Table of Content

    15 March 2018, Volume 4 Issue 3
    Haitai Fangyuan, Security Creates Value
    2018, 4(3):  186-194. 
    Asbtract ( )   PDF (10333KB) ( )  
    Related Articles | Metrics
    The Problems and Countermeasures of obtaining evidence from "electronic data" in criminal judicial practice
    2018, 4(3):  195-200. 
    Asbtract ( )   PDF (1109KB) ( )  
    References | Related Articles | Metrics
    With the continuous development of the Internet, artificial intelligence and electronic products, great changes have taken place in people's lives. At the same time, in the judicial practice, electronic data are playing an irreplaceable role. For the purpose of proving the facts of crime, the value of criminalization is even greater important. Compared with the traditional evidence-based evidence-gathering, electronic data evidence collection is still the weak link, mainly manifested in the following aspects: lack of specialized knowledge at the grassroots level, lack of attention to the extraction of original storage media and internet enterprises' negligence of obtaining evidence with the judiciary. To solve the above problems, in addition to improving relevant laws and regulations, it is also possible to improve the professional quality of grass-roots investigators, establish a professional database of evidence-based electronic forensics and expert supporters, and clarify the obligations and responsibilities of Internet companies to assist the judiciary solve.
    Case Analysis of “Encryption and Law Enforcement” Abroad and It’s Enlightenment to China's Cryptography Legal System
    2018, 4(3):  201-210. 
    Asbtract ( )   PDF (1546KB) ( )  
    References | Related Articles | Metrics
    In the protection of information security, the cryptography constitutes a real obstacle to the law enforcement activities, and the conflict between encryption and law enforcement has become the core issue of the national cryptography management legal system. Starting from the actual case, analyze the controversial focus, provide more realistic and targeted suggestions for the conflict. Cryptography using caused the weakening of the law enforcement capacity, but the cryptography still plays an irreplaceable role in the information security, so the principle of free use of cryptography must be determined. In order to balance the conflict between encryption and law enforcement, it is important to make the necessary constraints to the service provider,they shall provide the necessary law enforcement assistance in conformity with the provisions of the law. In order to reduce conflicts, national legislation may consider establishing a national technical assistance center, which can effectively avoid direct conflicts between law enforcement agencies and service providers.
    The Evolution and Enlightenment of US Encryption Export Controls legal System
    2018, 4(3):  211-218. 
    Asbtract ( )   PDF (1373KB) ( )  
    References | Related Articles | Metrics
    The encryption technology is widely used in every fields, It plays an important role in supporting the national security. Therefore, In the various states, The Regulations of encryption Export is the inevitable choice in accordance with Encryption Export Controls laws System. US Encryption Export Controls laws System has four stages, The four stages are respectively the early America, the Clinton era, George W. Bush administration period and the Obama era. The encryption export control began to appear loosening in 1990s, US encryption export controls had gradually loosen in the Clinton era. The network security policy had been the turning point after the Sept. 11, 2001, terrorist attacks,The regulation of encryption export is slowed pace. After the 2008 financial crisis, the Obama encryption export control reform to stimulate exports. US Encryption Export Controls laws System is the key part of the reform of export control. In 2015, The US passed legislation to strengthen the network space safety control items, Adding new constraints for encryption export. China is currently performing a strict encryption export control policy, we should step up the “Cryptography”and its corresponding regulations and policy. we should learn from America of The Evolution of Encryption Export Controls laws System to reform our laws System.we still want to consider the our national conditions, such as the level of encryption technology and legislative technique. Then, we will set up encryption export control policies and regulations law System with Chinese characteristics.
    Comment on Hoover's Encryption Policy and International Influence in China
    2018, 4(3):  219-223. 
    Asbtract ( )   PDF (946KB) ( )  
    References | Related Articles | Metrics
    By reviewing and summarizing the Report of China Encryption Policy and International Influence published by the Hoover Research Institute, it is concluded that the evolution and development of China's encryption policy are not only related to the stable development of the state and society, The needs are closely linked and are also affected by all aspects of the international community. Therefore, the formulation of the password policy should take into consideration the national conditions of our country and the needs of the domestic public while taking into account the international relations and international pressure, and properly handle the relationship between the interests of the state and citizens, the stability of the country and the development of the country.
