4.5 Article

A cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments

期刊

COMPUTERS & SECURITY
卷 74, 期 -, 页码 340-354

出版社

ELSEVIER ADVANCED TECHNOLOGY
DOI: 10.1016/j.cose.2017.08.016

关键词

Edge device; Two-stage Markov model; Fog computing; Intrusion detection system; Virtual Honeypot Device; Internet of Things

向作者/读者索取更多资源

Device security is one of the major challenges for successful implementation of Internet of Things and fog computing environment in current IT space. Researchers and Information Technology (IT) organizations have explored many solutions to protect systems from unauthenticated device attacks (known as outside device attacks). Fog computing uses network devices (e.g. router, switch and hub) for latency-aware processing of collected data using IoT. Then, identification of malicious edge device is one of the critical activities in data security of fog computing environment. Preventing attacks from malicious edge devices in fog computing environment is more difficult because they have certain granted privileges to use and process the data. In this paper, proposed cybersecurity framework uses three technologies which are Markov model, Intrusion Detection System (IDS) and Virtual Honeypot Device (VHD) to identify malicious edge device in fog computing environment. A two stage hidden Markov model is used to effectively categorize edge devices in four different levels. VHD is designed to store and maintain log repository of all identified malicious devices which assists the system to defend itself from any unknown attacks in the future. Proposed cybersecurity framework is tested with real attacks in virtual environment created using OpenStack and Microsoft Azure. Results indicated that proposed cybersecurity framework is successful in identifying the malicious device as well as reducing the false IDS alarm rate. (C) 2017 Elsevier Ltd. All rights reserved.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.5
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Computer Science, Theory & Methods

An intelligent healthcare system for predicting and preventing dengue virus infection

Sandeep Kumar Sood, Vaishali Sood, Isha Mahajan, Sahil

Summary: This paper proposes an intelligent healthcare system that uses cloud computing, internet of things, and fog computing to diagnose and monitor dengue virus infection in real-time, as well as provide risk assessment and alerts.

COMPUTING (2023)

Article Engineering, Industrial

Digital transformation of healthcare during the COVID-19 pandemic: Patients' teleconsultation acceptance and trusting beliefs

Patricia Baudier, Galina Kondrateva, Chantal Ammi, Victor Chang, Francesco Schiavone

Summary: The COVID-19 pandemic has accelerated the digital transformation of healthcare services, particularly the use of teleconsultation for medical care. This study examines the factors that influence the intention to use medical teleconsultation, incorporating trusting beliefs and self-efficacy into the unified theory of acceptance and use of technology (UTAUT2). A survey was conducted among patients who utilized teleconsultation platforms during the pandemic, with a sample size of 1233 respondents. The findings underscore the importance of trusting beliefs and self-efficacy in the adoption of digital healthcare services, contributing to both theory and practice in COVID-19 research.

TECHNOVATION (2023)

Article Computer Science, Information Systems

Job satisfaction and turnover decision of employees in the Internet sector in the US

Victor Chang, Yeqing Mou, Qianwen Ariel Xu, Yue Xu

Summary: This paper proposes the importance of work-life balance, compensation, career opportunity, and culture and management style in improving job satisfaction. A turnover risk prediction model based on the random forest algorithm is constructed to understand the characteristics and identify risks of turnover. Empirical analysis using a sample of 17,724 online reviews from Glassdoor confirms the positive effects of antecedents, with job satisfaction as a mediator and the unemployment rate as a moderator. Finally, job satisfaction is identified as the most crucial feature for predicting turnover.

ENTERPRISE INFORMATION SYSTEMS (2023)

Article Information Science & Library Science

Customer Behavioral Trends in Online Grocery Shopping During COVID-19

Victor Chang, Ou Liu, Kiran Vijay Barbole, Qianwen Ariel Xu, Xianghuaa Jason Gao, Wendy Tabrizi

Summary: The evolution of online shopping was sparked by major players like Amazon, and customers quickly realized the convenience it offered, leading to its growing popularity. Therefore, it is important to study the usage and perception of online shopping during COVID-19, particularly in the grocery sector. This study surveyed approximately 28 respondents from 50 targeted groups using a structured questionnaire and analyzed the collected data through regression analysis. Additionally, 5 interviews were conducted to validate the findings. Customers showed a clear preference for online grocery shopping during COVID-19 due to safety, convenience, and government restrictions, with factors like delivery times, discounts, and product quality playing a significant role. Online grocery services also proved to be more stable and adhered to government rules and restrictions during the pandemic, resulting in high customer satisfaction.

