Showing 261 - 280 results of 414 for search '"network security"', query time: 0.05s Refine Results
  1. 261

    Defense strategies selection based on attack-defense evolutionary game model by Jian-ming HUANG, Heng-wei ZHANG, Jin-dong WANG, Shi-rui HUANG

    Published 2017-01-01
    “…Due to that the current network security researches based on game theory mostly use the completely rationality assumption,which is not consistent with the facts.Under the bounded rationality constraint of network attack-defense,attack-defense evolutionary game model and a method to solve evolutionary stable equilibrium based on the non-cooperative evolutionary game theory was proposed.The optimal defense strategy selection algorithm was designed based on the analysis of the evolutionary stable strategy.The effectiveness of the model and method proposed is verified by simulation results,through which some evolution conclusions of offensive behavior on the premise of limited rationality were drawn.…”
    Get full text
    Article
  2. 262

    A Game Theoretic Model for Wireless Sensor Networks with Hidden-Action Attacks by Yuxin Mao, Ping Zhu, Guiyi Wei

    Published 2013-08-01
    “…In this paper, we propose to apply game theory into solving the network security problem of wireless network. We explore game theory algorithms to model situation for wireless network with malicious nodes and investigate the attack and detection problem by modeling it as pairwise simultaneous game and spatial structured game. …”
    Get full text
    Article
  3. 263

    Ontology model based on security parameters capturing process for network systems by Tao LI, NJiu-chuan LI, Ai-qun HU

    Published 2017-02-01
    “…The whole processes and framework efficiently provided guidance for network security evaluation and supporting of ba-sic parameters.…”
    Get full text
    Article
  4. 264

    Survey on application of attack graph technology by Zi-wei YE, Yuan-bo GUO, Chen-dong WANG, An-kang JU

    Published 2017-11-01
    “…Attack graph technology was a measure to predict the pattern and process used by attacker to compromise the target network,so as to guide defender to take defensive measures and improve network security.The basic component,types of attack graphs and respective advantages and disadvantages of each type were reviewed.The application status of attack graph technology in risk assessment and network hardening,intrusion detection and alarm correlation,and other aspects were introduced.Several kinds of existing attack graph generation and analysis tools were also presented.At last a survey of some challenges and research trends in future research work was provided.…”
    Get full text
    Article
  5. 265
  6. 266

    Survey of community privacy in social network by Zhongyuan JIANG, Xianyu CHEN, Jianfeng MA

    Published 2021-04-01
    “…Community is an important feature of social network and the development of community detection technology brings the danger of privacy disclosure to network users.How to protect sensitive community information from being leaked and ensure the security of users and communities has become a research hotspot in the field of network security.In recent years, community privacy protection technology has made initial progress, but there is a few survey on the research of community privacy or community security in social networks, and it may limit the potential and long-term development of this research topic.The research on the privacy of community structure was mainly reviewed and the related works on community security were classified, summarized, compared.The hot issues of community security in the future were proposed.…”
    Get full text
    Article
  7. 267

    Modeling of the mimic defense based on heterogeneous redundancy by Junning QIN, Jiajia HAN, Sheng ZHOU, Chunming WU, Shuangxi CHEN, Ruoyan ZHAO, Jiangyu ZHANG

    Published 2020-05-01
    “…The unbalanced development status of network security was introduced.The main hazards and the mechanism model of penetration testing were described,and the inherent shortcomings of many existing traditional defense methods were analyzed.However,new method of the mimic defense model makes the attack information obtained invalid by dynamically selecting the executive set and adaptively changing the system composition.The same attack mode is difficult to be maintained or reproduced.Based on the attack chain model,the traditional defensetechnology and mimic defense technology were analyzed and compared,and it was demonstrated that it had a protective role in multiple stages of the attack chain.Finally,the effectiveness and superiority of the mimic defense was verified by experiments,and the model was summarized and prospected.…”
    Get full text
    Article
  8. 268

    Research and practice on data center security architecture refactoring based on intelligent service chain by CHEN Zhangying, FANG Yiquan

    Published 2024-11-01
    “…Based on this, used intelligent service chain as the research carrier, by deploying secure resource pools, reconstructing data center security architecture, implementing flexible traffic orchestration, optimizing network traffic agile scheduling and intelligent control, practical support is provided for the intelligent, personalized, and differentiated deployment of network security devices.…”
    Get full text
    Article
  9. 269

    An automatic test platform to verify the security functions for secure WIA-PA wireless sensor networks by Min Wei, Keecheon Kim

    Published 2016-11-01
    “…Among the several inherent limitations in wireless sensor network, security is a critical concern. The declared security functions of wireless devices should be well verified. …”
    Get full text
    Article
  10. 270

    Website defense strategy selection method based on attack-defense game and Monte Carlo simulation by Hao WU, Jiulun FAN, Chengzhe LAI, Jianhua LIU

    Published 2018-08-01
    “…Aiming at the selection of security defense strategy in network attack-defense,the dynamic change process of mutual influence between attack-defense strategy was studied.Based on the game process of both offense and defense,the attack-defense game model was constructed,the attack process of the attacker based on Monte Carlo simulation was simulated and the attacker’s best attack utility was obtained,so as to calculate the best defensive utility of the defender.In order to maximize the effectiveness of network security defense,the optimal defense strategy under limited resources was implemented.Simulation experiments verify the effectiveness of the proposed method and analyze the influence of different parameter settings on the selection of defense strategy.…”
    Get full text
    Article
  11. 271

