Most Download articles

    Published in last 1 year| In last 2 years| In last 3 years| All| Most Downloaded in Recent Month | Most Downloaded in Recent Year|

    Published in last 1 year
    Please wait a minute...
    For Selected: Toggle Thumbnails
    ChatGPT’s Applications, Status and Trends in the Field of Cyber Security
    Journal of Information Security Reserach    2023, 9 (6): 500-.  
    Abstract514)      PDF (2555KB)(461)       Save
    ChatGPT, as a large language model technology, demonstrates extremely strong language understanding and text generation capabilities. It has not only attracted tremendous attention across various industries but also brought new transformations to the field of cybersecurity. Currently, research on ChatGPT in the cybersecurity field is still in its infancy. To help researchers systematically understand the research status of ChatGPT in cybersecurity, this paper provides the first comprehensive summary of ChatGPT’s applications in the field of cybersecurity and potential accompanying security issues. The article first outlines the development of large language model technologies and briefly introduces the technology and features of ChatGPT. Then, it discusses the enabling effects of ChatGPT in the cybersecurity field from two perspectives: assisting attacks and assisting defense. This includes vulnerability discovery, exploitation and remediation, malicious software detection and identification, phishing email generation and detection, and potential use cases in security operations scenarios. Furthermore, the article delves into the accompanying risks of ChatGPT in the cybersecurity field, including content risks and prompt injection attacks, providing a detailed analysis and discussion of these risks. Finally, the paper looks into the future of ChatGPT in the cybersecurity field from the perspectives of security enablement and accompanying security, pointing out the direction for future research on ChatGPT in the cybersecurity domain.
    Reference | Related Articles | Metrics
    Journal of Information Security Reserach    2023, 9 (6): 498-.  
    Abstract253)      PDF (472KB)(294)       Save
    Related Articles | Metrics
    A Survey of SQL Injection Attack Detection and Defense Technology
    Journal of Information Security Reserach    2023, 9 (5): 412-.  
    Abstract216)      PDF (2612KB)(203)       Save
    In the era of “Internet+”, data is the most valuable resource of the Internet. Attackers often use SQL injection attacks to destroy the database in order to obtain important data information in the database. The threat to database security is becoming more and more serious. At present, the research on SQL injection attacks mostly focuses on traditional SQL injection attacks, but lacks the cognition of new advanced SQL injection technology with stronger concealment and higher risk, and the research on related detection and defense technology. In response to this phenomenon, this paper analyzes and evaluates traditional and advanced SQL injection attack technologies and their technical characteristics based on the classification of SQL injection technologies; summarizes existing detection and defense technologies, and evaluates the advantages and disadvantages of these methods for defense effectiveness; finally The problems existing in the current research field are sorted out, and suggestions for future research directions are put forward.

    Reference | Related Articles | Metrics
    Research on Content Detection Generated by Large Language Model  and the Mechanism of Bypassing
    Journal of Information Security Reserach    2023, 9 (6): 524-.  
    Abstract279)      PDF (1924KB)(198)       Save
    In recent years, there has been a surge in the development of large language models. AI robots like ChatGPT, although they have a largescale security confrontation mechanism inside, attackers can still elaborate questionandanswer patterns to bypass the mechanism, with their help to automatically produce phishing emails and carry out network attacks. In this case, how to identify the text generated by AI robots has also become a hot issue. In order to carry out LLMgenerated content detection experiment, our team collected a certain number of questionandanswer data samples from an Internet social platform and ChatGPT platform, and proposed a series of detection strategies according to different conditions of AI text availability. It includes text similarity analysis based on online controllable AI samples, text data mining based on statistical differences under offline conditions, adversarial analysis based on the LLM generation method under the condition that AI samples are not available, and AI model analysis based on building a classifier by finetuning the target LLM model itself. We calculated and compared the detection capabilities of the analysis engine in each case. On the other hand, we give some antikill techniques against AI text detection engines based on the characteristics of detection strategies, from the perspective of network attack and defense.
    Reference | Related Articles | Metrics
    Journal of Information Security Reserach    2023, 9 (E2): 4-.  
    Abstract39)      PDF (2945KB)(190)       Save
    Related Articles | Metrics
    Research on Network Security Governance and Response of  Largescale AI Model
    Journal of Information Security Reserach    2023, 9 (6): 551-.  
