期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Privacy Enhanced Mobile User Authentication Method Using Motion Sensors
1
作者 Chunlin Xiong zhengqiu weng +4 位作者 Jia Liu Liang Gu Fayez Alqahtani Amr Gafar Pradip Kumar Sharma 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第3期3013-3032,共20页
With the development of hardware devices and the upgrading of smartphones,a large number of users save privacy-related information in mobile devices,mainly smartphones,which puts forward higher demands on the protecti... With the development of hardware devices and the upgrading of smartphones,a large number of users save privacy-related information in mobile devices,mainly smartphones,which puts forward higher demands on the protection of mobile users’privacy information.At present,mobile user authenticationmethods based on humancomputer interaction have been extensively studied due to their advantages of high precision and non-perception,but there are still shortcomings such as low data collection efficiency,untrustworthy participating nodes,and lack of practicability.To this end,this paper proposes a privacy-enhanced mobile user authentication method with motion sensors,which mainly includes:(1)Construct a smart contract-based private chain and federated learning to improve the data collection efficiency of mobile user authentication,reduce the probability of the model being bypassed by attackers,and reduce the overhead of data centralized processing and the risk of privacy leakage;(2)Use certificateless encryption to realize the authentication of the device to ensure the credibility of the client nodes participating in the calculation;(3)Combine Variational Mode Decomposition(VMD)and Long Short-TermMemory(LSTM)to analyze and model the motion sensor data of mobile devices to improve the accuracy of model certification.The experimental results on the real environment dataset of 1513 people show that themethod proposed in this paper can effectively resist poisoning attacks while ensuring the accuracy and efficiency of mobile user authentication. 展开更多
关键词 Mobile authentication blockchain federated learning smart contract certificateless encryption VMD LSTM
下载PDF
TLSmell: Direct Identification on Malicious HTTPs Encryption Traffic withSimple Connection-Specific Indicators 被引量:3
2
作者 zhengqiu weng Timing Chen +3 位作者 Tiantian Zhu Hang Dong Dan Zhou Osama Alfarraj 《Computer Systems Science & Engineering》 SCIE EI 2021年第4期105-119,共15页
Internet traffic encryption is a very common traffic protection method.Most internet traffic is protected by the encryption protocol called transport layersecurity (TLS). Although traffic encryption can ensure the sec... Internet traffic encryption is a very common traffic protection method.Most internet traffic is protected by the encryption protocol called transport layersecurity (TLS). Although traffic encryption can ensure the security of communication, it also enables malware to hide its information and avoid being detected.At present, most of the malicious traffic detection methods are aimed at the unencrypted ones. There are some problems in the detection of encrypted traffic, suchas high false positive rate, difficulty in feature extraction, and insufficient practicability. The accuracy and effectiveness of existing methods need to be improved.In this paper, we present TLSmell, a framework that conducts maliciousencrypted HTTPs traffic detection with simple connection-specific indicators byusing different classifiers based online training. We perform deep packet analysisof encrypted traffic through data pre-processing to extract effective features, andthen the online training algorithm is used for training and prediction. Withoutdecrypting the original traffic, high-precision malicious traffic detection and analysis are realized, which can guarantee user privacy and communication security.At the same time, since there is no need to decrypt the traffic in advance, the effi-ciency of detecting malicious HTTPs traffic will be greatly improved. Combinedwith the traditional detection and analysis methods, malicious HTTPs traffic isscreened, and suspicious traffic is further analyzed by the expert through the context of suspicious behaviors, thereby improving the overall performance of malicious encrypted traffic detection. 展开更多
关键词 Cyber security malware detection TLS feature engineering
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部