Most Download articles

    Published in last 1 year| In last 2 years| In last 3 years| All| Most Downloaded in Recent Month | Most Downloaded in Recent Year|

    Published in last 1 year
    Please wait a minute...
    For Selected: Toggle Thumbnails
    Journal of Information Security Reserach    2024, 10 (E1): 236-.  
    Abstract299)      PDF (796KB)(252)       Save
    Reference | Related Articles | Metrics
    Research for Zero Trust Security Model
    Journal of Information Security Reserach    2024, 10 (10): 886-.  
    Abstract245)      PDF (2270KB)(225)       Save
    Zero trust is considered a new security paradigm. From the perspective of security models, this paper reveals the deepening and integration of security models in zero trust architecture, with “identity and data” as the main focus. Zero trust establishes a panoramic control object chain with identity at its core, builds defenseindepth mechanisms around object attributes, functions, and lifecycles, and centrally redirects the flow of information between objects. It integrates information channels to achieve layered protection and finegrained, dynamic access control. Finally, from an attacker’s perspective, it sets up proactive defense mechanisms at key nodes in the information flow path. Since zero trust systems are bound to become highvalue assets, this paper also explores the essential issues of inherent security and resilient service capabilities in zerotrust systems. Through the analysis of the security models embedded in zerotrust and its inherent security, this paper aims to provide a clearer technical development path for the architectural design, technological evolution, and selfprotection of zero trust in its application.
    Reference | Related Articles | Metrics
    Research on Source Code Vulnerability Detection Based on BERT Model
    Journal of Information Security Reserach    2024, 10 (4): 294-.  
    Abstract160)      PDF (3199KB)(202)       Save
    Techniques such as code metrics, machine learning, and deep learning are commonly employed in source code vulnerability detection. However, these techniques have problems, such as their inability to retain the syntactic and semantic information of the source code and the requirement of extensive expert knowledge to define vulnerability features. To cope with the problems of existing techniques, this paper proposed a source code vulnerability detection model based on BERT(bidirectional encoder representations from transformers) model. The model splits the source code to be detected into multiple small samples, converted each small sample into the form of approximate natural language, realized the automatic extraction of vulnerability features in the source code through the BERT model, and then trained a vulnerability classifier with good performance to realize the detection of multiple types of vulnerabilities in Python language. The model achieved an average detection accuracy of 99.2%, precision of 97.2%, recall of 96.2%, and an F1 score of 96.7% across various vulnerability types. This represents a performance improvement of 2% to 14% over existing vulnerability detection methods. The experimental results showed that the model was a general, lightweight and scalable vulnerability detection method.
    Reference | Related Articles | Metrics
    Intelligent Fuzzy Testing Method Based on Sequence Generative Adversarial Networks
    Journal of Information Security Reserach    2024, 10 (6): 490-.  
    Abstract155)      PDF (2426KB)(199)       Save
    The increase in the number of vulnerabilities and the emergence of a large number of highly dangerous vulnerabilities, such as supercritical and highrisk ones, pose great challenges to the state of network security. As a mainstream security testing method, fuzz testing is widely used. Test case generation, as a core step, directly determines the quality of fuzz testing. However, traditional test case generation methods based on pregeneration, random generation, and mutation strategies face bottlenecks such as low coverage, high labor costs, and low quality. Generating highquality, highly available, and comprehensive test cases is a difficult problem in intelligent fuzz testing. To address this issue, this paper proposes an intelligent fuzz testing method based on the sequence generation adversarial network (SeqGAN) model. By combining the idea of reinforcement learning, the test case generation is abstracted as a learning and approximate generation problem for universally applicable variablelength discrete sequence data. Innovatively, a configurable embedding layer is added to the generator part to standardize the generation, and a reward function is designed from the dimensions of authenticity and diversity through dynamic weight adjustment. This ultimately achieves the goal of automatically and intelligently constructing a comprehensive, complete, and usable test case set for flexible and efficient intelligent fuzz testing. This paper verifies the proposed scheme from two aspects of effectiveness and universality. The average test case pass rate of over 95% and the average target defect detection rate of 10% under four different testing targets fully demonstrate the universality of the scheme. The 98% test case pass rate, 9% target defect detection rate, and the ability to generate 20000 usable test cases per unit time under four different schemes fully demonstrate the effectiveness of the scheme.
    Reference | Related Articles | Metrics
    Journal of Information Security Reserach    2024, 10 (E2): 24-.  
