Cyberattacks

网络攻击
  • 文章类型: Journal Article
    机器学习(ML)代表了当前数字时代的主要支柱之一,特别是在现代现实世界的应用。物联网(IoT)技术是开发先进智能系统的基础。ML和物联网的融合推动了各个领域的重大进步,例如使基于物联网的安全系统更智能,更高效。然而,基于ML的物联网系统在训练和测试阶段容易受到潜伏攻击。对抗性攻击旨在通过引入扰动的输入来破坏ML模型的功能。因此,它可能构成导致设备故障的重大风险,服务中断,和个人数据滥用。本文研究了对抗性攻击的严重性,并强调了在物联网环境中设计安全和强大的ML模型的重要性。提供了对抗性机器学习(AML)的综合分类。此外,提出了对AML和基于物联网的安全系统交集的最新研究趋势(从2020年到2024年)的系统文献综述。结果显示了各种AML攻击技术的可用性,其中使用最多的是快速梯度符号法(FGSM)。一些研究建议使用对抗训练技术来防御此类攻击。最后,强调了潜在的开放问题和主要研究方向,以供将来考虑和加强。
    Machine learning (ML) represents one of the main pillars of the current digital era, specifically in modern real-world applications. The Internet of Things (IoT) technology is foundational in developing advanced intelligent systems. The convergence of ML and IoT drives significant advancements across various domains, such as making IoT-based security systems smarter and more efficient. However, ML-based IoT systems are vulnerable to lurking attacks during the training and testing phases. An adversarial attack aims to corrupt the ML model\'s functionality by introducing perturbed inputs. Consequently, it can pose significant risks leading to devices\' malfunction, services\' interruption, and personal data misuse. This article examines the severity of adversarial attacks and accentuates the importance of designing secure and robust ML models in the IoT context. A comprehensive classification of adversarial machine learning (AML) is provided. Moreover, a systematic literature review of the latest research trends (from 2020 to 2024) of the intersection of AML and IoT-based security systems is presented. The results revealed the availability of various AML attack techniques, where the Fast Gradient Signed Method (FGSM) is the most employed. Several studies recommend the adversarial training technique to defend against such attacks. Finally, potential open issues and main research directions are highlighted for future consideration and enhancement.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

       PDF(Pubmed)

  • 文章类型: Journal Article
    虽然新冠肺炎疫情的第二波让世界步履蹒跚,过去几个月也导致了新一轮的网络犯罪。以下文章分析了与大流行相关的网络犯罪的背景和表现,并展示了我们的刑法系统如何能够应对冠状病毒时代的当前挑战。
    While the second wave of the Covid-19 pandemic is keeping the world on tenterhooks, the last few months have also led to a new wave of cybercrime. The following article analyzes the background and manifestations of pandemic-related cybercrimes and shows how our criminal law systems are able to deal with current challenges in the age of the coronavirus.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

       PDF(Pubmed)

