International journal of network security & its applications最新文献

筛选
英文 中文
Understanding Traffic Patterns of Covid-19 IoC in Huge Academic Backbone Network SINET 了解新型冠状病毒IoC在大型学术骨干网SINET中的流量模式
International journal of network security & its applications Pub Date : 2021-11-30 DOI: 10.5121/ijnsa.2021.13603
R. Ando, Y. Kadobayashi, H. Takakura, Hiroshi Itoh
{"title":"Understanding Traffic Patterns of Covid-19 IoC in Huge Academic Backbone Network SINET","authors":"R. Ando, Y. Kadobayashi, H. Takakura, Hiroshi Itoh","doi":"10.5121/ijnsa.2021.13603","DOIUrl":"https://doi.org/10.5121/ijnsa.2021.13603","url":null,"abstract":"Recently, APT (Advanced Persistent Threats) groups are using the COVID-19 pandemic as part of their cyber operations. In response to cyber threat actors, IoCs (Indicators of Compromise) are being provided to help us take some countermeasures. In this paper, we analyse how the coronavirus-based cyber attack unfolded on the academic infrastructure network SINET (The Science Information Network) based on the passive measurement with IoC. SINET is Japan's academic information infrastructure network. To extract and analyze the traffic patterns of the COVID-19 attacker group, we implemented a data flow pipeline for handling huge session traffic data observed on SINET. The data flow pipeline provides three functions: (1) identification the direction of the traffic, (2) filtering the port numbers, and (3) generation of the time series data. From the output of our pipeline, it is clear that the attacker's traffic can be broken down into several patterns. To name a few, we have witnessed (1) huge burstiness (port 25: FTP and high port applications), (3) diurnal patterns (port 443: SSL), and (3) periodic patterns with low amplitude (port 25: SMTP) We can conclude that some unveiled patterns by our pipeline are informative to handling security operations of the academic backbone network. Particularly, we have found burstiness of high port and unknown applications with the number of session data ranging from 10,000 to 35,000. For understanding the traffic patterns on SINET, our data flow pipeline can utilize any IoC based on the list of IP address for traffic ingress/egress identification and port filtering.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"6 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79463868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Can Blockchain be a Solution to IoT Technical and Security Issues 区块链能否成为物联网技术和安全问题的解决方案
International journal of network security & its applications Pub Date : 2021-11-30 DOI: 10.5121/ijnsa.2021.13609
Adanma Cecilia Eberendu, Titus Ifeanyi Chinebu
{"title":"Can Blockchain be a Solution to IoT Technical and Security Issues","authors":"Adanma Cecilia Eberendu, Titus Ifeanyi Chinebu","doi":"10.5121/ijnsa.2021.13609","DOIUrl":"https://doi.org/10.5121/ijnsa.2021.13609","url":null,"abstract":"The Internet of Things (IoT) is a growing trend in technology that interconnects millions of physical devices from any location anytime. Currently, IoT devices have become an integral part of human lives, as such organizations are deeply concerned with its security and technical issues. Blockchain system comprises a distributed digital ledger which is shared among community of users on the Internet; validated and recorded transactions in the ledger which cannot be altered or removed. We presented the challenges of IoT devices and how blockchain can be used to alleviate these problems. An outline of how to integrate blockchain with IoT was tackled, highlighting the challenges of IoT and how blockchain can remedy the issues. It was concluded that blockchain has the capability to curb the challenges posed by IoT devices.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"118 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77475216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improve Security in Smart Cities Based on IoT, Solve Cyber Electronic Attacks with Technology by using Packet Tracer 基于物联网提升智慧城市安全,利用数据包追踪技术解决网络电子攻击
International journal of network security & its applications Pub Date : 2021-11-30 DOI: 10.5121/ijnsa.2021.13605
Raed Al-hamarneh
{"title":"Improve Security in Smart Cities Based on IoT, Solve Cyber Electronic Attacks with Technology by using Packet Tracer","authors":"Raed Al-hamarneh","doi":"10.5121/ijnsa.2021.13605","DOIUrl":"https://doi.org/10.5121/ijnsa.2021.13605","url":null,"abstract":"Smart cities are expected to significantly improve people's quality of life, promote sustainable development, and enhance the efficiency of operations. With the implementation of many smart devices, c problems have become a serious challenge that needs strong treatments, especially the cyber-attack, which most countries suffer from it. My study focuses on the security of smart city systems, which include equipment like air conditioning, alarm systems, lighting, and doors. Some of the difficulties that arise daily may be found in the garage. This research aims to come up with a simulation of smart devices that can be and reduce cyber attach. Use of Cisco Packet tracer Features Simulated smart home and c devices are monitored. Simulation results show that smart objects can be connected to the home portal and objects can be successfullymonitored which leads to the idea of real-life implementation and see. In my research make manysolutions for attachingissues,which was great, and apply some wirelessprotocol.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"31 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84564496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving Security and Fairness in Federated Learning Systems 提高联邦学习系统的安全性和公平性
