-
321
Model of cyberspace threat early warning based on cross-domain and collaboration
Published 2020-12-01“…The development of network threat shows the characteristics of initiative,concealment and ubiquity.It poses a severe challenge to the passive,local and isolated traditional network defense mode.In view of the new trend of integration of big data,artificial intelligence and network security,a cross-domain collaborative network threat early warning model was proposed,which could enable and increase efficiency for cyberspace security.Firstly,starting from the overall structure of the protected network space,the model constructs a cross-domain function framework with the vertical and horizontal conjunction by dividing the security threat domain,decomposing the system function,designing the information sharing mechanism.Secondly,to enhance the ability of threat information detection,the collaborative technology architecture is designed by the logic of hierarchical management,and the key technologies involved in threat information perception,processing and application,are systematically introduced.Finally,with the help of application scenarios,qualitatively the capability increment of the proposed threat early warning model was described.…”
Get full text
Article -
322
Clustering perception mining of network protocol’s stealth attack behavior
Published 2017-06-01“…Deep stealth attack behavior in the network protocol becomes a new challenge to network security.In view of the shortcomings of the existing protocol reverse methods in the analysis of protocol behavior,especially the stealth attack behavior mining,a novel instruction clustering perception mining algorithm was proposed.By extracting the protocol's behavior instruction sequences,and clustering analysis of all the behavior instruction sequences using the instruction clustering algorithm,the stealth attack behavior instruction sequences can be mined quickly and accurately from a large number of unknown protocol programs according to the calculation results of the behavior distance.Combining dynamic taint analysis with instruction clustering analysis,1 297 protocol samples were analyzed in the virtual analysis platform hidden disc which was developed independently,and 193 stealth attack behaviors were successfully mined,the results of automatic analysis and manual analysis were completely consistent.Experimental results show that,the solution is ideal for perception mining the protocol's stealth attack behavior in terms of efficiency and accuracy.…”
Get full text
Article -
323
-
324
Analysis of super-long and sparse feature in pseudo-random sequence based on similarity
Published 2016-10-01“…Similarity analysis of pseudo-random sequence in wireless communication networks is a research hotspot problem in the domain of information warfare.Based on the difficulties in super-long sequence,extremely sparse feature,and futilities in engineering application for real-time processing exist in similarity analysis of sequence in wireless net-work,a method of similarity analysis of sequence in a certain margin of misacceptance probability was proposed.Firstly,the similarity probability distribution of real-random sequence was theoretically analyzed.Secondly,according to the standard of NIST SP 800-22,the randomness of pseudo-bitstream was analyzed and the validity of pseudo-bitstream was judged.Finally,similarity was analyzed and verified by combining super-long pseudo-random sequence in real wireless communication networks.The results indicate that the lower bound of similarity value is 0.62 when misacceptance prob-ability uncertainty at about 1%.Above conclusion is considerable importance from the significance and theoretical values in network security domains,such as protocol analysis,traffic analysis,intrusion detection and others.…”
Get full text
Article -
325
Research and prospect of intelligent internet of vehicles based on 5G technology
Published 2020-05-01“…With the rapid development of 5G communication technology,in the future,V2X will take 5G communication technology as the starting point,integrate 5G vehicle unit,5G base station,5G mobile terminal,5G cloud server and other advanced equipment,to provide comprehensive and high-quality services for multi-type users.Firstly,the key technologies of V2X and its evolution to 5G era were outlined.5G is deeply integrated with the internet of vehicles,which has the technical advantages of relatively low deployment cost and clear evolution route.Then,the application and research status of 5G emerging key technologies such as mobile edge computing (MEC) and network slicing in typical application scenarios of the Internet of vehicles was focused on.Finally,the problems of 5G internet of vehicles in communication interference,network security and privacy protection,communication interference were put forward,and the research direction was pointed out.…”
Get full text
Article -
326
A survey of cybersecurity for intelligent connected-automated vehicle
Published 2020-04-01“…(Semi-) Autonomous vehicles use a new generation of information and communication technologies to realize a full range of interactions between vehicles and cloud,vehicles and vehicles,vehicles and roads,and vehicles and pedestrian,etc.When cars started to become connected computers on wheels,network security became a major challenge,and because the scope of cyber threats extended from virtual space to physical space,the harm of cybersecurity had risen to human life.The electronic/electrical structure,in-vehicle network structure,and out-of-vehicle network structure of intelligent vehicles were introduced,the security requirements of vehicle networks were elaborated,several cyber-attacks against connected-automated vehicle (CAV) were pointed out,the available defense measures against these attacks were addressed.The advantages and disadvantages of these measures were summarized.Finally,possible defense measures and directions in the future were discussed to further ensure the security of CAV.…”
Get full text
Article -
327
UVDA:design and implementation of automation fusion framework of heterogeneous security vulnerability database
Published 2015-10-01“…Security vulnerability was the core of network security.Vulnerability database was designed to collect,assess and publish vulnerability information.However,there was redundant and heterogeneous data in vulnerability database which leads to sharing difficulty of vulnerability information among vulnerability database.15 main vulnerability database with a total of 842 thousands of vulnerability data items were connected and analyzed.Based on text mining technology,a rule of removing duplicate form vulnerabilities whose accuracy rate was 94.4% and vulnerability database fusion framework(UVDA)were proposed.Finally,three representative vulnerability database were used to realize UVDA framework,which made the process fully automatic.The generated UVDA vulnerability database has been used in national security vulnerability database and can be retrieved according to uniform product version and date time,promoting the standardization process of vulnerability information release mechanism.…”
Get full text
Article -
328
Application of fuzzy comprehensive evaluation method in network information security assessment of electric power enterprises
