Most Read articles

    Published in last 1 year |  In last 2 years |  In last 3 years |  All

    Please wait a minute...
    For Selected: Toggle Thumbnails
    On the Exploration and Prospect of the Development Path of  Cyberspace Trusted Identity in China
    Journal of Information Security Reserach    2022, 8 (12): 1236-.  
    Abstract482)      PDF (1941KB)(90)       Save
    Reference | Related Articles | Metrics
    Research on the Application of Commercial Cryptography in 5G Network
    Journal of Information Security Reserach    2023, 9 (4): 331-.  
    Abstract475)      PDF (1197KB)(263)       Save
    As a new generation of mobile communication network infrastructure, 5G application scenarios run through all aspects of production and life, such as industrial Internet, energy industry, transportation, medical industry and education. However, unprecedented security risks have been brought to 5G networks, including massive terminal access, largescale network deployment, and massive data aggregation. 5G security has gradually become a worldwide research trend in recent years since it is crucial to social development, economic operation, and even national security. Cryptography is the core technology and basic support to assure network and information security. After more than ten years of development, national commercial cryptographic algorithms ZUC, SM4, SM3, SM2, whose independent intellectual property rights are available, have gradually exerted more indispensable effects in maintaining the security of national cyberspace. Starting from the 5G network architecture and interfaces, this paper analyzes the underlying security risks faced by the 5G networks and proposes a corresponding solution as an example in terms of the commercial cryptography application practices of the 5G network.
    Reference | Related Articles | Metrics
    Application of Penetration Testing for Industrial Control System Terminals
    Journal of Information Security Reserach    2023, 9 (4): 313-.  
    Abstract428)      PDF (3070KB)(110)       Save
    The security of industrial control system terminals is getting crucial with the development of the industrial Internet. How to conduct effective safety tests for industrial control system terminals has become a key problem to be studied and solved urgently. In this paper, the general process of penetration testing is firstly introduced, then the application of penetration testing for industrial control system terminals is examined using improper input validation vulnerability as an example. The method starts from information collection and penetration tools to deeply understand the system input verification. Then, during the stage of the vulnerability discovery, the modeling of the vulnerability to sensitive input is proposed, as well as the seed mutation pattern for the industrial control programs is designed. The experiment demonstrates the effectiveness of the proposed method and the vulnerability widely existed in the industrial control systems. This method also discovers the security threats such as data tampering, denial of service, permission access and malicious script injection caused by the input validation vulnerability. At last, this work provides security suggestions for industrial control network security protection and equipment protection.
    Reference | Related Articles | Metrics
    Key Points and Practice of Compliance Assessment for Government Data Security
    Journal of Information Security Reserach    2022, 8 (11): 1050-.  
    Abstract355)      PDF (719KB)(298)       Save
    With the development of digital government, the security of government data has become a crucial task. The state attaches great importance to the security risk prevention of government data, and has issued a series of laws, regulations and policy documents, which put forward clear requirements for strengthening the security management of government data. Based on the requirements of government data security compliance, this article proposes the evaluation method and index system of compliance assessment for government data security, which will provide reference for the manager of government data to carry out government data security compliance assessment.
    Reference | Related Articles | Metrics
    ChatGPT’s Applications, Status and Trends in the Field of Cyber Security
    Journal of Information Security Reserach    2023, 9 (6): 500-.  
    Abstract268)      PDF (2555KB)(252)       Save
    ChatGPT, as a large language model technology, demonstrates extremely strong language understanding and text generation capabilities. It has not only attracted tremendous attention across various industries but also brought new transformations to the field of cybersecurity. Currently, research on ChatGPT in the cybersecurity field is still in its infancy. To help researchers systematically understand the research status of ChatGPT in cybersecurity, this paper provides the first comprehensive summary of ChatGPT’s applications in the field of cybersecurity and potential accompanying security issues. The article first outlines the development of large language model technologies and briefly introduces the technology and features of ChatGPT. Then, it discusses the enabling effects of ChatGPT in the cybersecurity field from two perspectives: assisting attacks and assisting defense. This includes vulnerability discovery, exploitation and remediation, malicious software detection and identification, phishing email generation and detection, and potential use cases in security operations scenarios. Furthermore, the article delves into the accompanying risks of ChatGPT in the cybersecurity field, including content risks and prompt injection attacks, providing a detailed analysis and discussion of these risks. Finally, the paper looks into the future of ChatGPT in the cybersecurity field from the perspectives of security enablement and accompanying security, pointing out the direction for future research on ChatGPT in the cybersecurity domain.
    Reference | Related Articles | Metrics
    Data Security Governance Practices
    Journal of Information Security Reserach    2022, 8 (11): 1069-.  