    Abstract129)      PDF (555KB)(178)       Save
    Reference | Related Articles | Metrics
    Federated Foundation Model Finetuning Based on Differential Privacy#br#
    #br#
    Journal of Information Security Reserach    2024, 10 (7): 616-.  
    Abstract288)      PDF (1752KB)(177)       Save
    As the availability of private data decreases, large model finetuning based on federated learning has become a research area of great concern. Although federated learning itself has a certain degree of privacy protection, privacy security issues such as gradient leakage attacks and embedding inversion attacks on large models still threaten the sensitive information of participants. In the current context of increasing awareness of privacy protection, these potential privacy risks have significantly hindered the promotion of large model finetuning based on federated learning in practical applications. Therefore, this paper proposes a federated large model embedding differential privacy control algorithm, which adds controllable random noise to the embedded model of the large model during efficient parameter finetuning process through a global and local dual privacy control mechanism to enhance the privacy protection ability of federated learning based large model parameter finetuning. In addition, this paper demonstrates the privacy protection effect of this algorithm in large model finetuning through experimental comparisons of different federation settings, and verifies the feasibility of the algorithm through performance comparison experiments between centralization and federation.
    Reference | Related Articles | Metrics
    A Review of GPU Acceleration Technology for Deep Learning in Plaintext  and Private Computing Environments
    Journal of Information Security Reserach    2024, 10 (7): 586-.  
    Abstract161)      PDF (1274KB)(176)       Save
    With the continuous development of deep learning technology, the training time of neural network models is getting longer and longer, and using GPU computing to accelerate neural network training has increasingly become a key technology. In addition, the importance of data privacy has also promoted the development of private computing technology. This article first introduces the concepts of deep learning, GPU computing, and two privacy computing technologies, secure multiparty computing and homomorphic encryption, and then discusses the GPU acceleration technology of deep learning in plaintext environment and private computing environment. In the plaintext environment, the two basic deep learning parallel training modes of data parallelism and model parallelism are introduced, two different memory optimization technologies of recalculation and video memory swapping are analyzed, and gradient compression in the training process of distributed neural network is introduced. technology. This paper introduces two deep learning GPU acceleration techniques: Secure multiparty computation and homomorphic encryption in a privacy computing environment. Finally, the similarities and differences of GPUaccelerated deep learning methods in the two environments are briefly analyzed.
    Reference | Related Articles | Metrics
    Journal of Information Security Reserach    2024, 10 (E1): 246-.  
    Abstract273)      PDF (1562KB)(172)       Save
    Reference | Related Articles | Metrics
    A Review of Hardware Accelerated Research on Zeroknowledge Proofs
    Journal of Information Security Reserach    2024, 10 (7): 594-.  
    Abstract192)      PDF (1311KB)(162)       Save
    ZeroKnowledge Proofs (ZKP) are cryptographic protocols that allow a prover to demonstrate the correctness of a statement to a verifier without revealing any additional information. This article primarily introduces research on the acceleration of zeroknowledge proofs, with a particular focus on ZKPs based on Quadratic Arithmetic Programs (QAP) and Inner Product Proofs (IPA). Studies have shown that the computational efficiency of zeroknowledge proofs can be significantly improved through hardware acceleration technologies, including the use of GPUs, ASICs, and FPGAs. Firstly, the article introduces the definition and classification of zeroknowledge proofs, as well as the difficulties encountered in its current application. Secondly, this article  discusses in detail the acceleration methods of different hardware systems, their implementation principles, and their performance improvements over traditional CPUs. For example, cuZK and GZKP utilize GPUs to perform Multiscalar Multiplication (MSM) and Number Theoretic Transform (NTT), while PipeZK, PipeMSM, and BSTMSM accelerate these computational processes through ASICs and FPGAs. Additionally, the article mentions applications of zeroknowledge proofs in blockchain for concealing transaction details, such as the private transactions in ZCash. Lastly, the article proposes future research directions, including accelerating more types of ZKPs and applying hardware acceleration to practical scenarios to resolve issues of inefficiency and promote the widespread application of zeroknowledge proof technology.
    Reference | Related Articles | Metrics
    Model of Intrusion Detection Based on Federated Learning and Convolutional Neural Network
    Journal of Information Security Reserach    2024, 10 (7): 642-.  