    Abstract241)      PDF (1101KB)(187)       Save
    With the continuous development of artificial intelligence technology, largescale AI model technology has become an important research direction in the field of artificial intelligence. The publication of ChatGPT4.0 and ERNIE Bot has rapidly promoted the development and application of this technology. However, the emergence of largescale AI model technology has also brought new challenges to network security. This paper will start with the definition, characteristics and application of largescale AI model technology, and analyze the network security situation under largescale AI model technology. The network security governance framework of largescale AI model is proposed, and the given steps can provide reference for network security work of largescale AI model.
    Reference | Related Articles | Metrics
    ChatGPT’s Security Threaten Research
    Journal of Information Security Reserach    2023, 9 (6): 533-.  
    Abstract197)      PDF (1801KB)(169)       Save
    With the rapid development of deep learning technology and natural language processing technology, the large language model represented by ChatGPT came into being. However, while showing surprising capabilities in many fields, ChatgPT also exposed many security threats, which aroused the concerns of academia and industry. This paper first introduces the development history, working mode, and training methods of ChatGPT and its series models, then summarizes and analyzes various current security problems that ChatGPT may encounter and divides it into two levels: user and model. Then, countermeasures and solutions are proposed according to the characteristics of ChatGPT at each stage. Finally, this paper looks forward to developing a safe and trusted ChatGPT and a large language model.
    Reference | Related Articles | Metrics
    Research and Thinking on Data Classification and Grading of Important Information Systems#br#
    Journal of Information Security Reserach    2023, 9 (7): 631-.  
    Abstract147)      PDF (1882KB)(168)       Save
    With the development of information technology and networking, incidents surrounding data security are also increasing. The data as a new production factor, is particularly important to ensure the security of important data. The “Data Security Law of the People’s Republic of China” clearly stipulates that the country should establish a data classification and grading protection system to implement classification and grading protection for data. This paper will study China’s data safety management regulations and policies, analyze the the degree of impact and influening objects of data damage, propose specific data classification and grading methods, and provide security protection and governance measures under data classification and grading management based on the industry characteristics and application scenarios of government data. It will achieve the openness and sharing of the data under safety protection, and provide reference for the classification and classification protection of the data in the future.
    Reference | Related Articles | Metrics
    Journal of Information Security Reserach    2023, 9 (E1): 105-.  
    Abstract332)      PDF (1450KB)(160)       Save
    Reference | Related Articles | Metrics
    Key Technologies and Research Prospects of Privacy Computing
    Journal of Information Security Reserach    2023, 9 (8): 714-.  
    Abstract261)      PDF (1814KB)(158)       Save
    Privacy computing, as an important technical means taking into account both data circulation and privacy protection, can effectively break the “data island” barriers while ensuring data security, it enables open data sharing, and promotes the deep mining and use of data and crossdomain integration. In this paper, the background knowledge, basic concepts and architecture of privacy computing were introduced, the basic concepts of three key technologies of privacy computing, including secure multiparty computation, federated learning and trusted execution environment were elaborated, and studies on the existing privacy security was conducted, a multidimensional comparison and summarization of the differences of the three key technologies were made. On this basis, the future research direction of privacy computing is prospected from the technical integration of privacy computing with blockchain, deep learning and knowledge graph.
    Reference | Related Articles | Metrics
    Towards a Privacy-preserving Research for AI and Blockchain Integration
    Journal of Information Security Reserach    2023, 9 (6): 557-.  
    Abstract218)      PDF (1307KB)(156)       Save
    With the widespread attention and application of artificial intelligence (AI) and blockchain technologies, privacy protection techniques arising from their integration are of notable significance. In addition to protecting the privacy of individuals, these techniques also guarantee the security and dependability of data. This paper initially presents an overview of AI and blockchain, summarizing their combination along with derived privacy protection technologies. It then explores specific application scenarios in data encryption, deidentification, multitier distributed ledgers, and kanonymity methods. Moreover, the paper evaluates five critical aspects of AIblockchainintegration privacy protection systems, including authorization management, access control, data protection, network security, and scalability. Furthermore, it analyzes the deficiencies and their actual cause, offering corresponding suggestions. This research also classifies and summarizes privacy protection techniques based on AIblockchain application scenarios and technical schemes. In conclusion, this paper outlines the future directions of privacy protection technologies emerging from AI and blockchain integration, including enhancing efficiency and security to achieve more comprehensive privacy protection of AI privacy.
