信息安全(英文)最新文献

筛选
英文 中文
Improved Smartphone Application for Remote Access by Network Administrators 用于网络管理员远程访问的改进的智能手机应用程序
信息安全(英文) Pub Date : 2019-10-25 DOI: 10.4236/jis.2019.104014
E. Nwabueze, E. Okon
{"title":"Improved Smartphone Application for Remote Access by Network Administrators","authors":"E. Nwabueze, E. Okon","doi":"10.4236/jis.2019.104014","DOIUrl":"https://doi.org/10.4236/jis.2019.104014","url":null,"abstract":"This research attempts the implementation of an improved smartphone application for remote system administration. The work was motivated by the inability of network administrators to access their virtual servers from a remote location without worrying about the security implications, inaccurate and unreliable reports from a third party whenever he is out of town. The cloud server can be monitored and administered because various task such as creating users, manage users (grant access, block or delete users), restart server and shutdown server can be handled by the remote system administrator. This will involve of securing the system with a one-way hashing of encrypted password and a device ID for only whitelisted devices to be granted access. It will be observed that remote access for system administration can be implemented using a smartphone app based on a Point-to-Point Protocol and also reveal the advantages of PPP protocol, therefore making the enormous responsibilities of a remote system administrator much easier to accomplish.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48810263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Development of a Novel Symmetric Algorithm for Enhancing Data Security in Cloud Computing 一种增强云计算数据安全的新型对称算法的设计与开发
信息安全(英文) Pub Date : 2019-10-14 DOI: 10.4236/jis.2019.104012
M. Hossain, A. Ullah, Newaz Ibrahim Khan, Feroz Alam
{"title":"Design and Development of a Novel Symmetric Algorithm for Enhancing Data Security in Cloud Computing","authors":"M. Hossain, A. Ullah, Newaz Ibrahim Khan, Feroz Alam","doi":"10.4236/jis.2019.104012","DOIUrl":"https://doi.org/10.4236/jis.2019.104012","url":null,"abstract":"Cloud computing \u0000is a kind of computing that depends on shared figuring assets instead of having \u0000nearby servers or individual gadgets to deal with applications. Technology is moving to the cloud more and more. \u0000It’s not just a trend, the shift away from ancient package models to package as \u0000service has steadily gained momentum over \u0000the last ten years. Looking forward, the following decade of cloud computing guarantees \u0000significantly more approaches to work from anyplace, utilizing cell phones. Cloud computing \u0000focused on better performances, better scalability and resource consumption but \u0000it also has some security issue with the data stored in it. The proposed \u0000algorithm intents to come with some solutions that will reduce the security \u0000threats and ensure far better security to the data stored in cloud.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45379168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Systematizing IT Risks IT风险系统化
信息安全(英文) Pub Date : 2019-10-14 DOI: 10.4236/jis.2019.104013
Georg Disterer
{"title":"Systematizing IT Risks","authors":"Georg Disterer","doi":"10.4236/jis.2019.104013","DOIUrl":"https://doi.org/10.4236/jis.2019.104013","url":null,"abstract":"IT \u0000risks—risks associated with the operation or use of information technology—have \u0000taken on great importance in business, and IT risk management is accordingly \u0000important in the science and practice of information management. Therefore, it \u0000is necessary to systematize IT risks in order to plan, manage and control for \u0000different risk-specific measures. In order to choose and implement suitable \u0000measures for managing IT risks, effect-based and cause-based \u0000procedures are necessary. These procedures are explained in detail for IT \u0000security risks because of their special importance.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42855446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Can Routers Provide Sufficient Protection against Cyber Security Attacks? 路由器能为网络安全攻击提供足够的保护吗?
