期刊文献+
共找到20篇文章
< 1 >
每页显示 20 50 100
Secure Network Coding Against Intra/Inter-Generation Pollution Attacks 被引量:4
1
作者 刘光军 王斌 《China Communications》 SCIE CSCD 2013年第8期100-110,共11页
By allowing routers to combine the received packets before forwarding them,network coding-based applications are susceptible to possible malicious pollution attacks.Existing solutions for counteracting this issue eith... By allowing routers to combine the received packets before forwarding them,network coding-based applications are susceptible to possible malicious pollution attacks.Existing solutions for counteracting this issue either incur inter-generation pollution attacks(among multiple generations)or suffer high computation/bandwidth overhead.Using a dynamic public key technique,we propose a novel homomorphic signature scheme for network coding for each generation authentication without updating the initial secret key used.As per this idea,the secret key is scrambled for each generation by using the generation identifier,and each packet can be fast signed using the scrambled secret key for the generation to which the packet belongs.The scheme not only can resist intra-generation pollution attacks effectively but also can efficiently prevent inter-generation pollution attacks.Further,the communication overhead of the scheme is small and independent of the size of the transmitting files. 展开更多
关键词 network coding pollution attacks homomorphic signature authentication homomorphic cryptography
下载PDF
Cost management based security framework in mobile ad hoc networks
2
作者 YANG Rui-jun XIA Qi +2 位作者 PAN Qun-hua WANG Wei-nong LI Ming-lu 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2006年第4期493-501,共9页
Security issues are always difficult to deal with in mobile ad hoe networks. People seldom studied the costs of those security schemes respectively and for some security methods designed and adopted beforehand, their ... Security issues are always difficult to deal with in mobile ad hoe networks. People seldom studied the costs of those security schemes respectively and for some security methods designed and adopted beforehand, their effects are often investigated one by one. In fact, when facing certain attacks, different methods would respond individually and result in waste of resources. Making use of the cost management idea, we analyze the costs of security measures in mobile ad hoc networks and introduce a security framework based on security mechanisms cost management. Under the framework, the network system's own tasks can be finished in time and the whole network's security costs can be decreased. We discuss the process of security costs computation at each mobile node and in certain nodes groups. To show how to use the proposed security framework in certain applications, we give examples of DoS attacks and costs computation of defense methods. The results showed that more secure environment can be achieved based on the security framework in mobile ad hoc networks. 展开更多
关键词 network attacks Mobile ad hoc Cost management Security framework
下载PDF
An Effective Classifier Model for Imbalanced Network Attack Data
3
作者 Gürcan Ctin 《Computers, Materials & Continua》 SCIE EI 2022年第12期4519-4539,共21页
Recently,machine learning algorithms have been used in the detection and classification of network attacks.The performance of the algorithms has been evaluated by using benchmark network intrusion datasets such as DAR... Recently,machine learning algorithms have been used in the detection and classification of network attacks.The performance of the algorithms has been evaluated by using benchmark network intrusion datasets such as DARPA98,KDD’99,NSL-KDD,UNSW-NB15,and Caida DDoS.However,these datasets have two major challenges:imbalanced data and highdimensional data.Obtaining high accuracy for all attack types in the dataset allows for high accuracy in imbalanced datasets.On the other hand,having a large number of features increases the runtime load on the algorithms.A novel model is proposed in this paper to overcome these two concerns.The number of features in the model,which has been tested at CICIDS2017,is initially optimized by using genetic algorithms.This optimum feature set has been used to classify network attacks with six well-known classifiers according to high f1-score and g-mean value in minimumtime.Afterwards,amulti-layer perceptron based ensemble learning approach has been applied to improve the models’overall performance.The experimental results showthat the suggested model is acceptable for feature selection as well as classifying network attacks in an imbalanced dataset,with a high f1-score(0.91)and g-mean(0.99)value.Furthermore,it has outperformed base classifier models and voting procedures. 展开更多