  • 文章类型: Review
    网络层的信息流与车辆层的物理主体之间的高级集成和交互使联网的自动车辆(CAV)能够实现快速,合作和共享旅行。然而,网络层受到恶意攻击和通信资源短缺的挑战,这使得车辆层受到系统非线性的影响,扰动随机性和行为不确定性,从而干扰了排的稳定运行。到目前为止,学者通常采用假设或改进跟车模型的方法来探索网络攻击中的排行行为和防御机制,但是他们没有考虑模型本身是否对网络攻击防御有干扰和影响。换句话说,目前仍在确定所设计的跟随车模型是否可以完全适用于此类网络攻击。为车辆层建模提供理论依据,有必要理解不同的跟车车型在各种网络攻击中的自我抵抗力。首先,我们回顾了网络攻击中车辆层采用的跟随车模型,涉及交通工程,物理统计,和排动态。根据审查,我们将网络层面临的恶意攻击分为显性攻击和隐性攻击。第二,我们建立了一个合作广义力模型(CGFM),它组合和统一了遵循通信拓扑的r-preaders。提出的模型,标记为脆弱的协作智能驱动程序模型(VCIDM),脆弱合作最优速度模型(VCOVM),和脆弱合作排动力学模型(VCPDM),结合CGFM模型和各种网络攻击注入模式来解释网络攻击对排自我抵抗能力的影响。根据描述的模型,我们从基本交通要素的三个维度提供六个指标,包括司机,车辆,和环境。这些指标说明了驾驶员的容忍度,车辆适应性,当一个排面临诸如虚假信息之类的攻击时,重播/延迟,通信中断。我们对跟车模型和网络攻击注入模式进行了整理和重组,完成了对车队自我抵抗能力的研究,这对于增强车载层的内生安全和提高网络层的入侵容忍度具有积极的研究价值和现实意义。
    The high-level integration and interaction between the information flow at the cyber layer and the physical subjects at the vehicular layer enables the connected automated vehicles (CAVs) to achieve rapid, cooperative and shared travel. However, the cyber layer is challenged by malicious attacks and the shortage of communication resources, which makes the vehicular layer suffer from system nonlinearity, disturbance randomness and behavior uncertainty, thus interfering with the stable operation of the platoon. So far, scholars usually adopt the method of assuming or improving the car-following model to explore the platoon behavior and the defense mechanism in cyberattacks, but they have not considered whether the model itself has disturbance and impact on cyberattack defenses. In other words, it is still being determined whether the car-following model designed can be fully applicable to such cyberattacks. To provide a theoretical basis for vehicular layer modeling, it is necessary to comprehend the self-resistance of different car-following models faced on various cyberattacks. First, we review the car-following models adopted on the vehicular layer in cyberattacks, involving traffic engineering, physical statistics, and platoon dynamics. Based on the review, we divide the malicious attacks faced by the cyber layer into explicit attacks and implicit attacks. Second, we develop a cooperative generalized force model (CGFM), which combines and unifies the r-predecessors following communication topology. The proposed models, labeled the vulnerable cooperative intelligent driver model (VCIDM), the vulnerable cooperative optimal velocity model (VCOVM), and the vulnerable cooperative platoon dynamics model (VCPDM), incorporate the CGFM model and assorted cyberattack injection modes to explain the cyberattack effects on the platoon self-resistance capability. Upon the described models, we provide six indicators in three dimensions from the basic traffic element, including drivers, vehicles, and environment. These indicators illustrate driver tolerance, vehicle adaptability, and environmental resistance when a platoon faces attacks such as bogus information, replay/delay, and communication interruption. We arrange and reorganize the car-following models and the cyberattack injection modes to complete the research on the self-resistance capability of the platoon, which has positive research value and practical significance for enhancing the endogenous security at the vehicular layer and improving the intrusion tolerability at the cyber layer.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

    求助全文

  • 文章类型: Journal Article
    网络恐怖主义行为涉及利用互联网和其他形式的信息和通信技术威胁或造成身体伤害,以通过威胁或恐吓获得政治或意识形态权力。数据盗窃,数据操作,基本服务的中断都是网络攻击的形式。随着数字基础设施变得越来越重要,恶意行为者的进入壁垒减少,网络恐怖主义已成为一个日益关注的问题。检测,回应,预防这种犯罪给执法和政府带来了独特的挑战,这需要多方面的方法。网络恐怖主义可能对广泛的个人和组织产生毁灭性影响。一个国家的声誉和稳定会受到损害,可能会发生财务损失,在某些情况下,甚至生命也会失去。由于网络攻击,关键基础设施,比如电网,医院,和运输系统,也可能被打乱,导致广泛的中断和痛苦。在过去的十年中,全球发生了几次网络攻击,包括WannaCry攻击(2017年)。雅虎数据泄露(2013-2014),OPM数据泄露(2015年),SolarWinds供应链攻击(2020)等。这项研究涵盖了过去十年中发生的一些网络恐怖主义事件,他们的目标国家,他们的毁灭性影响,它们对国家经济的影响,政治不稳定,以及随着时间的推移采取的应对措施。我们基于调查的网络恐怖主义研究将通过提供有价值的经验数据来补充现有文献,理解感知和意识,以及对目标人群的见解。它可以有助于开发更好的测量工具,战略,以及打击网络恐怖主义的政策。
    An act of cyberterrorism involves using the internet and other forms of information and communication technology to threaten or cause bodily harm to gain political or ideological power through threat or intimidation. Data theft, data manipulation, and disruption of essential services are all forms of cyberattacks. As digital infrastructure becomes more critical and entry barriers for malicious actors decrease, cyberterrorism has become a growing concern. Detecting, responding, and preventing this crime presents unique challenges for law enforcement and governments, which require a multifaceted approach. Cyberterrorism can have devastating effects on a wide range of people and organizations. A country\'s reputation and stability can be damaged, financial losses can occur, and in some cases, even lives can be lost. As a result of cyberattacks, critical infrastructure, such as power grids, hospitals, and transportation systems, can also be disrupted, leading to widespread disruptions and distress. The past ten years have seen several cyber-attacks around the globe including WannaCry attack (2017), Yahoo data breaches (2013-2014), OPM data breach (2015), SolarWinds supply chain attack (2020) etc. This study covers some of the cyberterrorism events that have happened in the past ten years, their target countries, their devastating effects, their impacts on nation\'s economy, political instability, and measures adopted to counter them over the passage of time. Our survey-based research on cyberterrorism will complement existing literature by providing valuable empirical data, understanding of perceptions and awareness, and insights into targeted populations. It can contribute to the development of better measurement tools, strategies, and policies for countering cyberterrorism.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