    Research on the Legal Personality of Artificial Intelligence
    2018, 4(3):  224-232. 
    Asbtract ( )   PDF (1427KB) ( )  
    References | Related Articles | Metrics
    The rapid development of artificial intelligence technology, though making it quickly integrated into human life and bringing convenience, has certain risks. Artificial intelligence has its own ability to learn, make decisions and take actions, which may cause damage to the rights of human beings during its independent course of action. If to blame entirely on the artificial intelligence's owners, producers or program developers, it may be both unfair and impeding the development of technology. The paper explored the concept, features as well as other issues of artificial intelligence, and gradually clarified the possible damage, the related legal responsibilities and the regulatory difficulties caused by artificial intelligence. Referring to the current system of legal entities such as natural persons and legal persons, the paper elaborates whether artificial intelligence may be granted legal personality, and then better deals with the relationship between artificial intelligence and other legal subjects so as to be benefit of determining the legal status of artificial intelligence.
    The Introduction and Review of NATO Ten Rules for Cyber Security
    2018, 4(3):  233-237. 
    Asbtract ( )   PDF (988KB) ( )  
    References | Related Articles | Metrics
    t In recent years, cyber crime continues unabated in the world and to increase in sophistication, and the cyber threat has attracted the attention of all countries around the world. However, existing cyber law and regulations are difficult to deal with the complex cyber crime. The ten rules mentioned in this paper are the solutions to problems existing in the legal system of cyber security. Through politics, law, technology, military and other coordination, it strives to enhance cyber security and reduce cyber threat in the existing legal system. Through the study of these ten rules that will make people realize the shortage of the existing cyber law, popularize the awareness of cyber security, reduce the phenomenon of cyber crime and provide soil for further improvement of cyber law.
    Several Issues on Compliance with Commercial Cryptography Regulations and the Cybersecurity Law after Cancelling of Part of the Approval Items
    2018, 4(3):  238-241. 
    Asbtract ( )   PDF (830KB) ( )  
    References | Related Articles | Metrics
    Complying with National Security Law and Cybersecurity Law of PRC, the #46 document of State Council, as well as the #336 document of State Cryptography Administration honored and encouraged the idea to rely more on the FOEs and be more flexible in regulating commercial cryptography. In response to massive newly enacted rules and regulations, FOEs must adapt their policies in multiple dimensions including research, production, sale, use, exportation, and importation. More importantly, data localization and export evaluation requirement under Cybersecurity Law created a new demand for FOEs to regulate its cryptography technology and international data exchange. This article takes on the perspective of corporations, interprets the two documents mentioned above and their related instructions, and further analyzes the issues posed under Cybersecurity laws and regulations.
    Android Malware Detection and Analysisof Malware Behavior Base on Semi-supervised Learning
    2018, 4(3):  242-250. 
    Asbtract ( )   PDF (1603KB) ( )  
    References | Related Articles | Metrics
    In order to better detect Android malware and analyze its malicious behavior,a research approach of Android malware detection and its malicious behavior analysis based on semi-supervisedlearning is presented in this paper.First 16179 Android benign software and 31964 Android malware are collected, and thendecompiling the APK for Android, extracting permissions, services and sensitive APIs as static features, and then using the dynamic analysis tool called DroidBox to extract seven kinds of dynamic features. Android malware family reflects the malicious behavior of Android malware, but different malware family might have the same malicious behavior. Therefore, the main twenty kinds of malicious families in the sample data are divided into five kinds of malicious behaviors by manual analysis and clustering analysis in this paper. Only the malicious behavior of twenty kinds of malicious families are labelled and malicious behavior of other families are not labelled. In order to make full use of the data, the Co-RFGBDT algorithm which combines the advantages of Random Forest and GBDT in semi-supervised learning is presented. Re-train the data sets using Co-RFGBDT algorithm in semi-supervised learning in combination with unlabeled samples with the overall accuracy of 91.5%. However, malicious behavior is endless, so the unknown malicious behavior is identified by setting the threshold of confidence in the paper.Finally, compared with the benchmark experiment, the overall accuracy is improved by 2%, which proves that the proposed Co-RFGBDT semi-supervised learning algorithm has better performance in this scenario.
