Most Read articles

    Published in last 1 year |  In last 2 years |  In last 3 years |  All

    All
    Please wait a minute...
    For Selected: Toggle Thumbnails
    Research on the Application of Commercial Cryptography in 5G Network
    Journal of Information Security Reserach    2023, 9 (4): 331-.  
    Abstract517)      PDF (1197KB)(293)       Save
    As a new generation of mobile communication network infrastructure, 5G application scenarios run through all aspects of production and life, such as industrial Internet, energy industry, transportation, medical industry and education. However, unprecedented security risks have been brought to 5G networks, including massive terminal access, largescale network deployment, and massive data aggregation. 5G security has gradually become a worldwide research trend in recent years since it is crucial to social development, economic operation, and even national security. Cryptography is the core technology and basic support to assure network and information security. After more than ten years of development, national commercial cryptographic algorithms ZUC, SM4, SM3, SM2, whose independent intellectual property rights are available, have gradually exerted more indispensable effects in maintaining the security of national cyberspace. Starting from the 5G network architecture and interfaces, this paper analyzes the underlying security risks faced by the 5G networks and proposes a corresponding solution as an example in terms of the commercial cryptography application practices of the 5G network.
    Reference | Related Articles | Metrics
    Application of Penetration Testing for Industrial Control System Terminals
    Journal of Information Security Reserach    2023, 9 (4): 313-.  
    Abstract465)      PDF (3070KB)(142)       Save
    The security of industrial control system terminals is getting crucial with the development of the industrial Internet. How to conduct effective safety tests for industrial control system terminals has become a key problem to be studied and solved urgently. In this paper, the general process of penetration testing is firstly introduced, then the application of penetration testing for industrial control system terminals is examined using improper input validation vulnerability as an example. The method starts from information collection and penetration tools to deeply understand the system input verification. Then, during the stage of the vulnerability discovery, the modeling of the vulnerability to sensitive input is proposed, as well as the seed mutation pattern for the industrial control programs is designed. The experiment demonstrates the effectiveness of the proposed method and the vulnerability widely existed in the industrial control systems. This method also discovers the security threats such as data tampering, denial of service, permission access and malicious script injection caused by the input validation vulnerability. At last, this work provides security suggestions for industrial control network security protection and equipment protection.
    Reference | Related Articles | Metrics
    ChatGPT’s Applications, Status and Trends in the Field of Cyber Security
    Journal of Information Security Reserach    2023, 9 (6): 500-.  
    Abstract445)      PDF (2555KB)(382)       Save
    ChatGPT, as a large language model technology, demonstrates extremely strong language understanding and text generation capabilities. It has not only attracted tremendous attention across various industries but also brought new transformations to the field of cybersecurity. Currently, research on ChatGPT in the cybersecurity field is still in its infancy. To help researchers systematically understand the research status of ChatGPT in cybersecurity, this paper provides the first comprehensive summary of ChatGPT’s applications in the field of cybersecurity and potential accompanying security issues. The article first outlines the development of large language model technologies and briefly introduces the technology and features of ChatGPT. Then, it discusses the enabling effects of ChatGPT in the cybersecurity field from two perspectives: assisting attacks and assisting defense. This includes vulnerability discovery, exploitation and remediation, malicious software detection and identification, phishing email generation and detection, and potential use cases in security operations scenarios. Furthermore, the article delves into the accompanying risks of ChatGPT in the cybersecurity field, including content risks and prompt injection attacks, providing a detailed analysis and discussion of these risks. Finally, the paper looks into the future of ChatGPT in the cybersecurity field from the perspectives of security enablement and accompanying security, pointing out the direction for future research on ChatGPT in the cybersecurity domain.
    Reference | Related Articles | Metrics
    Journal of Information Security Reserach    2023, 9 (E1): 105-.  
    Abstract303)      PDF (1450KB)(137)       Save
    Reference | Related Articles | Metrics
    A Novel Blockchain Privacy Preserving Scheme Based on Paillier  and FO Commitment
    Journal of Information Security Reserach    2023, 9 (4): 306-.  
    Abstract253)      PDF (934KB)(160)       Save
    The blockchain is a shared database with excellent characteristics such as high decentralization and traceability. However, data leakage is still a big problem for blockchain transactions. To order to solve the problem, this paper introduces Paillier homomorphic encryption with variable k (KPH), a privacy protection strategy that hides transaction information by the public key encryption algorithm RSA, performs zeroknowledge proof on the legitimacy of the transaction amount with FO commitment, and updates the transaction amount using the enhanced Paillier semihomomorphic encryption algorithm and verifies the transaction using the FO commitment. Unlike the typical Paillier algorithm, the KPH scheme’s Paillier algorithm includes the variable k and combines the L function and the Chinese remainder theorem to reduce the time complexity from O(|n|2+e) to O(logn), making the algorithm decryption process more efficient.

