期刊文献+
共找到1,145篇文章
< 1 2 58 >
每页显示 20 50 100
Multilevel security model for ad hoc networks 被引量:1
1
作者 Wang Changda Ju Shiguang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第2期391-397,F0003,共8页
Modern battlefield doctrine is based on mobility, flexibility, and rapid response to changing situations. As is well known, mobile ad hoc network systems are among the best utilities for battlefield activity. Although... Modern battlefield doctrine is based on mobility, flexibility, and rapid response to changing situations. As is well known, mobile ad hoc network systems are among the best utilities for battlefield activity. Although much research has been done on secure routing, security issues have largely been ignored in applying mobile ad hoc network theory to computer technology. An ad hoc network is usually assumed to be homogeneous, which is an irrational assumption for armies. It is clear that soldiers, commanders, and commanders-in-chief should have different security levels and computation powers as they have access to asymmetric resources. Imitating basic military rank levels in battlefield situations, how multilevel security can be introduced into ad hoc networks is indicated, thereby controlling restricted classified information flows among nodes that have different security levels. 展开更多
关键词 ad hoc network multilevel security model access control.
下载PDF
A Three-dimensional IP-based Telecom Metropolitan Area Network Model
2
作者 Li Hongbiao (Data Division of ZTE Corporation, Nanjing 210012, China) 《ZTE Communications》 2005年第3期52-55,共4页
The Metropolitan Area Network (MAN) has faced serious problems after years of rapid development. The model of three-dimensional IP-based MAN, proposed by ZTE, is a next-generation MAN solution, which not only solves t... The Metropolitan Area Network (MAN) has faced serious problems after years of rapid development. The model of three-dimensional IP-based MAN, proposed by ZTE, is a next-generation MAN solution, which not only solves the existing problems but also brings new ideas for the development of next-generation MAN. 展开更多
关键词 IP A three-dimensional IP-based Telecom Metropolitan Area network model ZTE MPLS
下载PDF
Using the Latin Square Design Model in the Prioritzation of Network Security Threats: A Quantitative Study
3
作者 Rodney Alexander 《Journal of Information Security》 2020年第2期92-102,共11页
Society is becoming increasingly dependent on cyberspace for both business and pleasure. Cyber attackers continue to attack organizational computer networks, as those same computer networks become increasing critical ... Society is becoming increasingly dependent on cyberspace for both business and pleasure. Cyber attackers continue to attack organizational computer networks, as those same computer networks become increasing critical to organizational business process. Strategic planning and managing IT security risks play an important role in the business and government planning process. Deploying defense in depth security measures can ensure that organizations continue to function in times of crisis. This quantitative study explores whether the Latin Square Design (LSD) model can be effectively applied to the prioritization of cybersecurity threats and to the linking of information assurance defense in-depth measures to those threats. The methods used in this study consisted of scanning 10 Cybersecurity Websites such as the Department of Homeland Security US CERT (United States-Computer Emergency Readiness Team [1]) and the SANS Institute (SysAdmin, Audit, Network and Security [2]) using the Likert Scale Model for the Website’s top ten list of cyber threats facing organizations and the network defense in depth measures to fight those threats. A comparison of each cybersecurity threats was then made using LSD to determine whether the Likert scale and the LSD model could be effectively applied to prioritize information assurance measures to protect organizational computing devices. The findings of the research reject the H0 null hypothesis that LSD does not affect the relationship between the ranking of 10 Cybersecurity websites top ten cybersecurity threats dependent variables and the independent variables of defense in depth measures used in protecting organizational devices against cyber-attacks. 展开更多
关键词 INFORMATION ASSURANCE LATIN SQUARE Design model DEFENSE in Depth INFORMATION Technology network security CYBERsecurity
下载PDF
Prediction of Salinity Variations in a Tidal Estuary Using Artificial Neural Network and Three-Dimensional Hydrodynamic Models
4
作者 Weibo Chen Wencheng Liu +1 位作者 Weiche Huang Hongming Liu 《Computational Water, Energy, and Environmental Engineering》 2017年第1期107-128,共22页
