Catálogo de publicaciones - libros

Compartir en
redes sociales


Título de Acceso Abierto

Cyber Security

Xiaochun Yun ; Weiping Wen ; Bo Lang ; Hanbing Yan ; Li Ding ; Jia Li ; Yu Zhou (eds.)

En conferencia: 15º China Cyber Security Annual Conference (CNCERT) . Beijing, China . August 14, 2018 - August 16, 2018

Resumen/Descripción – provisto por la editorial

No disponible.

Palabras clave – provistas por la editorial

Systems and Data Security

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No requiere 2019 SpringerLink acceso abierto

Información

Tipo de recurso:

libros

ISBN impreso

978-981-13-6620-8

ISBN electrónico

978-981-13-6621-5

Editor responsable

Springer Nature

País de edición

Reino Unido

Fecha de publicación

Información sobre derechos de publicación

© The Editor(s) (if applicable) and The Author(s) 2019

Tabla de contenidos

Correction to: Automatic and Accurate Detection of Webshell Based on Convolutional Neural Network

Zhuo-Hang Lv; Han-Bing Yan; Rui Mei

In the version of this paper that was originally published, the acknowledgment of the NSFC Foundation was missing. The paper has been updated to include these corrections.

Pp. C1-C2

Research on Identity Authentication Method Based on Negative Logic System

Yexia Cheng; Yuejin Du; Jin Peng; Jun Fu; Baoxu Liu

With the rapid development of computer and network, new technologies and services such as mobile Internet, Internet of Things, cloud and artificial intelligence have arisen and changed people’s life. The identity authentication is a must for these services. To solve the problem, identity authentication system and method based on negative logic system (NLS) is proposed in the paper. NLS is introduced to improve security in the essence of attack and defense. Security mechanisms based on NLS are proved effective to increase attack cost and strengthen defense ability. So NLS-based identity authentication system and method in the cloud environment are designed. Meanwhile, the corresponding converters, distributed storage, distributed detectors and authentication are proposed. The proposed method can improve security and provide identity authentication for cloud, IoT, etc. The theoretical performance analysis proves that it is feasible and effective.

- Identity Authentication | Pp. 3-15

Design of Multi-dimensional Electronic Channel Unified Identity Authentication Method for Power Information System

Baoxian Guo; Ying Xu; Renjie Li; Xingxiong Zhu

At present, State Grid Corporation has established a wealth of electronic service channels, including 95598 website, electric E-power, hand-held power, national network mall, E-charging, WeChat, with the rich application of various electronic channels, while gradually facilitating user use. There has been a problem of poor user experience such as registration and query service sharing, lack of unified management of multiple electronic service channels, and lack of service supervision for various electronic channels. Therefore, it is urgent to start from the source to conduct specific research on unified identity authentication system among various electronic channels. So in this paper, we proposed a multi-dimensional electronic channel unified authentication method based PKI certificate for power information system. By the proposed method, users can directly access each application system and perform fast and secure switching between application systems without multiple authentication process, providing users with the convenience and security of engaging in complex business management activities.

- Identity Authentication | Pp. 16-23

Extension of ISO/IEC27001 to Mobile Devices Security Management

Xiaobo Zhu; Yunqian Zhu

Mobile security is more and more important with the fast growth of mobile devices, and people are becoming more dependent on mobile devices in their daily life. Malicious samples in mobile devices are growing in double times each year from 2011 to 2017 in China. ISO/IEC 27000 family of standards helps organizations keep information assets secure, such as financial information, intellectual property, employee details or information entrusted to you by third parties. ISO/IEC 27001 is the best-known standard in the family providing requirements for an information security management system (ISMS). However, ISO/IEC 27001 is not quite adaptable for mobile devices, because these developing mobile information devices lead to new challenges and security risks. This paper analyzes mobile devices security issues, and gives the drawback for 27001 in mobile security. Finally, this paper gives a consideration to these issues under ISO/IEC 27001 information security management system framework.