    Reference | Related Articles | Metrics
    Research on Content Detection Generated by Large Language Model  and the Mechanism of Bypassing
    Journal of Information Security Reserach    2023, 9 (6): 524-.  
    Abstract248)      PDF (1924KB)(175)       Save
    In recent years, there has been a surge in the development of large language models. AI robots like ChatGPT, although they have a largescale security confrontation mechanism inside, attackers can still elaborate questionandanswer patterns to bypass the mechanism, with their help to automatically produce phishing emails and carry out network attacks. In this case, how to identify the text generated by AI robots has also become a hot issue. In order to carry out LLMgenerated content detection experiment, our team collected a certain number of questionandanswer data samples from an Internet social platform and ChatGPT platform, and proposed a series of detection strategies according to different conditions of AI text availability. It includes text similarity analysis based on online controllable AI samples, text data mining based on statistical differences under offline conditions, adversarial analysis based on the LLM generation method under the condition that AI samples are not available, and AI model analysis based on building a classifier by finetuning the target LLM model itself. We calculated and compared the detection capabilities of the analysis engine in each case. On the other hand, we give some antikill techniques against AI text detection engines based on the characteristics of detection strategies, from the perspective of network attack and defense.
    Reference | Related Articles | Metrics
    Key Technologies and Research Prospects of Privacy Computing
    Journal of Information Security Reserach    2023, 9 (8): 714-.  
    Abstract242)      PDF (1814KB)(136)       Save
    Privacy computing, as an important technical means taking into account both data circulation and privacy protection, can effectively break the “data island” barriers while ensuring data security, it enables open data sharing, and promotes the deep mining and use of data and crossdomain integration. In this paper, the background knowledge, basic concepts and architecture of privacy computing were introduced, the basic concepts of three key technologies of privacy computing, including secure multiparty computation, federated learning and trusted execution environment were elaborated, and studies on the existing privacy security was conducted, a multidimensional comparison and summarization of the differences of the three key technologies were made. On this basis, the future research direction of privacy computing is prospected from the technical integration of privacy computing with blockchain, deep learning and knowledge graph.
    Reference | Related Articles | Metrics
    Research on Loop Security Problem in Binary Programs
    Journal of Information Security Reserach    2023, 9 (4): 364-.  
    Abstract233)      PDF (2829KB)(58)       Save
    Loop is a common structure in programs and improperly using loop is one of the most important reasons resulting in security problems, making detecting loop security problem is important and valuable. As the path state explosion and loop modeling problems in binary code, statically analyzing of loop security is extremely challenging, and traditional methods are unable to solve these problem. In this paper, we proposed a detecting method for loop security problems based on binary static analyzing,having the ability of detecting out of bound memory access in loop and infinite loop problem. Firstly, we present an accurate extracting and recovering method of loop factors in binary based on analyzing of loop structure and then multiple path explore strategies are utilized to solving the path state explosion and sorting problem. Moreover, we propose a function summary method based on static concrete execution to solving constraints growing problem caused by induction function invoking in loops. Finally, we proposed an inductive analysis method based on loop predicates to detect insecure loop in binary. We have applied our methods on ten real world programs and compared with Angr. The experimental results turn out that our method is capable of detecting more loop problems than Angr.
    Related Articles | Metrics
    Journal of Information Security Reserach    2023, 9 (6): 498-.  
    Abstract229)      PDF (472KB)(269)       Save
    Related Articles | Metrics
    Research on Network Security Governance and Response of  Largescale AI Model
    Journal of Information Security Reserach    2023, 9 (6): 551-.  
    Abstract229)      PDF (1101KB)(173)       Save
    With the continuous development of artificial intelligence technology, largescale AI model technology has become an important research direction in the field of artificial intelligence. The publication of ChatGPT4.0 and ERNIE Bot has rapidly promoted the development and application of this technology. However, the emergence of largescale AI model technology has also brought new challenges to network security. This paper will start with the definition, characteristics and application of largescale AI model technology, and analyze the network security situation under largescale AI model technology. The network security governance framework of largescale AI model is proposed, and the given steps can provide reference for network security work of largescale AI model.
    Reference | Related Articles | Metrics
    Research on the Application of Commercial Cryptography to Cloud Computing
    Journal of Information Security Reserach    2023, 9 (4): 375-.  
    Abstract226)      PDF (3447KB)(189)       Save
    Cloud computing, as a new information processing method, enables users to access information and communication resource services through the network, and it has become an inevitable trend in the development of information technology industry. Users, data, and information resources are highly concentrated, highly dependent on the continuity of cloud platform services, and the scalability of virtualized resources bring inevitable security risks to cloud computing., and the scalability of virtualized resources bring inevitable security risks to cloud computing. Therefore, how to eliminate the security risks of cloud computing by using commercial cryptography technology has become the current research hotspot. This paper starts from the cloud computing network architecture, anlyzes the cryptography application requirements of cloud computing. The paper proposes the corresponding commercial cryptography application scheme for cloud computing scenarios on this basis. The research results provide a theoretical guidance and reference for the application practice of commercial cryptography in cloud computing scenarios, and are expected to solve the key problems of cloud computing security.
