KeySplitWatermark: Zero Watermarking Algorithm for Software Protection Against Cyber-Attacks

被引:101
|
作者
Iwendi, Celestine [1 ]
Jalil, Zunera [2 ]
Javed, Abdul Rehman [3 ]
Reddy, Thippa G. [4 ]
Kaluri, Rajesh [4 ]
Srivastava, Gautam [5 ,6 ]
Jo, Ohyun [7 ]
机构
[1] Cent South Univ Forestry & Technol, Dept Elect BCC, Changsha 410004, Peoples R China
[2] Air Univ, Dept Cyber Secur, Islamabad 44000, Pakistan
[3] Air Univ, Natl Ctr Cyber Secur, Islamabad 44000, Pakistan
[4] VIT, Sch Informat Technol & Engn, Vellore 632014, Tamil Nadu, India
[5] Brandon Univ, Dept Math & Comp Sci, Brandon, MB R7A 6A9, Canada
[6] China Med Univ, Res Ctr Interneural Comp, Taichung 40402, Taiwan
[7] Chungbuk Natl Univ, Coll Elect & Comp Engn, Dept Comp Sci, Cheongju 28644, South Korea
基金
新加坡国家研究基金会;
关键词
Watermarking; Software algorithms; Heuristic algorithms; Malware; Software protection; Cyber-attacks; watermarking; software; algorithm; blind detection; attack models; security;
D O I
10.1109/ACCESS.2020.2988160
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber-attacks are evolving at a disturbing rate. Data breaches, ransomware attacks, crypto-jacking, malware and phishing attacks are now rampant. In this era of cyber warfare, the software industry is also growing with an increasing number of software being used in all domains of life. This evolution has added to the problems of software vendors and users where they have to prevent a wide range of attacks. Existing watermark detection solutions have a low detection rate in the software. In order to address this issue, this paper proposes a novel blind Zero code based Watermark detection approach named <italic>KeySplitWatermark</italic>, for the protection of software against cyber-attacks. The algorithm adds watermark logically into the code utilizing the inherent properties of code and gives a robust solution. The embedding algorithm uses keywords to make segments of the code to produce a key-dependent on the watermark. The extraction algorithms use this key to remove watermark and detect tampering. When tampering increases to a certain user-defined threshold, the original software code is restored making it resilient against attacks. <italic>KeySplitWatermark</italic> is evaluated on tampering attacks on three unique samples with two distinct watermarks. The outcomes show that the proposed approach reports promising results against cyber-attacks that are powerful and viable. We compared the performance of our proposal with state-of-the-art works using two different software codes. Our results depict that <italic>KeySplitWatermark</italic> correctly detects watermarks, resulting in up to 15.95 and 17.43 percent reduction in execution time on given code samples with no increase in program size and independent of watermark size.
引用
收藏
页码:72650 / 72660
页数:11
相关论文
共 50 条
  • [41] Observer-based adaptive ISMC for connected vehicles against cyber-attacks
    Yue, Wei
    Shen, Hongxia
    Guo, Xiangjun
    Wang, Liyuan
    MEASUREMENT & CONTROL, 2023, 56 (3-4): : 638 - 653
  • [42] Economic Information Warfare: Classifying Cyber-Attacks Against Commodity Value Chains
    van Niekerk, Brett
    PROCEEDINGS OF THE 14TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2019), 2019, : 448 - 456
  • [43] The Countermeasure Strategy Based on Big Data against North Korean Cyber-attacks
    Lee, Yong-joon
    Kwon, Hyuk-jin
    Lee, Jae-il
    Shin, Dong-kyoo
    KOREAN JOURNAL OF DEFENSE ANALYSIS, 2018, 30 (03): : 437 - 454
  • [44] Multivariate Gaussian-Based False Data Detection Against Cyber-Attacks
    An, Yu
    Liu, Dong
    IEEE ACCESS, 2019, 7 : 119804 - 119812
  • [45] Software Protection Against Illegal Copy Using Software Watermarking
    Sotelo-Garrido, Mario
    Nakano-Miyatake, Mariko
    Sanchez-Perez, Gabriel
    Cedillo-Hernamdez, Manuel
    Perez-Meana, Hector
    NEW TRENDS IN INTELLIGENT SOFTWARE METHODOLOGIES, TOOLS AND TECHNIQUES, 2017, 297 : 503 - 511
  • [46] Cyber-Attacks Against Voltage Profile In Smart Distribution Grids With Highly-Dispersed PV Generators: Detection and Protection
    Abu Aysheh, Nour Ghalib
    Khattab, Tamer
    Massoud, Ahmed
    2020 IEEE ELECTRIC POWER AND ENERGY CONFERENCE (EPEC), 2020,
  • [47] Resilient Countermeasures Against Cyber-Attacks on Self-Driving Car Architecture
    Qurashi, Junaid M. M.
    Jambi, Kamal
    Alsolami, Fawaz
    Eassa, Fathy E. E.
    Khemakhem, Maher
    Basuhail, Abdullah
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2023, 24 (11) : 11514 - 11543
  • [48] The impact of educational training on improving the vigilance of public officials against cyber-attacks
    Hulaj, Astrit
    Dreshaj, Artan
    ONLINE JOURNAL OF COMMUNICATION AND MEDIA TECHNOLOGIES, 2023, 13 (04):
  • [49] WWWMDs: Cyber-attacks against infrastructure in domestic anti-terror laws
    Hardy, Keiran
    COMPUTER LAW & SECURITY REVIEW, 2011, 27 (02) : 152 - 161
  • [50] Protection of industrial controls against advanced cyber attacks
    Erdrich, Andreas
    Biss, Klaus
    Wiesner, Jens
    ATP MAGAZINE, 2020, (09): : 80 - 85