- Mobile Security | Pp. 27-35

Android Malware Detection Method Based on Frequent Pattern and Weighted Naive Bayes

Jingwei Li; Bozhi Wu; Weiping Wen

With the market share of Android system becoming the first in the world, the security problem of Android system is becoming more and more serious. How to effectively detect Android malware has become a significant problem. Permissions and API calls in Android applications can effectively reflect the behavior patterns of an Android application. Most researchers have only considered a single permission or API feature, and did not consider associations and patterns inside the permission or API features. Some scholars have also tried to find the combination modes inside the permission features in malwares, but the detection of maliciousness according to this combination mode is too absolute. This paper proposes a malware detection method, which combines the advantages of frequent pattern mining and Naive Bayes to effectively identify Android malwares.

- Mobile Security | Pp. 36-51

An Overview of Blockchain Security Analysis

Hai Wang; Yong Wang; Zigang Cao; Zhen Li; Gang Xiong

The blockchain, with its own characteristics, has received much attention at the beginning of its birth and been applied in many fields. At the same time, however, its security issues are exposed constantly and cyber attacks have caused significant losses in it. At present, there is little concern and research in the field of network security of the blockchain. This paper introduces the applications of blockchain in various fields, systematically analyzes the security of each layer of the blockchain and possible cyber attacks, expounds the challenges brought by the blockchain to network supervision, and summarizes research progress in the protection technology. This paper is a review of the current security of the blockchain and will effectively help the development and improvement of security technologies of the blockchain.

- Emerging Technologies | Pp. 55-72

Automatic and Accurate Detection of Webshell Based on Convolutional Neural Network

Zhuo-Hang Lv; Han-Bing Yan; Rui Mei

The rapid development of the Internet has changed the way people live and work. Web security, as the foundation of network security, has received much more attention. Based on the variability of Webshells and the vulnerability of detection methods, this paper proposed a model that used deep learning to detect and implements the automatic identification of Webshells. For the shortcomings of the traditional detection models using machine learning algorithms, this paper proposed to apply convolutional neural network to Webshell detection process. The deep learning model does not require complicated artificial feature engineering, and the modeled features trained through model learning can also allow the attacker to avoid targeted bypassing in Webshell detection. The experimental results showed that this method not only has better detection accuracy, but also can effectively avoid the attacker’s targeted bypassing. At the same time, with the accumulation of training samples, the detection accuracies of the detection model in different application environments will gradually improvements, which has clear advantages over traditional machine learning algorithms.

- Emerging Technologies | Pp. 73-85

End-Link Collaboration Control Mechanism in Intelligent Networks Based on Traffic Classification

Songer Sun; Li Zhang; Xiaoping Han; Chengjie Gu

In order to meet special requirements of service transportation and improve integral network performance, we propose self-adaptive control mechanism in intelligent networks based on traffic classification. The self-adaptive control mechanism which considers end-link cooperation in intelligent network implements service transportation with control method of the distributed-centralized combination. The mechanism optimize relevant network elements devices and reasonably allocates limited resources to improve end-to-end target depending on given strategies.

- Emerging Technologies | Pp. 86-95

Malware Detection with Neural Network Using Combined Features

Huan Zhou

The growth in amount and species of malicious programs are now turning into a severe problem that strengthens the demand for development in detecting and classifying the potential threats automatically. Deep learning is an acceptable method to process this increment. In this paper, we propose an innovative method for detecting malware which uses the combined features (static + dynamic) to classify whether a portable executable (PE) file is malicious or not. A thorough experimental research on a real PE file collection was executed to make comparisons with the results that was performed in diverse situations and the performances of different machine learning models. The experiments prove the effectiveness of our model and show that our method is able to detect unknown malicious samples well.

- Emerging Technologies | Pp. 96-106

Malicious Websites Identification Based on Active-Passive Method

Xue-qiang Zou; Peng Zhang; Cai-yun Huang; Xiu-guo Bao

Nowadays, massive numbers of malicious websites are endeavored to change their hosts/IP addresses to avoid tracking. This paper fills a gap in the study of tracking this kind of websites and offers approaches to detection and identification by combining both active and passive methods. The active method, as bootstrap, is based on crawling traffic from Internet, we can extract title, keywords and picture as features and store them as feature sets. What we do in passive filtering is to match online traffic using the feature sets. Other than finding out those malicious websites, we can extract extra features such as cookie and users information, which is unavailable by using active method, from online traffic and add them to the feature sets created by proceeding active method. According to the experiment, we can have 95.43% true positive rate and 3.90% false positive rate under real data flow in this way.

- Cyber Threat Detection and Defense | Pp. 109-121