The simulation of salinity at different locations of a tidal river using physically-based hydrodynamic models is quite cumbersome because it requires many types of data, such as hydrological and hydraulic time series ... The simulation of salinity at different locations of a tidal river using physically-based hydrodynamic models is quite cumbersome because it requires many types of data, such as hydrological and hydraulic time series at boundaries, river geometry, and adjusted coefficients. Therefore, an artificial neural network (ANN) technique using a back-propagation neural network (BPNN) and a radial basis function neural network (RBFNN) is adopted as an effective alternative in salinity simulation studies. The present study focuses on comparing the performance of BPNN, RBFNN, and three-dimensional hydrodynamic models as applied to a tidal estuarine system. The observed salinity data sets collected from 18 to 22 May, 16 to 22 October, and 26 to 30 October 2002 (totaling 4320 data points) were used for BPNN and RBFNN model training and for hydrodynamic model calibration. The data sets collected from 30 May to 2 June and 11 to 15 November 2002 (totaling 2592 data points) were adopted for BPNN and RBFNN model verification and for hydrodynamic model verification. The results revealed that the ANN (BPNN and RBFNN) models were capable of predicting the nonlinear time series behavior of salinity to the multiple forcing signals of water stages at different stations and freshwater input at upstream boundaries. The salinity predicted by the ANN models was better than that predicted by the physically based hydrodynamic model. This study suggests that BPNN and RBFNN models are easy-to-use modeling tools for simulating the salinity variation in a tidal estuarine system. 展开更多
关键词 SALINITY Variation Artificial NEURAL network Backpropagation Algorithm Radial Basis Function NEURAL network three-dimensional Hydrodynamic model TIDAL ESTUARY
下载PDF
Discontinuity development patterns and the challenges for 3D discrete fracture network modeling on complicated exposed rock surfaces 被引量:1
5
作者 Wen Zhang Ming Wei +8 位作者 Ying Zhang Tengyue Li Qing Wang Chen Cao Chun Zhu Zhengwei Li Zhenbang Nie Shuonan Wang Han Yin 《Journal of Rock Mechanics and Geotechnical Engineering》 SCIE CSCD 2024年第6期2154-2171,共18页
Natural slopes usually display complicated exposed rock surfaces that are characterized by complex and substantial terrain undulation and ubiquitous undesirable phenomena such as vegetation cover and rockfalls.This st... Natural slopes usually display complicated exposed rock surfaces that are characterized by complex and substantial terrain undulation and ubiquitous undesirable phenomena such as vegetation cover and rockfalls.This study presents a systematic outcrop research of fracture pattern variations in a complicated rock slope,and the qualitative and quantitative study of the complex phenomena impact on threedimensional(3D)discrete fracture network(DFN)modeling.As the studies of the outcrop fracture pattern have been so far focused on local variations,thus,we put forward a statistical analysis of global variations.The entire outcrop is partitioned into several subzones,and the subzone-scale variability of fracture geometric properties is analyzed(including the orientation,the density,and the trace length).The results reveal significant variations in fracture characteristics(such as the concentrative degree,the average orientation,the density,and the trace length)among different subzones.Moreover,the density of fracture sets,which is approximately parallel to the slope surface,exhibits a notably higher value compared to other fracture sets across all subzones.To improve the accuracy of the DFN modeling,the effects of three common phenomena resulting from vegetation and rockfalls are qualitatively analyzed and the corresponding quantitative data processing solutions are proposed.Subsequently,the 3D fracture geometric parameters are determined for different areas of the high-steep rock slope in terms of the subzone dimensions.The results show significant variations in the same set of 3D fracture parameters across different regions with density differing by up to tenfold and mean trace length exhibiting differences of 3e4 times.The study results present precise geological structural information,improve modeling accuracy,and provide practical solutions for addressing complex outcrop issues. 展开更多
关键词 Complicated exposed rock surfaces Discontinuity characteristic variation three-dimensional discrete fracture network modeling Outcrop study Vegetation cover and rockfalls
下载PDF
Intrusion Detection Model Using Chaotic MAP for Network Coding Enabled Mobile Small Cells
6
作者 Chanumolu Kiran Kumar Nandhakumar Ramachandran 《Computers, Materials & Continua》 SCIE EI 2024年第3期3151-3176,共26页