    Abstract230)      PDF (5897KB)(208)       Save
    Data security governance has been written into the Data Security Law of the People’s Republic of China. At the same time, data security governance is also one of the key points in the construction of systematic network security. This paper analyzes the data security governance concepts of Gantner and Microsoft, combines enterprise architecture, stakeholder theory, data flow security assessment, maturity security assessment and other methodologies, forms a set of data security governance concepts, and designs a data security management and operation platform for dynamic supervision and data security operation of data security governance indicators. Since 2018, this methodology and platform have been put into practice in the project to solve the construction and optimization of users’ data management and defense system.
    Reference | Related Articles | Metrics
    Journal of Information Security Reserach    2023, 9 (3): 206-.  
    Abstract217)      PDF (513KB)(184)       Save
    Related Articles | Metrics
    A Novel Blockchain Privacy Preserving Scheme Based on Paillier  and FO Commitment
    Journal of Information Security Reserach    2023, 9 (4): 306-.  
    Abstract203)      PDF (934KB)(125)       Save
    The blockchain is a shared database with excellent characteristics such as high decentralization and traceability. However, data leakage is still a big problem for blockchain transactions. To order to solve the problem, this paper introduces Paillier homomorphic encryption with variable k (KPH), a privacy protection strategy that hides transaction information by the public key encryption algorithm RSA, performs zeroknowledge proof on the legitimacy of the transaction amount with FO commitment, and updates the transaction amount using the enhanced Paillier semihomomorphic encryption algorithm and verifies the transaction using the FO commitment. Unlike the typical Paillier algorithm, the KPH scheme’s Paillier algorithm includes the variable k and combines the L function and the Chinese remainder theorem to reduce the time complexity from O(|n|2+e) to O(logn), making the algorithm decryption process more efficient.

    Reference | Related Articles | Metrics
    Research on Loop Security Problem in Binary Programs
    Journal of Information Security Reserach    2023, 9 (4): 364-.  
    Abstract201)      PDF (2829KB)(48)       Save
    Loop is a common structure in programs and improperly using loop is one of the most important reasons resulting in security problems, making detecting loop security problem is important and valuable. As the path state explosion and loop modeling problems in binary code, statically analyzing of loop security is extremely challenging, and traditional methods are unable to solve these problem. In this paper, we proposed a detecting method for loop security problems based on binary static analyzing,having the ability of detecting out of bound memory access in loop and infinite loop problem. Firstly, we present an accurate extracting and recovering method of loop factors in binary based on analyzing of loop structure and then multiple path explore strategies are utilized to solving the path state explosion and sorting problem. Moreover, we propose a function summary method based on static concrete execution to solving constraints growing problem caused by induction function invoking in loops. Finally, we proposed an inductive analysis method based on loop predicates to detect insecure loop in binary. We have applied our methods on ten real world programs and compared with Angr. The experimental results turn out that our method is capable of detecting more loop problems than Angr.
    Related Articles | Metrics
    Analysis on the Division of Data Security Management Responsibilities  and Accountability Mechanism
    Journal of Information Security Reserach    2023, 9 (1): 73-.  
    Abstract193)      PDF (1038KB)(120)       Save
    Strengthening the awareness of security and responsibility is the primary condition for data security management. People are the most important factor in the construction of data security. All data security management specifications and technical measures are based on people. From the perspective of data security compliance, this article fully analyzes the corporate data security protection obligations in accordance with the Data Security Law, and innovatively designs the corporate data security responsibility matrix and data security incident accountability matrix to provide enterprises with the construction of data security compliance management. The design ideas for the key functions required by each stakeholder in the system process, and a practical accountability plan based on the key functions, can implement the Data Security Law for various industries and units, and build a data security organization. And the incident accountability mechanism to provide sufficient reference.
    Reference | Related Articles | Metrics
    Research on Personal Privacy Data Sharing Technology Based on  Blockchain Traceability
    Journal of Information Security Reserach    2023, 9 (2): 109-.  
    Abstract188)      PDF (1327KB)(114)       Save
    Personal privacy data on the Internet, as an one of the important information resources, involves a series of security issues. Centralized or distributed servers are usually used to centrally manage personal privacy data. The data storage is not transparent, and it is prone to problems such as single point of failure and information theft. This paper combines blockchain technology with the improved CPABE algorithm, uses IPFS to store private data, and designs a flexible finegrained personal privacy data sharing scheme PPSSBC based on improved CPABE algorithm. The proposed scheme supports the accountability of malicious users who leak their private keys and realizes dynamic access control. The paper proves the security of the scheme. Experimental analysis shows that the scheme is effective.
    Reference | Related Articles | Metrics
    Research on Network Security Governance and Response of  Largescale AI Model
    Journal of Information Security Reserach    2023, 9 (6): 551-.  
