Journal of Science and Technology on Information security
https://isj.vn/index.php/journal_STIS
<h2 style="color: red !important; font-size: 30px;">About the Journal</h2> <h1><strong><span class="pkp_screen_reader">Edit About the Journal<span style="font-size: 14px;">Information Security Journal publishes a periodical academic, scientific, specialized journal in the field of information security named “Journal of Science and Technology on Information security”. The publication aims to create a forum to discuss scientific and technological issues in the field of information security, to support of researching science and technology in this field, and contribute to connecting research, trainning and applications deployment.</span></span></strong></h1> <div id="sponsors"> <p>The Journal of Science and Technology on Information Security - abbreviated name ISJ, with index ISSN 2615-9570 is a publication of Information Security Journal, Vietnam Government Information Security Commission. This is an academic, scientific, specialized magazine and is also a place to discuss scientific and technological issues in the field of information security, support scientific and technological research in this field, and contribute connecting research, training and application deployment. Helpful for leaders, managers, scientific and technical staff, teachers, students...</p> <p>The Journal of Science and Technology on Information Security has been published since 2015 with 2 issues/year (1 issue in Vietnamese and 1 issue in English). By 2022, the publication has increased the number of publications to 3 issues/year with 2 English issues (published in June and December) and 1 Vietnamese issue (published in September). From 2024, the Journal's installments will be published entirely in English.</p> <p>The Journal of Science and Technology on Information security in the field of Information Security is recognized as high quality according to Decision No. 22/QĐ-HĐGSNN of the State Council for Professorship (<a href="http://hdgsnn.gov.vn/tin-tuc/quyet-dinh-so-25-qd-hdgsnn-phe-duyet-danh-muc-tap-chi-khoa-hoc-duoc-tinh-diem-nam-2024_788/">http://hdgsnn.gov.vn/tin-tuc/quyet-dinh-so-25-qd-hdgsnn-phe-duyet-danh-muc-tap-chi-khoa-hoc-duoc-tinh-diem-nam-2024_788/</a>). According to The State Council for Professorship of Vietnam, the paper are counted 0.75 score by The Council for Professorship in Information Technology and 0.75 score by The Interdisciplinary Council for Professorship in Electrical-Electronics-Automation.</p> <p>The papers published in the Journal are scientific research works, new technologies applications, scientific achievements and new techniques in the field of information security. They have not been published or sent to any magazines or any conference proceedings.</p> <p>The papers are sent to scientists for strict assessment and criticism and to be counted points, according to the process of publishing scientific works of The State Council for Professor Title of Vietnam. The authors whose papers are published will receive royalties according to the provisions of the Journal, along with the issues including their papers and soft copies (PDFs) of other issues if needed. Authors do not have to submit any fees when submitting articles. All cost for the publication process is supported by Journal of Science and Technology on Information security.</p> <p> </p> <p> </p> </div> <h2 style="color: red !important; font-size: 30px;"><strong>Call for scientific papers for</strong><strong> 2025</strong></h2> <div class="content-new" style="font-size: 14px; line-height: 25px;"> <p><img style="width: 207px; float: left; margin-right: 20px; margin-bottom: 50px; margin-top: 10px;" src="https://isj.vn/public/site/images/admin/bia-en.png" alt="" height="289" />Dear professionals!</p> <p>To prepare for publishing the Journal of Science and Technology on Information security 2025 in English and aim to become a prestigious, quality magazine with unique characteristics in the field of information security and safety. The Journal respectfully invites and calls on all domestic and foreign scientists to submit quality articles to the Journal. The release schedule for 3 issues in 2025 is as follows:</p> <p>No. 1.CS(24) 2025 is expected to be published: June 2025</p> <p>No. 2.CS(25) 2025 is expected to be published: September 2025</p> <p>No. 3.CS(26) 2025 is expected to be published: December 2025</p> <p>Authors please submit the manuscript according to the