关键词 Ensemble methods feature selection genetic algorithm multilayer perceptron network attacks imbalanced data
下载PDF
Task-Specific Feature Selection and Detection Algorithms for IoT-Based Networks
4
作者 Yang Gyun Kim Benito Mendoza +1 位作者 Ohbong Kwon John Yoon 《Journal of Computer and Communications》 2022年第10期59-73,共15页
As IoT devices become more ubiquitous, the security of IoT-based networks becomes paramount. Machine Learning-based cybersecurity enables autonomous threat detection and prevention. However, one of the challenges of a... As IoT devices become more ubiquitous, the security of IoT-based networks becomes paramount. Machine Learning-based cybersecurity enables autonomous threat detection and prevention. However, one of the challenges of applying Machine Learning-based cybersecurity in IoT devices is feature selection as most IoT devices are resource-constrained. This paper studies two feature selection algorithms: Information Gain and PSO-based, to select a minimum number of attack features, and Decision Tree and SVM are utilized for performance comparison. The consistent use of the same metrics in feature selection and detection algorithms substantially enhances the classification accuracy compared to the non-consistent use in feature selection by Information Gain (entropy) and Tree detection algorithm by classification. Furthermore, the Tree with consistent feature selection is comparable to the ensemble that provides excellent performance at the cost of computation complexity. 展开更多
关键词 CYBERSECURITY Features Selection Information Gain Particle Swarm Optimization Intrusion Detection System Machine Learning Decision Tree network attacks IoT network
下载PDF
FEW-NNN: A Fuzzy Entropy Weighted Natural Nearest Neighbor Method for Flow-Based Network Traffic Attack Detection 被引量:7
5
作者 Liangchen Chen Shu Gao +2 位作者 Baoxu Liu Zhigang Lu Zhengwei Jiang 《China Communications》 SCIE CSCD 2020年第5期151-167,共17页
Attacks such as APT usually hide communication data in massive legitimate network traffic, and mining structurally complex and latent relationships among flow-based network traffic to detect attacks has become the foc... Attacks such as APT usually hide communication data in massive legitimate network traffic, and mining structurally complex and latent relationships among flow-based network traffic to detect attacks has become the focus of many initiatives. Effectively analyzing massive network security data with high dimensions for suspicious flow diagnosis is a huge challenge. In addition, the uneven distribution of network traffic does not fully reflect the differences of class sample features, resulting in the low accuracy of attack detection. To solve these problems, a novel approach called the fuzzy entropy weighted natural nearest neighbor(FEW-NNN) method is proposed to enhance the accuracy and efficiency of flowbased network traffic attack detection. First, the FEW-NNN method uses the Fisher score and deep graph feature learning algorithm to remove unimportant features and reduce the data dimension. Then, according to the proposed natural nearest neighbor searching algorithm(NNN_Searching), the density of data points, each class center and the smallest enclosing sphere radius are determined correspondingly. Finally, a fuzzy entropy weighted KNN classification method based on affinity is proposed, which mainly includes the following three steps: 1、 the feature weights of samples are calculated based on fuzzy entropy values, 2、 the fuzzy memberships of samples are determined based on affinity among samples, and 3、 K-neighbors are selected according to the class-conditional weighted Euclidean distance, the fuzzy membership value of the testing sample is calculated based on the membership of k-neighbors, and then all testing samples are classified according to the fuzzy membership value of the samples belonging to each class;that is, the attack type is determined. The method has been applied to the problem of attack detection and validated based on the famous KDD99 and CICIDS-2017 datasets. From the experimental results shown in this paper, it is observed that the FEW-NNN method improves the accuracy and efficiency of flow-based network traffic attack detection. 展开更多
关键词 fuzzy entropy weighted KNN network attack detection fuzzy membership natural nearest neighbor network security intrusion detection system
下载PDF
A Network Security Risk Assessment Method Based on a B_NAG Model 被引量:2
6
作者 Hui Wang Chuanhan Zhu +3 位作者 Zihao Shen Dengwei Lin Kun Liu MengYao Zhao 《Computer Systems Science & Engineering》 SCIE EI 2021年第7期103-117,共15页
