Most Download articles

    Published in last 1 year | In last 2 years| In last 3 years| All| Most Downloaded in Recent Month| Most Downloaded in Recent Year|

    Most Downloaded in Recent Month
    Please wait a minute...
    For Selected: Toggle Thumbnails
    Journal of Information Security Reserach    2026, 12 (2): 98-.  
    Abstract35)      PDF (532KB)(44)       Save
    Related Articles | Metrics
    Compound Admissibility Rules of Blockchain Evidence in Online Litigation
    Journal of Information Security Reserach    2026, 12 (2): 134-.  
    Abstract103)      PDF (1088KB)(34)       Save
    Blockchain evidence offers a solution to the limitations of traditional electronic evidence by establishing a new model of “evidence selfauthentication”. However, current regulations in China exhibit obvious limitations, failing to fully cover the application of blockchain evidence in both online and offline spaces, while prioritizing authenticity at the expense of admissibility. To realize the proper application of blockchain evidence in the Chinese context, this paper proposes a dualspace framework integrating technological selfauthentication with legal presumptions. This approach aims to achieve consensual justice, composite admissibility rules for preservation, presentation, crossexamination, and authentication, and thereby foster a novel form of evidence rule of law with benign interaction between rule of law and technical rule of law.
    Reference | Related Articles | Metrics
    A Graphembedded Data Security Audit Scheme Based on Risk Elements
    Journal of Information Security Reserach    2026, 12 (2): 100-.  
    Abstract32)      PDF (2173KB)(25)       Save
    With the increasing complexity of data security risks in big data environments, existing data security audit technologies are limited by fragmented feature utilization and insufficient scalability, preventing comprehensive lifecycle risk coverage and thereby reducing risk detection efficiency. To address these challenges, a graphembedded data security audit scheme based on risk elements (REGDSA) has been proposed. The scheme first constructs a security risk elements space comprising data attributes (D), user characteristics (U), carrier environment (C), and actions (A), achieving structured mapping of risk features throughout the entire data lifecycle. It then employs graph embedding technology to map these security risk elements into lowdimensional semantic vectors, constructs a crossdimensional association model for integrated analysis, and achieves efficient risk detection. The feasibility of the scheme is validated through effectiveness and performance analysis.
    Reference | Related Articles | Metrics
    Remote Office Solution and Its Application Based on Secure Instant Messaging Technology
    Journal of Information Security Research    2020, 6 (4): 301-310.  
    Abstract195)      PDF (3086KB)(338)       Save
    Remote office is getting more and more favored by users for its characteristics of unconstrained time and space, high-efficiency and convenience, fragmentation time utilization and so on, but it also raised a lot of security problems. This article systematically introduces a security solution for remote office and its innovative applications. Based on the secure instant messaging architecture of interconnection and interworking, it realizes vertical security support and application aggregation, as well as horizontal data sharing and application collaboration through open aggregation interfaces. Therefore an remote office ecosystem is built. The solution has been widely used in sectors such as government, military, finance and energy, providing a security application solution to meet the requirements of relevant national standards for the high-security users’ remote office.
    Reference | Related Articles | Metrics
    Building Cyber Security Defense by Trusted Computing 3.0
    Journal of Information Security Research    2017, 3 (4): 290-298.  
    Abstract412)      PDF (1075KB)(1830)       Save
    Related Articles | Metrics
    Research on ECDSA Key Recovery Attacks Based on the Extended  Hidden Number Problem
    Journal of Information Security Reserach    2026, 12 (2): 174-.  
    Abstract16)      PDF (797KB)(19)       Save
    Elliptic curve digital signature algorithm (ECDSA) is one of the most widely used digital signature algorithms. During the signing process, it requires computing scalar multiplication on elliptic curves, which is typically the most timeconsuming component of the signature. In many present cryptographic libraries, the windowed nonadjacent form representation is commonly used to represent the ephemeral key in order to reduce time consumption. This exposes sidechannel vulnerability to malicious attackers, allowing them to extract partial information about the ephemeral key from sidechannel traces and subsequently recover the signing key. Leveraging the extended hidden number problem to extract information from sidechannel traces and applying latticebased attacks to recover keys constitutes one of the mainstream attack frameworks against ECDSA. Based on above, we propose three optimization methods. First, we introduce a neighboring dynamic constraint merge strategy. By dynamically adjusting the merging parameters, we reduce the dimension of the lattice and control the amount of known information lost during the attack, ensuring high success rates for key recovery across all signatures. Second, we analyze and optimize the embedding number in the lattice, reducing the Euclidean norm of the target vector by approximately 8%, thereby improving the success rate and reducing time consumption. Finally, we propose a linear predicate method which significantly reduces the time overhead of the lattice sieving. In this work, we achieve a success rate of 0.99 in recovering the private key using only two signatures.