JOURNAL OF GLOBAL INFORMATION MANAGEMENT (2023)

Article Computer Science, Cybernetics

Blockchain Oriented Effective Charity Process During Pandemics and Emergencies

Mandeep Kaur, Pankaj Deep Kaur, Sandeep Kumar Sood

Summary: During emergencies, donation is seen as a moral responsibility globally. Lack of transparency and oversight in charity donations hampers people's enthusiasm to donate. Blockchain technology offers a solution to make donation procedures more viable, ensuring a secure and transparent environment without third-party involvement.

IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS (2023)

Article Computer Science, Information Systems

New product design and implementation of aboleth: a mobile D&D character creator for enterprise mobile applications and metaverse

Victor Chang, Dan Lawrence, Le Minh Thao Doan, Ariel Qianwen Xu, Ben S. C. Liu

Summary: This paper introduces Aboleth, a tool for rapid prototyping. We propose enhancing the API framework and provide details on the design process and implementation of the project. The prototype is developed using Computer-Assisted Designs and Xamarin, integrating software engineering into game design to improve Human-Computer Interaction and user experiences. Additionally, we discuss the relevance of using this tool for rapid prototyping in enterprise mobile applications and Metaverse, and explore opportunities to improve the project design.

ENTERPRISE INFORMATION SYSTEMS (2023)

Review Computer Science, Information Systems

Cybersecurity for children: an investigation into the application of social media

Victor Chang, Lewis Golightly, Qianwen Ariel Xu, Thanaporn Boonmee, Ben S. S. Liu

Summary: This paper discusses cybersecurity issues for children, especially teenagers, with a focus on the impact of social media. Many social media users lack awareness of cybersecurity and digital privacy, and fail to understand the importance of developing privacy measures. The paper identifies seven categories of hacking motivations through multimedia platforms, and explores various hacking methods, such as sexting and influence on buying advertisements. The findings highlight the importance of understanding the digital footprint and its consequences for protection.

ENTERPRISE INFORMATION SYSTEMS (2023)

Article Automation & Control Systems

FV-Seg-Net: Fully Volumetric Network for Accurate Segmentation of COVID-19 Lesions From Chest CT Scans

Mohamed Abdel-Basset, Hossam Hawash, Victor Chang

Summary: This article proposes a novel fully volumetric segmentation network called FV-Seg-Net, which effectively addresses the precise segmentation of small-size lesions in CT scans. The network utilizes a computationally efficient recalibrated anisotropic convolution module and a multilevel multiscale pyramid aggregation module to capture local and global spatial information. The introduction of stacked data augmentation further improves the generalizability of FV-Seg-Net. Experimental results show that FV-Seg-Net achieves excellent segmentation performance, outperforming current cutting-edge studies.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2023)

Article Operations Research & Management Science

Noise traders in an agent-based artificial stock market

Xiaoting Dai, Jie Zhang, Victor Chang

Summary: This paper investigates the long-term survival of noise traders and their influence on financial markets by proposing an agent-based artificial stock market. The market consists of noise traders, informed and uninformed traders. Informed and uninformed traders can learn from information using Genetic Programming, while noise traders cannot. The system is calibrated to real financial markets and replicates several stylized facts. The findings suggest that noise traders either cannot survive in the long run or transform into other types of traders, and they increase market volatility, price distortion, noise trader risk, and trading volume. Regulatory interventions, such as price limits, transaction tax, and longer settlement cycles, can affect the survival period of noise traders and their influence on markets.

ANNALS OF OPERATIONS RESEARCH (2023)

Article Computer Science, Information Systems

BUA: a blockchain-based unlinkable authentication scheme for mobile IoT

Yihong Wen, Mingxi Liu, Xiwen Yang, Tailong Yang, Victor Chang

Summary: This paper presents a blockchain-based unlinkable authentication scheme that reduces the computational load of Certificate Authorities and compresses blockchain data using vector commitment. It also minimizes redundancy in vector commitment verification with a binary tree auxiliary index. The scheme achieves its security goals and improves performance by 13.24%, surpassing similar proposals.

ENTERPRISE INFORMATION SYSTEMS (2023)

Article Computer Science, Artificial Intelligence

Comprehensive analysis of UK AADF traffic dataset set within four geographical regions of England

Victor Chang, Qianwen Ariel Xu, Karl Hall, Olojede Theophilus Oluwaseyi, Jiabin Luo

Summary: Traffic flow detection is crucial in freeway traffic surveillance systems. Despite significant investment in monitoring and analyzing traffic congestion, autonomous traffic analysis remains challenging due to the complexity of traffic delays. This study presents an intelligent analytic method based on machine-learning algorithms to investigate and predict road traffic flows in four locations in the United Kingdom, achieving high accuracy and demonstrating the practical insights in traffic analysis.