Computer networks face a variety of cyberattacks.Most network attacks are contagious and destructive,and these types of attacks can be harmful to society and computer network security.Security evaluation is an effecti... Computer networks face a variety of cyberattacks.Most network attacks are contagious and destructive,and these types of attacks can be harmful to society and computer network security.Security evaluation is an effective method to solve network security problems.For accurate assessment of the vulnerabilities of computer networks,this paper proposes a network security risk assessment method based on a Bayesian network attack graph(B_NAG)model.First,a new resource attack graph(RAG)and the algorithm E-Loop,which is applied to eliminate loops in the B_NAG,are proposed.Second,to distinguish the confusing relationships between nodes of the attack graph in the conversion process,a related algorithm is proposed to generate the B_NAG model.Finally,to analyze the reachability of paths in B_NAG,the measuring indexs such as node attack complexity and node state transition are defined,and an iterative algorithm for obtaining the probability of reaching the target node is presented.On this basis,the posterior probability of related nodes can be calculated.A simulation environment is set up to evaluate the effectiveness of the B_NAG model.The experimental results indicate that the B_NAG model is realistic and effective in evaluating vulnerabilities of computer networks and can accurately highlight the degree of vulnerability in a chaotic relationship. 展开更多
关键词 network attack graph Bayesian network state transition REACHABILITY risk assessment
下载PDF
Network resource allocation attack detection with long range dependence
7
作者 王欣 方滨兴 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2007年第1期74-78,共5页
The approach of traffic abnormality detection of network resource allocation attack did not have reliable signatures to depict abnormality and identify them. However, it is crucial for us to detect attacks accurately.... The approach of traffic abnormality detection of network resource allocation attack did not have reliable signatures to depict abnormality and identify them. However, it is crucial for us to detect attacks accurately. The technique that we adopted is inspired by long range dependence ideas. We use the number of packet arrivals of a flow in fixed-length time intervals as the signal and attempt to extend traffic invariant “self-similarity”. We validate the effectiveness of the approach with simulation and trace analysis. 展开更多
关键词 network resource allocation attack long range dependence Hurst parameter
下载PDF
Adaptive and augmented active anomaly detection on dynamic network traffic streams
8
作者 Bin LI Yijie WANG Li CHENG 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2024年第3期446-460,共15页
Active anomaly detection queries labels of sampled instances and uses them to incrementally update the detection model,and has been widely adopted in detecting network attacks.However,existing methods cannot achieve d... Active anomaly detection queries labels of sampled instances and uses them to incrementally update the detection model,and has been widely adopted in detecting network attacks.However,existing methods cannot achieve desirable performance on dynamic network traffic streams because(1)their query strategies cannot sample informative instances to make the detection model adapt to the evolving stream and(2)their model updating relies on limited query instances only and fails to leverage the enormous unlabeled instances on streams.To address these issues,we propose an active tree based model,adaptive and augmented active prior-knowledge forest(A3PF),for anomaly detection on network trafic streams.A prior-knowledge forest is constructed using prior knowledge of network attacks to find feature subspaces that better distinguish network anomalies from normal traffic.On one hand,to make the model adapt to the evolving stream,a novel adaptive query strategy is designed to sample informative instances from two aspects:the changes in dynamic data distribution and the uncertainty of anomalies.On the other hand,based on the similarity of instances in the neighborhood,we devise an augmented update method to generate pseudo labels for the unlabeled neighbors of query instances,which enables usage of the enormous unlabeled instances during model updating.Extensive experiments on two benchmarks,CIC-IDS2017 and UNSW-NB15,demonstrate that A3PF achieves significant improvements over previous active methods in terms of the area under the receiver operating characteristic curve(AUC-ROC)(20.9%and 21.5%)and the area under the precision-recall curve(AUC-PR)(44.6%and 64.1%). 展开更多
关键词 Active anomaly detection network traffic streams Pseudo labels Prior knowledge of network attacks
原文传递