Wireless Network security management is difficult because of the ever-increasing number of wireless network malfunctions,vulnerabilities,and assaults.Complex security systems,such as Intrusion Detection Systems(IDS),a... Wireless Network security management is difficult because of the ever-increasing number of wireless network malfunctions,vulnerabilities,and assaults.Complex security systems,such as Intrusion Detection Systems(IDS),are essential due to the limitations of simpler security measures,such as cryptography and firewalls.Due to their compact nature and low energy reserves,wireless networks present a significant challenge for security procedures.The features of small cells can cause threats to the network.Network Coding(NC)enabled small cells are vulnerable to various types of attacks.Avoiding attacks and performing secure“peer”to“peer”data transmission is a challenging task in small cells.Due to the low power and memory requirements of the proposed model,it is well suited to use with constrained small cells.An attacker cannot change the contents of data and generate a new Hashed Homomorphic Message Authentication Code(HHMAC)hash between transmissions since the HMAC function is generated using the shared secret.In this research,a chaotic sequence mapping based low overhead 1D Improved Logistic Map is used to secure“peer”to“peer”data transmission model using lightweight H-MAC(1D-LM-P2P-LHHMAC)is proposed with accurate intrusion detection.The proposed model is evaluated with the traditional models by considering various evaluation metrics like Vector Set Generation Accuracy Levels,Key Pair Generation Time Levels,Chaotic Map Accuracy Levels,Intrusion Detection Accuracy Levels,and the results represent that the proposed model performance in chaotic map accuracy level is 98%and intrusion detection is 98.2%.The proposed model is compared with the traditional models and the results represent that the proposed model secure data transmission levels are high. 展开更多
关键词 network coding small cells data transmission intrusion detection model hashed message authentication code chaotic sequence mapping secure transmission
下载PDF
Cyber Resilience through Real-Time Threat Analysis in Information Security
7
作者 Aparna Gadhi Ragha Madhavi Gondu +1 位作者 Hitendra Chaudhary Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2024年第4期51-67,共17页
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t... This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1]. 展开更多
关键词 Cybersecurity Information security network security Cyber Resilience Real-Time Threat Analysis Cyber Threats Cyberattacks Threat Intelligence Machine Learning Artificial Intelligence Threat Detection Threat Mitigation Risk Assessment Vulnerability Management Incident Response security Orchestration Automation Threat Landscape Cyber-Physical Systems Critical Infrastructure Data Protection Privacy Compliance Regulations Policy Ethics CYBERCRIME Threat Actors Threat modeling security Architecture
下载PDF
Enhanced Security with Improved Defensive Routing Mechanism in Wireless Sensor Networks
8
作者 R.Sabitha C.Gokul Prasad S.Karthik 《Computer Systems Science & Engineering》 SCIE EI 2023年第6期2795-2810,共16页
In recent scenario of Wireless Sensor Networks(WSNs),there are many application developed for handling sensitive and private data such as military information,surveillance data,tracking,etc.Hence,the sensor nodes of W... In recent scenario of Wireless Sensor Networks(WSNs),there are many application developed for handling sensitive and private data such as military information,surveillance data,tracking,etc.Hence,the sensor nodes of WSNs are distributed in an intimidating region,which is non-rigid to attacks.The recent research domains of WSN deal with models to handle the WSN communications against malicious attacks and threats.In traditional models,the solution has been made for defending the networks,only to specific attacks.However,in real-time applications,the kind of attack that is launched by the adversary is not known.Additionally,on developing a security mechanism for WSN,the resource constraints of sensor nodes are also to be considered.With that note,this paper presents an Enhanced Security Model with Improved Defensive Routing Mechanism(IDRM)for defending the sensor network from various attacks.Moreover,for efficient model design,the work includes the part of feature evaluation of some general attacks of WSNs.The IDRM also includes determination of optimal secure paths and Node security for secure routing operations.The performance of the proposed model is evaluated with respect to several factors;it is found that the model has achieved better security levels and is efficient than other existing models in WSN communications.It is proven that the proposed IDRM produces 74%of PDR in average and a minimized packet drop of 38%when comparing with the existing works. 展开更多