    Abstract184)      PDF (1722KB)(160)       Save
    The cyber intrusion detection model needs to identify the malicious data timely and accurately among the largescale cyber traffic data. However, due to the insufficient label data of a single institution and the unwillingness of various institutions to share data, the performance of the trained cyber intrusion detection model has low performance. In view of the above problems, this paper proposed an intrusion detection model FL1DCNN, which combined federated learning and onedimensional convolutional neural network. While ensuring high detection accuracy, it allowed more participants to protect their data privacy and security, which solved the problem of insufficiency of the labeled data. The FL1DCNN model first carried on a series of preprocessing operations on the original data set, then used the onedimensional convolutional neural network as the general model of each participant to extract features under the federated learning mechanism and finally performs binary classification using a sigmoid classifier. The experimental results show that the accuracy of the FL1DCNN model on the CICIDS2017 dataset is 96.5% and the F1score of the FL1DCNN model is 97.9%. In addition, compared to the traditional centralized training model 1DCNN, the FL1DCNN model reduces training time by 32.7%.
    Reference | Related Articles | Metrics
    A Review of Adversarial Attack on Autonomous Driving Perception System
    Journal of Information Security Reserach    2024, 10 (9): 786-.  
    Abstract244)      PDF (1560KB)(155)       Save
    The autonomous driving perception system collects surrounding environmental information through various sensors and processes this data to detect vehicles, pedestrians and obstacles, providing realtime foundational data for subsequent control and decisionmaking functions. Since sensors are directly connected to the external environment and often lack the ability to discern the credibility of inputs, the perception systems are  potential targets for various attacks. Among these, adversarial example attack is a mainstream attack method characterized by high concealment and harm. Attackers manipulate or forge input data of the perception system to deceive the perception algorithms, leading to incorrect output results by the system. Based on the research of existing relevant literature, this paper systematically summarizes the working methods of the autonomous driving perception system, analyzes the adversarial example attack schemes and defense strategies targeting the perception system. In particular, this paper subdivide the adversarial examples for the autonomous driving perception system into signalbased adversarial example attack scheme and objectbased adversarial example attack scheme. Additionally, the paper comprehensively discusses defense strategy of the adversarial example attack for the perception system, and subdivide it into anomaly detection, model defense, and physical defense. Finally, this paper prospects the future research directions of adversarial example attack targeting autonomous driving perception systems.
    Reference | Related Articles | Metrics
    Blockchain Security Sharding Scheme Based on Multi-dimensional Reputation
    Journal of Information Security Reserach    2024, 10 (8): 690-.  
    Abstract180)      PDF (2816KB)(154)       Save
    Blockchain faces scalability issues. Sharding improves system performance by dividing the blockchain network into multiple subnetworks that process transactions in parallel. However, sharding can lead to the clustering of malicious nodes, resulting in 51% attacks and affecting system security. The existing singledimensional reputation schemes have the problems of high overhead and insufficient shard consensus in the redistribution process, failing to ensure both performance and security. To address these  problems, a blockchain security sharding scheme based on multidimensional reputation is proposed: Firstly, the scheme integrates multidimensional indicators of nodes to balance shard reputation and computational communication abilities, identifying malicious nodes.  Secondly, a twostage redistribution scheme is proposed to reduce the frequency and cost of redistribution through partial redistribution in first stage and complete redistribution in second stage. Finally, a multidimensional reputation based fast Byzantine faulttolerant consensus (MRFBFT) is designed, which combines voting power and reputation, and introduces consensus among shard leader nodes to prevent malicious behavior. The experimental results show that the shard reputation and computational communication level are more balanced, the consensus delay is reduced by about 20%, and the throughput is increased by about 15%.
    Reference | Related Articles | Metrics
    Research Advance and Challenges of Fuzzing Techniques
    Journal of Information Security Reserach    2024, 10 (7): 668-.  
    Abstract169)      PDF (1020KB)(145)       Save
    Fuzzing. as an efficient vulnerability discovery technique, has garnered increasing attention from researchers due to its rapid development in recent years. To delve deeper into fuzzing techniques, this paper introduces its definition and analyzes the advantages and disadvantages. It summarizes the research progress of fuzzing techniques from various perspectives, including energy scheduling for seed selection, test case mutation algorithms, fuzzy test execution performance, mixed fuzzy testing. Furthermore, it compares the improvement points and shortcomings of different fuzzing studies, and further proposes suggestions for future development. Additionally, the paper describes the research achievements of fuzzing in vulnerability discovery in the fields of operating system kernel, network protocol, firmware, and deep learning. Finally the paper concludes with a summary and offers insights into the future challenges and research hotspots of fuzzing.
    Reference | Related Articles | Metrics
    A Federated Learning Privacy Protection Method for Multikey Homomorphic  Encryption in the Internet of Things
    Journal of Information Security Reserach    2024, 10 (10): 958-.  