Automatic Botnet Attack Identification Based on Machine Learning
9
作者 Peng Hui Li Jie Xu +6 位作者 Zhong Yi Xu Su Chen Bo Wei Niu Jie Yin Xiao Feng Sun Hao Liang Lan Lu Lu Chen 《Computers, Materials & Continua》 SCIE EI 2022年第11期3847-3860,共14页
At present,the severe network security situation has put forward high requirements for network security defense technology.In order to automate botnet threat warning,this paper researches the types and characteristics... At present,the severe network security situation has put forward high requirements for network security defense technology.In order to automate botnet threat warning,this paper researches the types and characteristics of Botnet.Botnet has special characteristics in attributes such as packets,attack time interval,and packet size.In this paper,the attack data is annotated by means of string recognition and expert screening.The attack features are extracted from the labeled attack data,and then use K-means for cluster analysis.The clustering results show that the same attack data has its unique characteristics,and the automatic identification of network attacks is realized based on these characteristics.At the same time,based on the collection and attribute extraction of Botnet attack data,this paper uses RF,GBM,XGBOOST and other machine learning models to test the warning results,and automatically analyzes the attack by importing attack data.In the early warning analysis results,the accuracy rates of different models are obtained.Through the descriptive values of the three accuracy rates of Accuracy,Precision,and F1_Score,the early warning effect of each model can be comprehensively displayed.Among the five algorithms used in this paper,three have an accuracy rate of over 90%.The three models with the highest accuracy are used in the early warning model.The research shows that cyberattacks can be accurately predicted.When this technology is applied to the protection system,accurate early warning can be given before a network attack is launched. 展开更多
关键词 HONEYPOT LOG network attack machine learning
下载PDF
An Overview of General Theory of Security
10
作者 Min Lei Yixian Yang +2 位作者 Xinxin Niu Yu Yang Jie Hao 《China Communications》 SCIE CSCD 2017年第7期1-10,共10页
Cyber security lacks comprehensive theoretical guidance. General security theory, as a set of basic security theory concepts, is intended to guide cyber security and all the other security work. The general theory of ... Cyber security lacks comprehensive theoretical guidance. General security theory, as a set of basic security theory concepts, is intended to guide cyber security and all the other security work. The general theory of security aims to unify the main branches of cyber security and establish a unified basic theory. This paper proposal an overview on the general theory of security, which is devoted to constructing a comprehensive model of network security. The hierarchical structure of the meridian-collateral tree is described. Shannon information theory is employed to build a cyberspace security model. Some central concepts of security, i.e., the attack and defense, are discussed and several general theorems on security are presented. 展开更多
关键词 cyber security network attack and defense meridian-collateral theory
下载PDF
A Website Security Risk Assessment Method Based on the I-BAG Model
11
作者 Lin Liu Liang Liu +2 位作者 Cheng Huang Zhao Zhang Yong Fang 《China Communications》 SCIE CSCD 2016年第5期172-181,共10页
In order to protect the website and assess the security risk of website, a novel website security risk assessment method is proposed based on the improved Bayesian attack graph(I-BAG) model. First, the Improved Bayesi... In order to protect the website and assess the security risk of website, a novel website security risk assessment method is proposed based on the improved Bayesian attack graph(I-BAG) model. First, the Improved Bayesian attack graph model is established, which takes attack benefits and threat factors into consideration. Compared with the existing attack graph models, it can better describe the website's security risk. Then, the improved Bayesian attack graph is constructed with optimized website attack graph, attack benefit nodes, threat factor nodes and the local conditional probability distribution of each node, which is calculated accordingly. Finally, website's attack probability and risk value are calculated on the level of nodes, hosts and the whole website separately. The experimental results demonstrate that the risk evaluating method based on I-BAG model proposed is a effective way for assessing the website security risk. 展开更多
关键词 web security risk assessment attack graph Bayesian network
下载PDF