    Reference | Related Articles | Metrics
    Innovative and Professional Talent Education Architecture of  Cyberspace Security in New Situation
    Journal of Information Security Reserach    2025, 11 (4): 385-.  
    Abstract198)      PDF (3780KB)(120)       Save
    The emerging new problems and technologies in the field of cybersecurity currently do not match the applicability and timeliness of existing talent cultivation in technological development. In response to this, this paper investigates the innovative professional training system for cybersecurity talents under new circumstances. We systematically examine key issues in talent cultivation, dynamic updates of training objectives, evolution of knowledge systems, and cultivation of innovative competencies. The study proposes and constructs a comprehensive, multilevel, and dynamic talent cultivation framework for cyberspace security professionals, encompassing core theoretical research, critical technology R&D, and comprehensive innovation capability development that adapts to new technological trends. Through innovative processes including instructional objective design, content adaptation, teaching implementation, and feedback mechanisms, we establish an internationally adaptable training system that dynamically responds to technological advancements. This approach strengthens the dynamism, adaptability, and practical orientation of cybersecurity talent cultivation, effectively addressing the demand for innovative professionals in cyberspace security under evolving technological landscapes and emerging requirements.
    Reference | Related Articles | Metrics
    Research on Trusted Data Collection Metrics Mechanism for IoT in Smart Cities
    Journal of Information Security Reserach    2026, 12 (2): 109-.  
    Abstract24)      PDF (1939KB)(16)       Save
    The diversity, heterogeneity, and wide distribution characteristics of IoT devices expose their operational processes to risks such as data source forgery or tampering in sensing devices. However, current trust evaluation models in multidomain IoT scenarios for smart cities exhibit limited dynamic adaptability and lack comprehensive capabilities in addressing security threats. To address these issues, this study proposes a framework from the macrooperational perspective of IoT, integrating trusted computing technologies. We construct static attribute metrics and dynamic attribute metrics mechanisms for IoT device nodes, categorize trust levels by employing clustering algorithms, and establish a comprehensive trusted metrics mechanism tailored for multisource heterogeneous IoT devices. Subsequently, through simulation experiments based on a multidomain distributed IoT architecture, we validate that the proposed trusted metrics scheme effectively detects initial malicious propagation by malicious nodes, confines malicious propagation within a limited scope, and robustly addresses security challenges under varying proportions of malicious nodes.
    Reference | Related Articles | Metrics
    New Trends of the Main Countries Cybersecurity Strategy in 2015
    Cui Chuanzhen
    Journal of Information Security Research   
    Journal of Information Security Research    2016, 2 (11): 969-971.  
    Abstract488)      PDF (726KB)(1397)       Save
    Related Articles | Metrics
    Journal of Information Security Reserach    2025, 11 (E2): 2-.  
    Abstract30)      PDF (1416KB)(38)       Save
    Reference | Related Articles | Metrics
    Research on the Development Challenges and Governance Pathways of  Network Data Labeling and Tagging Technology
    Journal of Information Security Reserach    2026, 12 (2): 118-.  
    Abstract14)      PDF (689KB)(15)       Save
    Network data labeling and tagging technology serves as a critical enabler for ensuring the trusted circulation and secure controllability of data elements, offering significant application prospects and developmental potential. This paper reviews the global governance landscape of data labeling and tagging technologies, identifies three core challenges hindering their advancement and proposes targeted governance strategies. By addressing technical bottlenecks through institutional innovation, technological optimization, and collaborative supervision, this study provides theoretical guidance for building a secure, efficient, and modernized network data governance system in China.