EXPERT SYSTEMS (2023)

Article Computer Science, Artificial Intelligence

SDbQfSum: Query-focused summarization framework based on diversity and text semantic analysis

Muhidin Mohamed, Mourad Oussalah, Victor Chang

Summary: Query-focused multi-document summarization (Qf-MDS) is a sub-task of automatic text summarization that aims to extract a substitute summary from a document cluster of the same topic and based on a user query. In this work, a semantic diversity feature based query-focused extractive summarizer (SDbQfSum) is proposed to address the challenges of query-relevance, centrality, redundancy and diversity. The summarizer combines semantically parsed document text with knowledge-based vectorial representation to extract effective sentence importance and query-relevance features. Evaluation results on the DUC2006 dataset show that the proposed summarizer outperforms most state-of-the-art approaches on ROUGE measures.

EXPERT SYSTEMS (2023)

Article Computer Science, Artificial Intelligence

CogNLG: Cognitive graph for KG-to-text generation

Peichao Lai, Feiyang Ye, Yanggeng Fu, Zhiwei Chen, Yingjie Wu, Yilei Wang, Victor Chang

Summary: The study proposes a CogNLG framework based on the dual-process theory in cognitive science for KG-to-text generation tasks, which shows excellent performance in both explainability and capability.

EXPERT SYSTEMS (2023)

Review Business

Quantum Computing Review: A Decade of Research

Sandeep Kumar Sood, Pooja

Summary: Quantum computing has the potential to revolutionize various fields by leveraging principles of quantum mechanics, providing exponential speedup. This study analyzes the scientific literature in the computer science discipline from the Web of Science database to identify key research domains, publication patterns, collaboration, citation patterns, and research frontiers in quantum computing. The findings offer valuable insights for information scientists to understand the field and identify relevant applications, research topics, and challenges.

IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT (2023)

Article Business

Sharing Is Caring: Hurdles and Prospects of Open, Crowd-Sourced Cyber Threat Intelligence

Vitor Jesus, Balraj Bains, Victor Chang

Summary: Cyber threat intelligence (CTI) is important but often limited to large organizations, creating barriers to effective sharing. This article reviews the challenges of open, crowd-sourced CTI and analyzes the confidentiality threat in existing sharing architectures. By proposing a reference architecture and addressing key requirements, the article aims to strengthen the case for open, crowd-based sharing of CTI and mitigate confidentiality concerns.

IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT (2023)

Article Computer Science, Information Systems

CyberEntRel: Joint extraction of cyber entities and relations using deep learning

Kashan Ahmed, Syed Khaldoon Khurshid, Sadaf Hina

Summary: This paper mainly introduces the construction of the cyber threat intelligence knowledge graph and the information extraction technique. By using joint extraction technique, it solves the problem of traditional techniques becoming ineffective due to the increasing size of CTI data. Experimental results show that this technique outperforms state-of-the-art models in knowledge triple extraction on CTI data and improves the F1 score.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Enhance membership inference attacks in federated learning

Xinlong He, Yang Xu, Sicong Zhang, Weida Xu, Jiale Yan

Summary: This paper proposes a new membership inference attack method in federated learning, which utilizes data poisoning and sequence prediction confidence. The attack is effective and results in minimal overall model performance degradation.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

CTIMD: Cyber threat intelligence enhanced malware detection using API call sequences with parameters

Tieming Chen, Huan Zeng, Mingqi Lv, Tiantian Zhu

Summary: In this paper, the authors propose a deep learning based dynamic malware detection method called CTIMD, which integrates threat knowledge from CTIs into the learning process of API call sequences with runtime parameters. Experimental results show that CTIMD outperforms existing methods in terms of performance.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

SuM: Efficient shadow stack protection on ARM Cortex-M

Wonwoo Choi, Minjae Seo, Seongman Lee, Brent Byunghoon Kang

Summary: This paper proposes SUM, a backward-edge control flow protection scheme for ARM Cortex-M processors. It combines MPU and the overlooked hardware feature FaultMask to achieve efficient and robust protection. The empirical evaluation shows minimal runtime overhead for the proposed solution.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Which factors predict susceptibility to phishing? An empirical study

Liliana Ribeiro, Ines Sousa Guedes, Carla Sofia Cardoso

Summary: Phishing susceptibility is influenced by individual and contextual factors. The study found that individuals who perceive themselves as capable of detecting phishing and those who use online services more frequently are more susceptible to phishing. However, technology competencies and other individual variables do not predict phishing susceptibility.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Optimization-based adversarial perturbations against twin support vector machines

