Showing 301 - 320 results of 414 for search '"network security"', query time: 0.05s Refine Results
  1. 301

    Secure topology protocol for mobile peer-to-peer networks by LI Zhi-yuan1, WANG Ru-chuan1

    Published 2010-01-01
    “…For the security problem in mobile peer to peer(MP2P) networks,an adaptive mobile peer-to-peer secure topology protocol(AMPSTP) was proposed.Firstly,Fortune algorithm was used to divide a large geographical region into some small sub regions.Secondly,temporary anchor node selection and update strategies were given.Thirdly,MP2P overlay network topology construction and maintenance mechanisms were also given.Fourthly,MP2P overlay network routing discovery algorithm and node selection mechanism based on game theory for MP2P networks were successively proposed.Finally,the performance of the AMPSTP protocol was theoretically analyzed and simulated on the platform of NS-2.Theoretical analysis and simulation results show that compared with MADPastry protocol,AMPSTP protocol not only can guarantee the network security and improve network performance,but also greatly reduce the control overhead.…”
    Get full text
    Article
  2. 302

    Paramounts of Intent-based Networking: Overview by Martins Mihaeljans, Andris Skrastins, Jurgis Porins

    Published 2024-12-01
    “…The current IBN model detains its adaptation as network assurance requirements of ensuring network security and scalability, and continuity are unfulfillable via conduct of network analysis and track of intent drift. …”
    Get full text
    Article
  3. 303

    Research progress of abnormal user detection technology in social network by Qiang QU, Hongtao YU, Ruiyang HUANG

    Published 2018-03-01
    “…In social networks,the problem of anomalous users detection is one of the key problems in network security research.The anomalous users conduct false comments,cyberbullying or cyberattacks by creating multiple vests,which seriously threaten the information security of normal users and the credit system of social networks ,so a large number of researchers conducted in-depth study of the issue.The research results of the issue in recent years were reviewed and an overall structure was summarized.The data collection layer introduces the data acquisition methods and related data sets,and the feature presentation layer expounds attribute features,content features,network features,activity features and auxiliary features.The algorithm selection layer introduces supervised algorithms,unsupervised algorithms and graph algorithms.The result evaluation layer elaborates the method of data annotation method and index.Finally,the future research direction in this field was looked forward.…”
    Get full text
    Article
  4. 304

    Design and implementation of high-speed network traffic sensor for emergency response by Ya-zhou MA, Jian GONG, Wang YANG

    Published 2014-10-01
    “…In the network analysis and tracking,network security emergency response needs a emsrgency sensor that captures saw packets of specific IP,port,protocol.Base on the high-speed packet capture tool PF_RING DNA,it uses mutil-thread to capture network packets that match sensor rules,and allocates the shared buffer to improve the performance of the disk storage of packets,at the same time through setting different states for the packet sensor rule,impliments adding sensor rules and human intervention dynamically.The experimental results show that in the dual 10 Gigabit NICs environment,emergency sensor can capture and handle network traffic of 19.98 Gbit/s(3.5 Mpacket/s),and the maximum rate of emergency sensor is 1 297 Mbit/s(204.9 kpacket/s).…”
    Get full text
    Article
  5. 305

    SDN security prediction method based on bayesian attack graph by Yanshang YIN, Tongpeng SUO, Ligang DONG, Xian JIANG

    Published 2021-11-01
    “…Existing researchers use threat modeling and security analysis system to evaluate and predict SDN (software defined network) security threats, but this method does not consider the vulnerability utilization of SDN controller and the location of devices in the network, so the security evaluation is not accurate.In order to solve the above problems, according to the probability of device vulnerability utilization and device criticality, combined with PageRank algorithm, a algorithm to calculate the importance of each device in SDN was designed; according to SDN attack graph and Bayesian theory, a method to measure the success probability of device being attacked was designed.On this basis, a SDN security prediction method based on Bayesian attack graph was proposed to predict the attacker's attack path.Experimental results show that this method can accurately predict the attacker's attack path and provide more accurate basis for security defense.…”
    Get full text
    Article
  6. 306

    Secure Event-Triggered Mechanism for Networked Control Systems under Injection Cyber-Attacks by Xiao Cai, Jian Kang, Kaibo Shi

    Published 2022-01-01
    “…This study focuses on the secure stability issue of networked control systems (NCSs) under injection cyber-attacks (ICAs), which have important research value of applications for network security. Firstly, a more general Lyapunov–Krasovskii functional (LKF) is constructed based on the time-delay phenomenon in systems. …”
    Get full text
    Article
  7. 307