    Abstract174)      PDF (1101KB)(129)       Save
    With the continuous development of artificial intelligence technology, largescale AI model technology has become an important research direction in the field of artificial intelligence. The publication of ChatGPT4.0 and ERNIE Bot has rapidly promoted the development and application of this technology. However, the emergence of largescale AI model technology has also brought new challenges to network security. This paper will start with the definition, characteristics and application of largescale AI model technology, and analyze the network security situation under largescale AI model technology. The network security governance framework of largescale AI model is proposed, and the given steps can provide reference for network security work of largescale AI model.
    Reference | Related Articles | Metrics
    A Survey of IoT Firmware Vulnerability Security Detection
    Journal of Information Security Reserach    2022, 8 (12): 1146-.  
    Abstract173)      PDF (1780KB)(178)       Save
    With the advent of the Internet of everything, the security issues of the IoT have become more and more important, especially the economic losses caused by security risks and attacks caused by firmware vulnerabilities in the IoT. Efficient firmware vulnerability detection technology has increasingly become the key to ensuring the security of IoT devices. Therefore, studying the methods and technologies related to firmware vulnerability security detection in the IoT has essential theoretical significance and practical value. This paper analyzes the reasons for the frequent security problems of IoT firmware, summarizes the main security threats faced by IoT firmware, and targets the firmware. Based on the challenges faced by vulnerability analysis, the existing firmware vulnerability detection methods are reviewed. Through the analysis of the advantages and disadvantages of different methods, it provides guidance for further improving the intelligence, precision, automation, effectiveness, and scalability of the firmware security defect detection method. Finally, future research in IoT firmware vulnerability security detection is prospected.
    Reference | Related Articles | Metrics
    Organizational Capacity Building of Government Data Security
    Journal of Information Security Reserach    2022, 8 (11): 1061-.  
    Abstract170)      PDF (1321KB)(181)       Save
    As the country pays more and more attention to data security, government data, as the core assets of the digital government in the new era, will involve not only personal information data of citizens, but also important data such as government agencies. Therefore, the security protection and protection capabilities of government data cannot be ignored. At present, domestic protection mechanisms and research on government data security are relatively lacking. This paper analyzes the risks brought by laws, regulations and policies, complex business scenarios and new technologies to government data. Combining the three security levels of security management, security technology and security operation of government data. This paper proposes a government data security organization capability framework that meets the security requirements of government data, providing ideas for the subsequent research on government data security assurance system.
    Reference | Related Articles | Metrics
    Journal of Information Security Reserach    2023, 9 (6): 498-.  
    Abstract170)      PDF (472KB)(211)       Save
    Related Articles | Metrics
    A Survey of SQL Injection Attack Detection and Defense Technology
    Journal of Information Security Reserach    2023, 9 (5): 412-.  
    Abstract170)      PDF (2612KB)(164)       Save
    In the era of “Internet+”, data is the most valuable resource of the Internet. Attackers often use SQL injection attacks to destroy the database in order to obtain important data information in the database. The threat to database security is becoming more and more serious. At present, the research on SQL injection attacks mostly focuses on traditional SQL injection attacks, but lacks the cognition of new advanced SQL injection technology with stronger concealment and higher risk, and the research on related detection and defense technology. In response to this phenomenon, this paper analyzes and evaluates traditional and advanced SQL injection attack technologies and their technical characteristics based on the classification of SQL injection technologies; summarizes existing detection and defense technologies, and evaluates the advantages and disadvantages of these methods for defense effectiveness; finally The problems existing in the current research field are sorted out, and suggestions for future research directions are put forward.

    Reference | Related Articles | Metrics
    Research on Data Transfer Security Model of Digital Twin City  Big Data Platform
    Journal of Information Security Reserach    2023, 9 (1): 48-.  
    Abstract166)      PDF (3862KB)(120)       Save
    The digital twin city big data platform can promote the aggregation of smart city data resources, comprehensively promote the cross domain integration application of government data and social data, open up data circulation channels, avoid isolated islands, and innovate the open system of data management, sharing and data transaction service system. This paper proposes a big data flow security framework based on city big data platform, aiming at the security difficulties in the process of digital twin city data flow, such as various data formats involved in city big data platform data sources, diverse application data exchange requirements, complex system permission system, uncontrollable cross domain extension and so on, According to the time and space dimensions of data security flow cycle and data governance security domain, the data security flow system is constructed to solve the security problems of multisource heterogeneous, cross network and cross platform exchange and sharing of digital twin city data.
    Reference | Related Articles | Metrics
    Application of Blockchain Technology in Government Affairs
    Journal of Information Security Reserach    2022, 8 (12): 1223-.  
