Currently computing information systems have entered a new stage and the security of systems is more and more serious, and the research on system security is developing in depth. This paper discusses neuro-computing a...Currently computing information systems have entered a new stage and the security of systems is more and more serious, and the research on system security is developing in depth. This paper discusses neuro-computing applications in security of network information systems.展开更多
The evolution in communication techniques has created wide threats for crucial information transfer through a communication channel. Covert communication with steganography is a skill of concealing secret information ...The evolution in communication techniques has created wide threats for crucial information transfer through a communication channel. Covert communication with steganography is a skill of concealing secret information within cover object and hence shields the data theft over rapidly growing network.Recently, diverse steganography techniques using edge identification have been proposed in literature.Numerous methods however utilize certain pixels in the cover image for inserting edge information,resulting in significant deformation. The conventional edge detection method limits the deployment of edge detection in steganography as concealing the information would introduce some variations to the cover image. Hence inserting data in pixel areas recognized by existing conventional edge detection techniques like canny cannot ensure the recognition of the exact edge locations for the cover and stego images. In this paper, an Adaptive steganography method based on novel fuzzy edge identification is proposed. The method proposed is proficient of estimating the precise edge areas of a cover image and also ensures the exact edge location after embedding the secret message. Experimental results reveal that the technique has attained good imperceptibility compared to the Hayat AI-Dmour and Ahmed AIAni Edge XOR method in spatial domain.展开更多
信息安全风险评估是一项非常重要的信息安全保障活动.依据信息安全相关标准,可从资产、威胁和脆弱性3方面识别出重要的风险因素,并确定相应的信息安全风险评估指标.参考等保2.0确定风险评估指标是一种可行的方法.在进行信息安全风险评估...信息安全风险评估是一项非常重要的信息安全保障活动.依据信息安全相关标准,可从资产、威胁和脆弱性3方面识别出重要的风险因素,并确定相应的信息安全风险评估指标.参考等保2.0确定风险评估指标是一种可行的方法.在进行信息安全风险评估时,采用熵权法进行客观的指标赋权,并结合优劣解距离法(technique for order preference by similarity to ideal solution,TOPSIS)和灰色关联分析(grey relational analysis,GRA)进行综合评估.实例分析表明,依据信息熵进行客观赋权相对减少了主观因素的影响;基于TOPSIS和GRA进行信息安全风险评估,综合被评价对象整体因素和内部因素,较有效地将多项信息安全风险评估指标综合成单一评分,便于对多个被评对象进行信息安全风险的择优与排序.展开更多
随着信息化与工业化的融合不断加深,工业控制系统中信息域与物理域交叉部分越来越多,传统信息系统的网络攻击会威胁工业控制系统网络。传统的工业控制系统安全评估方法只考虑功能安全的风险,而忽略了信息安全风险对功能安全的影响。文...随着信息化与工业化的融合不断加深,工业控制系统中信息域与物理域交叉部分越来越多,传统信息系统的网络攻击会威胁工业控制系统网络。传统的工业控制系统安全评估方法只考虑功能安全的风险,而忽略了信息安全风险对功能安全的影响。文中提出一种基于改进petri网的工业控制系统功能安全和信息安全一体化风险建模方法(Safety and Security Petri Net Risk Assessment,SSPN-RA),其中包括一体化风险识别、一体化风险分析、一体化风险评估3个步骤。所提方法首先识别并抽象化工业控制系统中的功能安全与信息安全数据,然后在风险分析过程中通过构造结合Kill Chain的petri网模型,分析出功能安全与信息安全中所存在的协同攻击路径,对petri网中功能安全与信息安全节点进行量化。同时,通过安全事件可能性以及其造成的各类损失计算出风险值,实现对工业控制系统的一体化风险评估。在开源的仿真化工工业控制系统下验证该方法的可行性,并与功能安全故障树分析和信息安全攻击树分析进行对比。实验结果表明,所提方法能够定量地得到工业控制系统的风险值,同时也解决了功能安全与信息安全单一领域分析无法识别的信息物理协同攻击和安全风险问题。展开更多