    Reference | Related Articles | Metrics
    Modulated Signal Information Security Risk Analysis in Wireless Communications
    Wei Dong1, Liu Bo2, Liang Lili1, and Li Min1
    Journal of Information Security Research   
    Design and Analysis of Security Construction Scheme for City Rail AFC Systems
    Journal of Information Security Research    2018, 4 (1): 91-96.  
    Abstract216)      PDF (4299KB)(434)       Save
    City rail systems become more and more complex and intelligent, and information technology has become the management tool of AFC systems for city rails. This situation leads the information security protection to be part of the construction of AFC systems for city rails. This paper uses the security techniques for industrial control systems to design a construction scheme for city rail AFC systems. By considering the tools for border protection, intrusion detection, systematical detection, and function integration, a comprehensive security solution is formed. Analysis shows that the security construction scheme possesses high security.
    Reference | Related Articles | Metrics
    Research on Phishing Email Detection Based on Large Language Model
    Journal of Information Security Reserach    2026, 12 (2): 151-.  
    Abstract23)      PDF (1835KB)(14)       Save
    With the rapid increase in phishing email volumes and the continuous evolution of adversarial techniques, traditional phishing detection methods have encountered significant challenges regarding efficiency and accuracy. To address issues such as low detection rates, high falsenegative rates, and poor humancomputer interaction in existing systems, the authors proposed a phishing email detection system based on large language model. Through comprehensive analysis of key phishing email characteristics—including header fields, body content, URLs, QR codes, attachments, and HTML pages—they constructed a highquality training dataset using feature insertion algorithms. Building upon the pretrained LLaMA model, the researchers implemented LoRA finetuning technology, achieving domain knowledge transfer by updating only 0.72% of model parameters (approximately 50MB). Experimental results demonstrate that compared to traditional methods, the LLMbased detection approach achieves 94.5% overall accuracy with enhanced robustness, effectively reduces falsepositive rates, improves classification and interpretation capabilities for phishing email features, and provides a more practical and reliable solution for phishing detection.
    Reference | Related Articles | Metrics
    The General Theory of Security
    Journal of Information Security Research    2016, 2 (4): 372-376.  
    Abstract333)      PDF (1171KB)(786)       Save
    Related Articles | Metrics
    Research on the Audio Information Hiding Algorithms Based on Mean Quantization
    Journal of Information Security Research    2016, 2 (10): 909-912.  
    Abstract267)      PDF (3215KB)(426)       Save
    We presented a new blind digital audio information hiding algorithms based on DWT and mean quantization. In order to achieve the high imperceptibility, the modification of wavelet coefficients was reduced by piecewise adjustment the quantized area. The ability of resisting attack was also improved by adjustment the boundary value with poor resistance to attack. Experimental results demonstrate that the proposed method has a better Signal Noise Ratio (SNR) than the current mean quantization algorithm, and the Normalized Cross?Correlation (NC) has also a certain amount of improvement.
    Related Articles | Metrics
    TOPSEC, Leading Brand of Independent Innovation, Supporting Cyberspace Power Strategy
    Journal of Information Security Research    2018, 4 (9): 774-782.  
    Abstract194)      PDF (1579KB)(902)       Save
    Related Articles | Metrics
    A Survey on the Application of LSTM in Malicious Code Detection
    Journal of Information Security Reserach    2026, 12 (1): 89-.  
    Abstract24)      PDF (9291KB)(24)       Save
    With the continuous evolution of hacking technology, the iterative upgrades of malicious code variants have been acclerating and the number of malicious codes has exploded. How to rapidly and accurately detect malicious code has become a challenging research hotspot in the realm of cybersecurity. The unique gating mechanism of long shortterm memory network (LSTM) can selectively retain important historical information. Moreover, it demonstrates excellent performance for the sequential dependence of data on time series, which can effectively solve the problem of gradient vanishing or gradient explosion that may occur when traditional RNNs deal with such problems. This distinctive sequential processing capability of LSTM is particularly important for malware detection, thus learning to its extensive application in this area. This paper comprehensively sorts out and summarizes the application of LSTM in malicious code detection from five aspects, including the detection method of malicious code, the basic model and variants of LSTM, the application of LSTM in malicious code detection, the performance analysis of LSTM in malicious code detection, and the future development direction of LSTM in the field of malicious code detection, aiming to facilitating further research and improvement of existing methods for malicious code detection.