    Abstract165)      PDF (3627KB)(167)       Save
    As one of the new generation information technologies, blockchain has great technical advantages in promoting data sharing and utilization, optimizing business process links, improving multiparty collaboration efficiency, reducing overall operating costs, establishing a trusted ecosystem, etc., which provides a new paradigm of capabilities for realizing trusted circulation and sharing of egovernment business data, security asset information protection, and cross departmental collaborative supervision. This paper has designed a new blockchain technology architecture system. By building a blockchain service center, a government application chain service platform and a government security chain service platform, multiple pilot applications have been enabled in the province to achieve the inventory, connection, and standardized management of business and multi chain data resources, forming a basic “data asset” management system.

    Reference | Related Articles | Metrics
    Research on the Application of Commercial Cryptography to Cloud Computing
    Journal of Information Security Reserach    2023, 9 (4): 375-.  
    Abstract165)      PDF (3447KB)(145)       Save
    Cloud computing, as a new information processing method, enables users to access information and communication resource services through the network, and it has become an inevitable trend in the development of information technology industry. Users, data, and information resources are highly concentrated, highly dependent on the continuity of cloud platform services, and the scalability of virtualized resources bring inevitable security risks to cloud computing., and the scalability of virtualized resources bring inevitable security risks to cloud computing. Therefore, how to eliminate the security risks of cloud computing by using commercial cryptography technology has become the current research hotspot. This paper starts from the cloud computing network architecture, anlyzes the cryptography application requirements of cloud computing. The paper proposes the corresponding commercial cryptography application scheme for cloud computing scenarios on this basis. The research results provide a theoretical guidance and reference for the application practice of commercial cryptography in cloud computing scenarios, and are expected to solve the key problems of cloud computing security.
    Reference | Related Articles | Metrics
    Survey of Network Intrusion Detection Based on Deep Learning
    Journal of Information Security Reserach    2022, 8 (12): 1163-.  
    Abstract164)      PDF (2421KB)(159)       Save
    The rapid development of the Internet not only brings great convenience to users, but also causes many security incidents. With the increasing number of network attacks such as zeroday vulnerabilities and encryption attacks, the network security situation is becoming more and more serious. Intrusion detection is an important means of network attack detection. In recent years, with the continuous development of deep learning technology, intrusion detection system based on deep learning is gradually becoming a research hotspot in the field of network security. This paper introduces recent work on network intrusion detection using deep learning technology based on extensive investigation of literature. Firstly, it briefly summarizes the current network security situation and traditional intrusion detection technologies. Then, several deep learning models commonly used in network intrusion detection system are introduced. Then it summarizes the commonly used data preprocessing techniques, data sets and evaluation indicators in deep learning. Then from the perspective of practical application, it introduces the specific application of deep learning model in network intrusion detection system. Finally, the problems in the current research process are discussed, and the future development direction is put forward.
    Reference | Related Articles | Metrics
    A Comparative Study of the Ways of Personal Information Protection
    Journal of Information Security Reserach    2023, 9 (2): 146-.  
    Abstract160)      PDF (1172KB)(104)       Save
    From the perspective of cultural comparison, different countries or regions have different ways of protecting citizens’ personal information. However, in the age of information, influenced by the sociality and sharing characteristics of information, the goals and tendencies of personal information protection mode show similarities. In China newly published “Personal Information Protection Law of the People’s Republic of China”(PIPL), the national security oriented thinking is still in an important position. In the process of review, it is faced with the discretion and choice of the protection or utilization of personal information. Referring to the beneficial experience of other countries and combining with China’s local conditions, when reviewing and interpreting the PIPL, China should take public interest as the standard to protect personal information rights and interests or promote utilization of information, recognize the nature of information, build the mechanism of data sharing and circulation, incorporate the principle of trust into the personal information protection law, and propose China’s scheme on personal information protection approach.
    Reference | Related Articles | Metrics
    On the Right to Erasure of Personal Information: Characteristics,  Dilemmas and Improvement Paths —From the Perspective of COVID19 Prevention and Control
    Journal of Information Security Reserach    2023, 9 (4): 356-.  
    Abstract157)      PDF (1078KB)(70)       Save
    The right to erasure of personal information is an important right enjoyed by individuals in the process of processing personal information under the Personal Information Protection Law. The right to erasure of personal information is both public and private law attributes. From the nature of the public health emergency of the COVID19 and the relevant normative documents issued by China during the epidemic prevention and control period, it can be seen that the current social state can be equivalent to a state of emergency in essence. In this social context, identifying the right to erasure of personal information as a right in public law can effectively play the role of defense and objective law, and then protect the rights and interests of personal information through the protection obligation of public power. Under such logical path, through the establishment of the model of “requested by individualnoticed by power”, the use of the government information disclosure system to disclose personal information processing standards to improve the system design of the right to erasure of personal information, to solve the problems of high cost of exercising rights by COVID19 infected persons and difficulty in performing the obligations of personal information processors in practice.