       PDF(Pubmed)

  • 文章类型: Journal Article
    物联网(IoT)是一项众所周知的技术,对许多领域都有重大影响,包括连接,工作,healthcare,和经济。物联网有可能在各种环境中改善生活,从智慧城市到教室,通过自动化任务,增加产量,减少焦虑。网络攻击和威胁,另一方面,对智能物联网应用有重大影响。由于新的危险和漏洞,许多保护物联网的传统技术现在无效。为了保持他们的安全程序,未来的物联网系统将需要AI高效的机器学习和深度学习。人工智能的能力,特别是机器和深度学习解决方案,如果下一代物联网系统要具有不断变化和最新的安全系统,则必须使用。本文从各个角度对物联网安全智能进行了研究。保护物联网设备免受各种网络攻击的创新方法是使用机器学习和深度学习从原始数据中获取信息。最后,我们讨论相关的研究问题和潜在的下一步考虑我们的发现。本文研究了如何使用机器学习和深度学习来检测非结构化数据中的攻击模式并保护物联网设备。我们讨论研究人员面临的挑战,以及该研究领域的潜在未来方向,考虑到这些发现。任何对物联网或网络安全感兴趣的人都可以使用本网站的内容作为技术资源和参考。
    The Internet of Things (IoT) is a well-known technology that has a significant impact on many areas, including connections, work, healthcare, and the economy. IoT has the potential to improve life in a variety of contexts, from smart cities to classrooms, by automating tasks, increasing output, and decreasing anxiety. Cyberattacks and threats, on the other hand, have a significant impact on intelligent IoT applications. Many traditional techniques for protecting the IoT are now ineffective due to new dangers and vulnerabilities. To keep their security procedures, IoT systems of the future will need AI-efficient machine learning and deep learning. The capabilities of artificial intelligence, particularly machine and deep learning solutions, must be used if the next-generation IoT system is to have a continuously changing and up-to-date security system. IoT security intelligence is examined in this paper from every angle available. An innovative method for protecting IoT devices against a variety of cyberattacks is to use machine learning and deep learning to gain information from raw data. Finally, we discuss relevant research issues and potential next steps considering our findings. This article examines how machine learning and deep learning can be used to detect attack patterns in unstructured data and safeguard IoT devices. We discuss the challenges that researchers face, as well as potential future directions for this research area, considering these findings. Anyone with an interest in the IoT or cybersecurity can use this website\'s content as a technical resource and reference.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

       PDF(Pubmed)

  • 文章类型: Journal Article
    iBeacon系统已经越来越多地建立在公共区域,以帮助用户进行室内定位和定位。人们通过安装在他们的移动电话上的蓝牙低功耗(BLE)接收服务。然而,当面临黑客发出的网络攻击时,iBeacon系统的定位和导航功能可能会受到损害。换句话说,其安全性需要进一步考虑和加强。本研究采用台北车站的iBeacon系统,每天至少有三十万乘客的主要交通枢纽,作为探索其潜在攻击和进一步研究防御技术的例子,在人工智能技术和人类参与的帮助下。我们的实验表明,在iBeacon系统信息安全规划的早期阶段,应包括信息安全技术和滚动编码加密,代表了目前最好的防御方法。此外,我们认为采用滚动编码是最具成本效益的防御措施。然而,如果涉及关键基础设施的安全,应该采用最安全的防御方法,即一种可预测和加密的滚动编码方法。
    iBeacon systems have been increasingly established in public areas to assist users in terms of indoor location navigation and positioning. People receive the services through the Bluetooth Low Energy (BLE) installed on their mobile phones. However, the positioning and navigation functions of an iBeacon system may be compromised when faced with cyberattacks issued by hackers. In other words, its security needs to be further considered and enhanced. This study took the iBeacon system of Taipei Main Station, the major transportation hub with daily traffic of at least three hundred thousand passengers, as an example for exploring its potential attacks and further studying the defense technologies, with the assistance of AI techniques and human participation. Our experiments demonstrate that in the early stage of iBeacon system information security planning, information security technology and a rolling coding encryption should be included, representing the best defense methods at present. In addition, we believe that the adoption of rolling coding is the most cost-effective defense. However, if the security of critical infrastructure is involved, the most secure defense method should be adopted, namely a predictable and encrypted rolling coding method.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