Discussion and Research on Information Security Attack and Defense Platform Construction in Universities Based on Cloud Computing and Virtualization
12
作者 Xiancheng Ding 《Journal of Information Security》 2016年第5期297-303,共7页
This paper puts forward the plan on constructing information security attack and defense platform based on cloud computing and virtualization, provides the hardware topology structure of the platform and technical fra... This paper puts forward the plan on constructing information security attack and defense platform based on cloud computing and virtualization, provides the hardware topology structure of the platform and technical framework of the system and the experimental process and technical principle of the platform. The experiment platform can provide more than 20 attack classes. Using the virtualization technology can build hypothesized target of various types in the laboratory and diversified network structure to carry out attack and defense experiment. 展开更多
关键词 Information Security network Attack and Defense VIRTUALIZATION Experiment Platform
下载PDF
Exploring the link between brain topological resilience and cognitive performance in the context of aging and vascular risk factors:A cross-ethnicity population-based study
13
作者 Hao Liu Jing Jing +21 位作者 Jiyang Jiang Wei Wen Wanlin Zhu Zixiao Li Yuesong Pan Xueli Cai Chang Liu Yijun Zhou Xia Meng Yilong Wang Hao Li Yong Jiang Huaguang Zheng Suying Wang Haijun Niu Nicole Kochan Henry Brodaty Tiemin Wei Perminder S.Sachdev Yubo Fan Tao Liu Yongjun Wang 《Science Bulletin》 SCIE EI CAS CSCD 2024年第17期2735-2744,共10页
Brain aging is typically associated with a significant decline in cognitive performance.Vascular risk factors(VRF)and subsequent atherosclerosis(AS)play a major role in this process.Brain resilience reflects the brain... Brain aging is typically associated with a significant decline in cognitive performance.Vascular risk factors(VRF)and subsequent atherosclerosis(AS)play a major role in this process.Brain resilience reflects the brain’s ability to withstand external perturbations,but the relationship of brain resilience with cognition during the aging process remains unclear.Here,we investigated how brain topological resilience(BTR)is associated with cognitive performance in the face of aging and vascular risk factors.We used data from two cross-ethnicity community cohorts,PolyvasculaR Evaluation for Cognitive Impairment and Vascular Events(PRECISE,n=2220)and Sydney Memory and Ageing Study(MAS,n=246).We conducted an attack simulation on brain structural networks based on k-shell decomposition and node degree centrality.BTR was defined based on changes in the size of the largest subgroup of the network during the simulation process.Subsequently,we explored the negative correlations of BTR with age,VRF,and AS,and its positive correlation with cognitive performance.Furthermore,using structural equation modeling(SEM),we constructed path models to analyze the directional dependencies among these variables,demonstrating that aging,AS,and VRF affect cognition by disrupting BTR.Our results also indicated the specificity of this metric,independent of brain volume.Overall,these findings underscore the supportive role of BTR on cognition during aging and highlight its potential application as an imaging marker for objective assessment of brain cognitive performance. 展开更多
关键词 Brain resilience Vascular risk factors Cognition decline K-shell decomposition network attack simulation
原文传递
Key technologies of new malicious code developments and defensive measures in communication networks 被引量:1
14
作者 LI Peng,WANG Ru-chuan ,ZHANG Wei College of Computer,Nanjing University of Posts and Telecommunications,Nanjing 210003,China 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2010年第4期69-73,共5页
This article is focused on analyzing the key technologies of new malicious code and corresponding defensive measures in the large-scale communication networks. Based on description of the concepts and development of t... This article is focused on analyzing the key technologies of new malicious code and corresponding defensive measures in the large-scale communication networks. Based on description of the concepts and development of the malicious code, the article introduces the anti-analysis technology, splitting and inserting technology, hiding technology, polymorph virus technology, and auto production technology of the malicious code trends with intelligence, diversity and integration. Following that, it summarizes the security vulnerabilities of communication networks from four related layers aspects, according to the mechanisms of malicious code in the communication networks. Finally, it proposes rapid response disposition of malicious code attacks from four correlated steps: building up the network node monitoring system, suspicious code feature automation analysis and extraction, rapid active malicious code response technique for unknown malicious code, and malicious code attack immunity technique. As a result, it actively defenses against the unknown malicious code attacks and enhances the security performance of communication networks. 展开更多