    Reference | Related Articles | Metrics
    Journal of Information Security Reserach    2022, 8 (10): 954-.  
    Abstract151)      PDF (504KB)(160)       Save
    Related Articles | Metrics
    A Survey of Data Security Sharing Technology Development and  Its Application in Power Domain
    Journal of Information Security Reserach    2023, 9 (3): 208-.  
    Abstract150)      PDF (2019KB)(130)       Save
    The circulation, sharing and collaborative application of data elements are the core elements of data element market cultivation in the digital era, and data security sharing technology can effectively realize the secure sharing of data and avoid the phenomenon of “data silos” and privacy leakage. This paper presents a comprehensive review of the latest research achievements and progress of data security sharing technologies in this field. First of all, we outline the development and evolution of data security sharing technologies, and then compare and analyze existing data security sharing solutions in terms of technical features, problem solving, advantages and disadvantages, and summarize the key technologies they rely on and the risks and challenges they face. Secondly, we discuss the application of data security sharing technologies in typical scenarios in the energy and power fields, such as power energy trading, power internet of things, and electric vehicles, providing new ideas and insights for data compliance and governance in the energy and power fields. Finally, the future research directions and development prospects of data security sharing technology applications in the energy and power domain are foreseen.
    Reference | Related Articles | Metrics
    Research on the Progress of Crossborder Data Flow Governance
    Journal of Information Security Reserach    2023, 9 (7): 624-.  
    Abstract145)      PDF (1036KB)(43)       Save
    While promoting the sharing of global data resources, the crossborder data flow will inevitably threaten data sovereignty and national security. The competition for the right to speak in international data with crossborder data flow governance as the game will become the focus of competition in the international community in the future. This paper introduces the background knowledge and constraints of crossborder data flow, investigates and compares the crossborder data flow governance models of the United States, the European Union, Russia, Japan, and Australia, and analyzes the current policy status and challenges of crossborder data flow governance in our country, on this basis, countermeasures and suggestions are proposed for the governance of crossborder data flow in our country from the perspective of data sovereignty, including promoting the classification supervision of crossborder data flow, innovating and developing crossborder data flow governance models, improving countermeasures against extraterritorial “longarm jurisdiction”, and actively participating in and leading the formulation of international governance rules.
    Reference | Related Articles | Metrics
    Research and Trend Analysis on the Global Development and  Competition State of 6G
    Journal of Information Security Reserach    2022, 8 (11): 1135-.  
    Abstract138)      PDF (897KB)(57)       Save
    Based on their existing technological advantages, Western countries have taken the lead in the 6G field in an attempt to continue to maintain their technological superiority in the future communication field. To maintain technological hegemony, the U.S. aims to improve its international leadership in the future 6G field, and for the strategic consideration of “technological sovereignty”, the EU has been trying to get ahead of the game, while Japan, South Korea, the Five Eyes countries and other U.S. allies are following the pace of Europe and the U.S. to advance their 6G development. This will intensify the global 6G “technology race” and therefore increase the digital divide. At the same time, after the Biden administration takes office, the U.S. will continue its containment strategy based on realist foreign policy, that is 6G geopolitical pattern encircling China, and the competition for the rulemaking power in future will be “whitehot”. In order to cope with the future competition of 6G, China should accelerate the pace of the overall 6G strategy, continue to strengthen the international industrial layout and actively participate in the development of international 6G standards to promote the future development of 6G.
    Reference | Related Articles | Metrics
    Research on Content Detection Generated by Large Language Model  and the Mechanism of Bypassing
    Journal of Information Security Reserach    2023, 9 (6): 524-.  
    Abstract133)      PDF (1924KB)(116)       Save
    In recent years, there has been a surge in the development of large language models. AI robots like ChatGPT, although they have a largescale security confrontation mechanism inside, attackers can still elaborate questionandanswer patterns to bypass the mechanism, with their help to automatically produce phishing emails and carry out network attacks. In this case, how to identify the text generated by AI robots has also become a hot issue. In order to carry out LLMgenerated content detection experiment, our team collected a certain number of questionandanswer data samples from an Internet social platform and ChatGPT platform, and proposed a series of detection strategies according to different conditions of AI text availability. It includes text similarity analysis based on online controllable AI samples, text data mining based on statistical differences under offline conditions, adversarial analysis based on the LLM generation method under the condition that AI samples are not available, and AI model analysis based on building a classifier by finetuning the target LLM model itself. We calculated and compared the detection capabilities of the analysis engine in each case. On the other hand, we give some antikill techniques against AI text detection engines based on the characteristics of detection strategies, from the perspective of network attack and defense.