为了提高无线携能通信(Simultaneous Wireless nformation and Power Transfer,SWIPT)通信系统的安全性,同时克服系统收发机硬件损伤(Hardware Impairments,HIs)的影响,提出一种硬件损伤下的智能反射面(Intelligent Reflecting Surface,...为了提高无线携能通信(Simultaneous Wireless nformation and Power Transfer,SWIPT)通信系统的安全性,同时克服系统收发机硬件损伤(Hardware Impairments,HIs)的影响,提出一种硬件损伤下的智能反射面(Intelligent Reflecting Surface,IRS)辅助的SWIPT系统安全波束成形设计方法.考虑能量接收设备为潜在的窃听者,在基站最大发射功率、最小接收能量和IRS相移约束下,通过联合优化基站波束赋形矢量、人工噪声矢量和IRS的相移矩阵,构建系统安全速率最大化问题.针对该优化问题是非凸的,且优化变量是耦合的,提出一种基于交替优化和半正定松弛的有效算法来次优地解决该问题.仿真结果表明,本文所提算法能够在保障能量需求的同时,提升系统的安全性和抗硬件损伤能力.展开更多
为了提高无线通信系统的安全性,基于功率分割型无线携能通信(Power Splitting⁃Simultane⁃ous Wireless Information and Power Transfer,PS⁃SWIPT)模型,提出了一种有源可重构智能表面(Ac⁃tive Reconfigurable Intelligent Surface,ARIS...为了提高无线通信系统的安全性,基于功率分割型无线携能通信(Power Splitting⁃Simultane⁃ous Wireless Information and Power Transfer,PS⁃SWIPT)模型,提出了一种有源可重构智能表面(Ac⁃tive Reconfigurable Intelligent Surface,ARIS)辅助PS⁃SWIPT系统(ARIS⁃PS⁃SWIPT)的安全传输方案。综合考虑ARIS⁃PS⁃SWIPT系统的能量效率和安全性,构造了安全能效最大化问题,通过联合优化基站的波束成形向量、ARIS的反射系数矩阵,以及合法用户的功率分割比值,提升ARIS⁃PS⁃SWIPT系统的安全能效。由于所构建的优化问题为非凸问题,利用交替优化(Alternating Optimiza⁃tion,AO)算法将原问题分解为3个子问题,并进一步通过半正定松弛(Semi⁃Definite Relaxation,SDR)和Dinkelbach方法获得子问题的优化解。仿真结果表明,ARIS⁃PS⁃SWIPT方案在安全能效方面优于PRIS辅助PS⁃SWIPT(PRIS⁃PS⁃SWIPT)方案和放大转发辅助PS⁃SWIPT(AF⁃PS⁃SWIPT)方案,且所提算法相较于遗传算法(Genetic Algorithm,GA),对求解该类问题具备更高的适应性,并且获得了更高的安全能效。展开更多
基金This project was supported by the Foundation of State Key Lab for Software Engineering at Wuhan University.
文摘Currently computing information systems have entered a new stage and the security of systems is more and more serious, and the research on system security is developing in depth. This paper discusses neuro-computing applications in security of network information systems.
文摘The evolution in communication techniques has created wide threats for crucial information transfer through a communication channel. Covert communication with steganography is a skill of concealing secret information within cover object and hence shields the data theft over rapidly growing network.Recently, diverse steganography techniques using edge identification have been proposed in literature.Numerous methods however utilize certain pixels in the cover image for inserting edge information,resulting in significant deformation. The conventional edge detection method limits the deployment of edge detection in steganography as concealing the information would introduce some variations to the cover image. Hence inserting data in pixel areas recognized by existing conventional edge detection techniques like canny cannot ensure the recognition of the exact edge locations for the cover and stego images. In this paper, an Adaptive steganography method based on novel fuzzy edge identification is proposed. The method proposed is proficient of estimating the precise edge areas of a cover image and also ensures the exact edge location after embedding the secret message. Experimental results reveal that the technique has attained good imperceptibility compared to the Hayat AI-Dmour and Ahmed AIAni Edge XOR method in spatial domain.