    Reference | Related Articles | Metrics
    A Survey of SQL Injection Attack Detection and Defense Technology
    Journal of Information Security Reserach    2023, 9 (5): 412-.  
    Abstract211)      PDF (2612KB)(194)       Save
    In the era of “Internet+”, data is the most valuable resource of the Internet. Attackers often use SQL injection attacks to destroy the database in order to obtain important data information in the database. The threat to database security is becoming more and more serious. At present, the research on SQL injection attacks mostly focuses on traditional SQL injection attacks, but lacks the cognition of new advanced SQL injection technology with stronger concealment and higher risk, and the research on related detection and defense technology. In response to this phenomenon, this paper analyzes and evaluates traditional and advanced SQL injection attack technologies and their technical characteristics based on the classification of SQL injection technologies; summarizes existing detection and defense technologies, and evaluates the advantages and disadvantages of these methods for defense effectiveness; finally The problems existing in the current research field are sorted out, and suggestions for future research directions are put forward.

    Reference | Related Articles | Metrics
    Research on the Progress of Crossborder Data Flow Governance
    Journal of Information Security Reserach    2023, 9 (7): 624-.  
    Abstract200)      PDF (1036KB)(77)       Save
    While promoting the sharing of global data resources, the crossborder data flow will inevitably threaten data sovereignty and national security. The competition for the right to speak in international data with crossborder data flow governance as the game will become the focus of competition in the international community in the future. This paper introduces the background knowledge and constraints of crossborder data flow, investigates and compares the crossborder data flow governance models of the United States, the European Union, Russia, Japan, and Australia, and analyzes the current policy status and challenges of crossborder data flow governance in our country, on this basis, countermeasures and suggestions are proposed for the governance of crossborder data flow in our country from the perspective of data sovereignty, including promoting the classification supervision of crossborder data flow, innovating and developing crossborder data flow governance models, improving countermeasures against extraterritorial “longarm jurisdiction”, and actively participating in and leading the formulation of international governance rules.
    Reference | Related Articles | Metrics
    ChatGPT’s Security Threaten Research
    Journal of Information Security Reserach    2023, 9 (6): 533-.  
    Abstract190)      PDF (1801KB)(160)       Save
    With the rapid development of deep learning technology and natural language processing technology, the large language model represented by ChatGPT came into being. However, while showing surprising capabilities in many fields, ChatgPT also exposed many security threats, which aroused the concerns of academia and industry. This paper first introduces the development history, working mode, and training methods of ChatGPT and its series models, then summarizes and analyzes various current security problems that ChatGPT may encounter and divides it into two levels: user and model. Then, countermeasures and solutions are proposed according to the characteristics of ChatGPT at each stage. Finally, this paper looks forward to developing a safe and trusted ChatGPT and a large language model.
    Reference | Related Articles | Metrics
    On the Right to Erasure of Personal Information: Characteristics,  Dilemmas and Improvement Paths —From the Perspective of COVID19 Prevention and Control
    Journal of Information Security Reserach    2023, 9 (4): 356-.  
    Abstract186)      PDF (1078KB)(81)       Save
    The right to erasure of personal information is an important right enjoyed by individuals in the process of processing personal information under the Personal Information Protection Law. The right to erasure of personal information is both public and private law attributes. From the nature of the public health emergency of the COVID19 and the relevant normative documents issued by China during the epidemic prevention and control period, it can be seen that the current social state can be equivalent to a state of emergency in essence. In this social context, identifying the right to erasure of personal information as a right in public law can effectively play the role of defense and objective law, and then protect the rights and interests of personal information through the protection obligation of public power. Under such logical path, through the establishment of the model of “requested by individualnoticed by power”, the use of the government information disclosure system to disclose personal information processing standards to improve the system design of the right to erasure of personal information, to solve the problems of high cost of exercising rights by COVID19 infected persons and difficulty in performing the obligations of personal information processors in practice.
    Reference | Related Articles | Metrics
    Towards a Privacy-preserving Research for AI and Blockchain Integration
    Journal of Information Security Reserach    2023, 9 (6): 557-.  
    Abstract183)      PDF (1307KB)(131)       Save
    With the widespread attention and application of artificial intelligence (AI) and blockchain technologies, privacy protection techniques arising from their integration are of notable significance. In addition to protecting the privacy of individuals, these techniques also guarantee the security and dependability of data. This paper initially presents an overview of AI and blockchain, summarizing their combination along with derived privacy protection technologies. It then explores specific application scenarios in data encryption, deidentification, multitier distributed ledgers, and kanonymity methods. Moreover, the paper evaluates five critical aspects of AIblockchainintegration privacy protection systems, including authorization management, access control, data protection, network security, and scalability. Furthermore, it analyzes the deficiencies and their actual cause, offering corresponding suggestions. This research also classifies and summarizes privacy protection techniques based on AIblockchain application scenarios and technical schemes. In conclusion, this paper outlines the future directions of privacy protection technologies emerging from AI and blockchain integration, including enhancing efficiency and security to achieve more comprehensive privacy protection of AI privacy.
