-
241
Analysis of LoRaWAN security echanism
Published 2019-08-01“…LoRaWAN is one of the most important low power WAN technologies.As LoRaWAN technology is massively applied in various vertical industries,network security becomes more and more important.The security mechanism of LoRaWAN technology was analyzed.In addition,the comparative analysis of similar schemes was carried out.The future research direction of LoRaWAN security mechanism was also pointed out.…”
Get full text
Article -
242
Methods of security situation prediction for industrial internet fused attention mechanism and BSRU
Published 2022-02-01“…The security situation prediction plays an important role in balanced and reliable work for industrial internet.In the face of massive, high-dimensional and time-series data generated in the industrial production process, traditional prediction models are difficult to accurately and efficiently predict the network security situation.Therefore, the methods of security situation prediction for industrial internet fused attention mechanism and bi-directional simple recurrent unit (BSRU) were proposed to meet the real-time and accuracy requirements of industrial production.Each security element was analyzed and processed, so that it could reflect the current network state and facilitate the calculation of the situation value.One-dimensional convolutional network was used to extract the spatial dimension features between each security element and preserve the temporal correlation between features.The BSRU network was used to extract the time dimension features between the data information and reduced the loss of historical information.Meanwhile, with the powerful parallel capability of SRU network, the training time of model was reduced.Attention mechanism was introduced to optimize the correlation weight of BSRU hidden state to highlight strong correlation factors, reduced the influence of weak correlation factors, and realized the prediction of industrial internet security situation combining attention mechanism and BSRU.The comparative experimental results show that the model reduces the training time and training error by 13.1% and 28.5% than the model using bidirectional long short-term memory network and bidirectional gated recurrent unit.Compared with the convolutional and BSRU network fusion model without attention mechanism, the prediction error is reduced by 28.8% despite the training time increased by 2%.The prediction effect under different prediction time is better than other models.Compared with other prediction network models, this model achieves the optimization of time performance and uses the attention mechanism to improve the prediction accuracy of the model under the premise of increasing a small amount of time cost.The proposed model can well fit the trend of network security situation, meanwhile, it has some advantages in multistep prediction.…”
Get full text
Article -
243
5G carrier network data collection and security management evolution ideas
Published 2020-09-01“…Operators collect user data by deploying DPI system at some network node,and combining with the security control system to achieve an operator-level security operation and management system.The new architecture,technologies and services of the 5G network meet the unprecedented demands of connection,but also bring new security risks.The evolution of the data collection scheme of the carrier network was mainly discussed under the background of 5G network,as well as the innovative ideas of content security and network security systems that follow.…”
Get full text
Article -
244
Optimization of Expression Matching for String Matching
Published 2013-01-01“…As the requirement of network security application increases, more and more redundant patterns appear and the patterns' amount of intrusion detection system(IDS)raises. …”
Get full text
Article -
245
Trust, Security, and Privacy in Next-Generation Wireless Sensor Networks
Published 2013-10-01Get full text
Article -
246
Service-oriented security framework for datacenter networks
Published 2018-01-01“…With the large-scale deployment of datacenters in cloud computing,there is an increasing attention to their security issues.However,with the ossify deployment of traditional security devices,it is hard to meet the requirements of dynamical network security situation and copy with new kinds of security threats.Therefore,a service-oriented security framework for datacenter networks was proposed,which was able to compose the virtualized security functions flexibly and update the security policies dynamically based on virtualization technology and software-defined networking.With the implementation of prototype,the feasibility and availability of the proposed security framework was proved,and a solution to promote the flexibility and security of datacenter networks was provided.…”
Get full text
Article -
247
Research of Mobile Internet Core Security Requirement and Protection
Published 2013-11-01“…Based on the development of mobile internet, an overview of the network security problems at current stage was presented, the threats facing mobile internet network were introduced and the relevant ideas and proposals on the security protection were raised.…”
Get full text
Article -
248
Wireless VPN network structure and safety protection in the north and south call center of SGCC
Published 2016-02-01“…Through the research on wireless virtual private network security from the four aspects as the terminal,network,boundary and application,reference for the design and construction of the center wireless virtual private network was provided.…”
Get full text
Article -
249
-
250
Analysis of Network Demand and Research on the Key Technology for Integration of 5G and Wi-Fi
Published 2014-08-01“…In the networking of 5G and Wi-Fi, integration of network application scene and fusion networking technology were introduced to be the inevitable demand, no-sense authentication, network security, green communication were proposed to become the key technical indicators.…”
Get full text
Article -
251
Survey of DDoS defense:challenges and directions
Published 2017-10-01“…The distributed denial of server (DDoS) attack is a major threat to the Internet.Numerous works have been proposed to deal with this problem through attack detection and defense mechanism design.A survey was presented to introduce the DDoS defense technologies,from the traditional strategies,through Cloud-based systems,toward SDN-based mechanisms.According to the characteristics of DDoS attack,the features and drawbacks of these systems were discussed,which could provide new insights for the development of the new generation of network security framework in the future.…”
Get full text
Article -
252