    Explainability of Network Intrusion Detection Using Transformers: A Packet-Level Approach by Pahavalan Rajkumardheivanayahi, Ryan Berry, Nicholas U. Costagliola, Lance Fiondella, Nathaniel D. Bastian, Gokhan Kul

    Published 2025-01-01
    “…The tags and descriptions offer network security professionals a tool to comprehend suspicious packets with an unfamiliar or potentially malicious signature, assess their nature, and help make informed decisions promptly. …”
    Get full text
    Article
  12. 272

    Multi‐objective multiperiod stable environmental economic power dispatch considering probabilistic wind and solar PV generation by Aamir Ali, Sumbal Aslam, Sohrab Mirsaeidi, Noor Hussain Mugheri, Riaz Hussain Memon, Ghulam Abbas, Hammad Alnuman

    Published 2024-12-01
    “…Abstract The economic‐environmental power dispatch (EEPD) problem, a widely studied bi‐objective non‐linear optimization challenge in power systems, traditionally focuses on the economic dispatch of thermal generators without considering network security constraints. However, environmental sustainability necessitates reducing emissions and increasing the penetration of renewable energy sources (RES) into the electrical grid. …”
    Get full text
    Article
  13. 273

    SYN flood attack defense strategy for asymmetric routing by Jian-xi TAO, Li ZHOU, Zhou ZHOU, Wei YANG, Qing-yun LIU, Rong YANG

    Published 2013-08-01
    “…In order to resolve the problem that existing network security facilities can't defend against large-scale SYN flood attack under asymmetric routing environment, attack detection technology and connection management strategy were researched, and a defense architecture combining a light-weight detection method with a hierarchical connection management strategy was presented. …”
    Get full text
    Article
  14. 274

    Survey on Byzantine attacks and defenses in federated learning by ZHAO Xiaojie, SHI Jinqiao, HUANG Mei, KE Zhenhan, SHEN Liyan

    Published 2024-12-01
    “…Secondly, guided by the classic network security defense model, federated learning defense methods were classified and analyzed from the perspective of defense mechanisms. …”
    Get full text
    Article
  15. 275

    A density clustering-based network performance failure big data analysis algorithm by Xiang LI, Yuan LI, Zifei ZHANG, Zhe YANG

    Published 2020-09-01
    “…Facing frequent network security incidents,how to quickly find abnormal data in massive monitoring database and carry out network failure analysis becomes a research difficulty.A density-based network performance failure big data analysis algorithm was proposed,which extracted key performance characteristic indicators through entropy weight analysis,implemented data shaping through data cleaning and standardization,and extracted abnormal performance data on the basis of DBSCAN clustering algorithm.Relying on the real-time massive backbone network link performance data of multiple domestic operators to validated this algorithm,the results shows that compared with the manually manner,the recognition accuracy of the algorithm proposed to the network performance abnormal data is more than 90%,which can well fit for the analysis of real-time Internet network operation failure.…”
    Get full text
    Article
  16. 276

    Method of unknown protocol classification based on autoencoder by Chunxiang GU, Weisen WU, Ya’nan SHI, Guangsong LI

    Published 2020-06-01
    “…Aiming at the problem that a large number of unknown protocols exist in the Internet,which makes it very difficult to manage and maintain the network security,a classification and identification method of unknown protocols was proposed.Combined with the autoencoder technology and the improved K-means clustering technology,the unknown protocol was classified and identified for the network traffic.The autoencoder was used to reduce dimensionality and select features of network traffic,clustering technology was used to classify the dimensionality reduction data unsupervised,and finally unsupervised recognition and classification of network traffic were realized.Experimental results show that the classification effect is better than the traditional K-means,DBSCAN,GMM algorithm,and has higher efficiency.…”
    Get full text
    Article
  17. 277

    Study on dynamic trust metric of trusted network based on state and behavior associated by LI Dao-feng, YANG Yi-xian, GU Li-ze, SUN Bin

    Published 2010-01-01
    “…Intergrated the factors that state and behavior of entities,a new dynamic trust model of trusted network was proposed.The trust information was obtained through the associated analysis of state and behavior of entities.The rela-tion of trust,state and behavior of the entities was also studied,and a new dynamic trust measurement of trusted network was proposed.The simulation results show that the new trust model has advantages in providing real-time dynamic trust.It is highly effective in countering malicious entities regarding strategic altering behavior and malicious attack,presenting better choice in task assignment in the network,providing help to make the secure police for the network security,and enhancing trustworthily of network.…”
    Get full text
    Article
  18. 278

    LoRaWAN technologies for enabling new generation Internet of things by Chaojie GU, Rui TAN

    Published 2021-06-01
    “…., communication performance target localization, wireless network security, and heterogeneous network.The opportunities and challenges were also discussed regarding the wide adoption of LoRaWAN in China’s context in four aspects, i.e., business models, supervision methods, technology innovations, and emerging applications.…”
    Get full text
    Article
  19. 279

    Video Fingerprint Management System:Exploration and Practice on Video Content Security Protection by Yufeng Li, Shoulian Qian, Julong Lan, Xiaoqiang Guo, Bo Chen

    Published 2015-06-01
    “…Increasingly serious network security situation has made video website,broadcasting network and other video sending systems become more and more vulnerable to network attack. …”
    Get full text
    Article
  20. 280

    Risk assessment model based on fuzzy Petri nets by Xiang GAO, Yue-fei ZHU, Sheng-li LIU, Jin-long FEI, Long LIU

    Published 2013-08-01
    “…Aiming at the complex in the process of network security risk assessment, the asset, vulnerability and threat were used as the major factors in security assessment to establish the hierarchical index system for security assessment. …”
    Get full text
    Article