disclosure in the Real World: An Experimental Study 现实世界中的隐私披露:一项实验研究
IF 0.8
International Journal of Information Security and Privacy Pub Date : 2022-01-01 DOI: 10.4018/ijisp.2022010101
Siyu Wang, Nafei Zhu, Jingsha He, Da Teng, Yue Yang
{"title":"Privacy Disclosure in the Real World: An Experimental Study","authors":"Siyu Wang, Nafei Zhu, Jingsha He, Da Teng, Yue Yang","doi":"10.4018/ijisp.2022010101","DOIUrl":"https://doi.org/10.4018/ijisp.2022010101","url":null,"abstract":"Privacy protection is a hot topic in network security, many scholars are committed to evaluating privacy information disclosure by quantifying privacy, thereby protecting privacy and preventing telecommunications fraud. However, in the process of quantitative privacy, few people consider the reasoning relationship between privacy information, which leads to the underestimation of privacy disclosure and privacy disclosure caused by malicious reasoning. This paper completes an experiment on privacy information disclosure in the real world based on WordNet ontology .According to a privacy measurement algorithm, this experiment calculates the privacy disclosure of public figures in different fields, and conducts horizontal and vertical analysis to obtain different privacy disclosure characteristics. The experiment not only shows the situation of privacy disclosure, but also gives suggestions and method to reduce privacy disclosure.","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":"16 1","pages":"1-22"},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70458968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Ensemble approach for feature selection and classification in intrusion detection using Extra-Tree algorithm 基于Extra-Tree算法的入侵检测特征选择与分类集成方法
IF 0.8
International Journal of Information Security and Privacy Pub Date : 2022-01-01 DOI: 10.4018/ijisp.2022010113
{"title":"An Ensemble approach for feature selection and classification in intrusion detection using Extra-Tree algorithm","authors":"","doi":"10.4018/ijisp.2022010113","DOIUrl":"https://doi.org/10.4018/ijisp.2022010113","url":null,"abstract":"The number of attacks increased with speedy development in web communication in the last couple of years. The Anomaly Detection method for IDS has become substantial in detecting novel attacks in Intrusion Detection System (IDS). Achieving high accuracy are the significant challenges in designing an intrusion detection system. It also emphasizes applying different feature selection techniques to identify the most suitable feature subset. The author uses Extremely randomized trees (Extra-Tree) for feature importance. The author tries multiple thresholds on the feature importance parameters to find the best features. If single classifiers use, then the classifier's output is wrong, so that the final decision may be wrong. So The author uses an Extra-Tree classifier applied to the best-selected features. The proposed method is estimated on standard datasets KDD CUP'99, NSL-KDD, and UNSW-NB15. The experimental results show that the proposed approach performs better than existing methods in detection rate, false alarm rate, and accuracy.","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":" ","pages":""},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45963517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Secure and Flexible Key Protected Identity Framework for Mobile Devices 安全灵活的移动设备密钥保护身份框架
IF 0.8
International Journal of Information Security and Privacy Pub Date : 2022-01-01 DOI: 10.4018/ijisp.2022010117
Kapil Kant Kamal, M. Kapoor, Padmaja Joshi
{"title":"Secure and Flexible Key Protected Identity Framework for Mobile Devices","authors":"Kapil Kant Kamal, M. Kapoor, Padmaja Joshi","doi":"10.4018/ijisp.2022010117","DOIUrl":"https://doi.org/10.4018/ijisp.2022010117","url":null,"abstract":"Mobile or IOT based applications are emerging rapidly across the globe and there is a massive digital transformation happening within each country. It is a need of an hour to improve and protect digital identity during online transactions through handheld devices. This paper proposes a Mobile ID solution based on Mobile-originated PKI without the need for the actual identity card or a card reader. The solution proposed focuses on security, privacy, and usability using open standards which will protect Personally Identifiable Information (PII) over handheld devices. The proposed mobile ID solution has better cost-efficacy and privacy than today’s scenario. It also explicates the Mobile ID solution with established secure identity among users, authorities, other organizations of public, and private sectors.","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":"16 1","pages":"1-17"},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70459564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An Effective Intrusion Detection System Using Homogeneous Ensemble Techniques 基于同构集成技术的有效入侵检测系统
