Vol 1, No 1

Table of Contents

Open Access
Articles
Article ID: 407
PDF
by Qinghong Liang, Shangying Cao, Zhengan Qi
2018 , 1(1);    326 Views
Abstract A computer virus is a computer program or instruction set that can interfere with the normal operation of the computer and cause the computer hardware and software to malfunction and destroy the computer data. With the computer in various fields of social life widely used, computer virus attack and prevention technology is also constantly expanding, to prevent computer viruses are also more and more attention. This paper starts from the basic theory of script virus and the key technology of scripting virus, and realizes a simple script virus, and deeply analyzes the mechanism and principle of script virus. This paper summarizes the development history and development trend of computer virus, briefly introduces the basic knowledge of VBScript, Windows Script Host (WSH) and registry required to realize script virus. This paper focuses on the working principle of the script virus and the main techniques used in each module. Taking the source code of the script virus as an example, it analyzes the function of design idea, infection module, damage module and tag module, and implements the script virus Recursive algorithm for searching disk mechanisms and infection mechanisms.
show more
Open Access
Articles
Article ID: 408
PDF
by Jinliang Shen, Shiming Gong, Wencong Bao
2018 , 1(1);    1007 Views
Abstract From the beginning of the new century to the rapid development of global information technology today, with the popularity of the Internet and the rapid construction of information technology, more and more people involved in the use of the Internet. Especially in the past two years, online surfing, e-commerce, online chat, e-government, Internet banking, online shopping transactions, online games, this series of network activities, has become a hot application of today's society. With the increasing reliance on the network and information technology in all aspects of society, the network has become an indispensable part of work and life for most people. The rapid development of the network brings closer the distance between real life and virtual world, changed the way people work, study and live. It can be sure that now the human life becomes more relaxed because of network. However, the network has brought us great convenience, but also brought some difficulties. Due to the design defects of the Internet itself and its complexity, openness and expanding of the software scale, the application is more and more complex, making the hidden danger of the network increased dramatically. Therefore, the security of the network has become one of the important factors hindering the process of information technology. Today, for many users, they know that they are facing a certain network threat. But from where, what will happen, are not very clear for many people. Generally speaking, ordinary network users mainly face Internet security issues. Computer viruses, cyber scams, data loss, botnets, phishing, privacy leaks, are a few example of network security threats. The recent impact of large events, such as: Panda burning incense virus, Trojan industry chain exposure, once macro virus, Trojan horse site-linked malware, makes the network security issues become the focus of attention, even to worldwide audience.
show more
Open Access
Articles
Article ID: 409
PDF
by Qinghua Jiang, Lilin Lin, Yanhong He
2018 , 1(1);    251 Views
Abstract With the rapid development of computer technology and the popularization of the network, human civilization is undergoing profound changes. The network has become an important resource for the political, economic, military and cultural aspects of the country and has become a symbol of national soft power. With the extensive use of computer networks and the increase in data transmission between networks, network security issues are becoming more prominent. Network security is related to national security, social stability, economic development and cultural construction and other fields, has become a hot topic of global concern. If a country cannot guarantee the security of network information in terms of collection, storage, transmission and authentication, it is impossible to obtain the efficiency and efficiency of information technology. The social and economic life is difficult to be carried out in a healthy and orderly manner. When the status of China's network information security is not optimistic. People should correctly deal with the negative impact caused by the process of information technology, take positive measures to protect the security of China's network information.
show more
Open Access
Articles
Article ID: 410
PDF
by Xinyue Yang, Shujun Zhou, Guanghui Ren, Yaling Liu
2018 , 1(1);    845 Views
Abstract In recent years, the Internet as a symbol of the computer network protocols, standards and application technology development is extremely rapid. But the Internet is like a sharp double-edged sword, it is for the convenience of people at the same time, but also for computer viruses and computer crime to provide the soil, for systems, network protocols and databases, whether it is its own design flaws, or due to human factors caused by a variety of security vulnerabilities, may be some of the other attempts to use hackers and attack, so the establishment of an effective network security system is even more urgent. To ensure network security, reliable, you must be familiar with the general process of hacker network attacks. The only way to do before the hacker attack the necessary precautions is to ensure that the network is safe and reliable operation. This article comprehensively analyzes the steps, methods and common attack tools of network attack, and tells the concrete precautionary measures from several aspects, so that readers have a comprehensive network of knowledge, in the treatment of network threats are well prepared.