Interaction based on method for spam detection in online social networks
Published 2015-07-01“…In online social networks,advertisements,rumors and malicious links are propagated by spammers arbitrarily.They not only disturb users’usualaccess,but also bring about network security threats and social panics.In an attempt to deal with the spam problems,an information diffusion model was proposed to capture the features of spam propagation.Propagation behaviors are quantitatively analyzed to detect spam messages with a decision tree-based method.The effectiveness of proposed detection model is evaluated with real data from the micro-bloggingnetwork of Sina.The experimental results show that proposed model can effectively detect spams in Sina micro-bloggingnetwork.…”
Get full text
Article -
253
Network layer protocol architecture for many-nets internetworking
Published 2019-10-01“…Based on the analysis of the evolution history of existing network protocol technologies,the innovative guiding principles applicable to the future data network unified protocol system was proposed.By dividing the nature of network functions into the connections between network elements,five areas of protocol innovation such as data plane,control plane,user plane,management control and intrinsic network security were proposed.The implementation and application of the protocol system in many heterogeneous scenario were analyzed.Finally,the rationality of the protocol innovation guidelines was verified by analyzing the protocol innovation process in deterministic network forwarding technology and intrinsic security network technology.…”
Get full text
Article -
254
Situation description and critical technology analysis for industrial connection of intelligent manufacturing
Published 2017-11-01“…With the formally issue of the industrial internet in USA,the industry 4.0 in German and made in China 2025,the integration of the IT,Internet and industrialization has became the trend of intelligent manufacturing.Industrial connection is the basic ability for intelligent manufacturing.Firstly,the technology situation of OT and IT industrial connection was described.And then combined with made in China 2025,the eight demands for industrial internet scenarios and industrial connectivity key technology were analyzed,including data acquisition,IP network,wireless network,identifier resolution and network security,Finally,according to the domestic situation,the future trend of industrial connection was prospected.…”
Get full text
Article -
255
Research on the cultivation of cyber security talents under the perspective of double tops based on Jiangsu province
Published 2021-04-01“…Facing the opportunities and challenges in developing the cultivation of cyber security talents in the new security situation, a questionnaire survey on the undergraduate colleges of Jiangsu province, offering network security related majors, is conducted first.Next, multidimensional analysis and comparative study involve eight aspects, such as the distribution scale, the cultivation level, and the curriculum system.Finally, explorations on four aspects, including guarantees of politics, the teaching staff, society, and funds, lead to effective paths on the cultivation of cyber security talents for Jiangsu province under the environment of double tops.…”
Get full text
Article -
256
Research on Telecommunication System Business Security Architecture
Published 2013-08-01“…The concept of service security was thoroughly analyzed,and the generalized and narrow business security was proposed.The generalized business safety system was divided into five layers,and network security and safety requirements were defined,meanwhile the narrow business security was focused on the security of application layer,which was the concentration of the research.The security of application layer mainly includes two aspects:common vulnerabilities and loopholes in the service logic,which are defined and researched intensively.A security architecture against the security problem of the business-oriented system,and the security architecture taken as a better guideline for the design and implementation of business systems were proposed.…”
Get full text
Article -
257
SIM: a secure IP protocol for MANET
Published 2013-08-01“…According to the core logic of IP Sec, a secure IP protocol was proposed for Mobile Ad Hoc network. Security deal to the packets in and out of the network protocol stack was done by adding a transparent secure layer between trans-port-layer and link-layer. …”
Get full text
Article -
258
Research of Technology Solutions and Operation Countermeasures to Telephone Fraud Prevention and Control
Published 2014-11-01“…According to the root cause analysis, telephone fraud mechanism and behavior characteristics were discussed, network security model and the control system were researched, the recommending of core network number protection ability to ascend was proposed, and a set of early warning and intercept technology system based on big data model of signaling was developed. …”
Get full text
Article -
259
DNS log analysis system based on big data fusion algorithm
Published 2019-05-01“…The existing problems of big data analysis of DNS logs in the current industry were summarized,and a DNS log analysis system based on big data fusion algorithm was designed.The system integrates six information databases,such as record information database,website database,domain name database,IP address database,CNAME domain name database and security information database.It has powerful log analysis performance,comprehensive content analysis,and classification.With high analysis depth and flexible report customization function,it can provide decision-making basis for telecom operators to improve the management efficiency,optimize network security and enhance the network rate.…”
Get full text
Article -
260
Approach for topology partitioning in parallel network simulation
Published 2006-01-01“…To improve the usability and running efficiency of the parallel network simulation,an approach for topology partitioning based on load estimation was realized: first,the relative load values of nodes and links,estimated according to their core levels in the topology map,were treated as their weights;then,the simulation task was partitioned by the graph partitioning tool.Experiments showed that this partitioning method could improve the performance of simulation by 16.4% compared to the partitioning method with no weights.Simulation of worms based on the real topology gathered via network measurement proves that the partitioning method is suitable for real large-scale network topology and can be used to simulate large-scale network security incidents.…”
Get full text
Article