    求助全文

  • 文章类型: Journal Article
    本研究主要集中在动态恶意软件检测方面。恶意软件不断变化,导致在本研究中使用动态恶意软件检测技术。每天都有新的恶意软件程序涌入,这些程序利用互联网中的漏洞对在线安全构成威胁。有害软件的激增使恶意软件分析的手动启发式检查变得无效。因此,使用机器学习算法的基于行为的自动恶意软件检测被认为是改变游戏规则的创新。威胁是根据他们在模拟环境中的行为自动评估的,并创建报告。这些记录被转换为稀疏向量模型,用于进一步的机器学习工作。用于综合这项研究结果的分类器包括kNN,DT,射频,AdaBoost,SGD,额外的树和高斯NB分类器。在查看了所有五个分类器的测试和实验数据之后,我们发现RF,SGD,额外的树和高斯NB分类器在测试中都达到了100%的准确度,以及完美的精度(1.00),良好的召回(1.00),和良好的F1得分(1.00)。因此,可以合理地假设,采用基于行为的自主恶意软件分析和机器学习方法的概念验证可以有效且快速地识别恶意软件。
    This research study mainly focused on the dynamic malware detection. Malware progressively changes, leading to the use of dynamic malware detection techniques in this research study. Each day brings a new influx of malicious software programmes that pose a threat to online safety by exploiting vulnerabilities in the Internet. The proliferation of harmful software has rendered manual heuristic examination of malware analysis ineffective. Automatic behaviour-based malware detection using machine learning algorithms is thus considered a game-changing innovation. Threats are automatically evaluated based on their behaviours in a simulated environment, and reports are created. These records are converted into sparse vector models for use in further machine learning efforts. Classifiers used to synthesise the results of this study included kNN, DT, RF, AdaBoost, SGD, extra trees and the Gaussian NB classifier. After reviewing the test and experimental data for all five classifiers, we found that the RF, SGD, extra trees and Gaussian NB Classifier all achieved a 100% accuracy in the test, as well as a perfect precision (1.00), a good recall (1.00), and a good f1-score (1.00). Therefore, it is reasonable to assume that the proof-of-concept employing autonomous behaviour-based malware analysis and machine learning methodologies might identify malware effectively and rapidly.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

    求助全文

  • 文章类型: Journal Article
    网络物理系统(CPS)由计算和通信核心监视和控制。该网络层可以更好地管理受控子系统,但它也给CPS的安全和保护带来了威胁,最近的网络攻击证明了这一点。由此产生的对网络安全的治理和政策强调在学术界得到了大量文献的反映。在这篇文章中,我们将现有的CPS分析知识系统化。具体来说,我们专注于对中断发生前后的CPS进行定量评估。通过对文献中采用的模型和方法的系统分析,我们开发了一个由三个步骤组成的CPS弹性评估框架,即,(1)CPS说明,(2)中断情景识别,(3)韧性策略选择。对于框架的每个步骤,我们提出了CPS分析的既定方法,并提出了方法选择的四个标准.该框架提出了一个标准化的工作流程来评估CPS在发生中断之前和之后的弹性。参考变电站和相关的通信网络来举例说明所提出的框架的应用。案例研究表明,拟议的框架通过量化实施弹性策略的效果来支持弹性决策。
    Cyber-physical systems (CPSs) are monitored and controlled by a computing and communicating core. This cyber layer enables better management of the controlled subsystem, but it also introduces threats to the security and protection of CPSs, as demonstrated by recent cyberattacks. The resulting governance and policy emphasis on cybersecurity is reflected in the academia by a vast body of literature. In this article, we systematize existing knowledge on CPS analysis. Specifically, we focus on the quantitative assessment of CPSs before and after the occurrence of a disruption. Through the systematic analysis of the models and methods adopted in the literature, we develop a CPS resilience assessment framework consisting of three steps, namely, (1) CPS description, (2) disruption scenario identification, and (3) resilience strategy selection. For each step of the framework, we suggest established methods for CPS analysis and suggest four criteria for method selection. The framework proposes a standardized workflow to assess the resilience of CPSs before and after the occurrence of a disruption. The application of the proposed framework is exemplified with reference to a power substation and associated communication network.The case study shows that the proposed framework supports resilience decision making by quantifying the effects of the implementation of resilience strategies.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