    Abstract181)      PDF (1704KB)(145)       Save
    With federated learning, multiple distributed IoT devices can jointly train a global model by updating the transmission model without leaking raw data. However, federated learning systems are susceptible to model inference attacks, resulting in compromised system robustness and data privacy. A federated learning privacy protection method for multikey homomorphic encryption in the Internet of Things is proposed to address the issues of existing federated learning solutions being unable to protect the confidentiality of shared gradients and resisting collusion attacks initiated by clients and servers. This method utilizes multikey homomorphic encryption to achieve gradient update confidentiality protection. Firstly, by using proxy reencryption technology, the ciphertext under different public keys is converted into encrypted data under the public key, ensuring that the cloud server can decrypt the gradient ciphertext. Then, IoT devices use their own public key and random secret factor to encrypt local gradient data, which can resist collusion attacks initiated by malicious devices and servers. Secondly, an identity authentication method based on hybrid cryptography was designed to achieve realtime verification of the identities of participants in federated modeling. In addition, in order to further reduce client computing costs, some decryption calculations are coordinated with trusted servers for computation, and users only need a small amount of computation. A comprehensive analysis was conducted on the proposed solution to evaluate its safety and efficiency. The results indicate that the proposed scheme meets the expected security requirements. Experimental simulation shows that compared to existing schemes, this scheme has lower computational overhead and can achieve faster and more accurate model training.
    Reference | Related Articles | Metrics
    Journal of Information Security Reserach    2024, 10 (E2): 105-.  
    Abstract237)      PDF (929KB)(145)       Save
    Reference | Related Articles | Metrics
    Multifamily Malicious Domain Intrusion Detection Based on #br# Collaborative Attention#br#
    Journal of Information Security Reserach    2024, 10 (12): 115-.  
    Abstract144)      PDF (1317KB)(145)       Save
    The timely and accurate detection of illegal domain names can effectively prevent the information loss caused by server crashes or unauthorized intrusions. A multifamily malicious domain name intrusion detection method based on collaborative attention is proposed. Firstly, the deep autoencoder network is used to encode and compress layer by layer, extracting the domain name encoding features at the intermediate layer. Secondly, the longdistance and shortdistance encoding features of the domain name string are extracted from the temporal and spatial dimensions, and the selfattention mechanism is constructed on the temporal and spatial encoding feature maps to enhance the expressiveness of the encoding features in local space. Thirdly, the crossattention mechanism is used to establish information interaction between the temporal and spatial encoding features, enhancing the expressiveness of different dimension encoding features in the global space. Finally, the softmax function is used to predict the probability of the domain name to be tested, and quickly determine the legitimacy of the domain name according to the probability value. The results of testing on multiple families of malicious domain name datasets show that the proposed method can achieve a detection accuracy of 0.9876 in the binary classification task of normal and malicious domain names, and an average recognition accuracy of 0.9568 on 16 family datasets. Compared with other classic methods of the same kind, the proposed method achieves the best detection results on multiple evaluation metrics.
    Reference | Related Articles | Metrics
     A Survey of Forensic Network Attack Source Traceback
    Journal of Information Security Reserach    2024, 10 (4): 302-.  
    Abstract126)      PDF (1134KB)(140)       Save
    The concealment and anonymity of cyber attackers pose significant challenges to the field of network attack traceback. This study provides a comprehensive overview of the current state of research on network attack traceback analysis techniques, focusing on three aspects: traffic, scenarios, and samples. Firstly, with respect to traffic traceback, the paper outlines methods and applications based on log records, packet marking, ICMP tracing, and link testing. Secondly, it categorizes traceback techniques for different scenarios, encompassinganonymous networks, zombie networks, springboards, local area networks, and advanced persistent threat attacks, as well as their applications and limitations in realworld environments. Finally, concerning sample analysis, the paper discusses the progress and application scenarios of static and dynamic traceback analysis in the context of malicious code analysis and attack tracing.
    Reference | Related Articles | Metrics
    Research on Data Security Sharing Technology Based on Blockchain and  Proxy Re-encryption
    Journal of Information Security Reserach    2024, 10 (8): 719-.  
    Abstract136)      PDF (2800KB)(135)       Save
    In the digital age, a vast amount of sensitive data is stored across various networks and cloud platforms, making data protection a crucial challenge in the field of information security. Traditional encryption methods are vulnerable due to single point of failure and centralized control, which can lead to data leakage. To address these issues, this study proposes a new method that integrates blockchain technology with an improved proxy reencryption algorithm, utilizing Shamir threshold key sharing. A data sharing scheme TDPRBC based on the threshold proxy reencryption algorithm is designed. Security analysis and experimental results show that this scheme can meet most data access needs.