    Reference | Related Articles | Metrics
    Research on Blockchain Anomaly Transaction Detection Technology  Based on Stacking Ensemble Learning
    Journal of Information Security Reserach    2023, 9 (2): 98-.  
    Abstract131)      PDF (4463KB)(92)       Save
    In order to efficiently detect abnormal transactions on the blockchain, this paper proposes a method  based on Stacking integration learning. Firstly, XGBoost, LightGBM, CatBoost and LCE are used as the base classifier, and MLP is used as the metaclassifier, and the MLP_Stacking integrated learning algorithm is designed. Secondly,SUNDO is used for data augmentation to solve the problem of serious imbalance in data sets; Finally, a multimodel joint feature sorting algorithm is designed to generate an optimal subset of features, and the resulting optimal subset of features is used as the input data set of the MLP_Stacking for classification training to achieve model optimization. This paper experiments at the open source dataset provided by Kaggle platform , and the experimental results show that the SUNDO data generation method can effectively improve the performance of each classifier, and  the training effect of the integrated model designed in this paper is obviously better than that of the individual model.
    Reference | Related Articles | Metrics
    Research and Thinking on the Technical Framework of Data Security  in the Field of Transportation
    Journal of Information Security Reserach    2022, 8 (11): 1092-.  
    Abstract125)      PDF (1237KB)(117)       Save
    In recent years, in the continuous advancement of the construction of “digital government”, the “data gap” and “data island” between government departments have been gradually broken. As the core resource of digital government, data is an important driving force for national development,and also the most valuable core asset. With the largescale aggregation, integration and sharing of various data resources, a series of data securityrelated problems have emerged. For example, due to the high concentration of data, data is more likely to become the target of attacks, and a large number of illegal operations by internal personnel lead to data tampering and greatly increase. In order to solve the problem of data security in the field of transportation, this paper makes an indepth analysis of the main challenges of data security in the field of transportation technology and transportation, and proposes to create an “overall technical architecture of data security management and control”, and focuses on thinking and discussing the full life cycle security of data and data security operation    in the field of transportation. Data security management is not within the scope of this paper.
    Reference | Related Articles | Metrics
    Research and Implementation of Crossplatform Encryption  Technology for Mobile Storage Devices
    Journal of Information Security Reserach    2023, 9 (3): 271-.  
    Abstract124)      PDF (3407KB)(66)       Save
    At present, the problem of data leakage caused by mobile storage devices is becoming more and more serious. Although hardwarebased encrypted mobile storage devices can be effectively controlled. However, the current popular encryption in the market must belong to hardware encryption, with high cost and single encryption algorithm. There are certain limitations in capacity, and it is heavily dependent on the factory physical hardware; in addition, with the rise and wide application of Xinchuang systems represented by UOS, Kirin, etc., the traditional encryptionbased mobile storage devices under Windows are not available on Xinchuang system, linux and other systems. Therefore, this paper proposes a crossplatform software encryption and decryption technical scheme for mobile storage devices. Under this scheme, the registered encrypted storage data area can only be recognized by the system after the password authentication of the humancomputer interface, and the data encryption and decryption are transparent and imperceptible, registered mobile storage devices have consistent user experience and storage data in pure windows system, Xinchuang system (UOS, Kylin, etc.), pure linux system, etc.. This system innovatively solves the compatibility problem of mobile storage devices under different systems after encryption, and uses encryption and decryption technology to enhance the security of original data in bare storage, preventing data leakage events and protecting user’s data security.

    Reference | Related Articles | Metrics
    Research on Establishing Sinopec Network Security Risk Management  and Disposal Mechanism
    Journal of Information Security Reserach    2022, 8 (11): 1141-.  
    Abstract122)      PDF (2857KB)(82)       Save
    Network security in the new era is no longer a oneman fight, especially for a certain type of industry such as energy, chemical, electric power and other industries have gradually become important targets of foreign hacker organizations. Therefore, in terms of future defense capability building, we need to unite together to achieve threat intelligence sharing within the industry. However, as a central enterprise, we must first do our own joint defense and control, and realize intelligence sharing, threat linkage and emergency response within Sinopec at first. Sinopec conscientiously implements the work deployment requirements of national risk prevention and mitigation, strengthens the construction of internal network security management and control system, strictly controls the integration of information system design and construction phase with internal control, and continuously strengthens the rigid constraints of informatization. Network security management and network security protection technology are equally important. With management as the guide and technology as the support, we will jointly weave Sinopec’s network security protection network, effectively implement network security work, form an endogenous cohesion of network security, and build Sinopec’s “5+2” cybersecurity risk control and handling mechanism,  promote the coordinated development of overall network security and informatization work.
    Reference | Related Articles | Metrics
    Research on Active Defense Method of Network Security Under APT Organization Attack Behavior
    Journal of Information Security Reserach    2023, 9 (5): 423-.  
