期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
A Distributed Intrusion Detection Model via Nondestructive Partitioning and Balanced Allocation for Big Data 被引量:4
1
作者 Xiaonian Wu Chuyun Zhang +2 位作者 Runlian Zhang Yujue Wang jinhua cui 《Computers, Materials & Continua》 SCIE EI 2018年第7期61-72,共12页
There are two key issues in distributed intrusion detection system,that is,maintaining load balance of system and protecting data integrity.To address these issues,this paper proposes a new distributed intrusion detec... There are two key issues in distributed intrusion detection system,that is,maintaining load balance of system and protecting data integrity.To address these issues,this paper proposes a new distributed intrusion detection model for big data based on nondestructive partitioning and balanced allocation.A data allocation strategy based on capacity and workload is introduced to achieve local load balance,and a dynamic load adjustment strategy is adopted to maintain global load balance of cluster.Moreover,data integrity is protected by using session reassemble and session partitioning.The simulation results show that the new model enjoys favorable advantages such as good load balance,higher detection rate and detection efficiency. 展开更多
关键词 Distributed intrusion detection data allocation load balancing data integrity big data
下载PDF
Securing Display Path for Security-Sensitive Applications on Mobile Devices
2
作者 jinhua cui Yuanyuan Zhang +2 位作者 Zhiping Cai Anfeng Liu Yangyang Li 《Computers, Materials & Continua》 SCIE EI 2018年第4期17-35,共19页
While smart devices based on ARM processor bring us a lot of convenience,they also become an attractive target of cyber-attacks.The threat is exaggerated as commodity OSes usually have a large code base and suffer fro... While smart devices based on ARM processor bring us a lot of convenience,they also become an attractive target of cyber-attacks.The threat is exaggerated as commodity OSes usually have a large code base and suffer from various software vulnerabilities.Nowadays,adversaries prefer to steal sensitive data by leaking the content of display output by a security-sensitive application.A promising solution is to exploit the hardware visualization extensions provided by modern ARM processors to construct a secure display path between the applications and the display device.In this work,we present a scheme named SecDisplay for trusted display service,it protects sensitive data displayed from being stolen or tampered surreptitiously by a compromised OS.The TCB of SecDisplay mainly consists of a tiny hypervisor and a super light-weight rendering painter,and has only^1400 lines of code.We implemented a prototype of SecDisplay and evaluated its performance overhead.The results show that SecDisplay only incurs an average drop of 3.4%. 展开更多
关键词 Mobile device secure display VIRTUALIZATION trusted computing base display path trust anchor
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部