    求助全文

  • 文章类型: Journal Article
    互联和自动化车辆(CAV)在改善道路安全和缓解未来移动系统的交通拥堵方面具有巨大潜力。然而,合作驾驶车辆在相互通信时更容易受到网络攻击,这将给运输系统带来新的威胁。为了保证安全方面,还必须确保CAV的高水平信息质量。据我们所知,这是对混合交通中网络攻击对CAV影响的首次调查(大型车辆,中型车辆,和小型车辆)从车辆动力学的角度来看。本文旨在探讨网络攻击对CAV混合交通流演化的影响,并提出一种具有弹性和鲁棒性的控制策略(RRCS)来减轻网络攻击的威胁。首先,基于智能驱动模型(IDM),提出了一种考虑网络攻击的CAV混合交通跟车模型。此外,通过设置加速控制开关,开发了用于网络攻击的RRCS,并探讨了其对不同网络攻击类型下混合交通流的影响。最后,敏感性分析是在不同的排组成中进行的,车辆分布,和网络攻击强度。结果表明,所提出的网络攻击RRCS具有鲁棒性,能够抵御网络攻击对CAV排的负面威胁,从而为恢复CAV的稳定性和提高安全性提供了理论依据。
    Connected and automated vehicles (CAVs) present significant potential for improving road safety and mitigating traffic congestion for the future mobility system. However, cooperative driving vehicles are more vulnerable to cyberattacks when communicating with each other, which will introduce a new threat to the transportation system. In order to guarantee safety aspects, it is also necessary to ensure a high level of information quality for CAV. To the best of our knowledge, this is the first investigation on the impacts of cyberattacks on CAV in mixed traffic (large vehicles, medium vehicles, and small vehicles) from the perspective of vehicle dynamics. The paper aims to explore the influence of cyberattacks on the evolution of CAV mixed traffic flow and propose a resilient and robust control strategy (RRCS) to alleviate the threat of cyberattacks. First, we propose a CAV mixed traffic car-following model considering cyberattacks based on the Intelligent Driver Model (IDM). Furthermore, a RRCS for cyberattacks is developed by setting the acceleration control switch and its impacts on the mixed traffic flow are explored in different cyberattack types. Finally, sensitivity analyses are conducted in different platoon compositions, vehicle distributions, and cyberattack intensities. The results show that the proposed RRCS of cyberattacks is robust and can resist the negative threats of cyberattacks on the CAV platoon, thereby providing a theoretical basis for restoring the stability and improving the safety of the CAV.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

    求助全文

  • 文章类型: Journal Article
    虽然网络技术有益于我们的社会,还有一些相关的网络安全风险。例如,网络犯罪分子可能会利用人的漏洞,进程,和技术在尝试的时候,例如正在进行的COVID-19大流行,找出针对弱势个体的机会,组织(例如,医疗设施),和系统。在本文中,我们研究了与COVID-19大流行相关的各种网络威胁。我们还确定网络威胁的攻击媒介和表面。最后,我们将讨论和分析针对个人的不同网络攻击产生的见解和建议,组织,和系统。
    Although cyber technologies benefit our society, there are also some related cybersecurity risks. For example, cybercriminals may exploit vulnerabilities in people, processes, and technologies during trying times, such as the ongoing COVID-19 pandemic, to identify opportunities that target vulnerable individuals, organizations (e.g., medical facilities), and systems. In this paper, we examine the various cyberthreats associated with the COVID-19 pandemic. We also determine the attack vectors and surfaces of cyberthreats. Finally, we will discuss and analyze the insights and suggestions generated by different cyberattacks against individuals, organizations, and systems.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

       PDF(Pubmed)

公众号