    Reference | Related Articles | Metrics
    China’s Mirror and Insights for the Legitimate Interest Rule from  the EU Law Perspective
    Journal of Information Security Reserach    2026, 12 (2): 142-.  
    Abstract16)      PDF (1832KB)(12)       Save
    The rapid development of generative artificial intelligence (GAI) poses significant challenges to traditional informed consent rules. The European Union (EU) addresses this tension through the “legitimate interest rule” established under the General Data Protection Regulation. The EU effectively reconciles data protection with technological innovation by adopting an openstructured framework and dynamic balancing mechanisms. In contrast, China’s Personal Information Protection Law diverges from the EU counterpart in terms of the data processing lawfulness, rendering informed consent rules challenging to meet the demands of largescale data processing in the context of GAI. The EU’s approach is rooted in its governance doctrine that harmonizes rights protection with risk management, alongside an economic logic prioritizing a unified market. China adopts a riskbased regulatory strategy and has developed a “strong protection, weak circulation” regulatory model. To address the technical complexities of GAI, China should construct a localized legitimate interest rule which is confined to applications in commercial scenarios. This framework would incorporate a threetiered analysis—interest test, necessity test, and balance test—supported by risk mitigation measures and accountability mechanisms. Such institutional innovation would overcome the consent application dilemma while enabling adjudication to dynamically balance data subjects’ rights, commercial interests, and public values casebycase. This solution offers both a theoretical framework and practical feasibility for optimizing data governance in the AI era.
    Reference | Related Articles | Metrics
    Research on Security of 5G Mobile Communication Network
    Journal of Information Security Research    2020, 6 (8): 699-704.  
    Abstract198)      PDF (815KB)(376)       Save
    With the rapid development of mobile communications and smart devices, the commercial implementation of the fifth generation mobile communication system (5G) provides users with a better experience, faster, smoother, and stable communication services. Aiming at the security of 5G mobile communication network,The security of 5G mobile communication network is introduced from four aspects of new services, new network architecture, new air interface technology and higher user privacy Requirements, and proposed 5G UE access and switching methods, lightweight security mechanism of the Internet of Things, network slice security isolation strategy, user privacy protection and blockchain technology and other five aspects of protection and response strategies.
    Reference | Related Articles | Metrics
    Journal of Information Security Reserach    2022, 8 (6): 545-.  
    Abstract547)      PDF (1253KB)(204)       Save
    With the rapid development of automotive intelligence, onboard system changes the landscape of vehicle behavior automation. Various firmware and hardware devices can interact or exchange information with the onboard intelligent system. The Internet of vehicles carries the automatic control of software, ECU and hardware via the onboard intelligent system. Instate providing users with daytoday driving functionality, the onboard system been evolved and increase its complexity. There is no clear boundary between system security and functional safety. This paper gives an overview of the onboard intelligent system of the Internet of vehicles based on experimental modeling. It also emphasizes that under the scenario of the Internet of vehicles, the vulnerability and system failure of the intelligent vehicle system will directly affect the functional safety, which means it can threaten the safety of passengers. Therefore, the onboard system security of the Internet of vehicles becomes more and more important. This paper discusses the relationship between system security and functional safety in the Internet of vehicles based on an existing issue. In order to locate the actual system security in the Internet of vehicles, the existing defense indicates that the importance to find a balance point between vehicle performance and system security within the limited resource, this paper proposed a method about prereinforcement learning defense mechanism based on pseudo defense.Key words Internet of vehicles security; endogenous security; mimicry defense; reinforcement learning; information system security

    Related Articles | Metrics
    Journal of Information Security Reserach    2024, 10 (E2): 27-.  
    Abstract419)      PDF (763KB)(214)       Save
    Reference | Related Articles | Metrics
    Journal of Information Security Reserach    2024, 10 (E2): 32-.  
    Abstract328)      PDF (3674KB)(212)       Save
    Reference | Related Articles | Metrics
    A Covert Backdoor Attack Method in Fewshot Class Incremental Learning
    Journal of Information Security Reserach    2025, 11 (9): 797-.  