format of the Journal provided at <a href="https://isj.vn/index.php/journal_STIS/information/authors">https://isj.vn/index.php/journal_STIS/information/authors</a>. Article submission rules and guidelines for presenting articles are posted on the website <a href="https://isj.vn/index.php/journal_STIS/about/submissions">https://isj.vn/index.php/journal_STIS/about/submissions</a>. <span class="text">For support, please contact us via email at </span><a class="text-is-email" href="mailto:thukychuyensan@bcy.gov.vn" target="_blank" rel="noopener">thukychuyensan@bcy.gov.vn</a><span class="text"> or reach out to the Administrative Secretary, Hoang Thi Thu Hang (mobile phone at </span><a class="text-is-phone-number">+84 914372016)</a>.</p> <p>Sincerely./.</p> </div>Vietnam Government Information Security Commissionen-USJournal of Science and Technology on Information security2615-9570<p><strong>Proposed Policy for Journals That Offer Open Access</strong></p> <p>Authors who publish with this journal agree to the following terms:</p> <p>1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a <a href="http://creativecommons.org/licenses/by/3.0/" target="_new">Creative Commons Attribution License</a> that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.</p> <p>2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.</p> <p>3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See <a href="http://opcit.eprints.org/oacitation-biblio.html" target="_new">The Effect of Open Access</a>).</p> <p><strong>Proposed Policy for Journals That Offer Delayed Open Access</strong></p> <p>Authors who publish with this journal agree to the following terms:</p> <p>1. Authors retain copyright and grant the journal right of first publication, with the work [SPECIFY PERIOD OF TIME] after publication simultaneously licensed under a <a href="http://creativecommons.org/licenses/by/3.0/" target="_new">Creative Commons Attribution License</a> that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.</p> <p>2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.</p> <p>3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See <a href="http://opcit.eprints.org/oacitation-biblio.html" target="_new">The Effect of Open Access</a>).</p>A Combinational Model-Based APT Attack Detection Approach
https://isj.vn/index.php/journal_STIS/article/view/1078
<p>In the context of a world increasingly reliant on digital technology, Advanced Persistent Threats (APT) pose a significant challenge to global cybersecurity. To address this issue, this paper introduces a novel approach called BiLSTM-Attention-GCN (BiLAG), an advanced model combining Bidirectional Long Short-Term Memory (BiLSTM) networks, Attention mechanisms, and Graph Convolutional Networks (GCN). The goal of BiLAG is to provide an effective and accurate method for detecting APT. BiLSTM is employed to capture temporal features related to event sequences, enabling the detection of anomalies over time. The Attention mechanism focuses on the most critical aspects of the dataset, allowing the model to identify hidden signals that indicate potential attacks. Lastly, GCN is utilized to explore complex relationships among network entities, enhancing APT detection by constructing a detailed and precise relational graph. Experimental results demonstrate that BiLAG achieves an accuracy of 99%, with high recall and significantly reduced false positive rates.</p>Nguyen Thanh TungNguyen Tien TrongNguyen Thi HienNguyen Quang HoanDo Xuan Cho
Copyright (c) 2025 Journal of Science and Technology on Information security
2025-06-302025-06-30303910.54654/isj.v1i24.1078An Efficient Framework for Multi-Class Malware Classification in Cloud Environments
https://isj.vn/index.php/journal_STIS/article/view/1092
<p>Malware classification in cloud<br />environments remains a critical challenge due to the<br />increasing complexity and volume of cyber threats.<br />This paper proposes CMC (Cloud-based Malware<br />Classification), a novel framework that enhances<br />multi-class malware classification efficiency through<br />the integration of feature selection, dimensionality<br />reduction, and imbalanced data handling<br />techniques. The CMC framework aims to improve<br />classification accuracy and computational efficiency<br />by optimizing feature representation and addressing<br />class imbalance, which are common issues in<br />real-world malware datasets. To evaluate its<br />effectiveness, we apply the proposed model to two<br />public benchmark datasets: CMD_2024 and<br />CIC-MalMem-2022. Experimental results<br />demonstrate that CMC outperforms existing<br />approaches in terms of classification accuracy,<br />F1-score, and computational efficiency, proving its<br />potential for real-world deployment in cloud-based<br />security solutions. These findings highlight the<br />importance of intelligent data preprocessing and<br />feature optimization in enhancing malware<br />classification on cloud platforms.</p>Pham Sy NguyenPham Ngoc VanHoang Viet LongPham Duy Trung
