Showing 241 - 260 results of 414 for search '"network security"', query time: 0.05s Refine Results
  1. 241

    Analysis of LoRaWAN security echanism by Xiaobo YU, Hongru ZHU, Dapeng LIU, Qing AN

    Published 2019-08-01
    “…LoRaWAN is one of the most important low power WAN technologies.As LoRaWAN technology is massively applied in various vertical industries,network security becomes more and more important.The security mechanism of LoRaWAN technology was analyzed.In addition,the comparative analysis of similar schemes was carried out.The future research direction of LoRaWAN security mechanism was also pointed out.…”
    Get full text
    Article
  2. 242

    Methods of security situation prediction for industrial internet fused attention mechanism and BSRU by Xiangdong HU, Zhengguo TIAN

    Published 2022-02-01
    “…The security situation prediction plays an important role in balanced and reliable work for industrial internet.In the face of massive, high-dimensional and time-series data generated in the industrial production process, traditional prediction models are difficult to accurately and efficiently predict the network security situation.Therefore, the methods of security situation prediction for industrial internet fused attention mechanism and bi-directional simple recurrent unit (BSRU) were proposed to meet the real-time and accuracy requirements of industrial production.Each security element was analyzed and processed, so that it could reflect the current network state and facilitate the calculation of the situation value.One-dimensional convolutional network was used to extract the spatial dimension features between each security element and preserve the temporal correlation between features.The BSRU network was used to extract the time dimension features between the data information and reduced the loss of historical information.Meanwhile, with the powerful parallel capability of SRU network, the training time of model was reduced.Attention mechanism was introduced to optimize the correlation weight of BSRU hidden state to highlight strong correlation factors, reduced the influence of weak correlation factors, and realized the prediction of industrial internet security situation combining attention mechanism and BSRU.The comparative experimental results show that the model reduces the training time and training error by 13.1% and 28.5% than the model using bidirectional long short-term memory network and bidirectional gated recurrent unit.Compared with the convolutional and BSRU network fusion model without attention mechanism, the prediction error is reduced by 28.8% despite the training time increased by 2%.The prediction effect under different prediction time is better than other models.Compared with other prediction network models, this model achieves the optimization of time performance and uses the attention mechanism to improve the prediction accuracy of the model under the premise of increasing a small amount of time cost.The proposed model can well fit the trend of network security situation, meanwhile, it has some advantages in multistep prediction.…”
    Get full text
    Article
  3. 243

    5G carrier network data collection and security management evolution ideas by Huifang HOU, Xuefang LI, Jie PAN, Zhigang DING

    Published 2020-09-01
    “…Operators collect user data by deploying DPI system at some network node,and combining with the security control system to achieve an operator-level security operation and management system.The new architecture,technologies and services of the 5G network meet the unprecedented demands of connection,but also bring new security risks.The evolution of the data collection scheme of the carrier network was mainly discussed under the background of 5G network,as well as the innovative ideas of content security and network security systems that follow.…”
    Get full text
    Article
  4. 244

    Optimization of Expression Matching for String Matching by Tianlong Yang, Hongli Zhang

    Published 2013-01-01
    “…As the requirement of network security application increases, more and more redundant patterns appear and the patterns' amount of intrusion detection system(IDS)raises. …”
    Get full text
    Article
  5. 245
  6. 246

    Service-oriented security framework for datacenter networks by Teng HU, Guanwen LI, Huachun ZHOU

    Published 2018-01-01
    “…With the large-scale deployment of datacenters in cloud computing,there is an increasing attention to their security issues.However,with the ossify deployment of traditional security devices,it is hard to meet the requirements of dynamical network security situation and copy with new kinds of security threats.Therefore,a service-oriented security framework for datacenter networks was proposed,which was able to compose the virtualized security functions flexibly and update the security policies dynamically based on virtualization technology and software-defined networking.With the implementation of prototype,the feasibility and availability of the proposed security framework was proved,and a solution to promote the flexibility and security of datacenter networks was provided.…”
    Get full text
    Article
  7. 247

