4.7 Article

Government regulations in cyber security: Framework, standards and recommendations

Publisher

ELSEVIER
DOI: 10.1016/j.future.2018.09.063

Keywords

Cyber security; Cyber attacks; Information security; Government policies; Standards

Funding

  1. Information Security Education & Awareness (ISEA) Phase II Project, Department of Electronics and Information Technology (Deity), India

Ask authors/readers for more resources

Cyber security refers to the protection of Internet-connected systems, such as hardware, software as well as data (information) from cyber attacks (adversaries). A cyber security regulation is needed in order to protect information technology along with computer systems with the purpose of compelling various organizations as well as companies to protect their systems and information from cyber attacks. Several cyber attacks are possible, such as viruses, phishing, Trojan horses, worms, Denial-of-Service (DoS) attacks, illegal access (e.g., stealing intellectual property or confidential information) as well as control system attacks. In this article, we focus on importance of various standards in cyber defense, and architecture of cyber security framework. We discuss the security threats, attacks and measures in cyber security. We then discuss various standardization challenges in cyber security. We also discuss about the cyber security national strategy to secure cyberspace and also various government policies in protecting the cyber security. Finally, we provide some recommendations that are critical to cyber security and cyber defense. (C) 2018 Elsevier B.V. All rights reserved.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Computer Science, Artificial Intelligence

An overview of violence detection techniques: current challenges and future directions

Nadia Mumtaz, Naveed Ejaz, Shabana Habib, Syed Muhammad Mohsin, Prayag Tiwari, Shahab S. Band, Neeraj Kumar

Summary: This paper discusses the generation of big video data in smart cities and focuses on violence detection using deep learning approaches. The paper provides an overview of deep sequence learning methods and localization strategies for violence detection. It also explores the initial image processing and machine learning-based violence detection literature and their advantages and disadvantages. Additionally, the paper discusses datasets and proposes future directions in the violence detection domain based on in-depth analysis of previous methods.

ARTIFICIAL INTELLIGENCE REVIEW (2023)

Review Computer Science, Information Systems

A comprehensive review on variants of SARS-CoVs-2: Challenges, solutions and open issues

Deepanshi, Ishan Budhiraja, Deepak Garg, Neeraj Kumar, Rohit Sharma

Summary: SARS-CoV-2 is an infected disease caused by one of the variants of Coronavirus which emerged in December 2019. It is declared a pandemic by WHO in March 2020. COVID-19 outbreak has put the world on a halt and is a major threat to the public health system. Despite of numerous efforts, precautions and vaccination the infection has grown rapidly in the world.

COMPUTER COMMUNICATIONS (2023)

Article Engineering, Electrical & Electronic

SanJeeVni: Secure UAV-Envisioned Massive Vaccine Distribution for COVID-19 Underlying 6G Network

Ashwin Verma, Pronaya Bhattacharya, Deepti Saraswat, Sudeep Tanwar, Neeraj Kumar, Ravi Sharma

Summary: Recently, UAVs have been used for COVID-19 vaccine distribution to address fake vaccine issues. The authors propose a blockchain-assisted UAV vaccine distribution scheme based on sixth-generation enhanced ultra-reliable low latency communication (6G-eRLLC). The scheme utilizes a public Solana blockchain setup for user registration, vaccine request, and distribution, ensuring scalable transactions. With an intelligent edge offloading scheme, UAV swarms are deployed to deliver vaccines to nodal centers, showing significant improvements in service latency, energy reduction, UAV coverage, and storage cost compared to 5G uRLLC communication and Ethereum network.

IEEE SENSORS JOURNAL (2023)

Article Computer Science, Hardware & Architecture

AKN-FGD: Adaptive Kohonen Network Based Fine-Grained Detection of LDoS Attacks

Dan Tang, Xiyin Wang, Xiong Li, Pandi Vijayakumar, Neeraj Kumar

Summary: Low-rate denial of service (LDoS) attacks exploit network protocol vulnerabilities to launch periodic bursts, severely impacting TCP application quality of service. Current coarse-scale detection methods are ineffective. To accurately detect LDoS attacks, an adaptive Kohonen Network based fine-grained detection (AKN-FGD) model is proposed. The AKN-FGD scheme achieves accurate detection with high detection performance and adaptability, outperforming other methods.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2023)

Article Computer Science, Information Systems

Post-Quantum Lattice-Based Secure Reconciliation Enabled Key Agreement Protocol for IoT

Dharminder Dharminder, Challa Bhageeratha Reddy, Ashok Kumar Das, Youngho Park, Sajjad Shaukat Jamal

Summary: This article presents an efficient lattice-based authenticated key exchange protocol for IoT-enabled smart devices. The protocol utilizes the reconciliation mechanism and is shown to be robust against various attacks through detailed security analysis. Simulation results in the NS-3 simulator demonstrate superior security, lower computational cost, and comparable communication cost compared to competing schemes.