关键词 Enhanced security model wireless sensor networks improved defensive routing mechanism secure paths node security
下载PDF
ILSM:Incorporated Lightweight Security Model for Improving QOS in WSN
9
作者 Ansar Munir Shah Mohammed Aljubayri +4 位作者 Muhammad Faheem Khan Jarallah Alqahtani Mahmood ul Hassan Adel Sulaiman Asadullah Shaikh 《Computer Systems Science & Engineering》 SCIE EI 2023年第8期2471-2488,共18页
In the network field,Wireless Sensor Networks(WSN)contain prolonged attention due to afresh augmentations.Industries like health care,traffic,defense,and many more systems espoused the WSN.These networks contain tiny ... In the network field,Wireless Sensor Networks(WSN)contain prolonged attention due to afresh augmentations.Industries like health care,traffic,defense,and many more systems espoused the WSN.These networks contain tiny sensor nodes containing embedded processors,TinyOS,memory,and power source.Sensor nodes are responsible for forwarding the data packets.To manage all these components,there is a need to select appropriate parameters which control the quality of service of WSN.Multiple sensor nodes are involved in transmitting vital information,and there is a need for secure and efficient routing to reach the quality of service.But due to the high cost of the network,WSN components have limited resources to manage the network.There is a need to design a lightweight solution that ensures the quality of service in WSN.In this given manner,this study provides the quality of services in a wireless sensor network with a security mechanism.An incorporated hybrid lightweight security model is designed in which random waypoint mobility(RWM)model and grey wolf optimization(GWO)is used to enhance service quality and maintain security with efficient routing.MATLAB version 16 andNetwork Stimulator 2.35(NS2.35)are used in this research to evaluate the results.The overall cost factor is reduced at 60%without the optimization technique and 90.90%reduced by using the optimization technique,which is assessed by calculating the signal-to-noise ratio,overall energy nodes,and communication overhead. 展开更多
关键词 Wireless sensor networks quality of service random waypoint mobility model grey wolf optimization security
下载PDF
Researches On The Network Security Evaluation Method Based Bn BP Neural Network
10
作者 Zhang Yibin Yan Zequan 《International Journal of Technology Management》 2014年第9期93-95,共3页
This paper first describes the basic theory of BP neural network algorithm, defects and improved methods, establishes a computer network security evaluation index system, explores the computer network security evaluat... This paper first describes the basic theory of BP neural network algorithm, defects and improved methods, establishes a computer network security evaluation index system, explores the computer network security evaluation method based on BP neural network, and has designed to build the evaluation model, and shows that the method is feasible through the MATLAB simulation experiments. 展开更多
关键词 BP neural network network security model EVALUATION
下载PDF
Anomaly-based model for detecting HTTP-tunnel traffic using network behavior analysis 被引量:3
11
作者 李世淙 Yun Xiaochun Zhang Yongzheng 《High Technology Letters》 EI CAS 2014年第1期63-69,共7页
Increasing time-spent online has amplified users' exposure to tile tilreat oI miormanon leakage. Although existing security systems (such as firewalls and intrusion detection systems) can satisfy most of the securi... Increasing time-spent online has amplified users' exposure to tile tilreat oI miormanon leakage. Although existing security systems (such as firewalls and intrusion detection systems) can satisfy most of the security requirements of network administrators, they are not suitable for detecting the activities of applying the HTTP-tunnel technique to steal users' private information. This paper focuses on a network behavior-based method to address the limitations of the existing protection systems. At first, it analyzes the normal network behavior pattern over HTI'P traffic and select four features. Then, it pres- ents an anomaly-based detection model that applies a hierarchical clustering technique and a scoring mechanism. It also uses real-world data to validate that the selected features are useful. The experiments have demonstrated that the model could achieve over 93% hit-rate with only about 3% false- positive rate. It is regarded confidently that the approach is a complementary technique to the existing security systems. 展开更多