    Reference | Related Articles | Metrics
    Research on Active Defense Method of Network Security Under APT Organization Attack Behavior
    Journal of Information Security Reserach    2023, 9 (5): 423-.  
    Abstract163)      PDF (2792KB)(152)       Save
    At present, the international situation is complex and changeable, new social conflicts and contradictions are constantly arising in the transition period of the domestic society, and hostile forces are trying in vain to destroy the Critical Information Infrastructures (CII) of our country,  resulting in adverse social impacts. The existing defense measures based on the existing network attack detection and defense are not flexible and require high comprehensiveness of the defense system. Therefore, this thesis proposes an active defense method for electric power industry network security based on attack behaviors. By analyzing the attack behavior of attackers, combines ATT&CK attack framework model to carry out intermittent attack attempts against Advanced Persistent Threat (APT) organizations through layer upon layer forwarding of a large number of springboard nodes. Until the breakthrough and springboard node are found, the attack behavior and problems that may occur before or during the attack. The springboard, organization or personal information of the attacker at all levels is discovered in advance, and the attack behavior is discovered and blocked in advance in the stage of the attacker’s reconnaissance, so as to realize the active defense against the attack behavior.
    Reference | Related Articles | Metrics
    Research on Privacy Protection Technology in Federated Learning
    Journal of Information Security Reserach    2024, 10 (3): 194-.  
    Abstract121)      PDF (1252KB)(148)       Save
    In federated learning, multiple models are trained through parameter coordination without sharing raw data. However,  the extensive parameter exchange in this process renders the model vulnerable to threats not only from external users but also from internal participants. Therefore, research on privacy protection techniques in federated learning is crucial. This paper introduces the current research status on privacy protection in federated learning. It classifies the security threats of federated learning into external attacks and internal attacks.Based on this classification,  it summarizes external attack techniques such as model inversion attacks, external reconstruction attacks, and external inference attacks, as well as internal attack techniques such as poisoning attacks, internal reconstruction attacks, and internal inference attacks. From the perspective of attack and defense correspondence, this paper summarizes data perturbation techniques such as central differential privacy, local differential privacy, and distributed differential privacy, as well as process encryption techniques such as homomorphic encryption, secret sharing, and trusted execution environment. Finally, the paper analyzes the difficulties of federated learning privacy protection technology and identifies the key directions for its improvement.
    Reference | Related Articles | Metrics
    Research on Artificial Intelligence Data Falsification Risk  Based on GPT Model
    Journal of Information Security Reserach    2023, 9 (6): 518-.  
    Abstract167)      PDF (1887KB)(143)       Save
    The rapid development and application of artificial intelligence technology have led to the emergence of AIGC (Artificial Intelligence Generated Context), which has significantly enhanced productivity. ChatGPT, a product that utilizes AIGC, has gained popularity worldwide due to its diverse application scenarios and has spurred rapid commercialization development. This paper takes the artificial intelligence data forgery risk as the research goal, takes the GPT model as the research object, and focuses on the possible causes of data forgery and the realization process by analyzing the security risks that have been exposed or appeared. Based on the offensive and defensive countermeasures of traditional cyberspace security and data security, the paper makes a practical study of data forgery based on model finetuning and speculates some data forgery utilization scenarios after the widespread commercialization of artificial intelligence. Finally, the paper puts forward some suggestions on how to deal with the risk of data forgery and provides directions for avoiding the risk of data forgery before the largescale application of artificial intelligence in the future.
    Reference | Related Articles | Metrics
    Journal of Information Security Reserach    2023, 9 (7): 610-.  
    Abstract142)      PDF (519KB)(142)       Save
    Related Articles | Metrics
    Challenges and Responses to Data Governance in China
    Journal of Information Security Reserach    2023, 9 (7): 612-.  
    Abstract168)      PDF (924KB)(134)       Save
    At present, data can hold a substantial value in promoting economic and social development, and possess important strategic significance. Data governance has also been a significant topic and practical direction in the development of China’s digital economy and the construction of Digital China. By analyzing the difficulties in the following aspects of data rights confirmation, data security, data compliance, and data circulation, the institutional dilemmas and practical issues faced by data governance are being clarified. And a comprehensive approach for data governance has also been proposed, including protecting data rights and interests, strengthening compliance guidance, stimulating the vitality of the data market, and promoting technological empowerment. It is expected to advance the process of data governance in China.