    Research of Mobile Internet Core Security Requirement and Protection by Fangheng Xu, Xuan Chen, Cailiang Shen, Huanqiang Du

    Published 2013-11-01
    “…Based on the development of mobile internet, an overview of the network security problems at current stage was presented, the threats facing mobile internet network were introduced and the relevant ideas and proposals on the security protection were raised.…”
    Get full text
    Article
  8. 248

    Wireless VPN network structure and safety protection in the north and south call center of SGCC by Ying ZOU, Yirong WANG, Yanru WANG, Sining WANG

    Published 2016-02-01
    “…Through the research on wireless virtual private network security from the four aspects as the terminal,network,boundary and application,reference for the design and construction of the center wireless virtual private network was provided.…”
    Get full text
    Article
  9. 249
  10. 250

    Analysis of Network Demand and Research on the Key Technology for Integration of 5G and Wi-Fi by Ming Liu, Zhizhong Zhang, Fang Cheng

    Published 2014-08-01
    “…In the networking of 5G and Wi-Fi, integration of network application scene and fusion networking technology were introduced to be the inevitable demand, no-sense authentication, network security, green communication were proposed to become the key technical indicators.…”
    Get full text
    Article
  11. 251

    Survey of DDoS defense:challenges and directions by Fei CHEN, Xiao-hong BI, Jing-jing WANG, Yuan LIU

    Published 2017-10-01
    “…The distributed denial of server (DDoS) attack is a major threat to the Internet.Numerous works have been proposed to deal with this problem through attack detection and defense mechanism design.A survey was presented to introduce the DDoS defense technologies,from the traditional strategies,through Cloud-based systems,toward SDN-based mechanisms.According to the characteristics of DDoS attack,the features and drawbacks of these systems were discussed,which could provide new insights for the development of the new generation of network security framework in the future.…”
    Get full text
    Article
  12. 252

    Interaction based on method for spam detection in online social networks by Kan CHEN, Liang CHEN, Pei-dong ZHU, Yue-shan XIONG

    Published 2015-07-01
    “…In online social networks,advertisements,rumors and malicious links are propagated by spammers arbitrarily.They not only disturb users’usualaccess,but also bring about network security threats and social panics.In an attempt to deal with the spam problems,an information diffusion model was proposed to capture the features of spam propagation.Propagation behaviors are quantitatively analyzed to detect spam messages with a decision tree-based method.The effectiveness of proposed detection model is evaluated with real data from the micro-bloggingnetwork of Sina.The experimental results show that proposed model can effectively detect spams in Sina micro-bloggingnetwork.…”
    Get full text
    Article
  13. 253

    Network layer protocol architecture for many-nets internetworking by Guangpeng LI, Sheng JIANG, Chuang WANG

    Published 2019-10-01
    “…Based on the analysis of the evolution history of existing network protocol technologies,the innovative guiding principles applicable to the future data network unified protocol system was proposed.By dividing the nature of network functions into the connections between network elements,five areas of protocol innovation such as data plane,control plane,user plane,management control and intrinsic network security were proposed.The implementation and application of the protocol system in many heterogeneous scenario were analyzed.Finally,the rationality of the protocol innovation guidelines was verified by analyzing the protocol innovation process in deterministic network forwarding technology and intrinsic security network technology.…”
    Get full text
    Article
  14. 254

    Situation description and critical technology analysis for industrial connection of intelligent manufacturing by Jie LI, Dong ZHANG, Jie CHANG, Zhen YANG

    Published 2017-11-01
    “…With the formally issue of the industrial internet in USA,the industry 4.0 in German and made in China 2025,the integration of the IT,Internet and industrialization has became the trend of intelligent manufacturing.Industrial connection is the basic ability for intelligent manufacturing.Firstly,the technology situation of OT and IT industrial connection was described.And then combined with made in China 2025,the eight demands for industrial internet scenarios and industrial connectivity key technology were analyzed,including data acquisition,IP network,wireless network,identifier resolution and network security,Finally,according to the domestic situation,the future trend of industrial connection was prospected.…”
    Get full text
    Article
  15. 255