信息安全(英文) Pub Date : 2019-10-14 DOI: 10.4236/jis.2019.104017
David L. Leal, Sanjeev Kumar
{"title":"Can Routers Provide Sufficient Protection against Cyber Security Attacks?","authors":"David L. Leal, Sanjeev Kumar","doi":"10.4236/jis.2019.104017","DOIUrl":"https://doi.org/10.4236/jis.2019.104017","url":null,"abstract":"Nowadays many devices that make up a computer network are being equipped with security hardware and software features to prevent cyber security attacks. The idea is to distribute security features to intermediate systems in the network to mitigate the overall adverse effect of cyber attacks. In this paper, we will be focusing on the Juniper J4350 router with the Junos Software Enhanced, and it has security-attack protections in the router. We are going to evaluate how the Juniper router with built-in security protections affected the overall server performance under a cyber security attack.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43411915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How Perceived Benefits and Barriers Affect Millennial Professionals’ Online Security Behaviors 感知的利益和障碍如何影响千禧一代专业人士的网络安全行为
信息安全(英文) Pub Date : 2019-10-14 DOI: 10.4236/jis.2019.104016
Fabrice Djatsa
{"title":"How Perceived Benefits and Barriers Affect Millennial Professionals’ Online Security Behaviors","authors":"Fabrice Djatsa","doi":"10.4236/jis.2019.104016","DOIUrl":"https://doi.org/10.4236/jis.2019.104016","url":null,"abstract":"Over the past decade, there has been an increase in cybersecurity breaches through identity theft, hacking, phishing attacks, and the use of malware such as viruses, worms, or trojans. The breaches have triggered an increase in investment in information security in organizations. As technology continues to improve, the risks of having cybersecurity incidents also increase. Cybersecurity firms reported that in 2016, there were 1209 total breaches with 1.1 billion identities exposed. Most experts agree that human vulnerability is a significant factor in cybersecurity. Most issues related to advanced threats come from human nature and ignorance. For the study, the researcher examined the relationship between Millennial professionals’ perceptions of cybersecurity risks and users’ online security behaviors. The study focused on two elements of perception which are perceived benefits and perceived barriers. The researcher administered a survey to 109 participants randomly selected among Survey Monkey audience members. The Spearman’s correlation test performed supported the analysis of the strength of the relationship and the level of significance between each of the independent variables and the dependent variable. The results from the statistical test provided enough evidence to reject each of the null hypothesis tested in this study. There were significant correlations between each of the independent variables, Perceived Benefits (PBE) and Perceived Barriers (PBA) and the dependent variable Online Security Behaviors (OSB).","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43747712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-Value Sequence Generated over Sub Extension Field and Its Properties 子可拓域上生成的多值序列及其性质
信息安全(英文) Pub Date : 2019-07-02 DOI: 10.4236/JIS.2019.103008
Md. Arshad Ali, Yuta Kodera, Takuya Kusaka, S. Uehara, Y. Nogami, R. Morelos-Zaragoza
{"title":"Multi-Value Sequence Generated over Sub Extension Field and Its Properties","authors":"Md. Arshad Ali, Yuta Kodera, Takuya Kusaka, S. Uehara, Y. Nogami, R. Morelos-Zaragoza","doi":"10.4236/JIS.2019.103008","DOIUrl":"https://doi.org/10.4236/JIS.2019.103008","url":null,"abstract":"Pseudo-random sequences with long period, low correlation, high linear complexity, and uniform distribution of bit patterns are widely used in the field of information security and cryptography. This paper proposes an approach for generating a pseudo-random multi-value sequence (including a binary sequence) by utilizing a primitive polynomial, trace function, and k-th power residue symbol over the sub extension field. All our previous sequences are defined over the prime field, whereas, proposed sequence in this paper is defined over the sub extension field. Thus, it’s a new and innovative perception to consider the sub extension field during the sequence generation procedure. By considering the sub extension field, two notable outcomes are: proposed sequence holds higher linear complexity and more uniform distribution of bit patterns compared to our previous work which defined over the prime field. Additionally, other important properties of the proposed multi-value sequence such as period, autocorrelation, and cross-correlation are theoretically shown along with some experimental results.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48884657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Intelligent Model for Online Recruitment Fraud Detection 一种在线招聘欺诈检测的智能模型
信息安全(英文) Pub Date : 2019-06-14 DOI: 10.4236/JIS.2019.103009
Bandar Alghamdi, Fahad M. Alharby
{"title":"An Intelligent Model for Online Recruitment Fraud Detection","authors":"Bandar Alghamdi, Fahad M. Alharby","doi":"10.4236/JIS.2019.103009","DOIUrl":"https://doi.org/10.4236/JIS.2019.103009","url":null,"abstract":"This study research attempts to prohibit privacy and loss of money for individuals and organization by creating a reliable model which can detect the fraud exposure in the online recruitment environments. This research presents a major contribution represented in a reliable detection model using ensemble approach based on Random forest classifier to detect Online Recruitment Fraud (ORF). The detection of Online Recruitment Fraud is characterized by other types of electronic fraud detection by its modern and the scarcity of studies on this concept. The researcher proposed the detection model to achieve the objectives of this study. For feature selection, support vector machine method is used and for classification and detection, ensemble classifier using Random Forest is employed. A freely available dataset called Employment Scam Aegean Dataset (EMSCAD) is used to apply the model. Pre-processing step had been applied before the selection and classification adoptions. The results showed an obtained accuracy of 97.41%. Further, the findings presented the main features and important factors in detection purpose include having a company profile feature, having a company logo feature and an industry feature.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49529990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Unlink Attack Defense Method Based on New Chunk Structure 基于新区块结构的Unlink攻击防御方法
