期刊文献+

大数据技术应用于ISR系统需要解决的几个关键问题 被引量:1

Several Key Problems for Big Data Techniques Using in Intelligence Surveillance and Reconnaissance(ISR) System
下载PDF
导出
摘要 首先介绍了大数据的概念、内涵、特征和分析方法,然后结合信息化条件下情报侦察监视系统(ISR)的实际特点,从侦察手段多样、侦察数据繁杂、信号真伪难辨、处理实时要求高等方面,分析了大数据技术在情报侦察工作中的可行性和必要性。最后,指出了大数据应用于侦察情报工作需要考虑的几个关键问题,例如侦察大数据的处理流程、数据的安全性与可信性、侦察系统的可重构、与现有系统的衔接等,并给出了科学的参考建议。 Firstly the conception,connotation,characteristics and analytical methods are introduced.Then aiming at the actual situations of Intelligence Surveillance and Reconnaissance(ISR)System,such as the diversity of reconnaissance means,the miscellaneous of reconnaissance data,the fact or fiction for the signals,and the real-time requirements for information processing,the feasibility and necessity for big data technologies using in ISR system.Finally,several key problems for big data technologies using in ISR system are pointed out,such as the process flow for reconnaissance data,the safety and creditability for data,the reconfigurable for different ISR systems,and the linking up with existing systems.Also scientific proposals are given for them.
出处 《计算机与数字工程》 2016年第1期100-105,共6页 Computer & Digital Engineering
基金 博士后基金项目(编号:2012M512132) 总装预研项目(编号:9140A06040313JB11084)资助
关键词 大数据 ISR 预处理 可重构 衔接 big data ISR preconditioning reconfigurable link up
  • 相关文献

参考文献9

二级参考文献63

  • 1Kuzmanovic A, Knightly EW. Low-Rate TCP-targeted denial of service attacks--the shrew vs. the mice and elephants. In: Proc. of the ACM SIGCOMM 2003. New York: ACM Press, 2003. 75-86. http://byte.csc.lsu.edu/-durresi/7502/reading/p75-kuzmanovic. pdf.
  • 2Sarat S, Terzis A. On the effect of router buffer sizes on low-rate denial of service attacks. In: Proc. of the 14th Int'l Conf. on Computer Communications and Networks (ICCCN 2005). New York: IEEE Press, 200S. 281-286. http://www.cs.jhu.edu/-sarat/ ICCCN05.pdf.
  • 3Kwok YK, Tripathi R, Chen Y, Hwang K. HAWK: Halting anomalies with weighted choking to rescue well-behaved TCP sessions from shrew DDoS attacks. In: Proc. of the 3rd Int'l Conf. on Networking and Mobile Computing (ICCNMC 2005). New York: Springer-Verlag, 2005.423-432. http://gridsec.usc.edu/files/TR/HAWK-ICCNMC2005-CameraReady.pdf.
  • 4Sun H, Lui JCS, Yau DKY. Defending against low-rate TCP attacks: Dynamic detection and protection. In: Proc. of the 12th IEEE Int'l Conf. on Network Protocols (ICNP 2004). New York: IEEE Press, 2004. 196-205. http://www.cse.cuhk.edu.hk/-cslui/ PUBLICATION/icnp_lowrate.pdf.
  • 5Sun H, Lui JCS, Yau DKY. Distributed mechanism in detecting and defending against the low-rate TCP attack. Computer Networks, 2006,50(13):2312-2330.
  • 6Chen Y, Hwang K. Collaborative detection and filtering of shrew DDoS attacks using spectral analysis. Journal of Parallel and Distributed Computing, 2006,66(9): 1137-1151.
  • 7Guirguis M, Bestavros A, Matta I. Exploiting the transients of adaptation for RoQ attacks on Internet resources. In: Proc. of the 12th IEEE Int'l Conf. on Network Protocols (ICN-P 2004). New York: IEEE Press, 2004. 184-195. http://www.ieee-icnp.org/ 2004/papers/5-2.pdf.
  • 8Luo XP, Chang RKC. On a new class of pulsing denial-of-service attacks and the dcfanse, In: Proc. of the Network and Distributed System Security Symp. (NDSS 2005). Rcston: Intcrnct Society, 2005. http://www.isoc.org/isoc/confercnces/ndss/OS/proccedings/ papers/new_pulsing_DOS.pdf.
  • 9Chertov R, Fahmy S, Shroff NB. Emulation versus simulation: A case study of TCP-targeted denial of service attack. In: Proc. of the 2nd IEEE Conf. on Testbeds and Research Infrastructures for the Development of Networks and Communities (TRIDENTCOM 2006). New York: IEEE Press, 2006. http://cobweb.ecn.purdue.edu/-shroff/Shroff/conference/CheFahShr-tridentcom.pdf.
  • 10Chen Y, Hwang K. Spectral analysis of TCP flows for defense against reduction-of-quality attacks. In: Proc. of the 2007 IEEE Int'l Conf. on Communications (ICC 2007). New York: IEEE Press, 2005. 1203-1210. http://pods.binghamton.edu/-ychenfPID364015. pdf.

共引文献126

同被引文献4

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部