An Effective Method to Safeguard Cyber Security by Preventing Malicious Data

In order to ensure the information security of a network, network security devices have been widely deployed in the information and communication network. Based on the monitoring data collected by network security equipment, network security administrators analyze whether there is an attacking incid...

Full description

Bibliographic Details
Main Authors: Guohua Wang, Shangda Xie, Xun Zhang, Jinggeng Gao, Feng Wei, Bo Zhao, Chunying Wang, Shichao Lv
Format: Article
Language:English
Published: IEEE 2019-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8890693/
id doaj-8ef7332a9f4d4a6a9096c4e1acd60543
record_format Article
spelling doaj-8ef7332a9f4d4a6a9096c4e1acd605432021-03-30T00:38:01ZengIEEEIEEE Access2169-35362019-01-01716628216629110.1109/ACCESS.2019.29512348890693An Effective Method to Safeguard Cyber Security by Preventing Malicious DataGuohua Wang0Shangda Xie1Xun Zhang2Jinggeng Gao3Feng Wei4Bo Zhao5Chunying Wang6Shichao Lv7https://orcid.org/0000-0002-0549-0999School of Automation and Electrical Engineering, Lanzhou Jiaotong University, Lanzhou, ChinaSchool of Automation and Electrical Engineering, Lanzhou Jiaotong University, Lanzhou, ChinaState Grid Gansu Electric Power Research Institute, Lanzhou, ChinaState Grid Gansu Electric Power Research Institute, Lanzhou, ChinaState Grid Gansu Electric Power Research Institute, Lanzhou, ChinaState Grid Gansu Electric Power Company, Lanzhou, ChinaSchool of Software and Microelectronics, Peking University, Beijing, ChinaBeijing Key Laboratory of IoT Information Security Technology, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, ChinaIn order to ensure the information security of a network, network security devices have been widely deployed in the information and communication network. Based on the monitoring data collected by network security equipment, network security administrators analyze whether there is an attacking incident or abnormal situation in the current network environment. However, if the original monitoring data collected by network security equipment is tampered with by the attacker, then network security administrators will make a wrong judgment and delay the best time to take protective actions. Therefore, the reliability and authenticity of data generated by network security devices are of the utmost importance. In this paper, we first define a revised Euclidean distance formula for the D-S evidence theory and propose a dual test method for the authenticity of data based on algebra statistics and geometric trends, detecting any malicious tampering on these monitoring data. Utilizing a web application firewall (WAF) device, we carry out a series of experiments to verify the proposed method.https://ieeexplore.ieee.org/document/8890693/D-S evidence theoryalgebra statisticscross-site scripting attacksgeometric trend matchingcyber attacks
collection DOAJ
language English
format Article
sources DOAJ
author Guohua Wang
Shangda Xie
Xun Zhang
Jinggeng Gao
Feng Wei
Bo Zhao
Chunying Wang
Shichao Lv
spellingShingle Guohua Wang
Shangda Xie
Xun Zhang
Jinggeng Gao
Feng Wei
Bo Zhao
Chunying Wang
Shichao Lv
An Effective Method to Safeguard Cyber Security by Preventing Malicious Data
IEEE Access
D-S evidence theory
algebra statistics
cross-site scripting attacks
geometric trend matching
cyber attacks
author_facet Guohua Wang
Shangda Xie
Xun Zhang
Jinggeng Gao
Feng Wei
Bo Zhao
Chunying Wang
Shichao Lv
author_sort Guohua Wang
title An Effective Method to Safeguard Cyber Security by Preventing Malicious Data
title_short An Effective Method to Safeguard Cyber Security by Preventing Malicious Data
title_full An Effective Method to Safeguard Cyber Security by Preventing Malicious Data
title_fullStr An Effective Method to Safeguard Cyber Security by Preventing Malicious Data
title_full_unstemmed An Effective Method to Safeguard Cyber Security by Preventing Malicious Data
title_sort effective method to safeguard cyber security by preventing malicious data
publisher IEEE
series IEEE Access
issn 2169-3536
publishDate 2019-01-01
description In order to ensure the information security of a network, network security devices have been widely deployed in the information and communication network. Based on the monitoring data collected by network security equipment, network security administrators analyze whether there is an attacking incident or abnormal situation in the current network environment. However, if the original monitoring data collected by network security equipment is tampered with by the attacker, then network security administrators will make a wrong judgment and delay the best time to take protective actions. Therefore, the reliability and authenticity of data generated by network security devices are of the utmost importance. In this paper, we first define a revised Euclidean distance formula for the D-S evidence theory and propose a dual test method for the authenticity of data based on algebra statistics and geometric trends, detecting any malicious tampering on these monitoring data. Utilizing a web application firewall (WAF) device, we carry out a series of experiments to verify the proposed method.
topic D-S evidence theory
algebra statistics
cross-site scripting attacks
geometric trend matching
cyber attacks
url https://ieeexplore.ieee.org/document/8890693/
work_keys_str_mv AT guohuawang aneffectivemethodtosafeguardcybersecuritybypreventingmaliciousdata
AT shangdaxie aneffectivemethodtosafeguardcybersecuritybypreventingmaliciousdata
AT xunzhang aneffectivemethodtosafeguardcybersecuritybypreventingmaliciousdata
AT jinggenggao aneffectivemethodtosafeguardcybersecuritybypreventingmaliciousdata
AT fengwei aneffectivemethodtosafeguardcybersecuritybypreventingmaliciousdata
AT bozhao aneffectivemethodtosafeguardcybersecuritybypreventingmaliciousdata
AT chunyingwang aneffectivemethodtosafeguardcybersecuritybypreventingmaliciousdata
AT shichaolv aneffectivemethodtosafeguardcybersecuritybypreventingmaliciousdata
AT guohuawang effectivemethodtosafeguardcybersecuritybypreventingmaliciousdata
AT shangdaxie effectivemethodtosafeguardcybersecuritybypreventingmaliciousdata
AT xunzhang effectivemethodtosafeguardcybersecuritybypreventingmaliciousdata
AT jinggenggao effectivemethodtosafeguardcybersecuritybypreventingmaliciousdata
AT fengwei effectivemethodtosafeguardcybersecuritybypreventingmaliciousdata
AT bozhao effectivemethodtosafeguardcybersecuritybypreventingmaliciousdata
AT chunyingwang effectivemethodtosafeguardcybersecuritybypreventingmaliciousdata
AT shichaolv effectivemethodtosafeguardcybersecuritybypreventingmaliciousdata
_version_ 1724188038796410880