信息安全(英文) Pub Date : 2019-06-14 DOI: 10.4236/JIS.2019.103010
Yuan-Zhi Huo, Gang Wang, Fachang Yang
{"title":"Unlink Attack Defense Method Based on New Chunk Structure","authors":"Yuan-Zhi Huo, Gang Wang, Fachang Yang","doi":"10.4236/JIS.2019.103010","DOIUrl":"https://doi.org/10.4236/JIS.2019.103010","url":null,"abstract":"The Unlink attack is a way of attacking the heap overflow vulnerability \u0000under the Linux platform. However, because the heap overflow data seldom \u0000directly leads to program control flow hijacking and related protection \u0000mechanism limitations, the existing detection technology is difficult to judge whether \u0000the program meets the heap overflow attack condition. There are certain \u0000inspection measures in the existing unlink mechanism, but with carefully \u0000constructing the contents of the heap, you can bypass the inspection measures. \u0000The unlink mechanism must be triggered with the free function, and this \u0000principle is similar to function-exit of stacks. The \u0000paper obtains the inspiration through the canary protection mechanism in the \u0000stack, adds it to the chunk structure, encrypts the canary value, and defends the \u0000unlink attack from the fundamental structure. The experimental results show \u0000that this method can effectively prevent the occurrence of unlink attacks and \u0000has the ability to detect common heap overflows.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42907804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comparative Study and Performance Analysis of ATM Card Fraud Detection Techniques ATM卡欺诈检测技术的比较研究与性能分析
信息安全(英文) Pub Date : 2019-06-14 DOI: 10.4236/JIS.2019.103011
Md. Mijanur Rahman, A. Saha
{"title":"A Comparative Study and Performance Analysis of ATM Card Fraud Detection Techniques","authors":"Md. Mijanur Rahman, A. Saha","doi":"10.4236/JIS.2019.103011","DOIUrl":"https://doi.org/10.4236/JIS.2019.103011","url":null,"abstract":"ATM card fraud is increasing gradually with the expansion of modern technology and global communication. In the whole world, it is resulting in the loss of billions of dollars each year. Fraud detection systems have become essential for all ATM card issuing banks to minimize their losses. The main goals are, firstly, to review alternative techniques that have been used in fraud detection and secondly compare and analyze these techniques that are already used in ATM card fraud detection. Recently different card security systems used different fraud detection techniques; these techniques are based on neural network, genetic algorithm, hidden Markov model, Bayesian network, decision tree, clustering method, support vector machine, etc. According to our survey, the most important parameters used for comparing these fraud detection systems are accuracy, speed and cost of fraud detection. This study is very useful for any ATM card provider to choose an appropriate solution for fraud detection problem and also enable us to build a hybrid approach for developing some effective algorithms which can perform properly on fraud detection mechanism.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48918757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Quantitative Evaluation of Cyber-Attacks on a Hypothetical School Computer Network 对假想学校计算机网络的网络攻击的定量评估
信息安全(英文) Pub Date : 2019-06-14 DOI: 10.4236/JIS.2019.103006
A. A. Akinola, A. Adekoya, A. Kuye, A. Ayodeji
{"title":"Quantitative Evaluation of Cyber-Attacks on a Hypothetical School Computer Network","authors":"A. A. Akinola, A. Adekoya, A. Kuye, A. Ayodeji","doi":"10.4236/JIS.2019.103006","DOIUrl":"https://doi.org/10.4236/JIS.2019.103006","url":null,"abstract":"This paper presents the attack tree modeling technique of quantifying cyber-attacks on a hypothetical school network system. Attack trees are constructed by decomposing the path in the network system where attacks are plausible. Considered for the network system are two possible network attack paths. One network path represents an attack through the Internet, and the other represents an attack through the Wireless Access Points (WAPs) in the school network. The probabilities of success of the events, that is, 1) the attack payoff, and 2) the commitment of the attacker to infiltrate the network are estimated for the leaf nodes. These are used to calculate the Returns on Attacks (ROAs) at the Root Nodes. For Phase I, the “As Is” network, the ROA values for both attack paths, are higher than 7 (8.00 and 9.35 respectively), which are high values and unacceptable operationally. In Phase II, countermeasures are implemented, and the two attack trees reevaluated. The probabilities of success of the events, the attack payoff and the commitment of the attacker are then re-estimated. Also, the Returns on Attacks (ROAs) for the Root Nodes are re-assessed after executing the countermeasures. For one attack tree, the ROA value of the Root Node was reduced to 4.83 from 8.0, while, for the other attack tree, the ROA value of the Root Node changed to 3.30 from 9.35. ROA values of 4.83 and 3.30 are acceptable as they fall within the medium value range. The efficacy of this method whereby, attack trees are deployed to mitigate computer network risks, as well as using it to assess the vulnerability of computer networks is quantitatively substantiated.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43712114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信