关键词 network security anomaly detection model hierarchical clustering HTFP-tunnel
下载PDF
Improved Secure Trust-based Location-Aided Routing Model for MANETs 被引量:1
12
作者 王堃 吴蒙 《China Communications》 SCIE CSCD 2011年第3期154-162,共9页
In view of the security weakness in resisting the active attacks by malicious nodes in mobile ad hoc networks,the trust metric is introduced to defend those attacks by loading a trust model on the previously proposed ... In view of the security weakness in resisting the active attacks by malicious nodes in mobile ad hoc networks,the trust metric is introduced to defend those attacks by loading a trust model on the previously proposed Distance-Based LAR.The improved Secure Trust-based Location-Aided Routing algorithm utilizes direct trust and recommendation trust to prevent malicious nodes with low trust values from joining the forwarding.Simulation results reveal that ST-LAR can resist attacks by malicious nodes effectively;furthermore,it also achieves better performance than DBLAR in terms of average end-to-end delay,packet delivery success ratio and throughput. 展开更多
关键词 MANET(Ad Hoc) location-aided routing trust model trust-based routing network security
下载PDF
A Secure and Energy-Balanced Routing Scheme for Mobile Wireless Sensor Network
13
作者 Bei Liu Yuanming Wu 《Wireless Sensor Network》 2015年第11期137-148,共12页
Mobile wireless sensor network (MWSN) has the features of self-organization, multiple-hop and limited energy resources. It is vulnerable to a wide set of security attacks, including those targeting the routing protoco... Mobile wireless sensor network (MWSN) has the features of self-organization, multiple-hop and limited energy resources. It is vulnerable to a wide set of security attacks, including those targeting the routing protocol functionality. In this paper, the existing security problems and solutions in MWSN are summarized, and then a trust management system based on neighbor monitoring is proposed. In the trust management system, the trust value is calculated by the neighbor monitoring mechanism, and the direct trust value and the indirect trust value are combined to establish the distributed trust model to detect the malicious nodes. The consistency check algorithm is capable of defending against the attacks on the trust model. In addition, because of the limited energy of the sensor nodes, the energy-balanced algorithm is introduced to prolong the lifespan of MWSN. The residual energy and energy density are considered in the routing decision. Finally, the simulation experiments show that the proposed algorithm can detect the malicious nodes effectively and achieve the energy-balanced goal to prolong the lifespan of MWSN. 展开更多
关键词 MOBILE WIRELESS Sensor network network security TRUST model Energy-Balanced
下载PDF
Classification and Review of Security Schemes in Mobile Computing
14
作者 Sathish Alampalayam Kumar 《Wireless Sensor Network》 2010年第6期419-440,共22页
In this paper, we present the classification and review of security schemes in mobile computing system. We classify these schemes based on types the infrastructure used in the mobile computing system-Mobile Ad Hoc Net... In this paper, we present the classification and review of security schemes in mobile computing system. We classify these schemes based on types the infrastructure used in the mobile computing system-Mobile Ad Hoc Networks (MANET) and Mobile Agent model. Mobile Ad Hoc Networks are pervasive, ubiquitous and without any centralized authority. These unique characteristics, combined with ever-increasing security threats, demand solutions in securing ad hoc networks prior to their deployment in commercial and military applications. This paper reviews the prevailing mobile ad hoc network security threats, the existing solution schemes, their limitations and open research issues. We also explain the Intrusion detection and response technique as an alternate method to protect the MANET based mobile computing systems and their approaches. A literature review of important existing Intrusion Detection approaches and Intrusion Response Approaches for MANET is also presented. This paper also presents the limitations of existing Intrusion Detection and Response Approaches for MANET and open research issues in providing MANET security. With respect to Mobile Agent based mobile computing system, we have presented the classification of various types of security attacks in Mobile Agent based model and presented the security solutions for those type of attacks proposed by the various schemes and the open research issues in providing security for Mobile Agent based mobile computing system. Such classification enhances the understanding of the proposed security schemes in the mobile computing system, assists in the development and enhancement of schemes in the future and helps in choosing an appropriate scheme while implementing a mobile computing system. 展开更多