    Reference | Related Articles | Metrics
    Constructing a Secure and Innovative Framework for Digital Financial  Infrastructure Security Based on a Multidimensional Security Perspective
    Journal of Information Security Reserach    2024, 10 (4): 290-.  
    Abstract116)      PDF (865KB)(131)       Save
    Related Articles | Metrics
    Using Artificial Intelligence to Drive Quality and Upgrading of Opensource Big Data Analysis Work
    Journal of Information Security Reserach    2024, 10 (5): 390-.  
    Abstract84)      PDF (1504KB)(130)       Save
    Reference | Related Articles | Metrics
    Journal of Information Security Reserach    2024, 10 (E2): 2-.  
    Abstract137)      PDF (1381KB)(126)       Save
    Reference | Related Articles | Metrics
    Security Status Analysis and Countermeasures of Basic Software Supply Cha
    Journal of Information Security Reserach    2024, 10 (8): 780-.  
    Abstract150)      PDF (4217KB)(125)       Save
    Basic software is the cornerstone of supporting the efficient and stable operation of computer systems, which determines the level of development of digital infrastructure. The industrial chain of basic software, represented by operating system, database and middleware, occupies an upstream position in the entire software industry, which directly determines the scale and the efficiency of the downstream output. Due to the characteristics of long R&D cycle and large R&D investment, basic software has gradually attracted attention from various countries and risen to the level of national strategy in the increasingly complex environment of software supply chain. In recent years, while China’s basic software industry has developed rapidly with the help of open source, many security incidents of basic software supply chain have occurred, which brings risks and challenges. This paper reviews the current situation of the basic software supply chain security, analyzes the risks and challenges faced by the basic software supply chain, and puts forward reasonable suggestions from four aspects: policy, industry, user and ecology.

    Reference | Related Articles | Metrics
    Research on Risk Analysis of Opensource Software Supply Chain Security
    Journal of Information Security Reserach    2024, 10 (9): 862-.  
    Abstract162)      PDF (1824KB)(125)       Save
    Opensource software has become one of the most fundamental elements that support the operation of the digital society. It has also been penetrated to various industries and fields. As the opensource software supply chain becomes increasingly complex and diversified, the risks caused by security attacks on the opensource software supply chain are also intensified. This paper summarizes the current development of the opensource software supply chain ecosystem and the strategic layout of opensource software supply chain security in major countries. From the dimensions of development security, usage security, and operation security, this paper proposes an opensource software supply chain security risk analysis system. It identifies the major security risks currently faced by the opensource software supply chain. Besides, this paper constructs a security assurance model for the opensource software supply chain and offers countermeasures and suggestions for the security and development of China’s opensource software supply chain from the dimensions of supply chain phases, relevant entities, and safeguard measures.
    Reference | Related Articles | Metrics
    A Large Language Model Detection System for Domainspecific Jargon
    Ji Xu, Zhang Jianyi, Zhao Zhangchi, Zhou Ziyin, Li Yilong, and Sun Zezheng
    Journal of Information Security Reserach    2024, 10 (9): 795-.  
    Abstract129)      PDF (2610KB)(122)       Save
    Large language model (LLM) retrieve knowledge from their own structures and reasoning processes to generate responses to user queries, thus many researchers begin to evaluate the reasoning capabilities of large language models. However, while these models have demonstrated strong reasoning and comprehension skills in generic language tasks, there remains a need to evaluate their proficiency in addressing specific domainrelated problems, such as those found in telecommunications fraud. In response to this challenge, this paper presents the first evaluation system for assessing the reasoning abilities of DomainSpecific Jargon and proposes the first domain specific jargon dataset. To address issues related to cross matching problem and complex data calculation problem, we propose the collaborative harmony algorithm and the data aware algorithm based on indicator functions. These algorithms provide a multidimensional assessment of the performance of large language models. Our experimental results demonstrate that our system is adaptable in evaluating the accuracy of questionanswering by large language models within specialized domains. Moreover, our findings reveal, for the first time, variations in recognition accuracy based on question style and contextual cues utilized by the models. In conclusion, our system serves as an objective auditing tool to enhance the reliability and security of large language models, particularly when applied to specialized domains.
    Reference | Related Articles | Metrics
    Multilabel Classification Method of Open Source Threat Intelligence Text Based on BertTextCNN
    Journal of Information Security Reserach    2024, 10 (8): 760-.  