Published 2020-03-01“…Nowadays,electric power enterprises have realized the operation and production of information technology,and the importance of network information security evaluation is more and more obvious.Two-level fuzzy comprehensive evaluation method was used to evaluate the security level of network information security system of power enterprises based on PRDD model,and Delphi method was used to determine the weight coefficients of various factors of network security of power enterprises in the evaluation process.Through objective analysis of the evaluation results,the network credit of power enterprises was found out.The prominent problems existing in the informa tion security system should be solved and the corresponding security reinforcement scheme should be formulated.The validation results show that the optimized network information security model is more robust,practicability and operability are significantly improved,which effectively improve the network information security level of power enterprises,and can be used as a favorable reference for the construction of network information security of other power enterprises.…”
Get full text
Article -
329
A Reconfigurable Antenna-Based Solution for Stationary Device Authentication in Wireless Networks
Published 2012-01-01“…Applying channel information for user authentication is gaining attention in the area of wireless network security. Similarly, reconfigurable antennas capable of generating multiple decorrelated channel realizations have become increasingly popular in wireless systems. …”
Get full text
Article -
330
AN APPROACH HYBRID RECURRENT NEURAL NETWORK AND RULE-BASE FOR INTRUSION DETECTION SYSTEM
Published 2019-06-01“…Network intrusion detection is one of the most important issues of network security and is a research interest of many researchers. …”
Get full text
Article -
331
Packet Payload Monitoring for Internet Worm Content Detection Using Deterministic Finite Automaton with Delayed Dictionary Compression
Published 2014-01-01“…Packet content scanning is one of the crucial threats to network security and network monitoring applications. In monitoring applications, payload of packets in a network is matched against the set of patterns in order to detect attacks like worms, viruses, and protocol definitions. …”
Get full text
Article -
332
-
333
Assisting Laboratory Management Based on Network Big Data Mining Technology
Published 2022-01-01“…In today’s big data context, the composition of virtual networks is becoming increasingly complex, so it is neither easy nor difficult to strengthen the control of network security issues. This paper studies the important content of network big data mining-assisted laboratory management. …”
Get full text
Article -
334
Malware Detection in Self-Driving Vehicles Using Machine Learning Algorithms
Published 2020-01-01“…Thus, intrusion detection is a key network security function in vehicles with open connectivity, such as self-driving and connected cars. …”
Get full text
Article -
335
Modeling Peer-to-Peer Botnet on Scale-Free Network
Published 2014-01-01“…Our findings can provide meaningful instruction to network security management.…”
Get full text
Article -
336
A Hybrid Swarm Intelligence Algorithm for Intrusion Detection Using Significant Features
Published 2015-01-01“…Intrusion detection has become a main part of network security due to the huge number of attacks which affects the computers. …”
Get full text
Article -
337
An active detection of compromised nodes based on en-route trap in wireless sensor network
Published 2021-08-01“…With the development and wide use of wireless sensor network, security arises as an essential issue since sensors with restrict resources are deployed in wild areas in an unattended manner. …”
Get full text
Article -
338
Dynamics and Control of Worm Epidemic Based on Mobile Networks by SEIQR-Type Model with Saturated Incidence Rate
Published 2021-01-01“…Our results give new insights to mobile network security, namely, that is predicting the worm spreading tendency, identifying the epidemic control strategies, and estimating the worm popularity level. …”
Get full text
Article -
339
Network threat situation assessment based on unsupervised multi-source data feature analysis
Published 2020-02-01“…Aiming at the limitations of supervised neural network in the network threat testing task relying on data category tagging,a network threat situation evaluation method based on unsupervised multi-source data feature analysis was proposed.Firstly,a variant auto encoder-generative adversarial network (V-G) for security threat assessment was designed.The training data set containing only normal network traffic was input to the network collection layer of V-G to perform the model training,and the reconstruction error of the network output of each layer was calculated.Then,the reconstruction error learning was performed by the three-layer variation automatic encoder of the output layer,and the training abnormal threshold was obtained.The packet threat was tested by using the test data set containing the abnormal network traffic,and the probability of occurrence of the threat of each group of tests was counted.Finally,the severity of the network security threat was determined according to the probability of threat occurrence,and the threat situation value was calculated according to the threat impact to obtain the network threat situation.The simulation results show that the proposed method has strong characterization ability for network threats,and can effectively and intuitively evaluate the overall situation of network threat.…”
Get full text
Article -
340
Intelligent operation and maintenance of power communication network based on data perception fusion
Published 2024-01-01“…Under the common influence of multiple factors and structural complexity in the power communication network, traditional operation and maintenance methods are vulnerable to the disturbance of abnormal voltage signal and abnormal transformer signal in the perception process, resulting in the global perception of the network and seriously affecting the overall operation and maintenance effect.In order to effectively solve the problem of perception bias caused by multiple factors, the data perception fusion algorithm was used to optimize the perception of the power parameters under the power communication network, so as to realize the effect of improving the perception accuracy and optimizing the overall quality of operation and maintenance.In the optimization scheme, the situational awareness scope of power communication network security was determined firstly.Secondly, the situational awareness of voltage security under power communication network operation was optimized.Thirdly, the security situational awareness parameters of power network transformer were defined based on the data perception fusion algorithm.Finally, the data perception fusion calculation of perception information was completed.The simulation comparison test shows that the data perception fusion algorithm has the ability to improve the overall quality of operation and maintenance, reduce the perception deviation in the process of operation and maintenance, and improve the perception sensitivity and accuracy.…”
Get full text
Article