    Reference | Related Articles | Metrics
    Research on Artificial Intelligence Data Falsification Risk  Based on GPT Model
    Journal of Information Security Reserach    2023, 9 (6): 518-.  
    Abstract163)      PDF (1887KB)(137)       Save
    The rapid development and application of artificial intelligence technology have led to the emergence of AIGC (Artificial Intelligence Generated Context), which has significantly enhanced productivity. ChatGPT, a product that utilizes AIGC, has gained popularity worldwide due to its diverse application scenarios and has spurred rapid commercialization development. This paper takes the artificial intelligence data forgery risk as the research goal, takes the GPT model as the research object, and focuses on the possible causes of data forgery and the realization process by analyzing the security risks that have been exposed or appeared. Based on the offensive and defensive countermeasures of traditional cyberspace security and data security, the paper makes a practical study of data forgery based on model finetuning and speculates some data forgery utilization scenarios after the widespread commercialization of artificial intelligence. Finally, the paper puts forward some suggestions on how to deal with the risk of data forgery and provides directions for avoiding the risk of data forgery before the largescale application of artificial intelligence in the future.
    Reference | Related Articles | Metrics
    Challenges and Responses to Data Governance in China
    Journal of Information Security Reserach    2023, 9 (7): 612-.  
    Abstract162)      PDF (924KB)(123)       Save
    At present, data can hold a substantial value in promoting economic and social development, and possess important strategic significance. Data governance has also been a significant topic and practical direction in the development of China’s digital economy and the construction of Digital China. By analyzing the difficulties in the following aspects of data rights confirmation, data security, data compliance, and data circulation, the institutional dilemmas and practical issues faced by data governance are being clarified. And a comprehensive approach for data governance has also been proposed, including protecting data rights and interests, strengthening compliance guidance, stimulating the vitality of the data market, and promoting technological empowerment. It is expected to advance the process of data governance in China.
    Reference | Related Articles | Metrics
    Analysis of Potential Security Risks in the Field of Metaverse
    Journal of Information Security Reserach    2023, 9 (5): 490-.  
    Abstract159)      PDF (1635KB)(92)       Save
    The birth and outbreak of the metaverse is the result of the accelerated global digital transformation. As the final form of the network virtualization process, the metaverse has become an important historical node in the evolution of human civilization. However, the development of the metaverse also brings a series of security risks. Regulatory authorities should pay attention to the nested coupling relationship between the metaverse and the real society in their governance, so as to avoid becoming a completely virtual dream universe. Based on the analysis of the security risks of the metaverse in political, social, cultural and network aspects, some suggestions on network governance are put forward to make the metaverse become a beneficial extension and supplement of the real society.
    Reference | Related Articles | Metrics
    Research and Practice on Data Security Compliance Check  Technology for Operators
    Journal of Information Security Reserach    2023, 9 (7): 643-.  
    Abstract158)      PDF (889KB)(104)       Save
    In the context of the development of the global digital economy, data has become an important asset for enterprises. China positions data as one of the national basic strategic resources and innovative elements of social production. In recent years, the proliferation of ransomware attacks from hackers has posed a significant risk of data leakage to enterprise data security management. Secondly, unconscious data-sharing operations by employees during the production process are also an important way for enterprise data asset leakage. With the promulgation of the Data Security Law, regulatory agencies have made data security reviews a part of the industry security inspections for operators. Therefore, based on regulatory compliance, research and practice related inspection technologies to help operators enhance their security inspection capabilities, ensure data security, and meet the needs of compliance regulation and business development.
    Reference | Related Articles | Metrics
    Research on Adversarial Examples Generation Technology Based on  Text Keywords
    Journal of Information Security Reserach    2023, 9 (4): 338-.  
    Abstract157)      PDF (2165KB)(76)       Save
    Deep learning models have been widely used to deal with natural language tasks, but the latest research shows that adversarial attacks will seriously reduce the accuracy of the classification model and make the model classification function ineffective. Aiming at the vulnerability of deep learning models when dealing with natural language tasks, a new adversarial examples generation method, KeywordsAttack, is proposed. The method uses a statistical algorithm to select some words to form a text keyword set. And then it iteratively replaces the keywords according to the contribution of the model classification results until the classification model is successfully misled or the number of replacements reaches the set value. According to the characteristics of Chinese, this method generates adversarial examples by splitting Chinese characters and replacing pinyin. Finally, using the public hotel shopping review dataset to conduct experiments, the results show that the average modification magnitude of adversarial examples accounts for 18.2% of the original text and the classification accuracy of attacking the BERT model is reduced by about 43%, and the classification accuracy of attacking the LSTM model is reduced by about 30%. These data show that the KeywordsAttack method can successfully mislead the classification model by making small perturbations to the text. At the same time, the number of query models in the process of generating adversarial examples is small.