    Abstract193)      PDF (1641KB)(121)       Save
    Open source threat intelligence is very important for network security protection, but it has the characteristics of wide distribution, many forms and loud noise. Therefore, how to organize and analyze the collected massive open source threat intelligence efficiently has become an urgent problem to be solved. Therefore, this paper explores a multilabel classification method based on BertTextCNN model, considering the title, text, and regular judgment. According to the characteristics of the text published by the intelligence source, the article sets regular judgment rules to make up for the deficiency of the model. In order to fully reflect the threat topics involved in the open source threat intelligence text, the paper sets the BertTextCNN multilabel classification model for the title and the text respectively, and then resorts the two labels to get the final threat category of the text. Compared with the BertTextCNN multilabel classification model based on text only, the performance of the proposed model is improved, and the recall rate is significantly improved, which can provide valuable reference for the classification of open source threat intelligence.
    Reference | Related Articles | Metrics
    Analysis of Security Blind Area of Large LAN#br#
    #br#
    Journal of Information Security Reserach    2024, 10 (4): 335-.  
    Abstract132)      PDF (784KB)(119)       Save
    This paper proposes the concepts of network blind area, asset blind area and security blind area  as they pretain to the security of large local area networks (LAN).  It analyzes the reasons behind the emergence of these three blind area, describes their forms, and points out their impacts on the security of large LAN. This paper proposes a new perspective for solving the security issues associated with large LAN.
    Reference | Related Articles | Metrics
    Research and Practice of 5G Network Security Assessment Technologies
    Journal of Information Security Reserach    2024, 10 (6): 539-.  
    Abstract72)      PDF (5554KB)(116)       Save
    With the widespread deployment of 5G networks, establishing effective network security assessment mechanisms has become increasingly important to ensure network safety and mitigate risks. This paper proposes a standardized 5G network security assessment process to address the security risks arising from the complexity of 5G technology, the iterative nature of standards, and the diversity of applications. The approach includes an integrated suite of technical solutions such as a digital twinbased 5G security parallel simulation testing platform, security penetration techniques based on the ATT&CK model, and 5G security fuzz testing. These solutions have been incorporated into a practical 5G security evaluation framework and validated through realworld case studies. The results demonstrate that the proposed assessment process and technologies effectively address emerging security challenges and enhance the overall security of 5G networks.
    Reference | Related Articles | Metrics
    Survey of 5G Network Security Vulnerability Discovery and Classification Solutions
    Journal of Information Security Reserach    2024, 10 (4): 340-.  
    Abstract107)      PDF (1569KB)(115)       Save
    Discovering and solving 5G network security threats is an important means to ensure the stable operation of 5G network and user data security. By summarizing the new features of 5G network, this paper analyzes the security challenges faced by 5G network, systematically discusses the methods of discovering 5G security threats, classifies 5G security threats from the perspective of functional architecture, outlines the solutions and disposal measures of security threats, and looks forward to the impact of related technologies on the discovery and resolution of future 5G security threats. This paper aims to provide a reference framework for researchers and practitioners to discover and resolve 5G security threats.
    Reference | Related Articles | Metrics
    Journal of Information Security Reserach    2024, 10 (E1): 7-.  
    Abstract128)      PDF (1223KB)(114)       Save
    Reference | Related Articles | Metrics
    A Secure and Efficient Method of Fully Anonymous Vertical Federated Learning
    Journal of Information Security Reserach    2024, 10 (6): 506-.  
    Abstract124)      PDF (888KB)(113)       Save
    As a key technical paradigm to achieve “data availability and invisibility”, the core process of vertical federated learning is sample alignment based on private set intersection. Although the private set intersection protects the privacy of nonintersected information, it can’t meet the privacy protection requirements of user IDs in the intersected set. This paper proposes a fully anonymous vertical federated learning framework based on anonymous alignment to ensure that no private information of each holder set will be disclosed during the whole process. An implementation framework based on secure multiparty computation is proposed for fully anonymous joint modeling. The high performance and low error characteristics of the framework are verified through experiments, indicating it can be better applied in practice.
    Reference | Related Articles | Metrics
    Reversible Video Information Hiding Based on Multi-pass Motion Vector Ordering
    Journal of Information Security Reserach    2024, 10 (8): 698-.  