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Computer Science, Information Systems

Securing Age-of-Information (AoI)-Enabled 5G Smart Warehouse Using Access Control Scheme

Ashok Kumar Das, Sandip Roy, Eranga Bandara, Sachin Shetty

Summary: Low-power wireless sensor networks (WSNs) and Internet of Things (IoT) have a significant impact on the real-time applications in future 5th generation (5G) mobile networks. To address security concerns, a security scheme is designed for AoI-enabled 5G smart warehouse, using access control mechanism, mutual device authentication, and key agreement process for secure communication. The proposed mechanism demonstrates better security and comparable communication and computational costs, as shown through rigorous security analysis, comparative study, and real-time testbed experiments.

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Computer Science, Information Systems

ASPA-MOSN: An Efficient User Authentication Scheme for Phishing Attack Detection in Mobile Online Social Networks

Munmun Bhattacharya, Sandip Roy, Samiran Chattopadhyay, Ashok Kumar Das, Sajjad Shaukat Jamal

Summary: This article introduces a user authentication scheme for mitigating phishing attacks in online social networks, called ASPA-mOSN. Through security analysis and comparison with other schemes, this scheme performs well in terms of security and performance.

IEEE SYSTEMS JOURNAL (2023)

Article Computer Science, Hardware & Architecture

BPPS:Blockchain-Enabled Privacy-Preserving Scheme for Demand-Response Management in Smart Grid Environments

KiSung Park, JoonYoung Lee, Ashok Kumar Das, Youngho Park

Summary: With the revolutionary growth of the industrial Internet of Things and smart grid networks, smart grid (SG) communication has become the next-generation network for intelligent and efficient electric power transmission. However, SG networks face security issues with smart meters (SMs) and untrusted wireless communication. To address these issues, we propose a privacy-preserving authentication scheme for demand response management in SGs, called BPPS. It provides secure mutual authentication, integrity of demand-response data using blockchain, and has been analyzed for security and performance in simulations.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2023)

Article Automation & Control Systems

Deep Fusion: Crafting Transferable Adversarial Examples and Improving Robustness of Industrial Artificial Intelligence of Things

Yajie Wang, Yu-an Tan, Thar Baker, Neeraj Kumar, Quanxin Zhang

Summary: Industry 5.0 aims to merge the cognitive computing capabilities of DNNs with human resourcefulness in collaborative operations. However, DNNs are vulnerable to adversarial attacks, bringing risks to Industrial AIoT systems. To solve these problems, we propose two novel deep fusion methods.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2023)

Article Computer Science, Information Systems

SecGreen: Secrecy Ensured Power Optimization Scheme for Software-Defined Connected IoV

Rajat Chaudhary, Neeraj Kumar

Summary: Software-Defined Internet of Vehicles (SD-IoV) is an emerging technology used in modern intelligent transportation systems. The goal of SD-IoV is to provide seamless connectivity with low latency and high-speed data transfer. However, the challenges of high power consumption and secure data transfer arise due to the increased density of connected vehicles using the Internet. In this paper, a joint power optimization and secrecy ensured scheme known as SecGreen is proposed to address these issues.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2023)

Article Computer Science, Information Systems

Secure Smart Healthcare Framework Using Lightweight DNA Sequence and Chaos for Mobile-Edge Computing

Ashish Singh, Kakali Chatterjee, Anish Kumar Singh, Neeraj Kumar

Summary: Mobile-edge computing (MEC) is a new architecture providing services at the network edge, with potential applications in healthcare for remote patient monitoring, diagnosis, and treatment. However, there are security and privacy concerns related to remote data access, including unauthorized access and data leakage, which can make the system inconvenient, untrusted, less suitable, and vulnerable.

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Computer Science, Information Systems

Deep Reinforcement Learning Algorithm for Latency-Oriented IIoT Resource Orchestration

Peiying Zhang, Yi Zhang, Neeraj Kumar, Ching-Hsien Hsu

Summary: Due to geographical factors and resource constraints, the traditional Internet architecture cannot meet the needs of the space-air-ground-integrated network (SAGIN) resource layout in the Industrial Internet of Things (IIoT) service. This article proposes a latency-sensitive VNE algorithm based on deep reinforcement learning (DDRL-VNE) in the SAGIN environment to efficiently arrange network resources and meet the quality of service requirements of users. Experimental results effectively illustrate the effectiveness of the algorithm in the SAGIN resource allocation problem.