    Reference | Related Articles | Metrics
    Security Risks and Countermeasures to Artificial Intelligence#br#
    #br#
    Journal of Information Security Reserach    2024, 10 (2): 101-.  
    Abstract101)      PDF (469KB)(132)       Save
    Related Articles | Metrics
    The Status and Trends of Confidential Computing
    Journal of Information Security Reserach    2024, 10 (1): 2-.  
    Abstract100)      PDF (1466KB)(129)       Save
    Related Articles | Metrics
    Research on the Integration of Full Lifecycle Data Security Management and Artificial Intelligence Technology#br#
    Journal of Information Security Reserach    2023, 9 (6): 543-.  
    Abstract127)      PDF (1143KB)(128)       Save
    With data becoming a new production factor, China has elevated data security to a national strategic level. With the promotion of a new round of technological revolution and the deepening of digital transformation, the artificial intelligence technology has increasing development potential, and gradually empowers the field of data security management actively. Firstly, the paper introduces the concept and significance of data security lifecycle management, analyzes the security risks faced by data in various stages of the lifecycle, and further discusses the problems and challenges faced by traditional data security management technologies in the context of massive data processing and upgraded attack methods. Then, the paper introduces the potential advantages of artificial intelligence in solving these problems and challenges, and summarizes the current mature data security management technologies based on artificial energy and typical application scenarios. Finally, the paper provides an outlook on the future development trends of artificial intelligence technologies in the field of data security management. This paper aims to provide useful references for researchers and practitioners in the field of data security management, and promote the innovation and application of artificial intelligence in the field of data security management technology.
    Reference | Related Articles | Metrics
    Research on Security Risks and Protection of Container Images
    Journal of Information Security Reserach    2023, 9 (8): 792-.  
    Abstract87)      PDF (1788KB)(121)       Save
    As the digital transformation speeds up, more and more enterprises shift to adopt container technology to improve business productivity and scalability in order to deepen the process of industrial digital transformation. As the basis for container operation, container images contain packaged applications and their dependencies, as well as process information for container instantiation. However, container images also have various insecure factors. In order to solve the problem from the source and reduce the various security risks and threats faced by containers after they are instantiated, the fulllifecycle management of container images should be implemented. In this paper, the advantages that container images bring to the application development and deployment were investigatesd, the security risks faced by container images were analyzed. Key technologies for container mirroring security protection from the three stages of construction, distribution, and operation were proposed, and then a container image security scanning tool was developed, which can scan container images for applications and underlying infrastructure that use container technology. It was proved to have good practical effects, which can help enterprises achieve fulllifecycle image security protection.
    Reference | Related Articles | Metrics
    Vulnerability Mining and Threat Detection
    Journal of Information Security Reserach    2023, 9 (10): 930-.  
    Abstract107)      PDF (510KB)(121)       Save
    Related Articles | Metrics
    Research on the Disclosure and Sharing Policy of Cybersecurity  Vulnerabilities in China and the United States
    Journal of Information Security Reserach    2023, 9 (6): 602-.  
    Abstract153)      PDF (2305KB)(120)       Save
    With the increasing scale and complexity of computer software systems, vulnerability attacks on software and systems become more and more frequent, and attack methods become more and more diverse. Various countries have published vulnerability management regulations to avoid the threat of software and system vulnerabilities to national cyberspace security. Proper disclosure and sharing of security vulnerabilities can help security researchers learn security threats quickly and reduce vulnerability repair costs through sharing and communication, which has become essential to mitigating security risks. This paper introduces the public vulnerability database, focuses on the summary of China and the United States network security vulnerability disclosure and sharing related policies and regulations, and gives the possible problems and countermeasures  in vulnerability disclosure and sharing in China so that security researchers can better understand and learn the security vulnerability disclosure process and sharing related regulations, which ensures that security researchers can study security vulnerabilities in the extent permitted by regulations.
    Reference | Related Articles | Metrics
    Design and Implementation of Cryptography Intensive Platform for  Government Information System
    Journal of Information Security Reserach    2023, 9 (5): 461-.  