    Abstract71)      PDF (2644KB)(26)       Save
    The rapid development of deep learning has led to a sharp increase in the demand for training data, and fewshot classincremental learning has become an important technique for enhancing data integrity when training deep learning models. Users can directly download datasets or models trained using fewshot classincremental learning algorithms to improve efficiency. However, while this technology brings convenience, the security issues of the models should also raise concerns. In this paper, the backdoor attack is studied on the fewshot classincremental learning model in the image domain, and a covert backdoor attack method in fewshot class incremental learning is proposed, which carries out the backdoor attack in the initial and incremental phases, respectively: in the initial phase, the covert backdoor trigger is injected into the base dataset, and the base dataset which contains the backdoor is used for the incremental learning in place of the original data; in the incremental phase, when new batch samples arrive, select some samples to add to the trigger, and iteratively optimize the trigger during the incremental process to achieve the best triggering effect. The experimental evaluation shows that the attack success rate (ASR) of the stealthy backdoor attack method proposed in this paper can reach up to 100%, the clean test accuracy (CTA) and the clean sample model performance remain at a stable level, and at the same time, the method proposed in this paper is robust to the backdoor defense mechanism.
    Reference | Related Articles | Metrics
    Great Attention to Artificial Intelligence Security Issues
    Journal of Information Security Reserach    2022, 8 (3): 311-.  
    Abstract267)      PDF (1250KB)(305)       Save
    Related Articles | Metrics
    Brand-New AI Firewall Empowered by Intelligent Technologe
    Journal of Information Security Reserach    2021, 7 (E1): 122-.  
    Abstract326)      PDF (1428KB)(343)       Save
    Huawei HiSecEngine USG6000E series AI firewalls remove the defense bottlenecks of traditional firewalls by employing intelligent technologies. Powered by an intelligent threat detection engine, the AI firewalls can detect unknown threats effectively with an accuracy above 99%. Also, with the use of intelligent technologies, the firewalls support 12000+ IPS vulnerability signatures. Additionally, the builtin intelligent scanner can help detect unknown malicious files, delivering a detection rate of up to 97%.Key wordsAI firewall (AIFW); intelligent defense; unknown threats; encrypted; contentbased detection engine
    Related Articles | Metrics
    A Secure Data Sharing Scheme Supporting Finegrained Authorization
    Journal of Information Security Reserach    2023, 9 (7): 667-.  
    Abstract292)      PDF (1681KB)(242)       Save
    Considering the problems such as centralized data storage and difficulty in data sharing in cloud computing environments, based on the combination of multiconditional proxy reencryption and attributebased proxy reencryption, a multiconditional attributebased threshold proxy reencryption scheme which supports multiple authorization conditions is proposed. The scheme supports finegrained access to ciphertext data under multiple keyword authorization conditions, and can limit the authorization conditions and scope of ciphertext sharing. Only when the attribute set meets the access structure in the ciphertext and the keywords are consistent with the keywords set in the ciphertext, users can access the data. This solution achieves finegrained access to ciphertext data under multiple keyword authorization conditions, supports flexible user revocation, prevents unauthorized decryption of ciphertext by conspirators, and protects the sensitive information of data owners. Through the provable security analysis, it is shown that under the general group model, the scheme can resist chosen plaintext attack; compared with other conditional proxy reencryption schemes, the functions it supports are more diverse.

    Reference | Related Articles | Metrics
    Overview of Regulation of Crossborder Data Flow
    Journal of Information Security Reserach    2025, 11 (2): 164-.  
    Abstract324)      PDF (1274KB)(153)       Save
    The development of the digital economy has made crossborder data flow an inevitable trend, and while bringing economic benefits, the security of crossborder data flow cannot be ignored. Due to the complexity of the subjects and scenes involved in the process of crossborder data flow, and the uncontrollability of the process, how to regulate the possible security problems in the process of crossborder data flow has become the focus of the world. So far, there is no unified governance rule system for crossborder data flow in the world, and at the same time, there are huge differences in legislation on crossborder data flow in different countries, which results in the complex situation of legislation on crossborder data flow in the world. This paper describes the current situation of crossborder data flow from the perspectives of laws and regulations, bilateral agreements and standards, and in this way develops horizontal comparisons, sorts out the existing regulatory differences, analyzes the challenges and opportunities China faces under the current trend, and gives reasonable countermeasures.