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Engineering, Civil

MCLA Task Offloading Framework for 5G-NR-V2X-Based Heterogeneous VECNs

Muhammad Ayzed Mirza, Junsheng Yu, Salman Raza, Manzoor Ahmed, Muhammad Asif, Azeem Irshad, Neeraj Kumar

Summary: This paper proposes a mobility, contact, and computational load-aware (MCLA) task offloading scheme for heterogeneous vehicular edge computing networks, which integrates different wireless technologies to improve network performance and meet low-latency and cost constraints. The scheme leverages the computational power of public vehicles and shareable computations from passengers' mobile equipment to enhance computation capacity. Extensive evaluations show that the MCLA scheme significantly improves task turnover ratio by 4%-15% with lower transmission and computation costs of 4.7%-29.8%.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2023)

Article Engineering, Civil

An Authentication and Key Management Framework for Secure and Intelligent Transportation of Internet of Space Things

Mohammad Wazid, Ashok Kumar Das, Sachin Shetty

Summary: Internet of Space Things (IoST), also known as CubeSats, expands the uses and functionalities of traditional Internet of Things (IoT) by providing satellite networks and real-time satellite data. To address data security in IoST, an authentication and key management framework called SAKM-IoST has been proposed, which demonstrates resilience against potential threats and attacks.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2023)

Article Telecommunications

On the design of an AI-driven secure communication scheme for internet of medical things environment

Neha Garg, Rajat Petwal, Mohammad Wazid, D. P. Singh, Ashok Kumar Das, Joel J. P. C. Rodrigues

Summary: The Internet of Medical Things (IoMT) is a collection of smart healthcare devices that are connected via the Internet to improve overall healthcare outcomes. However, IoMT is vulnerable to security and privacy attacks, so a robust security mechanism is necessary to prevent such attacks.

DIGITAL COMMUNICATIONS AND NETWORKS (2023)

Editorial Material Computer Science, Theory & Methods

Artificial intelligence in biomedical big data and digital healthcare

Kiho Lim, Christian Esposito, Tian Wang, Chang Choi

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Editorial Material Computer Science, Theory & Methods

Cluster and cloud computing for life sciences

Jesus Carretero, Dagmar Krefting

Summary: Computational methods play a crucial role in bioinformatics and biomedicine, especially in managing large-scale data and simulating complex models. This special issue focuses on security and performance aspects in infrastructure, optimization for popular applications, and the integration of machine learning and data processing platforms to improve the efficiency and accuracy of bioinformatics.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Article Computer Science, Theory & Methods

Adaptive asynchronous federated learning

Renhao Lu, Weizhe Zhang, Qiong Li, Hui He, Xiaoxiong Zhong, Hongwei Yang, Desheng Wang, Zenglin Xu, Mamoun Alazab

Summary: Federated Learning allows collaborative training of AI models with local data, and our proposed FedAAM scheme improves convergence speed and training efficiency through an adaptive weight allocation strategy and asynchronous global update rules.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Article Computer Science, Theory & Methods

METSM: Multiobjective energy-efficient task scheduling model for an edge heterogeneous multiprocessor system

Qiangqiang Jiang, Xu Xin, Libo Yao, Bo Chen

Summary: This paper proposes a multi-objective energy-efficient task scheduling technique (METSM) for edge heterogeneous multiprocessor systems. A mathematical model is established for the task scheduling problem, and a problem-specific algorithm (IMO) is designed for optimizing task scheduling and resource allocation. Experimental results show that the proposed algorithm can achieve optimal Pareto fronts and significantly save time and power consumption.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Editorial Material Computer Science, Theory & Methods

Preface of special issue on heterogeneous information network embedding and applications

Weimin Li, Lu Liu, Kevin I. K. Wang, Qun Jin

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Article Computer Science, Theory & Methods

Group key management in the Internet of Things: Handling asynchronicity

Mohammed Riyadh Abdmeziem, Amina Ahmed Nacer, Nawfel Moundji Deroues

Summary: Internet of Things (IoT) devices have become ubiquitous and brought the need for group communications. However, security in group communications is challenging due to the asynchronous nature of IoT devices. This paper introduces an innovative approach using blockchain technology and smart contracts to ensure secure and scalable group communications.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Article Computer Science, Theory & Methods

