KeySplitWatermark: Zero Watermarking Algorithm for Software Protection Against Cyber-Attacks

被引:101
|
作者
Iwendi, Celestine [1 ]
Jalil, Zunera [2 ]
Javed, Abdul Rehman [3 ]
Reddy, Thippa G. [4 ]
Kaluri, Rajesh [4 ]
Srivastava, Gautam [5 ,6 ]
Jo, Ohyun [7 ]
机构
[1] Cent South Univ Forestry & Technol, Dept Elect BCC, Changsha 410004, Peoples R China
[2] Air Univ, Dept Cyber Secur, Islamabad 44000, Pakistan
[3] Air Univ, Natl Ctr Cyber Secur, Islamabad 44000, Pakistan
[4] VIT, Sch Informat Technol & Engn, Vellore 632014, Tamil Nadu, India
[5] Brandon Univ, Dept Math & Comp Sci, Brandon, MB R7A 6A9, Canada
[6] China Med Univ, Res Ctr Interneural Comp, Taichung 40402, Taiwan
[7] Chungbuk Natl Univ, Coll Elect & Comp Engn, Dept Comp Sci, Cheongju 28644, South Korea
基金
新加坡国家研究基金会;
关键词
Watermarking; Software algorithms; Heuristic algorithms; Malware; Software protection; Cyber-attacks; watermarking; software; algorithm; blind detection; attack models; security;
D O I
10.1109/ACCESS.2020.2988160
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber-attacks are evolving at a disturbing rate. Data breaches, ransomware attacks, crypto-jacking, malware and phishing attacks are now rampant. In this era of cyber warfare, the software industry is also growing with an increasing number of software being used in all domains of life. This evolution has added to the problems of software vendors and users where they have to prevent a wide range of attacks. Existing watermark detection solutions have a low detection rate in the software. In order to address this issue, this paper proposes a novel blind Zero code based Watermark detection approach named <italic>KeySplitWatermark</italic>, for the protection of software against cyber-attacks. The algorithm adds watermark logically into the code utilizing the inherent properties of code and gives a robust solution. The embedding algorithm uses keywords to make segments of the code to produce a key-dependent on the watermark. The extraction algorithms use this key to remove watermark and detect tampering. When tampering increases to a certain user-defined threshold, the original software code is restored making it resilient against attacks. <italic>KeySplitWatermark</italic> is evaluated on tampering attacks on three unique samples with two distinct watermarks. The outcomes show that the proposed approach reports promising results against cyber-attacks that are powerful and viable. We compared the performance of our proposal with state-of-the-art works using two different software codes. Our results depict that <italic>KeySplitWatermark</italic> correctly detects watermarks, resulting in up to 15.95 and 17.43 percent reduction in execution time on given code samples with no increase in program size and independent of watermark size.
引用
收藏
页码:72650 / 72660
页数:11
相关论文
共 50 条
  • [1] Cyber-Attacks Against Transportation Infrastructure
    Gercke, Marco
    TRANSPORTATION SECURITY AGAINST TERRORISM, 2009, 54 : 151 - 161
  • [2] A Switching Multiplicative Watermarking Scheme for Detection of Stealthy Cyber-Attacks
    Ferrari, Riccardo M. G.
    Teixeira, Andre M. H.
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2021, 66 (06) : 2558 - 2573
  • [3] Defending Against Cyber-Attacks on the Internet of Things
    Abdalrahman, Ghazi Abdalla
    Varol, Hacer
    2019 7TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSICS AND SECURITY (ISDFS), 2019,
  • [4] Resilient Distributed Optimization Against Cyber-Attacks
    Gusrialdi, Azwirman
    Qu, Zhihua
    IEEE CONTROL SYSTEMS LETTERS, 2023, 7 : 3956 - 3961
  • [5] Software measure in cyber-attacks on production control system
    Kawanaka, Takaaki
    Matsumaru, Masanobu
    Rokugawa, Shuichi
    COMPUTERS & INDUSTRIAL ENGINEERING, 2014, 76 : 378 - 386
  • [6] A Robust Algorithm against Delay Cyber-Attacks in PTP applicable for the fGn Environment
    Avraham, Yehonatan
    Pinchas, Monika
    PROCEEDINGS OF THE 2024 6TH INTERNATIONAL SYMPOSIUM ON SIGNAL PROCESSING SYSTEMS, SSPS 2024, 2024, : 63 - 68
  • [7] Cyber-Attacks Detection & Protection in Kuwait government sectors
    Al-Enezi, Khalid Abdulkareem
    Al-shaikhli, Imad Fakhri
    Al-kandari, Abdul Rahman
    Aldabbagh, Sufyan Salim Mahmood
    3RD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE APPLICATIONS AND TECHNOLOGIES ACSAT 2014, 2014, : 50 - 55
  • [8] Improved zero text watermarking algorithm against meaning preserving attacks
    Jalil, Z.
    Farooq, M.
    Zafar, H.
    Sabir, M.
    Ashraf, E.
    World Academy of Science, Engineering and Technology, 2010, 46 : 592 - 596
  • [9] INVESTIGATION ON CYBER-ATTACKS AGAINST IN-VEHICLE NETWORK
    Kumar, S. Vishnu
    Mary, G. Aloy Anuja
    Suresh, P.
    Uthirasamy, R.
    2021 7TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENERGY SYSTEMS (ICEES), 2021, : 305 - 311
  • [10] Identifying Vulnerabilities of State Estimators Against Cyber-Attacks
    Gol, Murat
    Abur, Ali
    2013 IEEE GRENOBLE POWERTECH (POWERTECH), 2013,