Latest Articles

  • Open Access

    Articles

    Article ID: 586

    A simple realization of the computer virus

    by Qinghong Liang, Shangying Cao, Zhengan Qi

    Information and Computer Security, Vol.1, No.1, pp. 1(1); , 2018; 211 Views, 1 PDF Downloads

    A computer virus is a computer program or instruction set that can interfere with the normal operation of the computer and cause the computer hardware and software to malfunction and destroy the computer data. With the computer in various fields of social life widely used, computer virus attack and prevention technology is also constantly expanding, to prevent computer viruses are also more and more attention. This paper starts from the basic theory of script virus and the key technology of scripting virus, and realizes a simple script virus, and deeply analyzes the mechanism and principle of script virus. This paper summarizes the development history and development trend of computer virus, briefly introduces the basic knowledge of VBScript, Windows Script Host (WSH) and registry required to realize script virus. This paper focuses on the working principle of the script virus and the main techniques used in each module. Taking the source code of the script virus as an example, it analyzes the function of design idea, infection module, damage module and tag module, and implements the script virus Recursive algorithm for searching disk mechanisms and infection mechanisms.

  • Open Access

    Articles

    Article ID: 587

    Analysis of Network Security in Daily Life

    by Jinliang Shen, Shiming Gong, Wencong Bao

    Information and Computer Security, Vol.1, No.1, pp. 1(1); , 2018; 243 Views, 0 PDF Downloads

    From the beginning of the new century to the rapid development of global information technology today, with the popularity of the Internet and the rapid construction of information technology, more and more people involved in the use of the Internet. Especially in the past two years, online surfing, e-commerce, online chat, e-government, Internet banking, online shopping transactions, online games, this series of network activities, has become a hot application of today's society. With the increasing reliance on the network and information technology in all aspects of society, the network has become an indispensable part of work and life for most people. The rapid development of the network brings closer the distance between real life and virtual world, changed the way people work, study and live. It can be sure that now the human life becomes more relaxed because of network. However, the network has brought us great convenience, but also brought some difficulties. Due to the design defects of the Internet itself and its complexity, openness and expanding of the software scale, the application is more and more complex, making the hidden danger of the network increased dramatically. Therefore, the security of the network has become one of the important factors hindering the process of information technology. Today, for many users, they know that they are facing a certain network threat. But from where, what will happen, are not very clear for many people. Generally speaking, ordinary network users mainly face Internet security issues. Computer viruses, cyber scams, data loss, botnets, phishing, privacy leaks, are a few example of network security threats. The recent impact of large events, such as: Panda burning incense virus, Trojan industry chain exposure, once macro virus, Trojan horse site-linked malware, makes the network security issues become the focus of attention, even to worldwide audience.

  • Open Access

    Articles

    Article ID: 588

    Analysis on Network Security and Its Countermeasures

    by Qinghua Jiang, Lilin Lin, Yanhong He

    Information and Computer Security, Vol.1, No.1, pp. 1(1); , 2018; 192 Views, 0 PDF Downloads

    With the rapid development of computer technology and the popularization of the network, human civilization is undergoing profound changes. The network has become an important resource for the political, economic, military and cultural aspects of the country and has become a symbol of national soft power. With the extensive use of computer networks and the increase in data transmission between networks, network security issues are becoming more prominent. Network security is related to national security, social stability, economic development and cultural construction and other fields, has become a hot topic of global concern. If a country cannot guarantee the security of network information in terms of collection, storage, transmission and authentication, it is impossible to obtain the efficiency and efficiency of information technology. The social and economic life is difficult to be carried out in a healthy and orderly manner. When the status of China's network information security is not optimistic. People should correctly deal with the negative impact caused by the process of information technology, take positive measures to protect the security of China's network information.

  • Open Access

    Articles

    Article ID: 589

    Computer Network Attack and Defense Technology

    by Xinyue Yang, Shujun Zhou, Guanghui Ren, Yaling Liu

    Information and Computer Security, Vol.1, No.1, pp. 1(1); , 2018; 198 Views, 2 PDF Downloads

    In recent years, the Internet as a symbol of the computer network protocols, standards and application technology development is extremely rapid. But the Internet is like a sharp double-edged sword, it is for the convenience of people at the same time, but also for computer viruses and computer crime to provide the soil, for systems, network protocols and databases, whether it is its own design flaws, or due to human factors caused by a variety of security vulnerabilities, may be some of the other attempts to use hackers and attack, so the establishment of an effective network security system is even more urgent. To ensure network security, reliable, you must be familiar with the general process of hacker network attacks. The only way to do before the hacker attack the necessary precautions is to ensure that the network is safe and reliable operation. This article comprehensively analyzes the steps, methods and common attack tools of network attack, and tells the concrete precautionary measures from several aspects, so that readers have a comprehensive network of knowledge, in the treatment of network threats are well prepared.

  • Open Access

    Articles

    Article ID: 590

    Research on Data Encryption Technology

    by Hongjiang Duan, Weilong Huang, Guangxu Zhu

    Information and Computer Security, Vol.1, No.1, pp. 1(1); , 2018; 240 Views, 1 PDF Downloads

    Data cryptography is the core technology of network and information security. Its basic design idea is to use the carrier form (called cipher text) after the various transformations (called encryption algorithm) to send the message (plaintext) For the storage and transmission, the authorized recipient with the corresponding transformation (known as the decryption algorithm) to restore the plaintext, the illegal interceptors are not visible or understand the plaintext, so as to achieve the purpose of information security.