关键词 network security malicious code network attack and defense malicious code defense
原文传递
Heuristics of node selection criteria to assess robustness of world airport network 被引量:3
15
作者 Manel SORIA Oriol LORDAN JosMaría SALLAN 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2017年第4期1473-1480,共8页
The world airport network(WAN) is one of the networked infrastructures that shape today's economic and social activity, so its resilience against incidents affecting the WAN is an important problem. In this paper, ... The world airport network(WAN) is one of the networked infrastructures that shape today's economic and social activity, so its resilience against incidents affecting the WAN is an important problem. In this paper, the robustness of air route networks is extended by defining and testing several heuristics to define selection criteria to detect the critical nodes of the WAN.In addition to heuristics based on genetic algorithms and simulated annealing, custom heuristics based on node damage and node betweenness are defined. The most effective heuristic is a multiattack heuristic combining both custom heuristics. Results obtained are of importance not only for advance in the understanding of the structure of complex networks, but also for critical node detection. 展开更多
关键词 Adaptive strategy Air route networks Complex networks Intentional attacks network robustness
原文传递
TIFAflow: Enhancing Traffic Archiving System with Flow Granularity for Forensic Analysis in Network Security 被引量:3
16
作者 Zhen Chen Linyun Ruan +2 位作者 Junwei Cao Yifan Yu Xin Jiang 《Tsinghua Science and Technology》 SCIE EI CAS 2013年第4期406-417,共12页
The archiving of Internet traffic is an essential function for retrospective network event analysis and forensic computer communication. The state-of-the-art approach for network monitoring and analysis involves stora... The archiving of Internet traffic is an essential function for retrospective network event analysis and forensic computer communication. The state-of-the-art approach for network monitoring and analysis involves storage and analysis of network flow statistic. However, this approach loses much valuable information within the Internet traffic. With the advancement of commodity hardware, in particular the volume of storage devices and the speed of interconnect technologies used in network adapter cards and multi-core processors, it is now possible to capture 10 Gbps and beyond real-time network traffic using a commodity computer, such as n2disk. Also with the advancement of distributed file system (such as Hadoop, ZFS, etc.) and open cloud computing platform (such as OpenStack, CloudStack, and Eucalyptus, etc.), it is practical to store such large volume of traffic data and fully in-depth analyse the inside communication within an acceptable latency. In this paper, based on well- known TimeMachine, we present TIFAflow, the design and implementation of a novel system for archiving and querying network flows. Firstly, we enhance the traffic archiving system named TImemachine+FAstbit (TIFA) with flow granularity, i.e., supply the system with flow table and flow module. Secondly, based on real network traces, we conduct performance comparison experiments of TIFAflow with other implementations such as common database solution, TimeMachine and TIFA system. Finally, based on comparison results, we demonstrate that TIFAflow has a higher performance improvement in storing and querying performance than TimeMachine and TIFA, both in time and space metrics. 展开更多
关键词 network security traffic archival forensic analysis phishing attack bitmap database hadoop distributed file system cloud computing NoSQL
原文传递
Prediction of network attack profit path based on NAPG model
17
作者 Liu Kun Wang Hui Shen Zihao 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2020年第5期91-102,共12页