IF 0.8
International Journal of Information Security and Privacy Pub Date : 2022-01-01 DOI: 10.4018/ijisp.2022010112
F. Masoodi, Iram Abrar, A. Bamhdi
{"title":"An Effective Intrusion Detection System Using Homogeneous Ensemble Techniques","authors":"F. Masoodi, Iram Abrar, A. Bamhdi","doi":"10.4018/ijisp.2022010112","DOIUrl":"https://doi.org/10.4018/ijisp.2022010112","url":null,"abstract":"In this work, homogeneous ensemble techniques, namely bagging and boosting were employed for intrusion detection to determine the intrusive activities in network by monitoring the network traffic. Simultaneously, model diversity was enhanced as numerous algorithms were taken into account, thereby leading to an increase in the detection rate Several classifiers, i.e., SVM, KNN, RF, ETC and MLP) were used in case of bagging approach. Likewise, tree-based classifiers have been employed for boosting. The proposed model was tested on NSL-KDD dataset that was initially subjected to preprocessing. Accordingly, ten most significant features were identified using decision tree and recursive feature elimination method. Furthermore, the dataset was divided into five subsets, each one them being subjected to training, and the final results were obtained based on majority voting. Experimental results proved that the model was effective for detecting intrusive activities. Bagged ETC and boosted RF outperformed all the other classifiers with an accuracy of 99.123% and 99.309%, respectively.","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":"16 1","pages":"1-18"},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70458988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Predicting Security-Vulnerable Developers Based on Their Techno-Behavioral Characteristics 基于技术行为特征的安全漏洞开发者预测
IF 0.8
International Journal of Information Security and Privacy Pub Date : 2022-01-01 DOI: 10.4018/ijisp.2022010103
M. D. J. S. Goonetillake, Rangana Jayashanka, S. V. Rathnayaka
{"title":"Predicting Security-Vulnerable Developers Based on Their Techno-Behavioral Characteristics","authors":"M. D. J. S. Goonetillake, Rangana Jayashanka, S. V. Rathnayaka","doi":"10.4018/ijisp.2022010103","DOIUrl":"https://doi.org/10.4018/ijisp.2022010103","url":null,"abstract":"Assigning developers for highly secured software projects requires identifying developers’ tendency to contribute towards vulnerable software codes called developer-centric security vulnerability to mitigate issues on human resource management, financial and project timelines. There are problems in assessing the previous codebases in evaluating the developer-centric security vulnerability level of each developer. Thus, this paper suggests a method to evaluate this through the techno-behavioral features of their previous projects. Consequently, we present results of an exploratory study of the developer-centric security vulnerability level prediction using a dataset of 1827 developers by logically selecting 13 techno-behavioral features. Our results depict that there is a correlation between techno-behavioral features and developer-centric security vulnerability with 89.46% accuracy. This model enables to predict developer-centric security vulnerability level of any developer if the required techno-behavioral features are available avoiding the analysis of his/her previous codebases.","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":"16 1","pages":"1-26"},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70458745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Chaotic Shark Smell Optimization With LSTM for Spatio-Temporal Analytics in Clustered WSN 基于LSTM的混沌鲨鱼气味优化方法在聚类WSN时空分析中的应用
IF 0.8
International Journal of Information Security and Privacy Pub Date : 2022-01-01 DOI: 10.4018/ijisp.308310
M. KusumaS., N. VeenaK., B. Varun
{"title":"A Novel Chaotic Shark Smell Optimization With LSTM for Spatio-Temporal Analytics in Clustered WSN","authors":"M. KusumaS., N. VeenaK., B. Varun","doi":"10.4018/ijisp.308310","DOIUrl":"https://doi.org/10.4018/ijisp.308310","url":null,"abstract":"","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":"16 1","pages":"1-16"},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70459533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信