    Reference | Related Articles | Metrics
    Research on Dynamic Risk Assessment and Security Supervision System of  Enterprise Outbound Data Transfer
    Journal of Information Security Reserach    2026, 12 (2): 124-.  
    Abstract16)      PDF (2161KB)(10)       Save
    The demand for crossborder data flow has grown significantly with the globalization of the digital economy, and the security risks related to data, such as national information, corporate secrets, and personal privacy, have gained much attention. To mitigate the risks of outbound data transfer, this article evaluates the risk factors from the regulatory perspective and further forms a risk assessment and security supervision system framework that combines monitoring and sampling mechanisms based on the outbound data flow model. The wholechain risk supervision approach, which includes risk preassessment based on multifactor merging analysis prior to the business, risk adjustment and response based on statistical monitoring and sampling mechanism during the business, and postbusiness disposal and supervision optimization of illegal behaviors, can be strengthened in order to regulate the data outbound behavior of crossborder enterprises. The study makes recommendations for enhancing the technical framework of outbound data transfer security supervision, which is crucial for fostering the future growth of the digital economy in a highcaliber and sound manner.
    Reference | Related Articles | Metrics
    Design of a Port Industrial Control System Based on Zero Trust Architecture
    Journal of Information Security Reserach    2026, 12 (2): 189-.  
    Abstract14)      PDF (1391KB)(10)       Save
    With the increasing intelligence of port industrial control system (ICS), traditional perimeterbased security models face severe challenges such as expanded attack surfaces and rigid permission management. This paper presents a zero trust architecture (ZTA)based security protection scheme for port ICS, establishing a hierarchical defense system through dynamic trust evaluation, softwaredefined perimeter (SDP), and microsegmentation technologies. The core contributions include a fourlayer architecture (terminal, access, control, and data), a dynamic trust evaluation model that integrates identity authentication, device health, and behavioral characteristics, and finegrained instructionlevel access control for industrial protocols. Experimental results demonstrate that the proposed architecture reduces the attack surface exposure rate from 100% to 8%, optimizes the average authentication time to 0.8s, and limits the permission adjustment response time to 45s, significantly enhancing both security and realtime performance in port industrial control systems.
    Reference | Related Articles | Metrics
    Cloud Platform Accountability and Retrospect Technology Based on Security Label
    Journal of Information Security Research    2015, 1 (2): 181-186.  
    Abstract298)      PDF (5191KB)(691)       Save
    In oder to achieve the accountability system of cloud platform, retrospect is the primary technology method. Recalling the complete trajectory of the security event in this period,it can be controlled by the ability to trigger and record operations during this period. In order to tackle the challenges of business transparency in cloud system retrospect, the paper reviews the transparency, efficiency and cost of the enterprise. This paper states general retrospect technology based on security label, and establishes an accurate and efficient retrospect technology prototype.
    Reference | Related Articles | Metrics
    The General Theory of Security(16) — Bionomics of Hacker
    Journal of Information Security Research    2016, 2 (10): 936-945.  
    Abstract339)      PDF (1197KB)(585)       Save
    Related Articles | Metrics
    Open Source Software Vulnerability DataBase Overview
    Journal of Information Security Reserach    2021, 7 (6): 566-574.  
    Abstract763)      PDF (2349KB)(520)       Save
     In recent years, with the continuous shortening of the software development cycle, a large number of open source code is used in modern software projects, and software developers tend to focus only on the security of the part of the project code they are responsible for, and rarely pay attention to the security of the open source code used in the project, and it is difficult for users to correspond the vulnerability entries in the traditional vulnerability repository to the current software version. and existing vulnerabilities There are some differences between existing version control schemes and those of open source code, so a vulnerability repository that can accurately collect open source code vulnerability intelligence and precisely match vulnerabilities is essential. This paper first introduces the potential security challenges brought by the widespread use of open source code, then analyzes in detail the existing open source vulnerability repository platforms and conducts a comparative study of existing open source vulnerability databases from several dimensions, then gives the problems and challenges faced by the construction of current open source vulnerability databases, and finally gives some suggestions for building open source vulnerability databases.
