期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
最大化多相各向异性导体的第一特征值:凸化与均匀化
1
作者 楼红卫 尹雪元 《中国科学:数学》 CSCD 北大核心 2018年第10期1395-1414,共20页
为使一类代表着几种各向异性材料混合物的椭圆型算子的第一特征值达到最大,本文考虑凸化问题和均匀化意义下的松弛问题.本文发现这两种问题的解在某种意义上是等同的,并建立了存在性结果和必要条件.
关键词 最优化 最优控制 复合材料 特征值 均匀化 各向异性
原文传递
Research and Practice of Dynamic Network Security Architecture for IaaS Platforms 被引量:7
2
作者 Lin Chen Xingshu Chen +2 位作者 Junfang Jiang xueyuan yin Guolin Shao 《Tsinghua Science and Technology》 SCIE EI CAS 2014年第5期496-507,共12页
Network security requirements based on virtual network technologies in laaS platforms and corresponding solutions were reviewed. A dynamic network security architecture was proposed, which was built on the technologie... Network security requirements based on virtual network technologies in laaS platforms and corresponding solutions were reviewed. A dynamic network security architecture was proposed, which was built on the technologies of software defined networking, Virtual Machine (VM) traffic redirection, network policy unified management, software defined isolation networks, vulnerability scanning, and software updates. The proposed architecture was able to obtain the capacity for detection and access control for VM traffic by redirecting it to configurable security appliances, and ensured the effectiveness of network policies in the total life cycle of the VM by configuring the policies to the right place at the appropriate time, according to the impacts of VM state transitions. The virtual isolation domains for tenants' VMs could be built flexibly based on VLAN policies or Netfilter/Iptables firewall appliances, and vulnerability scanning as a service and software update as a service were both provided as security supports. Through cooperation with IDS appliances and automatic alarm mechanisms, the proposed architecture could dynamically mitigate a wide range of network-based attacks. The experimental results demonstrate the effectiveness of the proposed architecture. 展开更多
关键词 cloud computing network security LAAS life cycle network policy
原文传递
An Anomalous Behavior Detection Model in Cloud Computing 被引量:5
3
作者 Xiaoming Ye Xingshu Chen +4 位作者 Haizhou Wang Xuemei Zeng Guolin Shao xueyuan yin Chun Xu 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2016年第3期322-332,共11页
This paper proposes an anomalous behavior detection model based on cloud computing. Virtual Machines (VMs) are one of the key components of cloud Infrastructure as a Service (laaS). The security of such VMs is cri... This paper proposes an anomalous behavior detection model based on cloud computing. Virtual Machines (VMs) are one of the key components of cloud Infrastructure as a Service (laaS). The security of such VMs is critical to laaS security. Many studies have been done on cloud computing security issues, but research into VM security issues, especially regarding VM network traffic anomalous behavior detection, remains inadequate. More and more studies show that communication among internal nodes exhibits complex patterns. Communication among VMs in cloud computing is invisible. Researchers find such issues challenging, and few solutions have been proposed--leaving cloud computing vulnerable to network attacks. This paper proposes a model that uses Software-Defined Networks (SDN) to implement traffic redirection. Our model can capture inter-VM traffic, detect known and unknown anomalous network behaviors, adopt hybrid techniques to analyze VM network behaviors, and control network systems. The experimental results indicate that the effectiveness of our approach is greater than 90%, and prove the feasibility of the model. 展开更多
关键词 virtual machine network behavior anomaly detection cloud computing
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部