With the growing discovery of exposed vulnerabilities in the Industrial Control Components(ICCs),identification of the exploitable ones is urgent for Industrial Control System(ICS)administrators to proactively forecas...With the growing discovery of exposed vulnerabilities in the Industrial Control Components(ICCs),identification of the exploitable ones is urgent for Industrial Control System(ICS)administrators to proactively forecast potential threats.However,it is not a trivial task due to the complexity of the multi-source heterogeneous data and the lack of automatic analysis methods.To address these challenges,we propose an exploitability reasoning method based on the ICC-Vulnerability Knowledge Graph(KG)in which relation paths contain abundant potential evidence to support the reasoning.The reasoning task in this work refers to determining whether a specific relation is valid between an attacker entity and a possible exploitable vulnerability entity with the help of a collective of the critical paths.The proposed method consists of three primary building blocks:KG construction,relation path representation,and query relation reasoning.A security-oriented ontology combines exploit modeling,which provides a guideline for the integration of the scattered knowledge while constructing the KG.We emphasize the role of the aggregation of the attention mechanism in representation learning and ultimate reasoning.In order to acquire a high-quality representation,the entity and relation embeddings take advantage of their local structure and related semantics.Some critical paths are assigned corresponding attentive weights and then they are aggregated for the determination of the query relation validity.In particular,similarity calculation is introduced into a critical path selection algorithm,which improves search and reasoning performance.Meanwhile,the proposed algorithm avoids redundant paths between the given pairs of entities.Experimental results show that the proposed method outperforms the state-of-the-art ones in the aspects of embedding quality and query relation reasoning accuracy.展开更多
A collective user web behavior simulation is an import means for generating a large-scale user network behavior in a network testbed or cyber range.Existing studies almost focus on individual web behavior analysis and...A collective user web behavior simulation is an import means for generating a large-scale user network behavior in a network testbed or cyber range.Existing studies almost focus on individual web behavior analysis and prediction,which cannot simulate human dynamics that widely exist in large-scale users’behaviors.To address these issues,we propose a novel collective user web behavior simulation method,in which an algorithm for constructing a connected virtual social network is proposed,and then a collective user web behavior simulation algorithm is designed on the virtual social network.In the simulation method,a new epidemic information dissemination algorithm based on the SIR model is proposed to drive the user web behavior with Breadth—First Search algorithm on the connected virtual social network.We specially build an experiment environment with 12 servers by using Docker container technology and then perform a wide range of experiments with different user scales to evaluate the method.The experimental results demonstrate that not only the degrees of the social network but also the time intervals of the collective users’web behavior can be well fitted to a power-law distribution and show that our simulation method can well simulate a collective user web behavior.展开更多
This project intends to study and discuss the teaching method of programming languages through an iterative case-driven model, to break through the traditional syntax-based teaching method so that students can activel...This project intends to study and discuss the teaching method of programming languages through an iterative case-driven model, to break through the traditional syntax-based teaching method so that students can actively participate in the case analysis and design which are closely related to enterprise applications. The purpose of teaching is achieved through the gradual iterative case-driven model. This project can form the best practice for the iterative case teaching method and promote programming language course innovation.展开更多
The new generation of world information technology revolution has promoted the vigorous development and rapid transform of the new economy.The in-depth implementation of a series of Chinese important national strategi...The new generation of world information technology revolution has promoted the vigorous development and rapid transform of the new economy.The in-depth implementation of a series of Chinese important national strategies such as“Made in China 2025”and“Internet+”is urgently needed the support of innovative and outstanding emerging engineering talents with cross-border integration abilities.Therefore,interdisciplinary education plays an important role in the training of the needed emerging engineering talents.Taking cybersecurity as an example,this paper summarizes the professional’s requirements and proposes the educational objectives of Harbin Institute of Technology.Then the objective oriented curriculum system and the teaching model emphasizing project-based learning are introduced.The practice and effect of interdisciplinary education are discussed and analyzed in four aspects including curriculum system,faculty,students and academy education.Finally,suggestions are made on the individualized education and sustainable competitiveness cultivation of the emerging engineering talents.展开更多
基金Our work is supported by the National Key R&D Program of China(2021YFB2012400).