    Abstract121)      PDF (2792KB)(122)       Save
    At present, the international situation is complex and changeable, new social conflicts and contradictions are constantly arising in the transition period of the domestic society, and hostile forces are trying in vain to destroy the Critical Information Infrastructures (CII) of our country,  resulting in adverse social impacts. The existing defense measures based on the existing network attack detection and defense are not flexible and require high comprehensiveness of the defense system. Therefore, this thesis proposes an active defense method for electric power industry network security based on attack behaviors. By analyzing the attack behavior of attackers, combines ATT&CK attack framework model to carry out intermittent attack attempts against Advanced Persistent Threat (APT) organizations through layer upon layer forwarding of a large number of springboard nodes. Until the breakthrough and springboard node are found, the attack behavior and problems that may occur before or during the attack. The springboard, organization or personal information of the attacker at all levels is discovered in advance, and the attack behavior is discovered and blocked in advance in the stage of the attacker’s reconnaissance, so as to realize the active defense against the attack behavior.
    Reference | Related Articles | Metrics
    Energy Data Sharing Access Control Model Based on Blockchain
    Journal of Information Security Reserach    2023, 9 (3): 220-.  
    Abstract120)      PDF (1400KB)(106)       Save
    Aiming at the problems of centralization, low transparency and low efficiency of interdepartmental access control in the traditional energy data sharing model, a blockchainbased hierarchical access control scheme for energy data sharing is proposed. Firstly, an Access Control model based on blockchain and energy data classification is designed. Based on the principle of “never trust, always verify” with zerotrust, blockchain is combined with AttributeBased access control (ABAC). The smart contract of blockchain is used to guarantee the automatic and credible decision of access control, and the finegrained access control with attribute as the determining factor is realized by ABAC. Secondly, the energy data is classified to reflect the privacy degree of its resources, and the corresponding access control strategy is designed. The final experimental results show that the scheme can ensure the controllable sharing of energy data under the largescale access control strategy.
    Reference | Related Articles | Metrics
    Local Protection of Power Data Prediction Model Based on Federated Learning and Homomorphic Encryption
    Journal of Information Security Reserach    2023, 9 (3): 228-.  
    Abstract119)      PDF (2070KB)(59)       Save
    The accurate and rapid prediction of power data is not only crucial to the stability and  regular operation of the power system but also has a significant impact on the production and life of the entire society. Therefore, efficient and accurate prediction of power data is an essential work in power data research. Recurrent neural networks have excellent performance in power data prediction problems, but require a large amount of data to train the model. Due to privacy concerns, power companies are reluctant to share their electricity data, making it impossible to train more accurate models. In addition, colossal network resource overhead is incurred while uploading massive amounts of data to a central server to train the federated model. To address these problems, this paper combines federal learning with paillier homomorphic encryption algorithm and proposes a local protection method for power data prediction models based on federal learning and homomorphic encryption. It implements the protection of power data and local model parameters, and cotrains the joint model in a secure manner. We conducted experiments using accurate electricity data, and this method achieved good experimental results.
    Reference | Related Articles | Metrics
    Research on Adversarial Examples Generation Technology Based on  Text Keywords
    Journal of Information Security Reserach    2023, 9 (4): 338-.  
    Abstract116)      PDF (2165KB)(52)       Save
    Deep learning models have been widely used to deal with natural language tasks, but the latest research shows that adversarial attacks will seriously reduce the accuracy of the classification model and make the model classification function ineffective. Aiming at the vulnerability of deep learning models when dealing with natural language tasks, a new adversarial examples generation method, KeywordsAttack, is proposed. The method uses a statistical algorithm to select some words to form a text keyword set. And then it iteratively replaces the keywords according to the contribution of the model classification results until the classification model is successfully misled or the number of replacements reaches the set value. According to the characteristics of Chinese, this method generates adversarial examples by splitting Chinese characters and replacing pinyin. Finally, using the public hotel shopping review dataset to conduct experiments, the results show that the average modification magnitude of adversarial examples accounts for 18.2% of the original text and the classification accuracy of attacking the BERT model is reduced by about 43%, and the classification accuracy of attacking the LSTM model is reduced by about 30%. These data show that the KeywordsAttack method can successfully mislead the classification model by making small perturbations to the text. At the same time, the number of query models in the process of generating adversarial examples is small.
    Reference | Related Articles | Metrics
    Analysis of Potential Security Risks in the Field of Metaverse
    Journal of Information Security Reserach    2023, 9 (5): 490-.  