International journal of network security & its applications Pub Date : 2021-11-30 DOI: 10.5121/ijnsa.2021.13604
Andrew R. Short, Τheofanis G. Orfanoudakis, Helen C. Leligou
{"title":"Improving Security and Fairness in Federated Learning Systems","authors":"Andrew R. Short, Τheofanis G. Orfanoudakis, Helen C. Leligou","doi":"10.5121/ijnsa.2021.13604","DOIUrl":"https://doi.org/10.5121/ijnsa.2021.13604","url":null,"abstract":"The ever-increasing use of Artificial Intelligence applications has made apparent that the quality of the training datasets affects the performance of the models. To this end, Federated Learning aims to engage multiple entities to contribute to the learning process with locally maintained data, without requiring them to share the actual datasets. Since the parameter server does not have access to the actual training datasets, it becomes challenging to offer rewards to users by directly inspecting the dataset quality. Instead, this paper focuses on ways to strengthen user engagement by offering “fair” rewards, proportional to the model improvement (in terms of accuracy) they offer. Furthermore, to enable objective judgment of the quality of contribution, we devise a point system to record user performance assisted by blockchain technologies. More precisely, we have developed a verification algorithm that evaluates the performance of users’ contributions by comparing the resulting accuracy of the global model against a verification dataset and we demonstrate how this metric can be used to offer security improvements in a Federated Learning process. Further on, we implement the solution in a simulation environment in order to assess the feasibility and collect baseline results using datasets of varying quality.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"95 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86162608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Comparative Review of Malware Analysis Methodologies 恶意软件分析方法的比较回顾
International journal of network security & its applications Pub Date : 2021-11-30 DOI: 10.5121/ijnsa.2021.13608
Ioannis G. Kiachidis, Dimitrios A. Baltatzis
{"title":"Comparative Review of Malware Analysis Methodologies","authors":"Ioannis G. Kiachidis, Dimitrios A. Baltatzis","doi":"10.5121/ijnsa.2021.13608","DOIUrl":"https://doi.org/10.5121/ijnsa.2021.13608","url":null,"abstract":"To fight against the evolution of malware and its development, the specific methodologies that are applied by the malware analysts are crucial. Yet, this is something often overlooked in the relevant bibliography or in the formal and informal training of the relevant professionals. There are only two generic and allencompassing structured methodologies for Malware Analysis (MA) – SAMA and MARE. The question is whether they are adequate and there is no need for another one or whether there is no such need at all. This paper will try to answer the above and it will contribute in the following ways: it will present, compare and dissect those two malware analysis methodologies, it will present their capacity for analysing modern malware by applying them on a random modern specimen and finally, it will conclude on whether there is a procedural optimization for malware analysis over the evolution of these two methodologies.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"39 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85340145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information and Communication Security Mechanisms For Microservices-based Systems 基于微服务的系统的信息和通信安全机制
International journal of network security & its applications Pub Date : 2021-11-01 DOI: 10.5121/ijnsa.2021.13607
Lenin Leines-Vite, J. C. Pérez-Arriaga, X. Limón
{"title":"Information and Communication Security Mechanisms For Microservices-based Systems","authors":"Lenin Leines-Vite, J. C. Pérez-Arriaga, X. Limón","doi":"10.5121/ijnsa.2021.13607","DOIUrl":"https://doi.org/10.5121/ijnsa.2021.13607","url":null,"abstract":"Security has become paramount in modern software services as more and more security breaches emerge, impacting final users and organizations alike. Trends like the Microservice Architecture bring new security challenges related to communication, system design, development, and operation. The literature presents a plethora of security-related solutions for microservices-based systems, but the spread of information difficult practitioners' adoption of novel security related solutions. In this study, we aim to present a catalogue and discussion of security solutions based on algorithms, protocols, standards, or implementations; supporting principles or characteristics of information security, considering the three possible states of data, according to the McCumber Cube. Our research follows a Systematic Literature Review, synthesizing the results with a meta-aggregation process. We identified a total of 30 primary studies, yielding 75 security solutions for the communication of microservices.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"25 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79118051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comments on A Remote User Authentication Scheme for Multi-server 5G Networks 一种面向多服务器5G网络的远程用户认证方案