    Abstract190)      PDF (1590KB)(111)       Save
    Aiming at the problem that existing reversible video information hiding algorithms based on motion vector ordering cannot adaptively adjust the embedding capacity according to the visual characteristics of video frames and have limited capacity, a multipass vector ordering reversible video information hiding algorithm is proposed. This algorithm decides whether to embed information in subsequent frames by assessing the texture and motion complexities of reference frames, thereby enabling adaptive information embedding in subsequent frames. The algorithm also enhances the multipass pixel value ordering (multipass PVO) technique and applies it to video information hiding, significantly enhancing the embedding capacity of reversible hiding algorithms. Experimental results demonstrate that, compared to similar algorithms, the variation values of PSNR and SSIM decreased by 14.5% and 8.5% respectively, and the embedding capacity increased by 7.4%. This represents significant improvements in both visual quality and embedding capacity.
    Reference | Related Articles | Metrics
    A Retrospective and Future Development Study of Zero Trust Architecture
    Journal of Information Security Reserach    2024, 10 (10): 896-.  
    Abstract116)      PDF (1683KB)(110)       Save
    With the rapid development of the internet, big data, and cloud computing, the zero trust architecture has been proposed as a new security paradigm to address the challenges of modern digitalization. This security model is built on never inherently trusting any internal or external requests, emphasizing that access must be granted through constant verification and monitoring. The core principles of zero trust include comprehensive identity verification, access control, least privilege, pervasive encryption, and continuous risk assessment and response. This article primarily reviews the development history of zero trust architecture, elaborates on the basic concepts of the zero zrust mechanism, and finally summarizes the future development of zero trust architecture.
    Reference | Related Articles | Metrics
    Multiuser Searchable Symmetric Encryption Scheme Based on  Elliptic Curve Encryption
    Journal of Information Security Reserach    2024, 10 (7): 624-.  
    Abstract98)      PDF (1306KB)(109)       Save
    Searchable encryption (SE) is one of the key technologies in secure data retrieval. It allows the server to search encrypted data directly without decrypting it. In this paper, we propose a multiuser extension of the existed dynamic searchable symmetric encryption (SSE) scheme for the singleuser to solve the problem of data security sharing in cloud storage environment. The proposed scheme is efficient, secure and requires no storage on the client. The scheme uses elliptic curve encryption system to realize key management and access key distribution among authorized users,effectively avoiding the key sharing problem and bilinear pairing operation in traditional multiuser scheme. It also meets the requirements of query privacy, search unforgeability, and user revocability. At the same time, after multiuser expansion, the scheme still maintains the advantages of the original scheme, such as less information leakage, efficient file search, efficient file deletion and no storage on the client.
    Reference | Related Articles | Metrics
    Journal of Information Security Reserach    2024, 10 (E2): 54-.  
    Abstract92)      PDF (1425KB)(108)       Save
    Reference | Related Articles | Metrics
    Journal of Information Security Reserach    2024, 10 (E2): 27-.  
    Abstract139)      PDF (763KB)(106)       Save
    Reference | Related Articles | Metrics
    Traffic Anomaly Detection Method by Secondorder Feature 
    Journal of Information Security Reserach    2024, 10 (12): 1082-.  
    Abstract86)      PDF (2415KB)(105)       Save
    A method is proposed to address the challenge of low detection rates for minority class attack traffic in deep learning models when dealing with imbalanced massive highdimensional network traffic data. Firstly, the isolation forest (iForest) is employed to remove outliers from normal class samples, used for training an enhanced Convolutional Denoising Autoencoder (CDAE) to mitigate the impact of noise and outliers on model training, resulting in a lowdimensional enhanced representation of the original features. Secondly, leveraging ADASYN on the outlierfree dataset to synthetically generate minority class attack samples, thereby resolving the data imbalance issue. Subsequently, using iForest to clean the newly generated samples from outliers, a new dataset is obtained. Employing the pretrained CDAE on this dataset achieves a firstround feature extraction, and the extracted features serve as input for a selfdistilled ResNet model to perform secondorder feature extraction. Finally, precise identification of anomalous traffic is accomplished by combining the trained CDAE and ResNet models. The method achieves the highest fiveclass accuracy and F1 score of 91.52% and 92.05%, respectively, on the NSLKDD dataset. Experimental results demonstrate that, compared to existing methods, this approach effectively enhances the detection rates for minority class attack traffic.
    Reference | Related Articles | Metrics
    Research on Science and Technology Management Information Security Guarantee System
    Journal of Information Security Reserach    2024, 10 (7): 675-.  
