Showing 201 - 220 results of 414 for search '"network security"', query time: 0.08s Refine Results
  1. 201
  2. 202
  3. 203
  4. 204
  5. 205

    Knowledge graph based ubiquitous power IoT security visualization technology by Yang YU, Shaomin ZHU, Chaoyi BIAN

    Published 2019-11-01
    “…With the construction of the ubiquitous power IoT,the power network transform to interconnection,the data become more interactive and shared,and the business transform to lateral link-up,which pose new challenges to the original network security protection system.Network security visualization technology helps network security personnel quickly identify potential attacks,locate abnormal events,discover new types of attacks,and quickly capture global network security situation by displaying and analyzing the graph patterns.Based on the knowledge graph,the ubiquitous power IoT security analysis was carried out.The internal and external threat intelligence was modeled firstly.Then the relationship between the conceptual entities was constructed.The threat intelligence as knowledge graph was modeled,and then the abstract and complex alarm information which was invisible was converted into a more intuitive and convenient style,which provided accurate support for ubiquitous network security protection decisions in the power IoT.…”
    Get full text
    Article
  6. 206

    Spread and Control of Mobile Benign Worm Based on Two-Stage Repairing Mechanism by Meng Wang, Zhide Chen, Li Xu, Huan Zhan

    Published 2014-01-01
    “…This control mechanism for benign worm propagation is of guiding significance to control the network security.…”
    Get full text
    Article
  7. 207

    A security data detection and management method in digital library network based on deep learning by Diyin Zhu, Yihang Wei, Jiali Cai, Jingwen Wang, Zhongshan Chen

    Published 2025-01-01
    “…With the rapid growth of data volume in digital library and the increasingly complex network environment, traditional network security measures are no longer able to meet their security needs. …”
    Get full text
    Article
  8. 208
  9. 209

    Bifurcation of a Fractional-Order Delayed Malware Propagation Model in Social Networks by Changjin Xu, Maoxin Liao, Peiluan Li

    Published 2019-01-01
    “…In recent years, with the rapid development of the Internet and the Internet of Things, network security is urgently needed. Malware becomes a major threat to network security. …”
    Get full text
    Article
  10. 210
  11. 211
  12. 212

    Bayesian-network-approximate-reasoning-based method for network vulnerabilities evaluation by JIA Wei1, LIAN Yi-feng2, FENG Deng-guo2, CHEN Si-si3

    Published 2008-01-01
    “…To evaluate the large-scale computer networks,a Bayesian-network-approximate-reasoning-based method for vulnerabilities evaluation was proposed.First,it models the elements which compose the network and the factors which affect the network security.Second,it builds the attack state graph(ASG) of the computer network to describe the process of vulnerability exploitation.Then,it makes the approximate reasoning to the ASG by stochastic sampling.At last,after the samples analysis and statistic,it achieves the quantitative evaluation result and will provide the theoretical evidence to improve the network security.…”
    Get full text
    Article
  13. 213

    Security of the industrial Internet of things and localization of the core technology by Guangnan NI

    Published 2018-06-01
    “…With the industrial control system as the breakthrough point,the security problems and national network security strategy of the industrial Internet of things were analyzed in detail,and the importance of the localization of the core technology was expounded.Taking the desktop computer technology,which was one of the core technologies of the industrial Internet of things,as an example,the necessity and favorable conditions for breaking the Wintel system monopoly was expounded,two ways and key technologies to replace the Wintel system were given,and the present status and application results of the security controlled desktop computer technology system in China was analyzed.Finally,suggestions for the future development of China’s network security and information technology were put forward.…”
    Get full text
    Article
  14. 214

    Survey on cyber deception by Zhao-peng JIA, Bin-xing FANG, Chao-ge LIU, Qi-xu LIU, Jian-bao LIN

    Published 2017-12-01
    “…The asymmetric situation of network attacks and defenses is one of the key issues of current network security.Cyber deception was a revolutionary technology introduced by defenders to alter the asymmetric situation.By thwarting an attacker's cognitive processes,defenders can mislead attackers,hence causing them to take specific actions that aid network security defenses.In this way,defenders can log attackers'behavior and method,increase cost for the attackers to launch a successful attack,as well as reduce the probability of an attacker's success.Cyber deception formally and classify cyber deception into four classes was defined.Then,the cyber deceptions’development was divided into three stages,and each stage’s character was decided.Next,a hierarchical model to describe the existing work was proposed.At last,the countermeasures in cyber deception and the development trends in this field was discussed.…”
    Get full text
    Article
  15. 215

    Quantitative threat situational assessment method for higher secure attribute value device by Lei HAN, Jiqiang LIU, Jian WANG, Bo SHI, Xudong HE

    Published 2020-10-01
    “…Traditional network security situational assessment is mainly for the macro network security situation, not for the specific equipment,especially for the key network device.A conception about the higher secure attribute value device was introduced,based on which a threat situational assessment research framework was presented and assessment indexes were discussed.A quantitative threat situational assessment method for higher secure attribute value device was proposed based on assessment research framework and assessment indexes.The experiment resultsshow that the proposed method can assess device threat situation accurately and effectively.Meanwhile,the method is more general and objective than traditional methods.…”
    Get full text
    Article
  16. 216