    Abstract143)      PDF (2467KB)(116)       Save
    Aiming at the problems of inconvenient, nonstandard, non universal and waste of resources for cipher application in the field of egovernment, this paper puts forward a systematic, intensive and standardized technical scheme. The scheme combines the SM2, SM3, SM4 and SM9 algorithms to form an intensive system framework, pool the cryptographic facilities, reduce the burden of applying cipher in the information system, provide a unified interface for cryptographic applications, and realize compliant, effective and convenient cryptographic applications. The pilot application practice of cryptographyintensive platform construction of egovernment extranet shows that this scheme can improve the utilization rate of cipher resources and save investment, and has reference value for the security protection of cipher application of scale government information system.Key wordscommercial cryptography; intensification; government informatization; identitybased cryptograph; egovernment
    Aiming at the problems of inconvenient, nonstandard, non universal and waste of resources for cipher application in the field of egovernment, this paper puts forward a systematic, intensive and standardized technical scheme. The scheme combines the SM2, SM3, SM4 and SM9 algorithms to form an intensive system framework, pool the cryptographic facilities, reduce the burden of applying cipher in the information system, provide a unified interface for cryptographic applications, and realize compliant, effective and convenient cryptographic applications. The pilot application practice of cryptographyintensive platform construction of egovernment extranet shows that this scheme can improve the utilization rate of cipher resources and save investment, and has reference value for the security protection of cipher application of scale government information system.
    Reference | Related Articles | Metrics
    Android Malware Multiclassification Model Based on Transformer
    Journal of Information Security Reserach    2023, 9 (12): 1138-.  
    Abstract117)      PDF (2073KB)(113)       Save
    Due to the open source and openness, the Android system has become a popular target for malware attacks, and there are currently a large number of research on Android malware detection, among which machine learning algorithms are widely used. In this paper, the Transformer algorithm is used to classify and detect the grayscale images converted by Android software classes.dex files, and the accuracy rate reaches 86%, which is higher than that of CNN, MLP and other models.
    Reference | Related Articles | Metrics
    Journal of Information Security Reserach    2023, 9 (E2): 13-.  
    Abstract87)      PDF (1022KB)(113)       Save
    Reference | Related Articles | Metrics
    Research and Practice on Data Security Compliance Check  Technology for Operators
    Journal of Information Security Reserach    2023, 9 (7): 643-.  
    Abstract161)      PDF (889KB)(111)       Save
    In the context of the development of the global digital economy, data has become an important asset for enterprises. China positions data as one of the national basic strategic resources and innovative elements of social production. In recent years, the proliferation of ransomware attacks from hackers has posed a significant risk of data leakage to enterprise data security management. Secondly, unconscious data-sharing operations by employees during the production process are also an important way for enterprise data asset leakage. With the promulgation of the Data Security Law, regulatory agencies have made data security reviews a part of the industry security inspections for operators. Therefore, based on regulatory compliance, research and practice related inspection technologies to help operators enhance their security inspection capabilities, ensure data security, and meet the needs of compliance regulation and business development.
    Reference | Related Articles | Metrics
    Security and Privacy Protection in 6G Network: A Survey
    Journal of Information Security Reserach    2023, 9 (9): 822-.  
    Abstract102)      PDF (1096KB)(110)       Save
    The scale of 5G network deployments continues to grow. While there are obvious advantages over 4G network, the limitations of 5G network are emerging, which leads to research on 6G network technologies. The complexity of 6G network and the diversity of 6G’s applications make the security issues of 6G more prominent. Coupled with the fact that 6G frameworks and related technologies are largely in a conceptual state, the security and privacy issues of 6G network are still in the exploratory stage. In this paper we analyzed the current state of 6G security and privacy research at first, and than pointed out the security challenges in 6G network, discussed potential security solutions for 6G network from the aspects of physical layer security, artificial intelligence (AI), distributed ledger technology (DLT), and edge computing, and finally we provided an outlook on future research trends of security and privacy protection in 6G network.
    Reference | Related Articles | Metrics
    Classification and Grading Method of Transportation Government Data
    Journal of Information Security Reserach    2023, 9 (8): 808-.  
    Abstract89)      PDF (1008KB)(106)       Save
    In order to promote the open sharing of government data and improve data security, it is urgent to solve the classification and grading of government data resources. This paper summarized the experience of domestic and foreign government data classification and grading, using a hybrid classification method combining surface and line to build transportation government data classification framework. A fivelevel data grading model was formed base on the data grading method of data security risk analysis, and the effect of the method was verified by introducing actual data. Transportation government data classification and grading method can effectively assist the relevant departments to carry out classification and grading of government data, as well as important data protection, and promoting the level of industry data security governance and security technology advancement.