show more
Open Access
Articles
Article ID: 411
PDF
by Hongjiang Duan, Weilong Huang, Guangxu Zhu
2018 , 1(1);    497 Views
Abstract Data cryptography is the core technology of network and information security. Its basic design idea is to use the carrier form (called cipher text) after the various transformations (called encryption algorithm) to send the message (plaintext) For the storage and transmission, the authorized recipient with the corresponding transformation (known as the decryption algorithm) to restore the plaintext, the illegal interceptors are not visible or understand the plaintext, so as to achieve the purpose of information security.
show more
Open Access
Articles
Article ID: 631
by Francisco D. Guillén-Gámez1, Iván García-Magariño2,3
2018 , 1(1);    327 Views
Abstract I n recent years, new technologies have become the focal point of any operation or digital system. Smartphones are increasingly gaining ground as a technological tool that combines a large number of applications and online services. It is an observable reality, as operations are increasingly being carried out in electronic commerce applications, banking transactions, health applications, and distance education. However, the widespread use of these types of practices means that more risks can present themselves through the internet. Therefore, any organization must take into account changes in virtual security, having to face possible cyber attacks or identity theft. Although smartphones have become a powerful tool in daily lives of most people, it is true that it has brought a series of challenges in the security and privacy of users, where facial authentication seems to be a possible solution to this type of problems. This article reviews the most relevant current existing literature about facial authentication as a biometric system, as well as the systems available on the market, so that organizations can use them with its clients or users.
show more
Open Access
Articles
Article ID: 607
by Ali Sheidaee, Leyli Mohammad Khanli
2018 , 1(1);    235 Views
Abstract Image steganography is a technique of embedding sensitive information in images. In literature, research articles proposed different image steganography schemes on cover images based on different algorithms. Withal, stego images have less quality in HVS and lower performance. Another topic in image steganography is the quality of extracted data in receiver side that can be affected by transmission channel options or even by the attacks on stego images in transmission channel. In this paper discrete cosine transform (DCT) function and Motion Blur (based on Richardson-Lucy algorithm) is used for secret image transformation and secured hash file of the transformed image generated with RSA cryptosystem therewith. The randomness property of the resultant image reduces the possibility of its detection by HVS and steganalysis techniques. Image data embedding applied with LSBMR substitution algorithm into another significant image. Image deconvolution addressed in recent articles that used different methods such as edge extractions, Richardson-Lucy algorithm, Regularized filters and etc. We apply the Richardson-Lucy deconvolution basics in final secret image extraction to remove the noise. Several experiments and comparative studies are further presented to verify the effectiveness of the proposed algorithm in terms of performance, stego image quality and secret images quality maintenance.
show more
Open Access
Articles
Article ID: 444
PDF
by Akram Boukhamla
2018 , 1(1);    182 Views
Abstract Steganography is the science of data concealment, but it can be used by malicious people to use it for destructive purposes. For this reason, the presence of methods detecting Steganography becomes a necessity. The science of detecting Steganography is called steganalysis and evolves with new steganographic techniques. The purpose of this paper is to present a model for detecting the content of JPEG images that have been steganographed. Our work involves applying Multi-Agent Systems (MAS) in image steganalysis where we use ADMs to reduce the complexity of solving a problem by dividing the necessary knowledge into subsets, combining an independent intelligent agent to each of these subsets and coordinating the activity of these agents. We opted for the Java Agent Development Framework (JADE) platform for the development and realization of the inter-operable Multi-Agent System
show more
Open Access
Articles
Article ID: 1025
PDF
by Evgeni Nikolaevich Terentiev1, I. García-Magariño2, N. E. Shilin-Terentyev3, I. N. Prikhodko1, I. I. Farshakova1
2018 , 1(1);    180 Views
Abstract An image in one color is a scalar field. The image is associated with its vector gradient field. The analysis of vector fields with the help of single-length vector templates made it possible to indicate in the image such objects as vortices, Road Signs (RS), Facial Features (FF), and so on. The proposed method of indicating local objects using gradient fields turned out to be highly accurate and noise-proof. The presented advantages of the proposed method recommend it as a promising tool in targets designation problems.
show more