    6G endogenous security:blockchain technology by Kaijun NIE, Bin CAO, Mugen PENG

    Published 2020-01-01
    “…With the development of mobile communication technology towards marginalization and distributed structure,the traditional network security method of external border protection will be faced with more and more challenges.The emerging network security accidents also show that it is necessary to grow self-adaptive,independent and self-growing security capabilities from the information system,that is,endogenous security.Blockchain,as a de-centralized shared ledger and database,has the characteristics of decentralization,immutability,leaving traces throughout,traceability,collective maintenance,openness and transparency,etc.…”
    Get full text
    Article
  17. 217

    Autonomous security analysis and penetration testing model based on attack graph and deep Q-learning network by Cheng FAN, Guoqing HU, Taojie DING, Zhanhua ZHANG

    Published 2023-12-01
    “…With the continuous development and widespread application of network technology, network security issues have become increasingly prominent.Penetration testing has emerged as an important method for assessing and enhancing network security.However, traditional manual penetration testing methods suffer from inefficiency,human error, and tester skills, leading to high uncertainty and poor evaluation results.To address these challenges, an autonomous security analysis and penetration testing framework called ASAPT was proposed, based on attack graphs and deep Q-learning networks (DQN).The ASAPT framework was consisted of two main components:training data construction and model training.In the training data construction phase, attack graphs were utilized to model the threats in the target network by representing vulnerabilities and possible attacker attack paths as nodes and edges.By integrating the common vulnerability scoring system (CVSS) vulnerability database, a “state-action”transition matrix was constructed, which depicted the attacker’s behavior and transition probabilities in different states.This matrix comprehensively captured the attacker’s capabilities and network security status.To reduce computational complexity, a depth-first search (DFS) algorithm was innovatively applied to simplify the transition matrix, identifying and preserving all attack paths that lead to the final goal for subsequent model training.In the model training phase, a deep reinforcement learning algorithm based on DQN was employed to determine the optimal attack path during penetration testing.The algorithm interacted continuously with the environment, updating the Q-value function to progressively optimize the selection of attack paths.Simulation results demonstrate that ASAPT achieves an accuracy of 84% in identifying the optimal path and exhibits fast convergence speed.Compared to traditional Q-learning, ASAPT demonstrates superior adaptability in dealing with large-scale network environments, which could provide guidance for practical penetration testing.…”
    Get full text
    Article
  18. 218

    Cyber Deception Against Battery Drain DoS Attacks in Wireless Sensor Networks Using Signaling Game by Ines Carole Kombou Sihomnou, Abderrahim Benslimane, Ahmed H. Anwar, Gabriel Deugoue, Charles A. Kamhoua

    Published 2025-01-01
    “…This approach allows us to identify energy-efficient scenarios and improve network security by distorting the attacker’s perception of the target. …”
    Get full text
    Article
  19. 219

    Model of the malicious traffic classification based on hypergraph neural network by Wenbo ZHAO, Zitong MA, Zhe YANG

    Published 2023-10-01
    “…As the use and reliance on networks continue to grow, the prevalence of malicious network traffic poses a significant challenge in the field of network security.Cyber attackers constantly seek new ways to infiltrate systems, steal data, and disrupt network services.To address this ongoing threat, it is crucial to develop more effective intrusion detection systems that can promptly detect and counteract malicious network traffic, thereby minimizing the resulting losses.However, current methods for classifying malicious traffic have limitations, particularly in terms of excessive reliance on data feature selection.To improve the accuracy of malicious traffic classification, a novel malicious traffic classification model based on Hypergraph Neural Networks (HGNN) was proposed.The traffic data was represented as hypergraph structures and HGNN was utilized to capture the spatial features of the traffic.By considering the interrelations among traffic data, HGNN provided a more accurate representation of the characteristics of malicious traffic.Additionally, to handle the temporal features of traffic data, Recurrent Neural Networks (RNN) was introduced to further enhance the model’s classification performance.The extracted spatiotemporal features were then used for the classification of malicious traffic, aiding in the detection of potential threats within the network.Through a series of ablative experiments, the effectiveness of the HGNN+RNN method was verified.These experiments demonstrate the model’s ability to efficiently extract spatiotemporal features from traffic, resulting in improved classification performance for malicious traffic.The model achieved outstanding classification accuracy across three widely-used open-source datasets: NSL-KDD (94% accuracy), UNSW-NB15 (95.6% accuracy), and CIC-IDS-2017 (99.08% accuracy).These results underscore the potential significance of the malicious traffic classification model based on hypergraph neural networks in enhancing network security and its capacity to better address the evolving landscape of network threats within the domain of network security.…”
    Get full text
    Article
  20. 220

    Design and application research on management information system security architecture in digital campus by Xin-zheng LONG, Cheng-jie XING, Rong-bin OUYANG, Qian-yi WANG, Li LI, Yun-feng LIU

    Published 2014-10-01
    “…Aiming at the university management information system security threats and challenges,a security architecture named 1C4GS was proposed.First connotation and function of five important components of 1C4GS was expounded,which named security management center,security communication network,security region boundary,security computing environment and security application.Then we used “basic personal data reporting system” as an example to construct the management information system security arrangement application based on 1C4AS,this arrangement application integrated a variety of security technologies and strategies such as transparent data encryption,user Identify,form edit cache as a whole to,and achieved the management information system’s network security,border security,computing environment security and application security.…”
    Get full text
    Article