    Reference | Related Articles | Metrics
    Research on Identity Authentication Technology Based on Block Chain and PKI
    Journal of Information Security Reserach    2024, 10 (2): 148-.  
    Abstract72)      PDF (1573KB)(106)       Save
    Public key infrastructure (PKI) is a secure system based on asymmetric cryptographic algorithm and digital certificate to realize identity authentication and encrypted communication, operating on the principle of  trust transmission based on trust anchor. However, this technology has the following problems: The CA center is unique and there is a single point of failure; The authentication process involves a large number of operations, such as certificate resolution, signature verification, and certificate chain verification. To solve the above problems, this paper builds an identity authentication model based on Changan Chain, and proposes an identity authentication scheme based on Changan Chain digital certificate and public key infrastructure. Theoretical analysis and experimental data demonstrate  that this scheme reduces certificate parsing, signature verification and other operations, simplifies the authentication process, and improves the authentication efficiency.
    Reference | Related Articles | Metrics
    Research on Network Malicious Traffic Detection Technology Based on  Ensemble Learning Strategy
    Journal of Information Security Reserach    2023, 9 (8): 730-.  
    Abstract92)      PDF (2586KB)(100)       Save
    Network traffic is the main carrier of network attacks, and the identification and analysis of malicious traffic is an important means to ensure network security. Machine learning method has been widely used in malicious traffic identification, which can achieve high precision identification. In the existing methods, the fusion model is more accurate than the single statistical model, but the depth of network behavior mining is insufficient. This paper proposes a stacking model that identifies multilevel network features and is MultiStacking for malicious traffic. It employs the network behavior patterns of network traffic in different session granularity and combines the robust fitting capability of the stacking model for multidimensional data to deeply heap malicious network behaviors. By verifying the detection capabilities of multiple fusion models on the CICIDS2017 and CICIDS2018 datasets, various detection methods are comprehensively quantified and compared, and the performance of MultiStacking detection methods in MultiStacking scenarios is deeply analyzed. The experimental results show that the malicious traffic detection method based on multilevel stacking can further improve the detection accuracy.
    Reference | Related Articles | Metrics
    A Network Intrusion Detection Model Integrating CNN-BiGRU and  Attention Mechanism
    Journal of Information Security Reserach    2024, 10 (3): 202-.  
    Abstract68)      PDF (2042KB)(95)       Save
    To enhance the feature extraction capabilities and classification accuracy of the network intrusion detection model, a network intrusion detection model integrating CNNBiGRU (Convolutional Neural NetworkBidirectional Gated Recurrent Unit) and attention mechanism is proposed. CNN is employed to effectively extract nonlinear features from traffic datasets,while BiGRU extracts timeseries features. The attention mechanism is then integrated to differentiate the importance of different types of traffic data through weighted means, thereby improvingthe overall performance of the model in feature extraction and classification. The experimental results indicate that the overall accuracy rate is 2.25% higher than that of the BiLSTM (Bidirectional Long ShortTerm Memory) model. Kfold crossvalidation results demonstrate that the proposed model's good generalization performance, avoiding the occurrence of overfitting phenomenon, and affirming its effectiveness and rationality.
    Reference | Related Articles | Metrics
    Research on Vulnerability Text Feature Classification Technology  Based on BERT
    Journal of Information Security Reserach    2023, 9 (7): 687-.  
    Abstract113)      PDF (944KB)(94)       Save
    With the development of informatization and the increase of network applications, many software and hardware products are affected by various types of cybersecurity vulnerabilities. Vulnerability analysis and management often require people to classify large amounts of vulnerability intelligence texts. In order to efficiently and accurately determine the category of the vulnerability described by the vulnerability intelligence text, this paper proposes a cybersecurity vulnerability classification model based on BERT (bidirectional encoder representation from Transformers). First, the vulnerability classification dataset is constructed, and the pretrained model represents the vulnerability intelligence text as feature vectors. Then the feature vectors complete the classification through the classifier. At last, we use the test set to evaluate the classification effect. In our experiment, we use TextCNN, TextRNN, TextRNN_Att, fastText and the proposed model to classify 48000 vulnerability intelligence texts containing vulnerability descriptions. Experimental results show that the proposed model scored the highest on the classification evaluation indicators on the test set, and it can be effectively applied to cybersecurity vulnerability classification tasks and reduce manual workload.