    Reference | Related Articles | Metrics
    Research on Active Defense Method of Network Security Under APT Organization Attack Behavior
    Journal of Information Security Reserach    2023, 9 (5): 423-.  
    Abstract157)      PDF (2792KB)(144)       Save
    At present, the international situation is complex and changeable, new social conflicts and contradictions are constantly arising in the transition period of the domestic society, and hostile forces are trying in vain to destroy the Critical Information Infrastructures (CII) of our country,  resulting in adverse social impacts. The existing defense measures based on the existing network attack detection and defense are not flexible and require high comprehensiveness of the defense system. Therefore, this thesis proposes an active defense method for electric power industry network security based on attack behaviors. By analyzing the attack behavior of attackers, combines ATT&CK attack framework model to carry out intermittent attack attempts against Advanced Persistent Threat (APT) organizations through layer upon layer forwarding of a large number of springboard nodes. Until the breakthrough and springboard node are found, the attack behavior and problems that may occur before or during the attack. The springboard, organization or personal information of the attacker at all levels is discovered in advance, and the attack behavior is discovered and blocked in advance in the stage of the attacker’s reconnaissance, so as to realize the active defense against the attack behavior.
    Reference | Related Articles | Metrics
    Research on the Disclosure and Sharing Policy of Cybersecurity  Vulnerabilities in China and the United States
    Journal of Information Security Reserach    2023, 9 (6): 602-.  
    Abstract146)      PDF (2305KB)(105)       Save
    With the increasing scale and complexity of computer software systems, vulnerability attacks on software and systems become more and more frequent, and attack methods become more and more diverse. Various countries have published vulnerability management regulations to avoid the threat of software and system vulnerabilities to national cyberspace security. Proper disclosure and sharing of security vulnerabilities can help security researchers learn security threats quickly and reduce vulnerability repair costs through sharing and communication, which has become essential to mitigating security risks. This paper introduces the public vulnerability database, focuses on the summary of China and the United States network security vulnerability disclosure and sharing related policies and regulations, and gives the possible problems and countermeasures  in vulnerability disclosure and sharing in China so that security researchers can better understand and learn the security vulnerability disclosure process and sharing related regulations, which ensures that security researchers can study security vulnerabilities in the extent permitted by regulations.
    Reference | Related Articles | Metrics
    Design and Implementation of Cryptography Intensive Platform for  Government Information System
    Journal of Information Security Reserach    2023, 9 (5): 461-.  
    Abstract143)      PDF (2467KB)(114)       Save
    Aiming at the problems of inconvenient, nonstandard, non universal and waste of resources for cipher application in the field of egovernment, this paper puts forward a systematic, intensive and standardized technical scheme. The scheme combines the SM2, SM3, SM4 and SM9 algorithms to form an intensive system framework, pool the cryptographic facilities, reduce the burden of applying cipher in the information system, provide a unified interface for cryptographic applications, and realize compliant, effective and convenient cryptographic applications. The pilot application practice of cryptographyintensive platform construction of egovernment extranet shows that this scheme can improve the utilization rate of cipher resources and save investment, and has reference value for the security protection of cipher application of scale government information system.Key wordscommercial cryptography; intensification; government informatization; identitybased cryptograph; egovernment
    Aiming at the problems of inconvenient, nonstandard, non universal and waste of resources for cipher application in the field of egovernment, this paper puts forward a systematic, intensive and standardized technical scheme. The scheme combines the SM2, SM3, SM4 and SM9 algorithms to form an intensive system framework, pool the cryptographic facilities, reduce the burden of applying cipher in the information system, provide a unified interface for cryptographic applications, and realize compliant, effective and convenient cryptographic applications. The pilot application practice of cryptographyintensive platform construction of egovernment extranet shows that this scheme can improve the utilization rate of cipher resources and save investment, and has reference value for the security protection of cipher application of scale government information system.
    Reference | Related Articles | Metrics
    Journal of Information Security Reserach    2023, 9 (7): 610-.  
    Abstract136)      PDF (519KB)(129)       Save
    Related Articles | Metrics
    Research and Thinking on Data Classification and Grading of Important Information Systems#br#
    Journal of Information Security Reserach    2023, 9 (7): 631-.  
    Abstract136)      PDF (1882KB)(154)       Save
    With the development of information technology and networking, incidents surrounding data security are also increasing. The data as a new production factor, is particularly important to ensure the security of important data. The “Data Security Law of the People’s Republic of China” clearly stipulates that the country should establish a data classification and grading protection system to implement classification and grading protection for data. This paper will study China’s data safety management regulations and policies, analyze the the degree of impact and influening objects of data damage, propose specific data classification and grading methods, and provide security protection and governance measures under data classification and grading management based on the industry characteristics and application scenarios of government data. It will achieve the openness and sharing of the data under safety protection, and provide reference for the classification and classification protection of the data in the future.