文摘信息安全风险评估是一项非常重要的信息安全保障活动.依据信息安全相关标准,可从资产、威胁和脆弱性3方面识别出重要的风险因素,并确定相应的信息安全风险评估指标.参考等保2.0确定风险评估指标是一种可行的方法.在进行信息安全风险评估时,采用熵权法进行客观的指标赋权,并结合优劣解距离法(technique for order preference by similarity to ideal solution,TOPSIS)和灰色关联分析(grey relational analysis,GRA)进行综合评估.实例分析表明,依据信息熵进行客观赋权相对减少了主观因素的影响;基于TOPSIS和GRA进行信息安全风险评估,综合被评价对象整体因素和内部因素,较有效地将多项信息安全风险评估指标综合成单一评分,便于对多个被评对象进行信息安全风险的择优与排序.
文摘随着信息化与工业化的融合不断加深,工业控制系统中信息域与物理域交叉部分越来越多,传统信息系统的网络攻击会威胁工业控制系统网络。传统的工业控制系统安全评估方法只考虑功能安全的风险,而忽略了信息安全风险对功能安全的影响。文中提出一种基于改进petri网的工业控制系统功能安全和信息安全一体化风险建模方法(Safety and Security Petri Net Risk Assessment,SSPN-RA),其中包括一体化风险识别、一体化风险分析、一体化风险评估3个步骤。所提方法首先识别并抽象化工业控制系统中的功能安全与信息安全数据,然后在风险分析过程中通过构造结合Kill Chain的petri网模型,分析出功能安全与信息安全中所存在的协同攻击路径,对petri网中功能安全与信息安全节点进行量化。同时,通过安全事件可能性以及其造成的各类损失计算出风险值,实现对工业控制系统的一体化风险评估。在开源的仿真化工工业控制系统下验证该方法的可行性,并与功能安全故障树分析和信息安全攻击树分析进行对比。实验结果表明,所提方法能够定量地得到工业控制系统的风险值,同时也解决了功能安全与信息安全单一领域分析无法识别的信息物理协同攻击和安全风险问题。
文摘为了提高无线携能通信(Simultaneous Wireless nformation and Power Transfer,SWIPT)通信系统的安全性,同时克服系统收发机硬件损伤(Hardware Impairments,HIs)的影响,提出一种硬件损伤下的智能反射面(Intelligent Reflecting Surface,IRS)辅助的SWIPT系统安全波束成形设计方法.考虑能量接收设备为潜在的窃听者,在基站最大发射功率、最小接收能量和IRS相移约束下,通过联合优化基站波束赋形矢量、人工噪声矢量和IRS的相移矩阵,构建系统安全速率最大化问题.针对该优化问题是非凸的,且优化变量是耦合的,提出一种基于交替优化和半正定松弛的有效算法来次优地解决该问题.仿真结果表明,本文所提算法能够在保障能量需求的同时,提升系统的安全性和抗硬件损伤能力.
文摘为了提高无线通信系统的安全性,基于功率分割型无线携能通信(Power Splitting⁃Simultane⁃ous Wireless Information and Power Transfer,PS⁃SWIPT)模型,提出了一种有源可重构智能表面(Ac⁃tive Reconfigurable Intelligent Surface,ARIS)辅助PS⁃SWIPT系统(ARIS⁃PS⁃SWIPT)的安全传输方案。综合考虑ARIS⁃PS⁃SWIPT系统的能量效率和安全性,构造了安全能效最大化问题,通过联合优化基站的波束成形向量、ARIS的反射系数矩阵,以及合法用户的功率分割比值,提升ARIS⁃PS⁃SWIPT系统的安全能效。由于所构建的优化问题为非凸问题,利用交替优化(Alternating Optimiza⁃tion,AO)算法将原问题分解为3个子问题,并进一步通过半正定松弛(Semi⁃Definite Relaxation,SDR)和Dinkelbach方法获得子问题的优化解。仿真结果表明,ARIS⁃PS⁃SWIPT方案在安全能效方面优于PRIS辅助PS⁃SWIPT(PRIS⁃PS⁃SWIPT)方案和放大转发辅助PS⁃SWIPT(AF⁃PS⁃SWIPT)方案,且所提算法相较于遗传算法(Genetic Algorithm,GA),对求解该类问题具备更高的适应性,并且获得了更高的安全能效。