International journal of network security & its applications Pub Date : 2021-09-01 DOI: 10.6633/IJNS.202109_23(5).14
Jiaqing Mo, Zhongwang Hu
{"title":"Comments on A Remote User Authentication Scheme for Multi-server 5G Networks","authors":"Jiaqing Mo, Zhongwang Hu","doi":"10.6633/IJNS.202109_23(5).14","DOIUrl":"https://doi.org/10.6633/IJNS.202109_23(5).14","url":null,"abstract":"","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"51 1","pages":"878-882"},"PeriodicalIF":0.0,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76655057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A New Fast Matching Method for Dummy K-anonymous Location Privacy Protection in Location Based Services 一种基于位置服务的虚拟k -匿名位置隐私保护快速匹配方法
International journal of network security & its applications Pub Date : 2021-09-01 DOI: 10.6633/IJNS.202109_23(5).16
Xiaohui Zhu, Renlong Qi
{"title":"A New Fast Matching Method for Dummy K-anonymous Location Privacy Protection in Location Based Services","authors":"Xiaohui Zhu, Renlong Qi","doi":"10.6633/IJNS.202109_23(5).16","DOIUrl":"https://doi.org/10.6633/IJNS.202109_23(5).16","url":null,"abstract":"This paper proposes a dummy k-anonymous location privacy protection based on a fast-matching method that adopts the space coordinate transformation algorithm. First, the 2-D coordinates are converted to binary Morton code. With the fast matching method, non-adjacent position points distributed in different grids are selected as candidate sets of dummy positions. Then, the semantic similarity of place name information of position points in the candidate sets is calculated using the edit distance, and k-1 position points with the smallest semantic similarity are selected as dummy positions. While satisfying the semantic l-diversity and physical dispersion, this method can improve the generation efficiency of dummy locations and further improve the quality of location service.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"30 1","pages":"888-894"},"PeriodicalIF":0.0,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91272609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Identity-based Proxy Re-encryption Scheme in Blockchain-assisted Decentralized Storage System 区块链辅助去中心化存储系统中基于身份的高效代理重加密方案
International journal of network security & its applications Pub Date : 2021-09-01 DOI: 10.6633/IJNS.202109_23(5).05
He Jiayu, Dong Zheng, Rui-Fang Guo, Chen Yushuang, Kemeng Li, Xiaoling Tao
{"title":"Efficient Identity-based Proxy Re-encryption Scheme in Blockchain-assisted Decentralized Storage System","authors":"He Jiayu, Dong Zheng, Rui-Fang Guo, Chen Yushuang, Kemeng Li, Xiaoling Tao","doi":"10.6633/IJNS.202109_23(5).05","DOIUrl":"https://doi.org/10.6633/IJNS.202109_23(5).05","url":null,"abstract":"","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"9 1","pages":"776-790"},"PeriodicalIF":0.0,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75932072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Robust Cybersecurity Topic Classification Tool 一个健壮的网络安全主题分类工具
International journal of network security & its applications Pub Date : 2021-08-30 DOI: 10.5121/ijnsa.2022.14101
Elijah Pelofske, L. Liebrock, V. Urias
{"title":"A Robust Cybersecurity Topic Classification Tool","authors":"Elijah Pelofske, L. Liebrock, V. Urias","doi":"10.5121/ijnsa.2022.14101","DOIUrl":"https://doi.org/10.5121/ijnsa.2022.14101","url":null,"abstract":"In this research, we use user defined labels from three internet text sources (Reddit, StackExchange, Arxiv) to train 21 different machine learning models for the topic classification task of detecting cybersecurity discussions in natural English text. We analyze the false positive and false negative rates of each of the 21 model’s in cross validation experiments. Then we present a Cybersecurity Topic Classification (CTC) tool, which takes the majority vote of the 21 trained machine learning models as the decision mechanism for detecting cybersecurity related text. We also show that the majority vote mechanism of the CTC tool provides lower false negative and false positive rates on average than any of the 21 individual models. We show that the CTC tool is scalable to the hundreds of thousands of documents with a wall clock time on the order of hours.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"347 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82983107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信