    Reference | Related Articles | Metrics
    Review of Secure Containers Based on System Call Isolation#br#
    #br#
    Journal of Information Security Reserach    2026, 12 (1): 2-.  
    Abstract41)      PDF (2062KB)(41)       Save
    This article elucidates the research progress in enhancing container security through the isolation of system calls. The article firstly outlines the development background of containerization technology and its major security challenges. Subsequently, an indepth analysis is conducted on the role of system call isolation in enhancing the security of containers, including the techniques of limiting the system calls of containerized applications to reduce the attack surface, and leveraging operating system middleware and hardware protection mechanisms to accomplish the isolation and protection of containers. By comparing the implementation principles, performance, and their effects on isolation, reduction of attack surfaces, and data protection, the article reveals the advantages and limitations of system call isolation technologies in enhancing container security.
    Reference | Related Articles | Metrics
    Cyberspace Strategic Measures of U.S. DoD and the Enlightenments
    Wang Yongjun and Su Jinshu
    Journal of Information Security Research    2015, 1 (1): 81-85.  
    Abstract444)      PDF (4515KB)(746)       Save
    Taking the construction of cyberspace operations forces and the cyberspace operations capabilities of the U.S. army as the core, in order to achieve the freedom of action in cyberspace, the U.S. Department of Defense has taken a number of strategic measures from five different levels, which includes the national strategy, the military strategy, the organization of combat forces, the construction of key elements of combat forces, and the law environment to support cyberspace operations. These strategic measures have achieved very comprehensive and positive results and ensured that the U.S. army maintains the absolute superiority of cyberspace operations in the future information war. By analyzing and grasping the logical structure and development context of cyberspace strategy of the U.S. Department of Defense, the corresponding references and inspirations are provided for the construction and development of China's cyberspace capabilities, which will help China take the initiatives in the cyberspace games of the world.
    Related Articles | Metrics
    Webshell Detection Method Research Based on Web Log
    Journal of Information Security Research    2016, 2 (1): 66-73.  
    Abstract965)      PDF (5409KB)(1041)       Save
    In this paper, a new method of Webshell detection based on Web log is proposed, which is based on the analysis of the server log text file, and the Webshell is detected from three angles: text feature, statistical feature and correlation feature. In the text feature, it is mainly to match the file access path and the parameters that are submitted. The experimental results show that the normal Web documents and Webshell files have obvious differences in the characteristics of the file access path and the parameters. In the statistical characteristics, the first is the comparison of the frequency of access to the file, and the experiment proved that the frequency of the Web page file access, combined with the depth of the Web page file directory, the starting time and the number of individual visitors, can accurately identify abnormal file. Page correlation is found by calculating the access of Web documents, the experiment shows that the Webshell is usually a solitary file, and the normal Web documents are clearly distinguished.
    Reference | Related Articles | Metrics
    The Transmission Technology of Covert Information Based on Acoustic Channel
    Ding Xuejie, Li Bin, Wei Di, Zhang Meng, Sun Degang
    Journal of Information Security Research   
    SURFILTER, Insisting on the Road of Independent Innovation of Information Security -- Review of the Information and Network Security Strategy of SURFILTER
    Journal of Information Security Research    2016, 2 (12): 1054-1067.  
    Abstract217)      PDF (5217KB)(1135)       Save
    Related Articles | Metrics
    The Finegrained Executor Scheduling Algorithm for Unknown  Attacks Perception
    Journal of Information Security Reserach    2025, 11 (6): 569-.  
    Abstract183)      PDF (1456KB)(38)       Save
    Addressing security threats from unknown attacks exploiting software and system vulnerabilities in power grid devices often overlooks potential issues within operating systems and communication protocols at the programming languarg level. This paper proposes a finegrained scheduling algorithm that quantifies the similarity of execution components and incorporates parameters such as attack timing and frequency to assess historical trust deficit. By combining similarity and historical trust deficit, a quantitative algorithm for redundant execution body heterogeneity is introduced. Simulation experiments demonstrate that this algorithm significantly outperforms other methods in distinguishing execution body similarity, effectively reducing the risk of exploiting similar vulnerabilities or defects, and minimizing redundant wastage from similar execution bodies. The failure rate remains consistently below 0.55, indicating superior practical performance compared to commonly used algorithms.
    Reference | Related Articles | Metrics