    Security Management Technology of Multilayer Satellite Internet Based on Blockchain by Ruijie ZHU, Yudong ZHANG, Yating WEI, Chao XI

    Published 2022-03-01
    “…Satellite internet have the advantages of wide coverage, low latency, large transmission capacity and no geographical infl uence.It can provide ubiquitous internet access services for users all over the world.However, the heterogeneity of satellite internet and ground network, the channel opening and node exposure of satellite internet will pose a security threat to network access and resource management.Aiming at the security problem of satellite internet, a multilayer satellite internet security management architecture based on blockchain was proposed.As a distributed ledger technology, blockchain uses chain data structure to verify and store data, and adopts encryption methods to maintain that data blocks cannot be tampered.Blockchain can realize network security access, trusted resource management, and provide information security protection for satellite internet.This paper improved the security of satellite internet by integrating blockchain technology with satellite internet.…”
    Get full text
    Article
  8. 308

    Few-shot cybersecurity event detection method by data augmentation with prompting question answering by TANG Mengmeng, GUO Yuanbo, ZHANG Han, BAI Qingchun, CHEN Qingli, ZHANG Bowen

    Published 2024-08-01
    “…The result showes that the proposed method’s substantial superiority in low-resource network security event detection tasks compared to other baseline methods.…”
    Get full text
    Article
  9. 309

    A survey on 5G capabilities enabling the factories of the future by Yusun FU, Jinhui TANG

    Published 2022-09-01
    “…5G systems extend mobile communication services beyond mobile telephony, mobile broadband, and massive machine-type communication into new application domains, so-called vertical domains, with special requirements for communication services.A comprehensive analysis and summary of 5G capabilities enabling the factories of the future were provided, including resilient network architecture, flexible spectrum, ultra reliable and low latency communication, time sensitive network, security and positioning.While resilient network architecture includes network slicing, non-public network, 5G LAN, and edge computing.It hopes to have a thorough and comprehensive understanding of the theoretical research and application of 5G, and a clear understanding of its challenges, so as to play a key reference for researchers and engineers in the related fields.…”
    Get full text
    Article
  10. 310

    Exploration and practice of PRIDE teaching mode oriented to cybersecurity talent cultivation by Jianwei LIU, Dawei LI, Ying GAO, Yu SUN, Hua GUO

    Published 2021-08-01
    “…In the long-term practice of cybersecurity talent cultivation, the teaching team of School of Cyber Science and Technology of Beihang University, aiming at the knowledge goal, ability goal and quality goal of talent cultivation of cybersecurity discipline and related majors, puts forward the innovative teaching idea of “fine teaching, strong practice, excellent assessment, abundant resources” according to the knowledge characteristics, thinking characteristics and psychological characteristics of students.The teaching team integrates political teaching,research teaching, inspiration teaching, seminar teaching and example teaching methods, puts forward the PRIDE teaching mode,which has been widely applied in the teaching of core professional courses such as “Information Network Security” and “Modern Cryptography”, and has got remarkable teaching achievement.Through the practice of PRIDE teaching mode, a high-level teaching team with high political quality and strong teaching ability has been also built.…”
    Get full text
    Article
  11. 311

    Application of Hybrid Transform Domain Digital Watermarking in Power System Information Security by Shaomin Zhu, Zhiqiang Zhang

    Published 2013-11-01
    “…The proposed digital watermarking is playing a more important role in network security for electric power system.…”
    Get full text
    Article
  12. 312

    Machine Learning Applications based on SVM Classification A Review by Dakhaz Mustafa Abdullah, Adnan Mohsin Abdulazeez

    Published 2021-04-01
    “…Classification based on SVM has been used in many fields like face recognition, diseases diagnostics, text recognition, sentiment analysis, plant disease identification and intrusion detection system for network security application. Based on this study, it can be concluded that SVM classifier has obtained high accuracy results in most of the applications, specifically, for face recognition and diseases identification applications. …”
    Get full text
    Article
  13. 313

    Towards 5G:heterogeneous cellular network architecture design based on intelligent SDN paradigm by Yifan ZHOU, Zhifeng ZHAO, Honggang ZHANG