    Abstract70)      PDF (1766KB)(104)       Save
    Technological security is a crucial component of the national security framework, serving as a vital force underpinning national security. To strengthen technological innovation and ensure technological security, it is imperative to establish a comprehensive and efficient national innovation system. The information security aspect of technology management information systems, as a pivotal lever for deepening technological institutional reform, should not be underestimated. This paper begins by introducing the significance of technology management, technological security, and the maintenance of information security in technology management. It also highlights the current risk challenges faced in technology management information security. Then, combined with technology management information security protection needs, it constructs a security assurance framework for technology management information security. Detailed explanations are provided on the security management system, security operations and maintenance system, and security technology system within this architecture, with a particular focus on strategies for safeguarding the security of technology management business data. Finally, an analysis is presented regarding the development trends in technology management information security assurance.
    Reference | Related Articles | Metrics
    Research on Security Protection and Prediction Models for Consumer Behavior Data Collection Platforms
    Journal of Information Security Reserach    2024, 10 (7): 649-.  
    Abstract62)      PDF (2887KB)(103)       Save
    Predicting interests and making reasonable recommendations based on user browsing records and other information has become a common means for many sales platforms to optimize the user experience. Thus, the issue of user information security has naturally become a major challenge for major platforms. This paper proposes an endogenous securitybased consumer behavior data collection and analysis platform, which accurately predicts future sales traffic data by collecting user data and using a prediction model based on long and shortterm memory networks. In terms of data security, the platform uses endogenous securitybased mimetic cloud WAF, providing autonomous and controllable security for the entire data platform through three core technologies: dynamic selection algorithm, heterogeneous executables, and adjudication algorithm, and detects anomalous traffic by utilizing sketchbased network measurement techniques. In addition, the platform incorporates data backup and recovery, encrypted storage, and data transmission encryption technologies, and takes measures such as categorized storage and access control for important data. Extensive experiments demonstrate that the prediction platform used for China Tobacco’s sales traffic has significant improvement in prediction accuracy and data security when compared with existing techniques, and can provide a reasonable and feasible solution for enterprise sales prediction.

    Reference | Related Articles | Metrics
    A DNS Root Zone Management Architecture Based on Consortium Blockchain
    Journal of Information Security Reserach    2024, 10 (7): 602-.  
    Abstract76)      PDF (2981KB)(103)       Save
    The centralized root architecture of Domain Name System (DNS) in the current Internet is accompanied by longterm concerns: on one hand, the country code toplevel domain may be out of control due to the destruction of the root authority function; on the other hand, it is worried that decentralized root alternatives will cause the domain name space to split. The root cause of the above concerns lies in the lack of autonomy and transparency in current and alternative root zone management, leading to a lack of trust in the current root authority or alternative solutions. This paper describes a new DNS root zone management architecture, the root consensus chain, to enhance mutual trust and ease the concerns of all parties. Multiple autonomous registries participate in root zone management in the root consensus chain. Each registry has a country code toplevel domain and root server operators to jointly build a consortium blockchainbased root zone management system. While maintaining a unified name space and a unique global root authority, the root consensus chain improves autonomy through the establishment of a root community by the root consensus chain managers; improves transparency by recording and executing the agreements among the parties and the operation of the root zone. The experimental results based on the real network research testbed show that the root consensus chain can effectively cope with the above concerns, and it has good feasibility and practicability.
    Reference | Related Articles | Metrics
    Adversarial Attack Algorithm Based on Multimodel Scheduling Optimization#br#
    #br#
    Journal of Information Security Reserach    2024, 10 (5): 403-.  
    Abstract74)      PDF (2173KB)(102)       Save
    Adversarial samples can be generated in two approaches: Single model and model ensemble. Adversarial samples generated through model ensemble often exhibit higher attack success rates. However, there are few related studies on model ensemble, and most of the existing model ensemble methods are based on all models being used simultaneously in the iteration without reasonable consideration of the differences between different models, resulting in a lower attack success rates of adversarial attack. To further enhance the success rate of model ensemble, this paper proposes an adversarial attack algorithm based on multimodel scheduling optimization. Firstly, the model scheduling is performed by calculating the difference of the loss gradient of each model. Then, the optimal model combination is selected in each iteration round to conduct a model ensemble attack, thereby obtaining the optimal gradient. Subsequently, the momentum item of the previous stage is utilized to update the current data point. The optimized gradient is calculated by using the model combination of the current stage on the updated data point. Finally, the optimized gradient combined with the transformed gradient is used to adjust the final gradient direction. Experimental results on the ImageNet dataset demonstrate that the proposed integrated algorithm achieves a higher blackbox attack success rate with less perturbation. Compared with mainstream fullmodel ensemble attack, the average success rates of blackbox attacks on normal training models have increased by 3.4% and 12%, respectively.Additionally, the generated adversarial samples exhibit better visual quality.
    Related Articles | Metrics