Copyright (c) 2025 Journal of Science and Technology on Information security
2025-06-302025-06-30405210.54654/isj.v1i24.1092Federated Trust-Based Authentication for Secure Mobile Cloud Access
https://isj.vn/index.php/journal_STIS/article/view/1113
<p>The proliferation of mobile cloud services significantly increases the complexity and risks associated with user authentication. Traditional password-based authentication methods are vulnerable to credential theft and account takeover attacks. Although centralized Risk-Based Authentication (RBA) methods enhance security by evaluating login attempt risks, they often compromise user privacy by aggregating sensitive authentication data. To overcome these challenges, this paper proposes a federated trust-based authentication framework utilizing federated learning (FL) integrated with an Artificial Neural Network enhanced by Batch Normalization (ANN-BN). Specifically, our framework calculates a trust score for each login attempt based on user behavior patterns and contextual threat indicators. This trust-based approach enables accurate detection of malicious login attempts while preserving user privacy by performing decentralized model training across multiple client devices. Experiments conducted on a real-world login dataset demonstrate that the proposed federated ANN-BN approach achieves high detection accuracy with a low false-alarm rate, effectively balancing security enhancement and privacy preservation. Our results confirm the effectiveness and practicality of federated learning for secure authentication in mobile cloud environments, highlighting its potential for real-world deployment and motivating future research directions.</p>Le Vinh Thinh
Copyright (c) 2025 Journal of Science and Technology on Information security
2025-06-302025-06-308810410.54654/isj.v1i24.1113Secure Implementation of Post-Quantum Cryptography
https://isj.vn/index.php/journal_STIS/article/view/1079
<p><span class="fontstyle0">Post-Quantum Cryptography (PQC) is now required by several institutions and vendors, especially for applications related to low-level security functions (secure boot, firmware management, secure channels establishment, etc.). Not only standardized PQC algorithms must match correctly their specification, but also they must be implemented in accordance with market requirements. Those mostly consist of Performance-Power-Area (PPA) and certification constraints. In turn, the PPA encompasses tradeoffs between speed and implementation size, but also optimal adequation with available resources (vectorization in software, parallelism in hardware, dedicated accelerators in embedded systems, etc.) The certification relates to secure implementation in the context of adversaries trying to gain information on the secrets, exploiting for instance some surreptitious information leakage (secret-dependent timing or power consumption). There is an interplay between PPA and certification aspects that we detail in this paper, for different classes of PQC algorithms. We also give some insights on the order in which PQC algorithms will be rolled-out, dictated by the requirements to implement in hardware some services which cannot be retrofitted later on in software, namely those that are in charge of firmware lifecycle management</span> </p>Ben El Haj Soulami Souhayl Connan YannSylvain GuilleyTakarabt Sofiane
Copyright (c) 2025 Journal of Science and Technology on Information security
2025-06-302025-06-3031110.54654/isj.v1i24.1079A Novel Approach for 1D-CNN Hyperparameter Optimization in IoT Attack Detection using Particle Swarm Optimization
https://isj.vn/index.php/journal_STIS/article/view/1097