文摘With the growing discovery of exposed vulnerabilities in the Industrial Control Components(ICCs),identification of the exploitable ones is urgent for Industrial Control System(ICS)administrators to proactively forecast potential threats.However,it is not a trivial task due to the complexity of the multi-source heterogeneous data and the lack of automatic analysis methods.To address these challenges,we propose an exploitability reasoning method based on the ICC-Vulnerability Knowledge Graph(KG)in which relation paths contain abundant potential evidence to support the reasoning.The reasoning task in this work refers to determining whether a specific relation is valid between an attacker entity and a possible exploitable vulnerability entity with the help of a collective of the critical paths.The proposed method consists of three primary building blocks:KG construction,relation path representation,and query relation reasoning.A security-oriented ontology combines exploit modeling,which provides a guideline for the integration of the scattered knowledge while constructing the KG.We emphasize the role of the aggregation of the attention mechanism in representation learning and ultimate reasoning.In order to acquire a high-quality representation,the entity and relation embeddings take advantage of their local structure and related semantics.Some critical paths are assigned corresponding attentive weights and then they are aggregated for the determination of the query relation validity.In particular,similarity calculation is introduced into a critical path selection algorithm,which improves search and reasoning performance.Meanwhile,the proposed algorithm avoids redundant paths between the given pairs of entities.Experimental results show that the proposed method outperforms the state-of-the-art ones in the aspects of embedding quality and query relation reasoning accuracy.
基金National Key Research and Development Plan under Grant 2017YFB0801804,Key Research and Development Plan of Shandong Province under Grant 2017CXGC0706Peng Cheng Laboratory Project of Guangdong Province PCL2018KP004+1 种基金frontier science and technology innovation of China under Grant 2016QY05X1002-2national regional innovation center scientific and technological special projects Grant 2017QYCX14,University Coconstruction Project in Weihai City.
文摘A collective user web behavior simulation is an import means for generating a large-scale user network behavior in a network testbed or cyber range.Existing studies almost focus on individual web behavior analysis and prediction,which cannot simulate human dynamics that widely exist in large-scale users’behaviors.To address these issues,we propose a novel collective user web behavior simulation method,in which an algorithm for constructing a connected virtual social network is proposed,and then a collective user web behavior simulation algorithm is designed on the virtual social network.In the simulation method,a new epidemic information dissemination algorithm based on the SIR model is proposed to drive the user web behavior with Breadth—First Search algorithm on the connected virtual social network.We specially build an experiment environment with 12 servers by using Docker container technology and then perform a wide range of experiments with different user scales to evaluate the method.The experimental results demonstrate that not only the degrees of the social network but also the time intervals of the collective users’web behavior can be well fitted to a power-law distribution and show that our simulation method can well simulate a collective user web behavior.
文摘This project intends to study and discuss the teaching method of programming languages through an iterative case-driven model, to break through the traditional syntax-based teaching method so that students can actively participate in the case analysis and design which are closely related to enterprise applications. The purpose of teaching is achieved through the gradual iterative case-driven model. This project can form the best practice for the iterative case teaching method and promote programming language course innovation.
基金supported in part by the Ministry of Education of the People’s Republic of China under the Emerging Engineering Education Research and Practice Projects of”Research and Practice on the Cooperative Education Model of Industry-Academic Cooperation in the Emerging Engineering Education System of Chinese Universities”and“Exploration and Practice of Engineering Talent Education Model with Multidisciplinary Integration”and under Grant 18JDGC014,and by the Shandong Provincial Department of Education under Grant M2018B336.
文摘The new generation of world information technology revolution has promoted the vigorous development and rapid transform of the new economy.The in-depth implementation of a series of Chinese important national strategies such as“Made in China 2025”and“Internet+”is urgently needed the support of innovative and outstanding emerging engineering talents with cross-border integration abilities.Therefore,interdisciplinary education plays an important role in the training of the needed emerging engineering talents.Taking cybersecurity as an example,this paper summarizes the professional’s requirements and proposes the educational objectives of Harbin Institute of Technology.Then the objective oriented curriculum system and the teaching model emphasizing project-based learning are introduced.The practice and effect of interdisciplinary education are discussed and analyzed in four aspects including curriculum system,faculty,students and academy education.Finally,suggestions are made on the individualized education and sustainable competitiveness cultivation of the emerging engineering talents.