    Reference | Related Articles | Metrics
    Consideration on Some Problems in the Development of GPT4 and Its Regulation Scheme
    Journal of Information Security Reserach    2023, 9 (6): 510-.  
    Abstract130)      PDF (1273KB)(79)       Save
    With the release of the new generation of generative artificial intelligence (AI) foundation model GPT4, the era of AI has arrived. GPT4’s rapid popularity also raises some risk issues. In the aspect of data security, facing with frequent data leakage events, data storage period should be set to ensure the parallel development of data security and technology. In the aspect of intellectual property, GPT4 brings challenges on copyright infringement, subject status and works identification, which should be kept in mind in the future. In the aspect of the core algorithm, GPT4 hides the risk of algorithm discrimination. The algorithm should be continuously optimized to make GPT4 towards the true artificial general intelligence. At present, GPT4 is still in the process of continuous development, so it is still too early to design a detailed regulation scheme. In order to better deal with the risks caused by GPT4, independent innovation in the digital age should be sought, and generative AI should be included in the category of deep synthesis technology through special legislation on AI and combined with existing algorithms governing practice.
    Reference | Related Articles | Metrics
    Safety Management of Electronic Display Screen in  Public Areas
    Journal of Information Security Reserach    2023, 9 (4): 397-.  
    Abstract127)      PDF (629KB)(81)       Save
    Reference | Related Articles | Metrics
    Research on Intranet Security Integrated Protection Architecture in  Energy Enterprises Under Complex Network Threat Environment
    Journal of Information Security Reserach    2023, 9 (4): 390-.  
    Abstract124)      PDF (2901KB)(101)       Save
    Under the background of complex network threats,the construction and improvement of enterprise Intranet security protection capability is imminent. At present, many enterprises still have problems of eradicating the botnet in the Intranet, insufficient ability to resist advanced persistent threat attacks and difficult to defend against network horizontal attacks. This paper analyzes the current complex network threats faced by energy enterprises, and then puts forward models for comprehensive security protection of the Intranet of energy enterprises, such as improving the ability of asset mapping and discovery, establishing an Intranet unified access authorization system, dividing Intranet finegrained Intranet Security Policy, building attack identification models, and system guarantee and expert talent training.
    Reference | Related Articles | Metrics
    Research on the Integration of Full Lifecycle Data Security Management and Artificial Intelligence Technology#br#
    Journal of Information Security Reserach    2023, 9 (6): 543-.  
    Abstract121)      PDF (1143KB)(119)       Save
    With data becoming a new production factor, China has elevated data security to a national strategic level. With the promotion of a new round of technological revolution and the deepening of digital transformation, the artificial intelligence technology has increasing development potential, and gradually empowers the field of data security management actively. Firstly, the paper introduces the concept and significance of data security lifecycle management, analyzes the security risks faced by data in various stages of the lifecycle, and further discusses the problems and challenges faced by traditional data security management technologies in the context of massive data processing and upgraded attack methods. Then, the paper introduces the potential advantages of artificial intelligence in solving these problems and challenges, and summarizes the current mature data security management technologies based on artificial energy and typical application scenarios. Finally, the paper provides an outlook on the future development trends of artificial intelligence technologies in the field of data security management. This paper aims to provide useful references for researchers and practitioners in the field of data security management, and promote the innovation and application of artificial intelligence in the field of data security management technology.
    Reference | Related Articles | Metrics
    K-anonymity Mechanism Based on Iterative Binary Clustering
    Journal of Information Security Reserach    2023, 9 (5): 402-.  
    Abstract120)      PDF (2822KB)(67)       Save
    With the deepening of data sharing in various fields, the protection of individual privacy contained in data has become increasingly prominent. At the same time, Kanonymity, as an advanced theory of privacy protection, is also widely used in data sharing and distribution. However, Kanonymity, as a way to achieve privacy protection by generalizing data, will inevitably cause a certain loss of information. Therefore, how to ensure data availability and reduce the information loss as much as possible under the premise of satisfying Kanonymity is a question worthy of study. For this problem, for numerical data, a Kanonymity algorithm KABIBC (Kanonymous algorithm based on iterative binary clustering) based on iterative binary clustering is proposed to achieve Kanonymity. First, the sum of the distances within the group is defined, i.e., WGSD(withingroup sum of distance), and treat all tuples in the data table as a cluster, and then use an iterative strategy to perform binary clustering on it, and recursively process the obtained subclusters in the same way,  and reasonably adjust the tuple assignment of the two subclusters based on the principle of minimizing the information loss in the bisection, until the minimum subcluster that satisfies the Kanonymity requirement is obtained, so as to ensure that the amount of information loss tends to be optimal. Theoretical and experimental analysis are given, and it is shown that this mechanism can effectively reduce the information loss, and at the same time has a high operating efficiency.