<p>This study proposes a hyperparameter optimization method for one-dimensional convolutional neural network using the Particle Swarm Optimization algorithm based on a Pareto multi-objective approach to improve the performance of IoT attack detection systems. Specifically, this study enhances the PSO algorithm by introducing an automatic termination criterion for optimization loops and proposes an early stopping mechanism, along with the optimization of the early stopping patience during the 1D-CNN model training process, thereby reducing computational costs and aligning with the resource-constrained hardware conditions of IoT. Additionally, a multi-objective optimization function is developed to balance detection performance and resource efficiency by combining validation accuracy with the 1D-CNN's execution time. The proposed method is evaluated on the Edge-IIoTset dataset. Experimental results demonstrate that the optimized model reduces execution time by 48-63% compared to the baseline model while maintaining high accuracy (over 94%). This research not only provides a practical solution for IoT security but also pioneers a novel approach to integrating evolutionary algorithms into adaptive deep learning systems and introduces a flexible method for hardware-constrained devices.</p>Le Thi Hong VanNguyen Quang MinhPham Van HuongNguyen Hieu Minh
Copyright (c) 2025 Journal of Science and Technology on Information security
2025-06-302025-06-30537110.54654/isj.v1i24.1097Large-scale Android malware detection by integrating Blockchain and IPFS for secure virus signature distribution
https://isj.vn/index.php/journal_STIS/article/view/1085
<p>The growing threat of Android malware underscores the limitations of centralized antivirus systems, which face challenges such as latency, single points of failure, and susceptibility to attacks. To address these issues, this paper introduces a decentralized framework leveraging blockchain technology via Hyperledger Fabric and the InterPlanetary File System (IPFS). The system, HypatiaX, provides secure, efficient, and transparent virus signature distribution while ensuring scalable and resilient data storage. By utilizing blockchain for virus signature management and IPFS for decentralized storage, HypatiaX supports real-time updates in distributed environment. Performance evaluations reveal low resource consumption, near-instantaneous query responses, and efficient virus scanning under diverse conditions. Advanced components, including a ledger controller, signature crawler, key manager, and IPFS client, further strengthen decentralized storage, secure key management, and automatic signature updates. This framework demonstrates significant improvements in combating Android malware while addressing the inherent flaws of traditional antivirus solutions.</p>Nguyen Tan CamPham Nhat DuyHoang Mai Thien Phuc
Copyright (c) 2025 Journal of Science and Technology on Information security
2025-06-302025-06-30728710.54654/isj.v1i24.1085Enhancing SPN ciphers: Dynamic substitution-key addition layers via binary block circulant matrices
https://isj.vn/index.php/journal_STIS/article/view/1100
<p data-pm-slice="0 0 []">The SPN (Substitution-Permutation Network) block cipher is one of the fundamental and important structures in the field of symmetric encryption, widely used in modern encryption algorithms such as AES. Due to its ability to efficiently diffuse and obscure data, SPN plays a key role in building secure and reliable encryption systems. However, with the development of the SPN block cipher, many studies have been conducted to identify cryptanalytic attack methods to break this cipher. To enhance the security of the SPN block cipher, recent research has focused on dynamic transformations of its components and often relies on the secret component, the key. In this study, we propose a new method that combines the dynamicization of two key components: the substitution layer and the key addition layer of the SPN block cipher. This method is based on using a binary block circular shift matrix, formed by combining a binary circular shift matrix with a binary Hadamard matrix. Our algorithm only requires the use of 26 additional key bits but can generate up to 2<sup>28 </sup>key-dependent S-boxes with strong cryptographic properties and 23<sup>3</sup> key-dependent XOR tables. When applying these key-dependent S-boxes and XOR tables to dynamically modify the AES block cipher, it can increase the security level of the dynamic AES block cipher by 2<sup>33</sup> compared to AES</p>Tran Thi LuongTrương Minh PhuongNguyen Van LongNguyen Nam Khanh
Copyright (c) 2025 Journal of Science and Technology on Information security
2025-06-302025-06-30122910.54654/isj.v1i24.1100