    Research on the cultivation of cyber security talents under the perspective of double tops based on Jiangsu province by Fu XIAO, Haiping HUANG, Sujun HU, Lijuan SUN

    Published 2021-04-01
    “…Facing the opportunities and challenges in developing the cultivation of cyber security talents in the new security situation, a questionnaire survey on the undergraduate colleges of Jiangsu province, offering network security related majors, is conducted first.Next, multidimensional analysis and comparative study involve eight aspects, such as the distribution scale, the cultivation level, and the curriculum system.Finally, explorations on four aspects, including guarantees of politics, the teaching staff, society, and funds, lead to effective paths on the cultivation of cyber security talents for Jiangsu province under the environment of double tops.…”
    Get full text
    Article
  16. 256

    Research on Telecommunication System Business Security Architecture by Hong Li, Kai Qu

    Published 2013-08-01
    “…The concept of service security was thoroughly analyzed,and the generalized and narrow business security was proposed.The generalized business safety system was divided into five layers,and network security and safety requirements were defined,meanwhile the narrow business security was focused on the security of application layer,which was the concentration of the research.The security of application layer mainly includes two aspects:common vulnerabilities and loopholes in the service logic,which are defined and researched intensively.A security architecture against the security problem of the business-oriented system,and the security architecture taken as a better guideline for the design and implementation of business systems were proposed.…”
    Get full text
    Article
  17. 257

    SIM: a secure IP protocol for MANET by Rong-sen LI, Wen-hua DOU

    Published 2013-08-01
    “…According to the core logic of IP Sec, a secure IP protocol was proposed for Mobile Ad Hoc network. Security deal to the packets in and out of the network protocol stack was done by adding a transparent secure layer between trans-port-layer and link-layer. …”
    Get full text
    Article
  18. 258

    Research of Technology Solutions and Operation Countermeasures to Telephone Fraud Prevention and Control by Lika Li, Zexiong Ma, Qingnian Chen, Cheng Li

    Published 2014-11-01
    “…According to the root cause analysis, telephone fraud mechanism and behavior characteristics were discussed, network security model and the control system were researched, the recommending of core network number protection ability to ascend was proposed, and a set of early warning and intercept technology system based on big data model of signaling was developed. …”
    Get full text
    Article
  19. 259

    DNS log analysis system based on big data fusion algorithm by Ming LIAO, Ming CHEN, Ji ZHOU, Xiaohua XIANG, Fang LI, Yefen JIAO

    Published 2019-05-01
    “…The existing problems of big data analysis of DNS logs in the current industry were summarized,and a DNS log analysis system based on big data fusion algorithm was designed.The system integrates six information databases,such as record information database,website database,domain name database,IP address database,CNAME domain name database and security information database.It has powerful log analysis performance,comprehensive content analysis,and classification.With high analysis depth and flexible report customization function,it can provide decision-making basis for telecom operators to improve the management efficiency,optimize network security and enhance the network rate.…”
    Get full text
    Article
  20. 260

    Approach for topology partitioning in parallel network simulation by WANG Xiao-feng, FANG Bin-xing, YUN Xiao-chun, ZHANG Hong-li

    Published 2006-01-01
    “…To improve the usability and running efficiency of the parallel network simulation,an approach for topology partitioning based on load estimation was realized: first,the relative load values of nodes and links,estimated according to their core levels in the topology map,were treated as their weights;then,the simulation task was partitioned by the graph partitioning tool.Experiments showed that this partitioning method could improve the performance of simulation by 16.4% compared to the partitioning method with no weights.Simulation of worms based on the real topology gathered via network measurement proves that the partitioning method is suitable for real large-scale network topology and can be used to simulate large-scale network security incidents.…”
    Get full text
    Article