    Reference | Related Articles | Metrics
    Comparison Research on Intrusion Detection Model Based on  Machine Learning
    Journal of Information Security Reserach    2023, 9 (8): 739-.  
    Abstract120)      PDF (942KB)(65)       Save
    Nowadays, network threats are constantly evolving and demonstrate increasing invisibility. Studying the performance and characteristics of multiple machine learning models for intrusion detection on modern traffic data is of greater significance to improve the timeliness of intrusion detection systems. This paper explores the use of recent efficient machine learning models, including ensemble learning(Random Forest, XGBoost, LightGBM) and deep learning(CNN, LSTM, GRU, etc) models for intrusion detection tasks on the public dataset UNSWNB15.We elaborate the task flow and experimental configuration, compare and analyze the experimental results of different models, summarize the characteristics of each model in the network intrusion detection task. The experimental results demonstrate that, under a 10% sampled dataset of UNSWNB15, the bestperforming model for the binary classification task among the experimental models is LightGBM, with an F1 score of 0.897, an accuracy of 89.86%, a training time of 1.98s, and a prediction time of 0.11s. In the case of multiclassification tasks, the most comprehensive prediction model among the experimental models is XGBoost, with an overall F1 score of 0.7907, an accuracy of 75.96%, a training time of 144.79s, and a prediction time of 0.21s.
    Reference | Related Articles | Metrics
    A Method of Active Defense for Intelligent Manufacturing  Device Swarms Based on Remote Attestation
    Journal of Information Security Reserach    2023, 9 (6): 580-.  
    Abstract118)      PDF (1988KB)(62)       Save
    With the development of artificial intelligence technology, intelligent manufacturing has become an inevitable choice for enterprise production. However, a compromised device not only causes issues such as confidentiality leaks and production chain errors, but also serves as a springboard for attackers and thus affects the security of the entire swarm. In this paper, we propose a proactive defense solution for intelligent manufacturing swarms based on remote attestation (SecRA). SecRA generates independent challenges for each device, enabling pointtopoint communication between gateways and devices. By extending the functionality of gateways, SecRA utilizes asynchronous communication to adapt to the existing network structure. In addition, based on the challengequery attestation protocol, communication and computation costs are transferred to resourcerich gateways, greatly reducing the burden of devices. Finally, the efficiency and feasibility of the SecRA are experimentally verified.
    Reference | Related Articles | Metrics
    A Mechanism Design for Compliance and Trusted Circulation of Data
    Journal of Information Security Reserach    2023, 9 (7): 618-.  
    Abstract116)      PDF (957KB)(82)       Save
    The circulation of data factors is critical to the development of the digital economy and highquality development of the economy. A trusted and practical data circulation mechanism should satisfy the incentives of all relevant participants simultaneously. The mechanism should be accompanied by an immediate regulation mechanism in data right authentication, registration, circulation, delivery and settlement to protect national information security and individual privacy exante. The rules of the mechanism should be observable to all so that a trusted consensus is established. The difference in features of data from tangible and intangible assets in physical existence, legal authentication, exclusiveness in use and relevant supporting techniques implies that a trusted data circulation mechanism should combine both theories of law, economics, management science and information techniques in designing circulation form, supplyside incentive, consistency in operation and screening signals in demandside.
    Reference | Related Articles | Metrics
    Research and Practice on Product Security Governance
    Journal of Information Security Reserach    2023, 9 (12): 1218-.  
    Abstract115)      PDF (2479KB)(57)       Save
    This paper studies how to ensure that suppliers deliver secure and trustworthy products and services from the perspective of product security governance. First, this paper introduces the context of product security, gives the definition and objectives of product security, and proposes that product security is a security governance problem. Then this paper establishes the organizational structure of product security governance based on the threeline model, describes the roles and responsibilities of each organizational unit, and solves the problems of separation of duties and conflicts of interest from the organizational structure. Next this paper introduces the concept, framework, system and implementation approaches of product security policies, and establishes the toplevel requirements of product security system construction. Finally, the contribution of this paper is summarized and the research direction for the next step is pointed out. These research results have been applied in ZTE’s product security practices and have achieved good governance effects.
    Reference | Related Articles | Metrics
    Research on Automatic Recognition Technology of Gambling Website
    Journal of Information Security Reserach    2023, 9 (5): 440-.  
    Abstract109)      PDF (1585KB)(77)       Save
    Online gambling has serious information security risks, and effective discovery and recognition of gambling websites is of great significance to maintaining national financial stability. Aiming at the difficulty of discovering gambling websites, the paper proposes a solution that obtains the IP network segment owned by the cloud platform based on the AS information, traverses the IP to reverse resolve the domain name, and distributes crawling to obtain website screenshots. Aiming at the problem that gambling websites are difficult to recognize, such as some gambling sites are just a picture with a link to download a gambling APP, the solution uses the dHash algorithm to clean the positive samples, and trains a convolutional neural network (CNN) for binary classification of websites. The experimental results show that the solution has a strong generalization ability and less human participation, and can solve the problems in the discovery and recognition of gambling websites.