Multi-task peer-to-peer learning using an encoder-only transformer model

Robert Sajina, Nikola Tankovic, Ivo Ipsic

Summary: This paper presents and evaluates a novel approach that utilizes an encoder-only transformer model to enable collaboration between agents learning two distinct NLP tasks. The evaluation results demonstrate that collaboration among agents, even when working towards separate objectives, can result in mutual benefits.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Article Computer Science, Theory & Methods

On the impact of event-driven architecture on performance: An exploratory study

Hebert Cabane, Kleinner Farias

Summary: Event-driven architecture has been widely adopted in the software industry for its benefits in software modularity and performance. However, there is a lack of empirical evidence to support its impact on performance. This study compares the performance of an event-driven application with a monolithic application and finds that the monolithic architecture consumes fewer computational resources and has better response times.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Article Computer Science, Theory & Methods

Federated Deep Learning for Wireless Capsule Endoscopy Analysis: Enabling Collaboration Across Multiple Data Centers for Robust Learning of Diverse Pathologies

Haroon Wahab, Irfan Mehmood, Hassan Ugail, Javier Del Ser, Khan Muhammad

Summary: Wireless capsule endoscopy (WCE) is a revolutionary diagnostic method for small bowel pathology. However, the manual analysis of WCE videos is cumbersome and the privacy concerns of WCE data hinder the adoption of AI-based diagnoses. This study proposes a federated learning framework for collaborative learning from multiple data centers, demonstrating improved anomaly classification performance while preserving data privacy.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Article Computer Science, Theory & Methods

A sustainable Bitcoin blockchain network through introducing dynamic block size adjustment using predictive analytics

Maruf Monem, Md Tamjid Hossain, Md. Golam Rabiul Alam, Md. Shirajum Munir, Md. Mahbubur Rahman, Salman A. AlQahtani, Samah Almutlaq, Mohammad Mehedi Hassan

Summary: Bitcoin, the largest cryptocurrency, faces challenges in broader adaption due to long verification times and high transaction fees. To tackle these issues, researchers propose a learning framework that uses machine learning to predict the ideal block size in each block generation cycle. This model significantly improves the block size, transaction fees, and transaction approval rate of Bitcoin, addressing the long wait time and broader adaption problem.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Article Computer Science, Theory & Methods

Leveraging a visual language for the awareness-based design of interaction requirements in digital twins

Rafael Duque, Crescencio Bravo, Santos Bringas, Daniel Postigo

Summary: This paper introduces the importance of user interfaces for digital twins and presents a technique called ADD for modeling requirements of Human-DT interaction. A study is conducted to assess the feasibility and utility of ADD in designing user interfaces, using the virtualization of a natural space as a case study.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Article Computer Science, Theory & Methods

Performance analysis of parallel composite service-based applications in clouds

Xiulin Li, Li Pan, Wei Song, Shijun Liu, Xiangxu Meng

Summary: This article proposes a novel multiclass multi-pool analytical model for optimizing the quality of composite service applications deployed in the cloud. By considering embarrassingly parallel services and using differentiated parallel processing mechanisms, the model provides accurate prediction results and significantly reduces job response time.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Article Computer Science, Theory & Methods

Unraveling the MEV enigma: ABI-free detection model using Graph Neural Networks

Seongwan Park, Woojin Jeong, Yunyoung Lee, Bumho Son, Huisu Jang, Jaewook Lee

Summary: In this paper, a novel MEV detection model called ArbiNet is proposed, which offers a low-cost and accurate solution for MEV detection without requiring knowledge of smart contract code or ABIs.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Article Computer Science, Theory & Methods

ExDe: Design space exploration of scheduler architectures and mechanisms for serverless data-processing

Sacheendra Talluri, Nikolas Herbst, Cristina Abad, Tiziano De Matteis, Alexandru Iosup

Summary: Serverless computing is increasingly used in data-processing applications. This paper presents ExDe, a framework for systematically exploring the design space of scheduling architectures and mechanisms, to help system designers tackle complexity.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Article Computer Science, Theory & Methods

FedBnR: Mitigating federated learning Non-IID problem by breaking the skewed task and reconstructing representation

Chao Wang, Hui Xia, Shuo Xu, Hao Chi, Rui Zhang, Chunqiang Hu

Summary: This paper introduces a Federated Learning framework called FedBnR to address the issue of potential data heterogeneity in distributed entities. By breaking up the original task into multiple subtasks and reconstructing the representation using feature extractors, the framework improves the learning performance on heterogeneous datasets.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)