关键词 WIRELESS Sensor networks BETA TRUST model TRUST ROUTING PROTOCOL network security TRUST Evaluation
下载PDF
Research on Beta Trust Model of Wireless Sensor Networks Based on Energy Load Balancing
15
作者 Danwei Chen Xizhou Yu Xianghui Dong 《Wireless Sensor Network》 2010年第5期373-380,共8页
This paper proposed beta trust model based on energy load balancing combines the recent achievements of the trust models in distributed networks, together with the characteristics of wireless sensor networks. The inte... This paper proposed beta trust model based on energy load balancing combines the recent achievements of the trust models in distributed networks, together with the characteristics of wireless sensor networks. The inter-node trust relation is established after an overall evaluation of node trust value based on the monitor results of the node packets forwarding behavior conducted by inter-node collaboration. Due to the node energy limitation in wireless sensor networks, energy load balancing mechanism is applied to prolong the node survival time. And the redundant routing protocol involves the presented trust model to develop the novel trust routing protocol of beta trust model based on energy load balancing. Simulation performance demonstrates that the beta trust model based on energy load balancing outperforms current schemes in energy consumption. 展开更多
关键词 WIRELESS Sensor networks BETA TRUST model TRUST ROUTING PROTOCOL network security TRUST Evaluation
下载PDF
3D geological modeling for mineral resource assessment of the Tongshan Cu deposit,Heilongjiang Province,China 被引量:28
16
作者 Gongwen Wang Lei Huang 《Geoscience Frontiers》 SCIE CAS 2012年第4期483-491,共9页
Three-dimensional geological modeling (3DGM) assists geologists to quantitatively study in three-dimensional (3D) space structures that define temporal and spatial relationships between geological objects. The 3D ... Three-dimensional geological modeling (3DGM) assists geologists to quantitatively study in three-dimensional (3D) space structures that define temporal and spatial relationships between geological objects. The 3D property model can also be used to infer or deduce causes of geological objects. 3DGM technology provides technical support for extraction of diverse geoscience information, 3D modeling, and quantitative calculation of mineral resources. Based on metallogenic concepts and an ore deposit model, 3DGM technology is applied to analyze geological characteristics of the Tongshan Cu deposit in order to define a metallogenic model and develop a virtual borehole technology; a BP neural network and a 3D interpolation technique were combined to integrate multiple geoscience information in a 3D environment. The results indicate: (1) on basis of the concept of magmatic-hydrothermal Cu polymetallic mineraliza- tion and a porphyry Cu deposit model, a spatial relational database of multiple geoscience information for mineralization in the study area (geology, geophysics, geochemistry, borehole, and cross-section data) was established, and 3D metallogenic geological objects including mineralization stratum, granodiorite, alteration rock, and magnetic anomaly were constructed; (2) on basis of the 3D ore deposit model, 23,800 effective surveys from 94 boreholes and 21 sections were applied to establish 3D orebody models with a kriging interpolation method; (3) combined 23,800 surveys involving 21 sections, using VC++ and OpenGL platform, virtual borehole and virtual section with BP network, and an improved inverse distance interpolation (IDW) method were used to predict and delineate mineralization potential targets (Cu-grade of cell not less than 0.1%); (4) comparison of 3D ore bodies, metallogenic geological objects of mineralization, and potential targets of mineralization models in the study area, delineated the 3D spatial and temporal relationship and causal processes among the ore bodies, alteration rock, metallo- genic stratum, intrusive rock, and the Tongshan Fault. This study provides important technical support and a scientific basis for assessment of the Tongshan Cu deposit and surrounding exploration and mineral resources. 展开更多
关键词 three-dimensional geological modeling (3DGM) Virtual borehole Virtual section BP network INTERPOLATION Tongshan Cu deposit
下载PDF
Intrusion Detection Algorithm Based on Model Checking Interval Temporal Logic 被引量:5
17
作者 朱维军 王忠勇 张海宾 《China Communications》 SCIE CSCD 2011年第3期66-72,共7页