    Published 2016-06-01
    “…To enrich the SDN(software defined networking)with intelligence and learning capability,an intelligent SDN paradigm was proposed for the first time.Combining it with the traditional cellular networks,5G-oriented heterogeneous cellular network architecture based on the intelligent SDN was set up,which made the integrated management of radio access networks and core networks possible.Based on the management and coordination of intelligent SDN,the decoupling of control and data,decoupling of uplink and downlink,and dynamic resource utilization in radio access networks to improve the spectrum efficiency and energy efficiency were put forward;content caching and network security strategies were deployed in the core networks to enhance the network scalability and data throughput.Globally,the resource utilization in radio access networks and core networks was optimized to achieve the network function virtualization and customized service provision,which contributed to the in-depth combination between the heterogeneous cellular networks and intelligent SDN.…”
    Get full text
    Article
  14. 314

    Research on backup and remapping of network slice based on security classification by Zhiyong SUN, Xinsheng JI, Wei YOU, Quan YUAN

    Published 2018-11-01
    “…In the future virtual environment of 5G core network,the general X86 servers make the attackers exploit vulnerabilities more easily,the substrate network is infected with and spreads the virus more easily,and the problem of single physical node failed will affect the service performance of the network slice seriously.Based on the existing node backup and remapping solutions,considering the impact of security constraints among nodes on network security performance,a security parameter evaluation model of virtual nodes and physical nodes were proposed in the network slicing,and the security constraint relationship was established between the virtual nodes and the physical nodes.Then backup virtual nodes were selected based on the security parameters evaluation model,and backup mapping methods were designed.Finally,the node remapping mechanism was designed with satisfying the requirement of network delay.Experiments show that the proposed method can significantly improve network intrusion tolerance with satisfying the requirements of network slicing service performance.…”
    Get full text
    Article
  15. 315

    Intelligent planning method for cyber defense strategies based on bounded rationality by Yingze LIU, Yuanbo GUO, Chen FANG, Yongfei LI, Qingli CHEN

    Published 2023-05-01
    “…Considering that network defense subjects were usually resource-constrained, an intelligent planning and au-tonomous implementation of network defense strategies under bounded rationality was studied considering the concept of intelligent confrontation.First, attack graph, general knowledge and domain-specific knowledge were fused to construct a network defense security ontology.On that basis, knowledge reasoning was utilized to recommend security defense strategies to better adapt to the security needs of protected network information assets and current attack threats.Finally, an autonomous planning and implementation of defense strategies was achieved under the constraints of limited network security defense resources and dynamic changes of network information assets with the help of bounded rationality.The example shows that the proposed method is robust under dynamic attacks.The experiments show that the defense effec-tiveness is improved by 5.6%~26.12% compared with existing game theory and attack graph-based methods against a typical APT attack.…”
    Get full text
    Article
  16. 316

    Design of nodes importance assessment method for complex network based on neighborhood information by Xing LI, Jie ZHAN, Baoquan REN, Siqi ZHU

    Published 2024-03-01
    “…Accurate identification of influential nodes in complex networks is crucial for network management and network security.The local centrality method is concise and easy to use, but ignores the topological relationship between neighboring nodes and cannot provide globally optimal results.A node importance assessment method was proposed to correlate the node edge relationship and topology, which firstly applied the H-index and information entropy to assess the nodes, then combined the structural holes of the nodes with the structural characteristics of the nodes, and took into account the attribute of “bridging” while focusing on the node’s own quality and the amount of information about the neighboring nodes.The algorithm was validated by simulating the propagation process using the SIR model, and the Kendall correlation coefficient, complementary cumulative distribution function and propagation influence were applied to validate the validity and applicability of the method.Comparison of the experimental results on six real network datasets shows that the proposed method is more accurate than the traditional centrality methods in identifying and ordering the key nodes in the network.…”
    Get full text
    Article
  17. 317

    Mathematical Modeling of Static Data Attribute Encryption Based on Big Data Technology by Yutang Liu, Qin Zhang

    Published 2022-01-01
    “…In order to improve the attributes of static data, encryption technology can provide a reliable technical guarantee for network security. This paper presents a mathematical modeling method of static data attribute encryption based on big data technology. …”
    Get full text
    Article
  18. 318

    A Method of Intrusion Detection Based on WOA-XGBoost Algorithm by Yan Song, Haowei Li, Panfeng Xu, Dan Liu

    Published 2022-01-01
    “…However, computer viruses and malicious network attacks make network security face huge challenges, and more accurate detection of attacks has become the focus of attention to current computer fields. …”
    Get full text
    Article
  19. 319
  20. 320

    Role of Machine Learning and Data Mining in Internet Security: Standing State with Future Directions by Bilal Ahmad, Wang Jian, Zain Anwar Ali

    Published 2018-01-01
    “…Intrusion detection, an important entity towards network security, has the ability to observe network activity as well as detect intrusions/attacks. …”
    Get full text
    Article