As a core component of the network,web applications have become one of the preferred targets for attackers because the static configuration of web applications simplifies the exploitation of vulnerabilities by attacke...As a core component of the network,web applications have become one of the preferred targets for attackers because the static configuration of web applications simplifies the exploitation of vulnerabilities by attackers.Although the moving target defense(MTD)has been proposed to increase the attack difficulty for the attackers,there is no solo approach can cope with different attacks;in addition,it is impossible to implement all these approaches simultaneously due to the resource limitation.Thus,the selection of an optimal defense strategy based on MTD has become the focus of research.In general,the confrontation of two players in the security domain is viewed as a stochastic game,and the reward matrices are known to both players.However,in a real security confrontation,this scenario represents an incomplete information game.Each player can only observe the actions performed by the opponent,and the observed actions are not completely accurate.To accurately describe the attacker’s reward function to reach the Nash equilibrium,this work simulated and updated the strategy selection distribution of the attacker by observing and investigating the strategy selection history of the attacker.Next,the possible rewards of the attacker in each confrontation via the observation matrix were corrected.On this basis,the Nash-Q learning algorithm with reward quantification was proposed to select the optimal strategy.Moreover,the performances of the Minimax-Q learning algorithm and Naive-Q learning algorithm were compared and analyzed in the MTD environment.Finally,the experimental results showed that the strategy selection algorithm can enable defenders to select a more reasonable defensive strategy and achieve the maximum possible reward.展开更多
Increment of mobile cloud video motivates mobile users to utilize cloud storage service to address their demands, cloud storage provider always furnish a location-independent platform for managing user's data. Howeve...Increment of mobile cloud video motivates mobile users to utilize cloud storage service to address their demands, cloud storage provider always furnish a location-independent platform for managing user's data. However, mobile users wonder if their cloud video data leakage or dynamic migration to illegal service providers. In this paper, we design a novel provable data possession protocol based on data geographic location attribute, which allows data owner to auditing the integrity of their video data, which put forward an ideal choice for remote data possession checking in the mobile cloud storage. In our proposed scheme, we check out whether the video data dynamic migrate to an unspecified location (such as: overseas) by adding data geographic location attribute tag into provable data possession protocol. Moreover, we make sure the security of our proposed scheme under the Computational Diffic-Hellman assumption. The analysis and experiment results demonstrate that our proposed scheme is provably secure and efficient.展开更多
With the rapid development of the Internet of Things(IoT),there is an increasing need for interac-tion between different networks.In order to improve the level of interconnection,especially the interoper-ability of us...With the rapid development of the Internet of Things(IoT),there is an increasing need for interac-tion between different networks.In order to improve the level of interconnection,especially the interoper-ability of users/devices between different nodes is very important.In the IoT heterogeneous blockchain sce-nario,how to ensure the legitimacy of the chain and how to confirm the identity of cross-chain informa-tion users/devices become the key issues to be solved for blockchain interoperability.In this paper,we pro-pose a secure and trusted interoperability mechanism for IoT based on heterogeneous chains to improve the security of blockchain interoperability.In this mecha-nism,a primary sidechain architecture supporting au-thentication at both ends of the heterogeneous chain is designed.In addition,a distributed gateway archi-tecture is proposed for cross-chain authentication and protocol conversion.The security and performance analysis shows that our scheme is feasible and effec-tive in improving the security of cross-chain opera-tions in IoT.展开更多
A sort of audio watermarking algorithm in discrete cosine transform(DCT)domain can embed secret information through modification of the distinction between positive and negative direct current(DC)coefficients.Such an ...A sort of audio watermarking algorithm in discrete cosine transform(DCT)domain can embed secret information through modification of the distinction between positive and negative direct current(DC)coefficients.Such an algorithm achieves a good balance between robustness and imperceptibility.This paper points out that steganographic methods change statistical characteristics of DC coefficients.It also states that the difference between positive and negative DC coefficients can detect whether an audio has hidden information or not.Experiment results justify that the algorithm accuracy is 79%.展开更多
基金This paper is supported by the National Key R&D Program of China(2017YFB0802703)the National Nature Science Foundation of China(61602052).