    Related Articles | Metrics
    Core Isolation Method of ARM Processor for OutofOrder Execution  Vulnerability Test
    Journal of Information Security Reserach    2023, 9 (4): 347-.  
    Abstract107)      PDF (1904KB)(53)       Save
    With the discovery of processor microarchitecture vulnerabilities represented by spectre and meltdown, microarchitecture security vulnerabilities have gradually attracted the attention of academia, and automatic testing schemes for related microarchitecture vulnerabilities have also been proposed. However, in the real test environment, the test microarchitecture environment will be interrupted and disturbed by the scheduling system, resulting in the omission of effective test cases. Therefore, this paper proposes an arm processor core isolation method for outoforder execution test. By using the management mechanism of interrupt and scheduling between ARM processor and Linux kernel and designing the corresponding process synchronization mechanism, this method can isolate the processor core from the interrupt and scheduling system during the test process, so as to ensure that the operation of test instruction block will not be interrupted by interrupt and scheduling program. The corresponding synchronization mechanism is designed to ensure that the process switching process will not be inserted and executed by other processes, so as to ensure the effectiveness of the test.
    Reference | Related Articles | Metrics
    Practical Exploration and Research on Automotive Cyber Security
    Journal of Information Security Reserach    2023, 9 (5): 476-.  
    Abstract105)      PDF (1491KB)(69)       Save
    This essay first analyzes the current cyber security threats faced by smart connected cars from four dimensions: Telematics cloud service platform, Telematics communication, invehicle terminals, and externally connected terminals. Secondly, in order to fully understand the current cyber security level of smart connected cars, 10 different mainstream car manufacturers’ smart connected cars are selected from the market and penetration tests are conducted based on six attack vectors: TCU, HU, invehicle network, radio, TSP and car control APP, and the test results are sorted and analyzed to assess their cyber security level. Then, the corresponding security protection strategies are proposed from four aspects: the security of the Telematics cloud service platform, the security of Telematics communication, the security of invehicle terminals and the security of externally connected terminals. Finally, based on the constantly diverse and unpredictable characteristics of automotive cyber security attack vectors, an outlook on the cyber security of smart connected vehicles is provided.
    Reference | Related Articles | Metrics
    Image Steganalysis Method Based on Multiattention Mechanism and  Siamese Network
    Journal of Information Security Reserach    2023, 9 (6): 573-.  
    Abstract103)      PDF (1439KB)(52)       Save
    Aiming at the problem of extracting more significant steganographic features from images to improve detection accuracy of steganalysis detection, a Siamese network image steganalysis method based on multiattention mechanism is proposed. This method uses the idea of feature fusion to make the steganalysis model extract richer steganographic features. Firstly, a Siamese network subnetwork composed of ParNet block, depthwise separable convolution block, normalizationbased attention module, squeeze and excitation module, and external attention module is designed, and the multibranch network structure and multiattention mechanism are used to extract more useful classification results. Features improve the detection ability of the model; then use Cyclical Focal loss to modify the weight of the training samples at different stages of training to improve the training effect of the model. The experiment uses the BOOSbase 1.01 data set to conduct experiments on five adaptive steganography algorithms: WOW, SUNIWARD, HUGO, MiPOD and HILL. Experimental results show that this method outperforms SRNet, ZhuNet and SiaStegNet methods in detection accuracy, and has a lower number of parameters.
    Reference | Related Articles | Metrics
    Research on Image Steganography and Extraction Scheme Based on  Implicit Symmetric Generative Adversarial Network
    Journal of Information Security Reserach    2023, 9 (6): 566-.  
    Abstract102)      PDF (953KB)(65)       Save
    Aiming at the problems in the image steganography technology that the quality of the carrier image is degraded and vulnerable to attacks when the secret image is embedded, this paper proposes an image steganography and extraction scheme based on an implicit symmetric generative network. The scheme first abstracts the task of image steganography and extraction into a mathematical optimization problem. Secondly, an implicit symmetric generative adversarial network model is proposed according to the optimization problem. The implicit symmetric generative adversarial network contains two independent generative adversarial subnetworks, namely the steganographic adversarial subnetwork and the extraction adversarial subnetwork. In the steganographic confrontational subnetwork, first the encoder converts the cover image and the covert image into a set of highdimensional feature vectors containing enough cover image information and secret image information. The decoder then reconstructs these feature vectors into images embedded with secret information. In the extraction adversarial subnetwork, the image embedded with secret information is passed through another set of encoder and decoder to extract the hidden image. Finally, a loss function suitable for the model is designed. Experimental results show that the proposed scheme has high image quality and can maintain good robustness in the face of various common attacks.
    Reference | Related Articles | Metrics