    Reference | Related Articles | Metrics
    Analysis of Potential Security Risks in the Field of Metaverse
    Journal of Information Security Reserach    2023, 9 (5): 490-.  
    Abstract165)      PDF (1635KB)(94)       Save
    The birth and outbreak of the metaverse is the result of the accelerated global digital transformation. As the final form of the network virtualization process, the metaverse has become an important historical node in the evolution of human civilization. However, the development of the metaverse also brings a series of security risks. Regulatory authorities should pay attention to the nested coupling relationship between the metaverse and the real society in their governance, so as to avoid becoming a completely virtual dream universe. Based on the analysis of the security risks of the metaverse in political, social, cultural and network aspects, some suggestions on network governance are put forward to make the metaverse become a beneficial extension and supplement of the real society.
    Reference | Related Articles | Metrics
    Survey of Intelligent Vulnerability Mining and Cyberspace Threat Detection
    Journal of Information Security Reserach    2023, 9 (10): 932-.  
    Abstract91)      PDF (1093KB)(94)       Save
    At present, the threat of cyberspace is becoming more and more serious. A large number of studies have focused on cyberspace security defense techniques and systems. Vulnerability mining technique can be applied to detect and repair vulnerabilities in time before the occurrence of network attacks, reducing the risk of intrusion; while threat detection technique can be applied to threat detection during and after network attacks occur, which can detect threats in a timely manner and respond to them, reducing the harm and loss caused by intrusion. This paper analyzed and summarized the research on vulnerability mining and cyberspace threat detection based on intelligent methods. In the aspect of intelligent vulnerability mining, the current research progress is summarized from several application classifications combined with artificial intelligence technique, namely vulnerability patch identification, vulnerability prediction, code comparison and fuzz testing. In the aspect of cyberspace threat detection, the current research progress is summarized from the classification of information carriers involved in threat detection based on network traffic, host data, malicious files, and network threat intelligence.
    Reference | Related Articles | Metrics
    A Secure Data Sharing Scheme Supporting Finegrained Authorization
    Journal of Information Security Reserach    2023, 9 (7): 667-.  
    Abstract103)      PDF (1681KB)(93)       Save
    Considering the problems such as centralized data storage and difficulty in data sharing in cloud computing environments, based on the combination of multiconditional proxy reencryption and attributebased proxy reencryption, a multiconditional attributebased threshold proxy reencryption scheme which supports multiple authorization conditions is proposed. The scheme supports finegrained access to ciphertext data under multiple keyword authorization conditions, and can limit the authorization conditions and scope of ciphertext sharing. Only when the attribute set meets the access structure in the ciphertext and the keywords are consistent with the keywords set in the ciphertext, users can access the data. This solution achieves finegrained access to ciphertext data under multiple keyword authorization conditions, supports flexible user revocation, prevents unauthorized decryption of ciphertext by conspirators, and protects the sensitive information of data owners. Through the provable security analysis, it is shown that under the general group model, the scheme can resist chosen plaintext attack; compared with other conditional proxy reencryption schemes, the functions it supports are more diverse.

    Reference | Related Articles | Metrics
    Research and Application of EndtoEnd Traceability Technology for Government Data
    Journal of Information Security Reserach    2023, 9 (7): 655-.  
    Abstract107)      PDF (1997KB)(92)       Save
    Along with the national digital government strategic layout’s continuous advancement, in order to give full play to the benefits of big data aggregation and analysis, the nodes of digital government deal with a large amount of important data, and the data communication and information sharing among the nodes, and the data security risk is exposed day by day, which brings a great challenge to trace the source of data leakage events. This paper first analyzes the risk scenario of digital government data leakage. Then, based on the domestic and foreign wellknown traceability models 7W, ProVOC and so on, the endtoend traceability model and technical method are proposed. The model is a comprehensive application of the annotation method and the reverse query method. The method is a scenariobased improvement of database watermarking, dynamic desensitization and other technologies, and makes use of big data and association analysis technology, the traceability technology and the landing practice strategy are formed through each link of the service data flow, including data marking, staining, data operation log association analysis. Finally, taking a government core node network environment as an example, the paper carries on the application practice research, and achieves the effect of successfully tracing the evidence chain of data leakage exit and data access transmission chain, it improves the traceability efficiency and accuracy of data security events.