文摘As a core component of the network,web applications have become one of the preferred targets for attackers because the static configuration of web applications simplifies the exploitation of vulnerabilities by attackers.Although the moving target defense(MTD)has been proposed to increase the attack difficulty for the attackers,there is no solo approach can cope with different attacks;in addition,it is impossible to implement all these approaches simultaneously due to the resource limitation.Thus,the selection of an optimal defense strategy based on MTD has become the focus of research.In general,the confrontation of two players in the security domain is viewed as a stochastic game,and the reward matrices are known to both players.However,in a real security confrontation,this scenario represents an incomplete information game.Each player can only observe the actions performed by the opponent,and the observed actions are not completely accurate.To accurately describe the attacker’s reward function to reach the Nash equilibrium,this work simulated and updated the strategy selection distribution of the attacker by observing and investigating the strategy selection history of the attacker.Next,the possible rewards of the attacker in each confrontation via the observation matrix were corrected.On this basis,the Nash-Q learning algorithm with reward quantification was proposed to select the optimal strategy.Moreover,the performances of the Minimax-Q learning algorithm and Naive-Q learning algorithm were compared and analyzed in the MTD environment.Finally,the experimental results showed that the strategy selection algorithm can enable defenders to select a more reasonable defensive strategy and achieve the maximum possible reward.
基金supported in part by National High Tech Research and Development Program(863 Program)of China(No.2015 AA016005)
文摘Increment of mobile cloud video motivates mobile users to utilize cloud storage service to address their demands, cloud storage provider always furnish a location-independent platform for managing user's data. However, mobile users wonder if their cloud video data leakage or dynamic migration to illegal service providers. In this paper, we design a novel provable data possession protocol based on data geographic location attribute, which allows data owner to auditing the integrity of their video data, which put forward an ideal choice for remote data possession checking in the mobile cloud storage. In our proposed scheme, we check out whether the video data dynamic migrate to an unspecified location (such as: overseas) by adding data geographic location attribute tag into provable data possession protocol. Moreover, we make sure the security of our proposed scheme under the Computational Diffic-Hellman assumption. The analysis and experiment results demonstrate that our proposed scheme is provably secure and efficient.
基金The research work is supported by the Shandong Provincial Key Research and Development Program(2021CXGC010107).
文摘With the rapid development of the Internet of Things(IoT),there is an increasing need for interac-tion between different networks.In order to improve the level of interconnection,especially the interoper-ability of users/devices between different nodes is very important.In the IoT heterogeneous blockchain sce-nario,how to ensure the legitimacy of the chain and how to confirm the identity of cross-chain informa-tion users/devices become the key issues to be solved for blockchain interoperability.In this paper,we pro-pose a secure and trusted interoperability mechanism for IoT based on heterogeneous chains to improve the security of blockchain interoperability.In this mecha-nism,a primary sidechain architecture supporting au-thentication at both ends of the heterogeneous chain is designed.In addition,a distributed gateway archi-tecture is proposed for cross-chain authentication and protocol conversion.The security and performance analysis shows that our scheme is feasible and effec-tive in improving the security of cross-chain opera-tions in IoT.
基金This work was supported by the National Basic Research Program of China(No.2007CB311203)the National Natural Science Foundation of China(Grant No.60821001)+1 种基金the 111 Project(No.B08004)the Specialized Research Fund for the Doctoral Program of Higher Education of China(No.20070013007).
文摘A sort of audio watermarking algorithm in discrete cosine transform(DCT)domain can embed secret information through modification of the distinction between positive and negative direct current(DC)coefficients.Such an algorithm achieves a good balance between robustness and imperceptibility.This paper points out that steganographic methods change statistical characteristics of DC coefficients.It also states that the difference between positive and negative DC coefficients can detect whether an audio has hidden information or not.Experiment results justify that the algorithm accuracy is 79%.