Model checking based on linear temporal logic reduces the false negative rate of misuse detection.However,linear temporal logic formulae cannot be used to describe concurrent attacks and piecewise attacks.So there is ... Model checking based on linear temporal logic reduces the false negative rate of misuse detection.However,linear temporal logic formulae cannot be used to describe concurrent attacks and piecewise attacks.So there is still a high rate of false negatives in detecting these complex attack patterns.To solve this problem,we use interval temporal logic formulae to describe concurrent attacks and piecewise attacks.On this basis,we formalize a novel algorithm for intrusion detection based on model checking interval temporal logic.Compared with the method based on model checking linear temporal logic,the new algorithm can find unknown succinct attacks.The simulation results show that the new method can effectively reduce the false negative rate of concurrent attacks and piecewise attacks. 展开更多
关键词 network security intrusion detection misuse detection interval temporal logic model checking
下载PDF
Network Security Situation Prediction Based on Improved Adaptive Grey Verhulst Model 被引量:4
18
作者 胡威 李建华 +1 位作者 陈秀真 蒋兴浩 《Journal of Shanghai Jiaotong university(Science)》 EI 2010年第4期408-413,共6页
Network security situation is a hot research topic in the field of network security. Whole situation awareness includes the current situation evaluation and the future situation prediction. However, the now-existing r... Network security situation is a hot research topic in the field of network security. Whole situation awareness includes the current situation evaluation and the future situation prediction. However, the now-existing research focuses on the current situation evaluation, and seldom discusses the future prediction. Based on the historical research, an improved grey Verhulst model is put forward to predict the future situation. Aiming at the shortages in the prediction based on traditional Verhulst model, the adaptive grey parameters and equal- dimensions grey filling methods are proposed to improve the precision. The simulation results prove that the scheme is efficient and applicable. 展开更多
关键词 network security situation situation prediction grey theory grey Verhulst model
原文传递
Grey-theory based intrusion detection model 被引量:3
19
作者 Qin Boping Zhou Xianwei Yang Jun Song Cunyi 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2006年第1期230-235,共6页
To solve the problem that current intrusion detection model needs large-scale data in formulating the model in real-time use, an intrusion detection system model based on grey theory (GTIDS) is presented. Grey theor... To solve the problem that current intrusion detection model needs large-scale data in formulating the model in real-time use, an intrusion detection system model based on grey theory (GTIDS) is presented. Grey theory has merits of fewer requirements on original data scale, less limitation of the distribution pattern and simpler algorithm in modeling. With these merits GTIDS constructs model according to partial time sequence for rapid detect on intrusive act in secure system. In this detection model rate of false drop and false retrieval are effectively reduced through twice modeling and repeated detect on target data. Furthermore, GTIDS framework and specific process of modeling algorithm are presented. The affectivity of GTIDS is proved through emulated experiments comparing snort and next-generation intrusion detection expert system (NIDES) in SRI international. 展开更多
关键词 network security intrusion detection grey theory model.
下载PDF
Classification Model with High Deviation for Intrusion Detection on System Call Traces
20
作者 彭新光 刘玉树 +1 位作者 吴裕树 杨勇 《Journal of Beijing Institute of Technology》 EI CAS 2005年第3期260-263,共4页
A new classification model for host intrusion detection based on the unidentified short sequences and RIPPER algorithm is proposed. The concepts of different short sequences on the system call traces are strictly defi... A new classification model for host intrusion detection based on the unidentified short sequences and RIPPER algorithm is proposed. The concepts of different short sequences on the system call traces are strictly defined on the basis of in-depth analysis of completeness and correctness of pattern databases. Labels of short sequences are predicted by learned RIPPER rule set and the nature of the unidentified short sequences is confirmed by statistical method. Experiment results indicate that the classification model increases clearly the deviation between the attack and the normal traces and improves detection capability against known and unknown attacks. 展开更多
关键词 network security intrusion detection system calls unidentified sequences classification model
下载PDF
上一页 1 2 58 下一页 到第
使用帮助 返回顶部