Showing 281 - 300 results of 414 for search '"network security"', query time: 0.06s Refine Results
  1. 281

    Survey of IoT security research: threats, detection and defense by Yiyu YANG, Wei ZHOU, Shangru ZHAO, Cong LIU, Yuhui ZHANG, He WANG, Wenjie WANG, Yuqing ZHANG

    Published 2021-08-01
    “…Based on the IoT security literatures published in the international conferences on network security (ACM CCS, USENIX Security, NDSS, IEEE S&P) in recent five years, and other prominent researches, the works from the perspective of "threat, detection, defense" were systematically summarized and analyzed.Firstly the basic architecture of the IoT system was introduced.Then the main threats proposed in these works were classified into eight categories, and the causes and hazards of the threats were analyzed.After that, six detection and five defense schemes against these threats were introduced, and their technical principles, advantages and disadvantages were compared.At last, on the basis of the above analysis, the main challenges that the current research still faces were put forward, and the research directions of future works were point out.…”
    Get full text
    Article
  2. 282

    Survey on the visualization technologies of threatening security data in cyber space by Fan ZHANG, Fan XIE, Jie JIANG

    Published 2018-02-01
    “…With the rapid development of the cyber threatening methods,the requirements of network security data analysis become more and more imperative.Data visualization has already evolved as a requisite tool among all kinds of data analysis theory framework and applications,especially in the fields of scientific computation,business intelligence and cyber security.Threatening security data visualization provides various effective interaction means which improve the perception ability for the cyber security specialists to get a distinctive insight into the large amount of complicated cyber security problems.The state-of-art cyber security data visualization technologies were introduced.Some existing problems that were still challenging research topics were investigated.Some directions for future studies were outlined.…”
    Get full text
    Article
  3. 283

    Research and application of 5G cloud-network-edge-end integrated in-depth security protection system by Guoxin ZHANG

    Published 2022-10-01
    “…A 5G cloud-network-edge-end integrated in-depth security protection implementation scheme was innovatively proposed, the network security protection system of 5G customized network was explored, and the basic architecture, characteristics, implementation scheme and application effect of the system were introduced.In the implementation plan, two key points were emphasized.Firstly, by deploying the security system of the four aspects of the 5G cloud network, the edge and the end, the multi-level and multi-dimensional security protection capability was formed.Secondly, the operation process of the adaptation system, including one-key reinforcement, security defense, situational awareness and one-key emergency response was established.Finally, the practical application effect of the 5G cloud-network-edge-end integrated in-depth security protection system was given.…”
    Get full text
    Article
  4. 284

    Research on the effectiveness evaluation of cyber security curriculum construction for combating telecom network fraud by Shengli ZHOU, Keyi JIANG, Bo XU, Rui XU, Xikang ZHANG, Quanzhe ZHAO, Yangdong XU

    Published 2023-06-01
    “…The governance of telecom network fraud under the new situation puts forward new requirements for developing network security courses of public security colleges.Considering the cyber security curriculums in public security colleges and universities that were not adaptive or practical enough in terms of training objectives, training plans, evaluation systems, etc, the methods such as chi-square test and independent samples t-test were used to analyze the construction status of cyber security curriculums in major public security universities and colleges nationwide, and the quantitative evaluation of course effectiveness was achieved by combining score card mathematical analysis.Based on the data analysis, an optimization path for the construction of cyber security curriculums in major public security universities and colleges was proposed.…”
    Get full text
    Article
  5. 285

    CUSUM-Based Intrusion Detection Mechanism for Wireless Sensor Networks by Bishan Ying

    Published 2014-01-01
    “…The nature of wireless sensor networks (WSNs) makes them very vulnerable to adversary's malicious attacks. Therefore, network security is an important issue to WSNs. Due to the constraints of WSN, intrusion detection in WSNs is a challengeable task. …”
    Get full text
    Article
  6. 286

    Research and practice of software-defined security technology architecture in the 5G+ era by Shuo QUAN, Xuliang WANG, Zeya ZHU

    Published 2021-12-01
    “…Cloud network security has become a strong need under the background of the new infrastructure and digital economy, while cloud network integration security has been defined as an ongoing trends.Initially, three major types of problems facing 5G private network users were presented in providing overall security services, and an overall software-defined security architecture in the 5G+ era was proposed.Furthermore, the corresponding prototype system design and implementation was discussed based on this architecture.At the end, the verification shows that the software-defined security orchestration and scheduling system based on the cloud-based architecture helps to accurately solve the overall business security threats and hidden dangers of 5G private network enterprise customers in the 5G+ era, providing systematic reference value for subsequent research.…”
    Get full text
    Article
  7. 287

