An Effective Method to Safeguard Cyber Security by Preventing Malicious Data
In order to ensure the information security of a network, network security devices have been widely deployed in the information and communication network. Based on the monitoring data collected by network security equipment, network security administrators analyze whether there is an attacking incid...
Main Authors: | , , , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2019-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/8890693/ |
id |
doaj-8ef7332a9f4d4a6a9096c4e1acd60543 |
---|---|
record_format |
Article |
spelling |
doaj-8ef7332a9f4d4a6a9096c4e1acd605432021-03-30T00:38:01ZengIEEEIEEE Access2169-35362019-01-01716628216629110.1109/ACCESS.2019.29512348890693An Effective Method to Safeguard Cyber Security by Preventing Malicious DataGuohua Wang0Shangda Xie1Xun Zhang2Jinggeng Gao3Feng Wei4Bo Zhao5Chunying Wang6Shichao Lv7https://orcid.org/0000-0002-0549-0999School of Automation and Electrical Engineering, Lanzhou Jiaotong University, Lanzhou, ChinaSchool of Automation and Electrical Engineering, Lanzhou Jiaotong University, Lanzhou, ChinaState Grid Gansu Electric Power Research Institute, Lanzhou, ChinaState Grid Gansu Electric Power Research Institute, Lanzhou, ChinaState Grid Gansu Electric Power Research Institute, Lanzhou, ChinaState Grid Gansu Electric Power Company, Lanzhou, ChinaSchool of Software and Microelectronics, Peking University, Beijing, ChinaBeijing Key Laboratory of IoT Information Security Technology, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, ChinaIn order to ensure the information security of a network, network security devices have been widely deployed in the information and communication network. Based on the monitoring data collected by network security equipment, network security administrators analyze whether there is an attacking incident or abnormal situation in the current network environment. However, if the original monitoring data collected by network security equipment is tampered with by the attacker, then network security administrators will make a wrong judgment and delay the best time to take protective actions. Therefore, the reliability and authenticity of data generated by network security devices are of the utmost importance. In this paper, we first define a revised Euclidean distance formula for the D-S evidence theory and propose a dual test method for the authenticity of data based on algebra statistics and geometric trends, detecting any malicious tampering on these monitoring data. Utilizing a web application firewall (WAF) device, we carry out a series of experiments to verify the proposed method.https://ieeexplore.ieee.org/document/8890693/D-S evidence theoryalgebra statisticscross-site scripting attacksgeometric trend matchingcyber attacks |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Guohua Wang Shangda Xie Xun Zhang Jinggeng Gao Feng Wei Bo Zhao Chunying Wang Shichao Lv |
spellingShingle |
Guohua Wang Shangda Xie Xun Zhang Jinggeng Gao Feng Wei Bo Zhao Chunying Wang Shichao Lv An Effective Method to Safeguard Cyber Security by Preventing Malicious Data IEEE Access D-S evidence theory algebra statistics cross-site scripting attacks geometric trend matching cyber attacks |
author_facet |
Guohua Wang Shangda Xie Xun Zhang Jinggeng Gao Feng Wei Bo Zhao Chunying Wang Shichao Lv |
author_sort |
Guohua Wang |
title |
An Effective Method to Safeguard Cyber Security by Preventing Malicious Data |
title_short |
An Effective Method to Safeguard Cyber Security by Preventing Malicious Data |
title_full |
An Effective Method to Safeguard Cyber Security by Preventing Malicious Data |
title_fullStr |
An Effective Method to Safeguard Cyber Security by Preventing Malicious Data |
title_full_unstemmed |
An Effective Method to Safeguard Cyber Security by Preventing Malicious Data |
title_sort |
effective method to safeguard cyber security by preventing malicious data |
publisher |
IEEE |
series |
IEEE Access |
issn |
2169-3536 |
publishDate |
2019-01-01 |
description |
In order to ensure the information security of a network, network security devices have been widely deployed in the information and communication network. Based on the monitoring data collected by network security equipment, network security administrators analyze whether there is an attacking incident or abnormal situation in the current network environment. However, if the original monitoring data collected by network security equipment is tampered with by the attacker, then network security administrators will make a wrong judgment and delay the best time to take protective actions. Therefore, the reliability and authenticity of data generated by network security devices are of the utmost importance. In this paper, we first define a revised Euclidean distance formula for the D-S evidence theory and propose a dual test method for the authenticity of data based on algebra statistics and geometric trends, detecting any malicious tampering on these monitoring data. Utilizing a web application firewall (WAF) device, we carry out a series of experiments to verify the proposed method. |
topic |
D-S evidence theory algebra statistics cross-site scripting attacks geometric trend matching cyber attacks |
url |
https://ieeexplore.ieee.org/document/8890693/ |
work_keys_str_mv |
AT guohuawang aneffectivemethodtosafeguardcybersecuritybypreventingmaliciousdata AT shangdaxie aneffectivemethodtosafeguardcybersecuritybypreventingmaliciousdata AT xunzhang aneffectivemethodtosafeguardcybersecuritybypreventingmaliciousdata AT jinggenggao aneffectivemethodtosafeguardcybersecuritybypreventingmaliciousdata AT fengwei aneffectivemethodtosafeguardcybersecuritybypreventingmaliciousdata AT bozhao aneffectivemethodtosafeguardcybersecuritybypreventingmaliciousdata AT chunyingwang aneffectivemethodtosafeguardcybersecuritybypreventingmaliciousdata AT shichaolv aneffectivemethodtosafeguardcybersecuritybypreventingmaliciousdata AT guohuawang effectivemethodtosafeguardcybersecuritybypreventingmaliciousdata AT shangdaxie effectivemethodtosafeguardcybersecuritybypreventingmaliciousdata AT xunzhang effectivemethodtosafeguardcybersecuritybypreventingmaliciousdata AT jinggenggao effectivemethodtosafeguardcybersecuritybypreventingmaliciousdata AT fengwei effectivemethodtosafeguardcybersecuritybypreventingmaliciousdata AT bozhao effectivemethodtosafeguardcybersecuritybypreventingmaliciousdata AT chunyingwang effectivemethodtosafeguardcybersecuritybypreventingmaliciousdata AT shichaolv effectivemethodtosafeguardcybersecuritybypreventingmaliciousdata |
_version_ |
1724188038796410880 |