    Webshell Detection Method Based on Correlation Analysis
    2018, 4(3):  251-255. 
    Asbtract ( )   PDF (899KB) ( )  
    References | Related Articles | Metrics
    Webshell current detection tools are mostly based on feature library matching detection, while the accuracy of confusion encryption webshell is low. In this paper, a webshell detection method based on correlation analysis is proposed according to the obfuscation statistical characteristics of webshells. The method uses correlation analysis algorithm to derive the potential implicit relationship of feature parameters, through the adjustment of support and confidence thresholds, and setting up a feature correlationrule that satisfies minimum support and confidence, then using the cross-validation to test the effect. The results show that this method can achieve the detection of obfuscated Webshell. It proves that this method improves the detection efficiency and accuracy compared with the two correlation analysis methods and detection tools.
    A Solution to Key Collision of the Combined Public Key
    2018, 4(3):  256-260. 
    Asbtract ( )   PDF (815KB) ( )  
    References | Related Articles | Metrics
    The key collision exists in the identification key generation process of the existing combinatorial public key CPK server, resulting in identification errors in terminal identity authentication, the confidentiality and integrity of the data in the process of the authentication system are destroyed. A new solution to solve the problem of combination public key collision is proposed, effectively solve the problem of identity between terminals that appear in the authentication process. The proposed scheme uses SM9 algorithm based on bilinear pairing to solve the key collision problem,it proves that the scheme has strong security and high efficiency, through theoretical analysis and security comparison.
    Cyberspace Security Subject & Major Research-based Teaching Framework and its Basic Cognition
    2018, 4(3):  261-269. 
    Asbtract ( )   PDF (1850KB) ( )  
    References | Related Articles | Metrics
    With the rapid development of information and information technology,cyberspace security has been involved in the entire social ecology and become a national strategy, there is no national security without cyberspace security. Information security and countermeasures issues involving a wide range of content, and can’t be classified according to a variety of existing technical methods, the construction and development of subject and major need to use the systematic and advanced research teaching framework with based on the accumulated knowledge and extensive expertise. The principle of the basic (six item) and system (5 item) level of information security is discussed, the characteristics of information attack and defense process are analyzed, a kind of co-inverse TAO model is constructed and applied. The research framework of cyberspace security research is conducive to the cultivation of high-quality professionals, conducive to promoting the development of China's cyberspace security subject and major conducive to strengthen its exemplary leading role.
    Research on Security in the Underwater Wireless Sensor Networks
    2018, 4(3):  270-275. 
    Asbtract ( )   PDF (1646KB) ( )  
    References | Related Articles | Metrics
    In recent years, underwater wireless sensor networks(UWSNs) has been widely used in ocean exploration, monitoring and protection as a new type of network mode. UWSNs consists of a large number of small sensor nodes, static or dynamic underwater robots deployed in the monitored area. They usually communicate using acoustic channels. Due to the unique properties of low transmission rate and high bit error rate, high delay and narrow channel, UWSNs is particularly vulnerable to malicious attacks, so these applications need to consider a basic question that is security problem. This paper mainly describes the security situation and countermeasures, analyzes the security requirements of UWSNs, and puts forward some security problems remaining to be solved.
    An improved snapshot method based on CDP
    2018, 4(3):  276-280. 
    Asbtract ( )   PDF (859KB) ( )  
    References | Related Articles | Metrics
    In traditional block-level continuous data protection, in order to reduce the time of traversing metadata records and speed up the recovery, it usually needs to insert snapshots of the protected volumes periodically. Frequent insertion of snapshots increases the speed of recovery and the storage space. An improved snapshot method, MS-CDP, which adds sequence index number, pointer of the previous item and pointer of the latter item in the metadata record, is proposed for the traditional snapshot method with large storage space. When a snapshot needs to be inserted, it is not necessary to retain the complete mapping table at the current moment. By the function of the timestamp and the block number, it only needs to retain the mapping table items corresponding to the extremum. It is proved by experiment that this method significantly reduces not only the storage space of the snapshot, but also the storage pressure on the service end of CDP system.