    6G endogenous security:architecture and key technologies by Yang LIU, Mugen PENG

    Published 2020-01-01
    “…At the beginning of design for the traditional mobile communication systems,security is considered as an independent technology,relying on “patch” and “plug-in” to realize the security protection of wireless communica-tion.The sixth-generation (6G) mobile communication system is designed based on software-defined slicing platform,edge computing,artificial intelligence and big data mining to adapt to different application scenarios and performance objectives,making the traditional network security mechanisms difficult to guarantee 6G's requirements for embed-ded security.6G endogenous security was proposed,the architecture and key technologies of 6G endogenous security were described,the security threats in the new technologies were discussed which 6G would adopt,and the chal-lenges and future research directions of 6G endogenous security were provided.…”
    Get full text
    Article
  8. 288

    Research on 5G network deployment scheme for intelligent manufacturing by Hong SHEN, Ling CUI, Tiankui ZHANG

    Published 2022-05-01
    “…Building smart factories based on 5G network and other new generation of advanced information technology is an important way for enabling industrial upgrading and realizing intelligent manufacturing.Firstly, the typical application scenario 5G network in intelligent manufacturing was analyzed and then the requirement of 5G network performance indicators was given.Based on these analysis, the specific deployment scheme of 5G network was design, including the high network capacity and large number of connections, high reliability and low delay, 5G slicing, toC/toB isolation and network security.The proposed 5G network deployment scheme provided a useful reference for the construction of smart factory based on 5G network and other advanced information technologies.…”
    Get full text
    Article
  9. 289

    An Energy-Efficient Cyclic Diversionary Routing Strategy against Global Eavesdroppers in Wireless Sensor Networks by Ju Ren, Yaoxue Zhang, Kang Liu

    Published 2013-04-01
    “…While many protocols for sensor network security provide confidentiality for message content, contextual information usually remains exposed, which can be critical to the mission of the sensor network. …”
    Get full text
    Article
  10. 290

    Implementation architecture of mimic security defense based on SDN by Zhen-peng WANG, Hong-chao HU, Guo-zhen CHENG, Chuan-hao ZHANG

    Published 2017-10-01
    “…To deal with the attacks employing unknown security vulnerabilities or backdoors which are difficult for traditional defense techniques to eliminate,mimic security defense (MSD) that employs “dynamic,heterogeneity,redundancy (DHR)” mechanism can increase the difficulty and cost of attack and uncertainty of system so as to improve network security.Based on the software defined networking (SDN),an implementation architecture of MSD was proposed.First,diverse functional equivalent variants for the protected target were constructed,then leverage the rich programmability and flexibility of SDN to realize the dynamic scheduling and decision-making functions on SDN controller.Simulation and experimental results prove the availability and the intrusion tolerant ability of the architecture.…”
    Get full text
    Article
  11. 291

    New electric power CDN based on the technology of SDN and NFV by Hongkai WANG, Hanyong HAO, Botao YU, Linqing LI

    Published 2016-09-01
    “…With the development of smart grid and the increasing of network application within the electric power information network,electric power CDN plays an important role of network acceleration technology,traffic load balancing and network security.However,facing the rapidly changing of application requirements,electric power CDN was required to response to the application deployment quickly and possess flexible application extensibility.In addition,there are some problems on electric power CDN node expansion,such as complex operations management and low utilization rate of resources.It is necessary to reform the traditional power CDN architecture,SDN and NFV technique can support.The data control can be extracted and transmitted by SDN from the network data,so it is conducive to expand a variety of application in power CDN rapidly.And NFV can expand the CDN node capacity and schedule node resources based on the application.It can effectively reduce the capital ecpenditure,storage and power consumption.…”
    Get full text
    Article
  12. 292

    Resilient Multipath Routing Mechanism Based on Clustering with Intrusion Tolerance by Shukui Zhang, Hongyan Zuo, Jianxi Fan, Juncheng Jia

    Published 2013-11-01
    “…However, in many special fields, network security is a basic and important factor which we must concern for. …”
    Get full text
    Article
  13. 293

    Cellular automata model based power network attack prediction technology by Lijuan YE, Yiting WANG, Licheng ZHU

    Published 2023-04-01
    “…The prediction range of the traditional power network attack range prediction technology was not wide enough, resulting in the poor effect of power network security improvement.For this reason, a power network attack prediction technology based on cellular automata model was proposed.A cellular automata model was built, regarding the cells in the cellular automata as power cells, a cell vitality value conversion rule was established and combined with the attack probability of attackers to predict the development and change of power cells.The power network attack was predicted according to the change trend of central power cells and neighboring power cells.The experimental result shows that, under the influence of time factors, the predicted attack node location of the proposed power network attack prediction technology based on cellular automata model is basically consistent with the original node, and the predicted load removal is always below 100 MW, the proposed technology is more effective.…”
    Get full text
    Article
  14. 294

    Research on structure and defense of adversarial example in deep learning by Guanghan DUAN, Chunguang MA, Lei SONG, Peng WU