Wenjie Wang, Yuanhai Shao, Yiju Wang

Summary: In this paper, we investigate the adversarial perturbations of twin support vector machines (TWSVMs) and propose an optimization framework, which provides explicit solutions to increase the interpretability of the conclusion and convenience for calculation.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

AIPA: An Adversarial Imperceptible Patch Attack on Medical Datasets and its Interpretability

Snofy D. Dunston, V. Mary Anita Rajam

Summary: This paper proposes a novel adversarial attack technique that can synthesize adversarial images to mislead deep learning models, and also studies interpretability plots. The research findings show that the proposed attack technique influences the interpretability plots, regardless of the success of the attack.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Protocol clustering of unknown traffic based on embedding of protocol specification

Junchen Li, Guang Cheng, Zongyao Chen, Peng Zhao

Summary: Protocol Reverse Engineering (PRE) is a direct approach for analyzing unknown traffic. This paper proposes a method for clustering unknown traffic based on private protocol labels, and the experimental results demonstrate its advantages on real-world network traffic.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

When explainability turns into a threat- using xAI to fool a fake news detection method

Rafal Kozik, Massimo Ficco, Aleksandra Pawlicka, Marek Pawlicki, Francesco Palmieri, Michal Choras

Summary: The inclusion of Explainability of Artificial Intelligence (xAI) has become a mandatory requirement for designing and implementing reliable, interpretable, and ethical AI solutions. However, it has been shown that xAI can enable successful adversarial attacks in the domain of fake news detection, leading to a decrease in AI security. This paper presents an attack scheme that uses an explainable solution to reshape the structure of the original message, allowing the adversary to manipulate the model's prediction while keeping the message's meaning intact.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Ensuring secure interoperation of access control in a multidomain environment

Benyuan Yang, Lili Luo, Zhimeng Wang

Summary: Interoperation is widely used in practical industrial applications, but merging local access control policies may lead to security violations. Dealing with these issues in a multidomain environment is critical, but finding the maximum secure interoperation among individual systems poses a challenge due to the large number of entities and access involved.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

FACILE: A capsule network with fewer capsules and richer hierarchical information for malware image classification

Binghui Zou, Chunjie Cao, Longjuan Wang, Sizheng Fu, Tonghua Qiao, Jingzhang Sun

Summary: The ongoing struggle between security researchers and malware has led to the exploration of using convolutional neural networks and capsule networks for classification and identification of malware. However, training these networks requires a significant amount of data and parameters, and the research on capsule networks is still in its early stages, posing challenges.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Multivariate time series anomaly detection by fusion of deep convolution residual autoencoding reconstruction model and ConvLstm forecasting model

Hongsong Chen, Xingyu Li, Wenmao Liu

Summary: Multivariate time-series anomaly detection is crucial for maintaining normal operation of physical equipment. Recent advances have been made in this field, but two challenges have limited the model's ability to generalize. To address these challenges, a multivariate time-series anomaly detection model consisting of a characterization network and a forecasting network is proposed. Experimental results demonstrate that this method outperforms baseline methods in terms of detection performance and robustness.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

FLAD: Adaptive Federated Learning for DDoS attack detection

Roberto Doriguzzi-Corin, Domenico Siracusa

Summary: This paper discusses the application of federated learning in the field of cybersecurity and proposes an adaptive mechanism-based federated learning solution for DDoS attack detection in dynamic cybersecurity scenarios. Through experiments, it is demonstrated that the proposed solution outperforms state-of-the-art federated learning algorithms in terms of convergence time and accuracy.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Municipality2HTTPS: A study on HTTPS protocol's usage in Italian municipalities' websites

Antonio Giovanni Schiavone

Summary: The usage of HTTPS protocol is crucial for secure communication with websites, ensuring the confidentiality, integrity, and authenticity of online data transmissions. The Municipality2HTTPS research project analyzed the implementation of HTTPS in Italian municipalities' websites and identified areas for improvement.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Hello me, meet the real me: Voice synthesis attacks on voice assistants

Domna Bilika, Nikoletta Michopoulou, Efthimios Alepis, Constantinos Patsakis

Summary: Voice Assistants (VAs) are widely used in smart devices, but are vulnerable to attacks, as shown by experiments with popular VAs revealing successful attack rates exceeding 30% and statistical variations among vendors, calling for additional countermeasures to protect user information.

COMPUTERS & SECURITY (2024)