The network attack profit graph(NAPG)model and the attack profit path predication algorithm are presented herein to cover the shortage of considerations in attacker’s subjective factors based on existing network atta... The network attack profit graph(NAPG)model and the attack profit path predication algorithm are presented herein to cover the shortage of considerations in attacker’s subjective factors based on existing network attack path prediction methods.Firstly,the attack profit is introduced,with the attack profit matrix designed and the attack profit matrix generation algorithm given accordingly.Secondly,a path profit feasibility analysis algorithm is proposed to analyze the network feasibility of realizing profit of attack path.Finally,an opportunity profit path and an optimal profit path are introduced with the selection algorithm and the prediction algorithm designed for accurate prediction of the path.According to the experimental test,the network attack profit path predication algorithm is applicable for accurate prediction of the opportunity profit path and the optimal profit path. 展开更多
关键词 network attack graph technology attack profit profit matrix attack profit rate network path prediction
原文传递
Using deep learning to solve computer security challenges:a survey 被引量:1
18
作者 Yoon-Ho Choi Peng Liu +5 位作者 Zitong Shang Haizhou Wang Zhilong Wang Lan Zhang Junwei Zhou Qingtian Zou 《Cybersecurity》 CSCD 2020年第1期203-234,共32页
Although using machine learning techniques to solve computer security challenges is not a new idea,the rapidly emerging Deep Learning technology has recently triggered a substantial amount of interests in the computer... Although using machine learning techniques to solve computer security challenges is not a new idea,the rapidly emerging Deep Learning technology has recently triggered a substantial amount of interests in the computer security community.This paper seeks to provide a dedicated review of the very recent research works on using Deep Learning techniques to solve computer security challenges.In particular,the review covers eight computer security problems being solved by applications of Deep Learning:security-oriented program analysis,defending return-oriented programming(ROP)attacks,achieving control-flow integrity(CFI),defending network attacks,malware classification,system-event-based anomaly detection,memory forensics,and fuzzing for software security. 展开更多
关键词 Deep learning Security-oriented program analysis Return-oriented programming attacks Control-flow integrity network attacks Malware classification System-event-based anomaly detection Memory forensics Fuzzing for software security
原文传递
Using deep learning to solve computer security challenges:a survey
19
作者 Yoon-Ho Choi Peng Liu +5 位作者 Zitong Shang Haizhou Wang Zhilong Wang Lan Zhang Junwei Zhou Qingtian Zou 《Cybersecurity》 2018年第1期815-846,共32页
Although using machine learning techniques to solve computer security challenges is not a new idea,the rapidly emerging Deep Learning technology has recently triggered a substantial amount of interests in the computer... Although using machine learning techniques to solve computer security challenges is not a new idea,the rapidly emerging Deep Learning technology has recently triggered a substantial amount of interests in the computer security community.This paper seeks to provide a dedicated review of the very recent research works on using Deep Learning techniques to solve computer security challenges.In particular,the review covers eight computer security problems being solved by applications of Deep Learning:security-oriented program analysis,defending return-oriented programming(ROP)attacks,achieving control-flow integrity(CFI),defending network attacks,malware classification,system-event-based anomaly detection,memory forensics,and fuzzing for software security. 展开更多
关键词 Deep learning Security-oriented program analysis Return-oriented programming attacks Control-flow integrity network attacks Malware classification System-event-based anomaly detection Memory forensics Fuzzing for software security
原文传递
Bayes-Based ARP Attack Detection Algorithm for Cloud Centers 被引量:1
20
作者 Huan Ma Hao Ding +3 位作者 Yang Yang Zhenqiang Mi James Yifei Yang Zenggang Xiong 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2016年第1期17-28,共12页
To address the issue of internal network security, Software-Defined Network(SDN) technology has been introduced to large-scale cloud centers because it not only improves network performance but also deals with netwo... To address the issue of internal network security, Software-Defined Network(SDN) technology has been introduced to large-scale cloud centers because it not only improves network performance but also deals with network attacks. To prevent man-in-the-middle and denial of service attacks caused by an address resolution protocol bug in an SDN-based cloud center, this study proposed a Bayes-based algorithm to calculate the probability of a host being an attacker and further presented a detection model based on the algorithm. Experiments were conducted to validate this method. 展开更多
关键词 cloud computing Bayes ARP attack detection software-defined network
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部