    Published 2020-04-01
    “…With the further promotion of deep learning technology in the fields of computer vision,network security and natural language processing,which has gradually exposed certain security risks.Existing deep learning algorithms can not effectively describe the essential characteristics of data or its inherent causal relationship.When the algorithm faces malicious input,it often fails to give correct judgment results.Based on the current security threats of deep learning,the adversarial example problem and its characteristics in deep learning applications were introduced,hypotheses on the existence of adversarial examples were summarized,classic adversarial example construction methods were reviewed and recent research status in different scenarios were summarized,several defense techniques in different processes were compared,and finally the development trend of adversarial example research were forecasted.…”
    Get full text
    Article
  15. 295

    Overview of the key technology of photonic firewall at high speed by Shanguo HUANG, Xin LI, Ying TANG, Junfeng GUO

    Published 2019-09-01
    “…In order to maintain the security of optical network,it is urgent to research and deploy photonic firewall which can effectively process high-speed optical signals to replace existing electronic firewall which consumes high energy.After a brief review of the principle of photonic firewall,the pattern matching technology based on correlation operation and all-optical logic gates were summarized,and the matching systems was compared according to their advantages and disadvantages.Besides,the realization methods of all-optical logic gates were introduced.Finally,the next research direction and development trend of all-optical pattern matching were prospected:more efficient system structure or non-linear devices with faster response speed.The survey shows that photonic firewall based on all-optical pattern matching has a good application prospect in network security.…”
    Get full text
    Article
  16. 296

    Backhaul carrying scheme of TD-LTE microcell base station by Xiaoxia QIN, Chen WANG, Di QIAO

    Published 2016-04-01
    “…In particular,PON+CMNet solution is better than the others in terms of network security,intelligence and efficiency.…”
    Get full text
    Article
  17. 297

    Fixed features of future networks based on future applications by Yawen ZHANG, Miao WANG, Linghao WANG, Hanwen ZHANG, Yujun ZHANG

    Published 2019-08-01
    “…More and more network applications place higher demands on the network functions and performance.Internet of vehicles requires the network to support low latency and high reliability,telemedicine requires it with deterministic latency and security assurance,the industrial internet requires networks to meet large connections and high reliability,AR/VR applications require low latency and high bandwidth,quantum computing also brings new challenges to network security.Due to the limitations of its own architecture,existing IP networks only provide best-effort services that cannot meet the needs of future network applications.Future network applications in the next 20 years were investigated,the functional and performance of the future network were analyzed.By describing the application scenarios of internet of vehicles,telemedicine,industrial internet AR/VR and quantum computing,the network performance to meet the needs of these scenarios was analyzed and the performance indicators of future networks were obtained.…”
    Get full text
    Article
  18. 298

    CNID: Research of Network Intrusion Detection Based on Convolutional Neural Network by Guojie Liu, Jianbiao Zhang

    Published 2020-01-01
    “…Network intrusion detection system can effectively detect network attack behaviour, which is very important to network security. In this paper, a multiclassification network intrusion detection model based on convolutional neural network is proposed, and the algorithm is optimized. …”
    Get full text
    Article
  19. 299

    Research and design in dual network scheme of power corporation based on network isolation and secure data exchange by Jing WANG, Kunlun GAO, Bo ZHANG

    Published 2017-02-01
    “…It is a common concern for power enterprises of how to ensure the safety and stability of power production management and information network for group-oriented power generation enterprises.The dual-network architecture of group-type power generation enterprise was designed based on network isolation and the safe data exchange technology.Based on the protection of network security isolation,the private protocol interaction technology was introduced to meet the growing business development needs of power enterprises.The overall technical route of logical strong isolation was proposed,the design scheme of construction of information internal and external network,the application and deployment,and information exchange in typical application scenarios was put forward.In addition,in order to realize the centralized monitoring and unified protection after isolation,the design scheme of deploying unified monitoring,unified anti-virus,unified terminal management and unified authentication system was put forward.…”
    Get full text
    Article
  20. 300

    Survey of encrypted malicious traffic detection based on deep learning by Mingfang ZHAI, Xingming ZHANG, Bo ZHAO

    Published 2020-06-01
    “…With the increasing awareness of network security,encrypted communication dominates and encrypted traffic grows rapidly.Traffic encryption,while protecting privacy,also masks illegal attempts and changes the form of threats.As one of the most important branch of machine learning,deep learning performs well in traffic classification.For several years,research on deep-learning based intrusion detection has been deepened and achieved good results.The steps of encrypted malicious traffic detection were introduced to be a general detection framework model named “six-step method”.Then,discussion and induction of data processing and detection algorithms were carried out combined with this model.Both advantages and disadvantages of various algorithm models were given as well.Finally,future research directions were pointed out with a view to providing assistance for further research.…”
    Get full text
    Article