    Reference | Related Articles | Metrics
    A Mechanism Design for Compliance and Trusted Circulation of Data
    Journal of Information Security Reserach    2023, 9 (7): 618-.  
    Abstract123)      PDF (957KB)(91)       Save
    The circulation of data factors is critical to the development of the digital economy and highquality development of the economy. A trusted and practical data circulation mechanism should satisfy the incentives of all relevant participants simultaneously. The mechanism should be accompanied by an immediate regulation mechanism in data right authentication, registration, circulation, delivery and settlement to protect national information security and individual privacy exante. The rules of the mechanism should be observable to all so that a trusted consensus is established. The difference in features of data from tangible and intangible assets in physical existence, legal authentication, exclusiveness in use and relevant supporting techniques implies that a trusted data circulation mechanism should combine both theories of law, economics, management science and information techniques in designing circulation form, supplyside incentive, consistency in operation and screening signals in demandside.
    Reference | Related Articles | Metrics
    Research on the Progress of Crossborder Data Flow Governance
    Journal of Information Security Reserach    2023, 9 (7): 624-.  
    Abstract208)      PDF (1036KB)(87)       Save
    While promoting the sharing of global data resources, the crossborder data flow will inevitably threaten data sovereignty and national security. The competition for the right to speak in international data with crossborder data flow governance as the game will become the focus of competition in the international community in the future. This paper introduces the background knowledge and constraints of crossborder data flow, investigates and compares the crossborder data flow governance models of the United States, the European Union, Russia, Japan, and Australia, and analyzes the current policy status and challenges of crossborder data flow governance in our country, on this basis, countermeasures and suggestions are proposed for the governance of crossborder data flow in our country from the perspective of data sovereignty, including promoting the classification supervision of crossborder data flow, innovating and developing crossborder data flow governance models, improving countermeasures against extraterritorial “longarm jurisdiction”, and actively participating in and leading the formulation of international governance rules.
    Reference | Related Articles | Metrics
    Consideration on Some Problems in the Development of GPT4 and Its Regulation Scheme
    Journal of Information Security Reserach    2023, 9 (6): 510-.  
    Abstract136)      PDF (1273KB)(87)       Save
    With the release of the new generation of generative artificial intelligence (AI) foundation model GPT4, the era of AI has arrived. GPT4’s rapid popularity also raises some risk issues. In the aspect of data security, facing with frequent data leakage events, data storage period should be set to ensure the parallel development of data security and technology. In the aspect of intellectual property, GPT4 brings challenges on copyright infringement, subject status and works identification, which should be kept in mind in the future. In the aspect of the core algorithm, GPT4 hides the risk of algorithm discrimination. The algorithm should be continuously optimized to make GPT4 towards the true artificial general intelligence. At present, GPT4 is still in the process of continuous development, so it is still too early to design a detailed regulation scheme. In order to better deal with the risks caused by GPT4, independent innovation in the digital age should be sought, and generative AI should be included in the category of deep synthesis technology through special legislation on AI and combined with existing algorithms governing practice.
    Reference | Related Articles | Metrics
    Research and Practice of Government Data Security Governance System
    Journal of Information Security Reserach    2023, 9 (9): 900-.  
    Abstract75)      PDF (4365KB)(86)       Save
    Critical data is an important engine that keeps organizations and societies going, which makes it a target for malicious hackers, a target for intense scrutiny by regulators, and a need to prevent employees from inadvertently disclosing secret internal information. As the “guardian” to maintain the order of data opening and ensure data security, government departments should not only protect the security of sensitive data, maintain regulatory compliance, but also quickly deploy and implement data security protection projects without changing the existing business processes, and effectively control costs and reduce complexity and risks. This paper starts from the background of government data security governance, through the analysis of the government data security management status and security management needs, refer to the latest data security governance theory and technology research results at home and abroad, according to the relevant policies, laws and regulations, based on the security needs under the background of information technology application innovation, puts forward the framework of the system which applies to the security governance of government affairs data in our country, introduces the related technologies and project practice case.
    Reference | Related Articles | Metrics