  • Open Access

    Articles

    Article ID: 591

    Facial Authentication as A Possible Solution to the Challenges in User’s Security and Privacy in Web Applications

    by Francisco D. Guillén-Gámez1, Iván García-Magariño2,3

    Information and Computer Security, Vol.1, No.1, pp. 1(1); , 2018; 549 Views, 0 PDF Downloads, 0 Facial Authentication as A Possible Solution to the Challenges in User’s Security and Privacy in Web Applications Downloads, 0 Facial Authentication as A Possible Solution to the Challenges in User’s Security and Privacy in Web Applications Downloads

    I n recent years, new technologies have become the focal point of any operation or digital system. Smartphones are increasingly gaining ground as a technological tool that combines a large number of applications and online services. It is an observable reality, as operations are increasingly being carried out in electronic commerce applications, banking transactions, health applications, and distance education. However, the widespread use of these types of practices means that more risks can present themselves through the internet. Therefore, any organization must take into account changes in virtual security, having to face possible cyber attacks or identity theft. Although smartphones have become a powerful tool in daily lives of most people, it is true that it has brought a series of challenges in the security and privacy of users, where facial authentication seems to be a possible solution to this type of problems. This article reviews the most relevant current existing literature about facial authentication as a biometric system, as well as the systems available on the market, so that organizations can use them with its clients or users.

  • Open Access

    Articles

    Article ID: 592

    Hiding image into another meaningful images using Richardson-Lucy algorithm with data authentication

    by Ali Sheidaee, Leyli Mohammad Khanli

    Information and Computer Security, Vol.1, No.1, pp. 1(1); , 2018; 221 Views, 2 PDF Downloads, 0 Hiding Image into Another Meaningful Images Using Richardson-Lucy Algorithm with Data Authentication Downloads

    Image steganography is a technique of embedding sensitive information in images. In literature, research articles proposed different image steganography schemes on cover images based on different algorithms. Withal, stego images have less quality in HVS and lower performance. Another topic in image steganography is the quality of extracted data in receiver side that can be affected by transmission channel options or even by the attacks on stego images in transmission channel. In this paper discrete cosine transform (DCT) function and Motion Blur (based on Richardson-Lucy algorithm) is used for secret image transformation and secured hash file of the transformed image generated with RSA cryptosystem therewith. The randomness property of the resultant image reduces the possibility of its detection by HVS and steganalysis techniques. Image data embedding applied with LSBMR substitution algorithm into another significant image. Image deconvolution addressed in recent articles that used different methods such as edge extractions, Richardson-Lucy algorithm, Regularized filters and etc. We apply the Richardson-Lucy deconvolution basics in final secret image extraction to remove the noise. Several experiments and comparative studies are further presented to verify the effectiveness of the proposed algorithm in terms of performance, stego image quality and secret images quality maintenance.

  • Open Access

    Articles

    Article ID: 593

    Multi-Agent System for an Image Steganalysis

    by Akram Boukhamla

    Information and Computer Security, Vol.1, No.1, pp. 1(1); , 2018; 194 Views, 0 PDF Downloads, 0 Multi-Agent System for an Image Steganalysis Downloads

    Steganography is the science of data concealment, but it can be used by malicious people to use it for destructive purposes. For this reason, the presence of methods detecting Steganography becomes a necessity. The science of detecting Steganography is called steganalysis and evolves with new steganographic techniques. The purpose of this paper is to present a model for detecting the content of JPEG images that have been steganographed. Our work involves applying Multi-Agent Systems (MAS) in image steganalysis where we use ADMs to reduce the complexity of solving a problem by dividing the necessary knowledge into subsets, combining an independent intelligent agent to each of these subsets and coordinating the activity of these agents. We opted for the Java Agent Development Framework (JADE) platform for the development and realization of the inter-operable Multi-Agent System

  • Open Access

    Articles

    Article ID: 594

    The method of false vortices in designation problems of targets, road signs, facial features and real vortices in space images

    by Evgeni Nikolaevich Terentiev1, I. García-Magariño2, N. E. Shilin-Terentyev3, I. N. Prikhodko1, I. I. Farshakova1

    Information and Computer Security, Vol.1, No.1, pp. 1(1); , 2018; 181 Views, 0 PDF Downloads, 0 The method of false vortices in designation problems of targets, road signs, facial features and real vortices in space images Downloads

    An image in one color is a scalar field. The image is associated with its vector gradient field. The analysis of vector fields with the help of single-length vector templates made it possible to indicate in the image such objects as vortices, Road Signs (RS), Facial Features (FF), and so on. The proposed method of indicating local objects using gradient fields turned out to be highly accurate and noise-proof. The presented advantages of the proposed method recommend it as a promising tool in targets designation problems.

View All Issues

Announcements

Call for Papers for the Special Issue: Information and Computer Security

2019-06-06

The smart home ecosystem is still in its infancy and we can say that it is not really here yet and more is yet to be realized. The developing of speech recognition, face recognition, 5G as well as other computing infrastructure from various vendors is creating a new wave of issues and concerns. There is a growing concern in terms of security and privacy issues which hinders the adaptation of smart connected home ecosystem. This can also be argued that the issue of privacy is only a small issue and as soon as users are able to realize that they can do more and do things easier with the connected and seamless integration of devices and service, they will ignore the security and privacy concerns. Another issue to be considered is the issue of getting the wrong advice or information in particular in reference to health issues.

The Lead Guest Editor

Abdullahi Arabo

Read more about Call for Papers for the Special Issue: Information and Computer Security

Advances ensuring Data Integrity in ambient intelligence

2019-03-27

Data integrity is the maintenance and assurance of data accuracy and consistency and is a critical aspect of designing, implementing and using any system storing processing or retrieving data. Furthermore, ambient intelligence refers to electronic environments that are sensitive and responsive to the presence of people. 

The Lead Guest Editor

Dr. Christos Troussa

Read more about Advances ensuring Data Integrity in ambient intelligence