    Abstract114)      PDF (1635KB)(83)       Save
    The birth and outbreak of the metaverse is the result of the accelerated global digital transformation. As the final form of the network virtualization process, the metaverse has become an important historical node in the evolution of human civilization. However, the development of the metaverse also brings a series of security risks. Regulatory authorities should pay attention to the nested coupling relationship between the metaverse and the real society in their governance, so as to avoid becoming a completely virtual dream universe. Based on the analysis of the security risks of the metaverse in political, social, cultural and network aspects, some suggestions on network governance are put forward to make the metaverse become a beneficial extension and supplement of the real society.
    Reference | Related Articles | Metrics
    Design and Implementation of Cryptography Intensive Platform for  Government Information System
    Journal of Information Security Reserach    2023, 9 (5): 461-.  
    Abstract113)      PDF (2467KB)(98)       Save
    Aiming at the problems of inconvenient, nonstandard, non universal and waste of resources for cipher application in the field of egovernment, this paper puts forward a systematic, intensive and standardized technical scheme. The scheme combines the SM2, SM3, SM4 and SM9 algorithms to form an intensive system framework, pool the cryptographic facilities, reduce the burden of applying cipher in the information system, provide a unified interface for cryptographic applications, and realize compliant, effective and convenient cryptographic applications. The pilot application practice of cryptographyintensive platform construction of egovernment extranet shows that this scheme can improve the utilization rate of cipher resources and save investment, and has reference value for the security protection of cipher application of scale government information system.Key wordscommercial cryptography; intensification; government informatization; identitybased cryptograph; egovernment
    Aiming at the problems of inconvenient, nonstandard, non universal and waste of resources for cipher application in the field of egovernment, this paper puts forward a systematic, intensive and standardized technical scheme. The scheme combines the SM2, SM3, SM4 and SM9 algorithms to form an intensive system framework, pool the cryptographic facilities, reduce the burden of applying cipher in the information system, provide a unified interface for cryptographic applications, and realize compliant, effective and convenient cryptographic applications. The pilot application practice of cryptographyintensive platform construction of egovernment extranet shows that this scheme can improve the utilization rate of cipher resources and save investment, and has reference value for the security protection of cipher application of scale government information system.
    Reference | Related Articles | Metrics
    Research on Encrypted Traffic Classification of Graph Neural Network  Based on Attention Mechanism
    Journal of Information Security Reserach    2023, 9 (1): 13-.  
    Abstract113)      PDF (1994KB)(106)       Save
    For precise identification of encrypted traffic, existing machine learningbased and graphbased solutions require manual feature selection or have low accuracy. Using a graph neural networkbased encrypted traffic identification method, the network traffic classification problem is transformed into a graph classification problem by converting the network traffic data into graph data, preserving the rich representation of the network data flow. And this paper designs a graph classification model based on selfattention mechanism to classify encrypted traffic. The experimental results show that the method has a good classification effect on the encrypted traffic of Virtual Private Network (VPN) based on Secure Socket Layer (SSL), and the classification accuracy is greatly improved.Key words
    Reference | Related Articles | Metrics
    Compliance Analysis Framework of Personal Information  Protection in Federated Learning
    Journal of Information Security Reserach    2023, 9 (2): 162-.  
    Abstract112)      PDF (2531KB)(83)       Save
    The compliance analysis of federated learning in the sense of personal information protection needs to be further improved, especially the closer combination of technology and law. Therefore, a 6 stepscompliance analysis framework is established, which includes identifying applicable regulations, data flow, processing behavior, subject identity, responsibilities and obligations, and compliance risk analysis. For the classical horizontal and vertical federated learning framework, the framework is sufficient to give concrete compliance conclusions which have close logical relationship with applicable regulations. It can be extended to other architectures or privacy computing technology compliance analysis, and be integrated into the compliance requirements of other countries or regions. The framework helps to meet the requirements of the personal information protection law for impact assessment of personal information processing. Finally, based on the framework and conclusions, some suggestions on the formulation of personal information protection standards for federated learning are put forward.
    Reference | Related Articles | Metrics
    Research and Practice on Data Security Compliance Check  Technology for Operators
    Journal of Information Security Reserach    2023, 9 (7): 643-.  
    Abstract111)      PDF (889KB)(75)       Save
    In the context of the development of the global digital economy, data has become an important asset for enterprises. China positions data as one of the national basic strategic resources and innovative elements of social production. In recent years, the proliferation of ransomware attacks from hackers has posed a significant risk of data leakage to enterprise data security management. Secondly, unconscious data-sharing operations by employees during the production process are also an important way for enterprise data asset leakage. With the promulgation of the Data Security Law, regulatory agencies have made data security reviews a part of the industry security inspections for operators. Therefore, based on regulatory compliance, research and practice related inspection technologies to help operators enhance their security inspection capabilities, ensure data security, and meet the needs of compliance regulation and business development.
    Reference | Related Articles | Metrics