The integrated linkage control problem based on attack detection is solved with the analyses of the security model including firewall, intrusion detection system (IDS) and vulnerability scan by game theory. The Nash...The integrated linkage control problem based on attack detection is solved with the analyses of the security model including firewall, intrusion detection system (IDS) and vulnerability scan by game theory. The Nash equilibrium for two portfolios of only deploying IDS and vulnerability scan and deploying all the technologies is investigated by backward induction. The results show that when the detection rates of IDS and vulnerability scan are low, the firm will not only inspect every user who raises an alarm, but also a fraction of users that do not raise an alarm; when the detection rates of IDS and vulnerability scan are sufficiently high, the firm will not inspect any user who does not raise an alarm, but only inspect a fraction of users that raise an alarm. Adding firewall into the information system impacts on the benefits of firms and hackers, but does not change the optimal strategies of hackers, and the optimal investigation strategies of IDS are only changed in certain cases. Moreover, the interactions between IDS & vulnerability scan and firewall & IDS are discussed in detail.展开更多
In order to relvedy the security weaknesses of a robust user authentication framework for wireless sensor networks, an enhanced user authentication framework is presented. The enhanced scheme requires proof of the pos...In order to relvedy the security weaknesses of a robust user authentication framework for wireless sensor networks, an enhanced user authentication framework is presented. The enhanced scheme requires proof of the possession of both a password and a snort card, and provides more security guarantees in two aspects: 1) it addresses the untmceability property so that any third party accessing the communication channel cannot link two authentication sessions originated from the same user, and 2) the use of a smart card prevents offiine attacks to guess passwords. The security and efficiency analyses indicate that our enhanced scheme provides the highest level of security at reasonable computational costs. Therefore, it is a practical authentication scheme with attractive security features for wireless sensor networks.展开更多
By using daily air temperature and precipitation data, and the weather phenomena data of daily snowfall from 98 meteorological stations over the Qinghai-Tibetan Plateau (QTP), this paper performs an "at-risk" eval...By using daily air temperature and precipitation data, and the weather phenomena data of daily snowfall from 98 meteorological stations over the Qinghai-Tibetan Plateau (QTP), this paper performs an "at-risk" evaluation on snowfall and accumulated snow over the QTP under current climate situation and future climate warming condition. When rainfall, snowfall, or accumulated snow weather phenomena occur, critical values are determined based on dally air temperature and precipitation for current climate conditions. Air temperature of 0 ℃ is defined as the critical value of temperature for rainfall or snowfall, while 0 ℃ air temperature and 4.0 mm (autumn) or 3.0 mm (spring) snowfall amounts are defined as the critical values for accumulated snowfall. Analyses based on the above critical values disclose that under current climate condition, stations with "at-risk" accumulated snow account for 33% and 36% of all stations, and the "at-risk" snowfall stations reach 78% and 81% in autumn and spring, respectively. Spatially, most stations with "at-risk" accumulated snow are located on the southern and eastern edge of the QTP, and stations with "at-risk" snowfall are also apparent at the northern edge. If the air temperature increases by 2.5 ℃ in 2050, only the snowfall at a few "at-risk" snowfall stations will transform into rainfall, while most "at-risk" accumulated snow stations will face the problem that snowfall is hardly accumulated. Additionally, most stations will become "at-risk" accumulated snow stations, indicating that both the snow depth and the snow cover duration will decline in most areas of the QTP, including a delay of the start date and an advancing of the end date of snow cover.展开更多
Building vulnerability evaluation is important in the risk assessment on earthquake and flood hazards. But for landslide hazard, it is also a very important part for the people in buildings. Most discussions or resear...Building vulnerability evaluation is important in the risk assessment on earthquake and flood hazards. But for landslide hazard, it is also a very important part for the people in buildings. Most discussions or researches about building vulnerability are for landslide failure, few for landslide in deformation phase. For this objective, this paper discussed about building vulnerability evaluation using Zhaoshuling landslide as an example Zhaoshuling landslide named located in the Three Gorges Reservoir Area, China. After a field survey on the geological condition of landslide, detailed field investigation on the buildings' location and structure is carried out. To get landslide surface deformation, numerical simulation method is used under the combining condition of water fluctuation and rainfall. Then building deformation and probable damage degree is analyzed according to landslide surface deformation and the relative theory in mining. Based on the national standard building damage classification system, the vulnerability of all the buildings on the landslide is semi-quantitatively evaluated.展开更多
Recent catastrophic events related to floods in Colombia reveal again the situation of disaster as a development issue not solved in the country. It is necessary to analyze in more detail the areas under threat and th...Recent catastrophic events related to floods in Colombia reveal again the situation of disaster as a development issue not solved in the country. It is necessary to analyze in more detail the areas under threat and their respective vulnerability to the different mechanisms can generate flooding events and make adjustments in the assessment of disaster risks for the appropriate decision-making at local, regional and national levels. This paper presents a research project in its first phase, whose main objective is to develop a methodology for vulnerability assessment from a multiscale, multitemporal and multidisciplinary perspectives, combining the use of indicators and a spatial information system to analyze exposure and vulnerability at regional and local level in specific areas. This methodological tool will also enable local and regional authorities to identify the most appropriate strategies to reduce vulnerability and adaptation options, and make better decisions in assessing disaster risk. The information generated in this study will contribute to public policy action structured to correct short- and medium-term situations of actual or potential vulnerability, which can also be used in other activities of territorial and environmental planning, developing technology transfer activities and training associated with the research project in the service of the authorities and communities. Results obtained of the vulnerability analysis for a Colombian study area will relate to the hazards obtained in a parallel project whose goal is to identify the best risk management strategies through the development of GIS (geographic information system)-based scenarios for different risk and vulnerability reduction options.展开更多
Along with the rapid development of social networks, social network worms have constituted one of the major internet security problems. The root of worm is the inevitable software vulnerability during the design and i...Along with the rapid development of social networks, social network worms have constituted one of the major internet security problems. The root of worm is the inevitable software vulnerability during the design and implementation process of software. So it is hard to completely avoid worms in the existing software engineering systems. Due to lots of bandwidth consumption, the patch cannot be transmitted simultaneously by the network administrator to all hosts. This paper studies how to prevent the propagation of social network worms through the immunization of key nodes. Unlike existing containment models for worm propagation, a novel immunization strategy is proposed based on network vertex influence. The strategy selects the critical vertices in the whole network. Then the immunization is applied on the selected vertices to achieve the maximal effect of worm containment with minimal cost. Different algorithms are implemented to select vertices. Simulation experiments are presented to analyze and evaluate the performance of different algorithms.展开更多
Integer overflow vulnerability will cause buffer overflow. The research on the relationship between them will help us to detect integer overflow vulnerability. We present a dynamic analysis methods RICB (Run-time Int...Integer overflow vulnerability will cause buffer overflow. The research on the relationship between them will help us to detect integer overflow vulnerability. We present a dynamic analysis methods RICB (Run-time Integer Checking via Buffer overflow). Our approach includes decompile execute file to assembly language; debug the execute file step into and step out; locate the overflow points and checking buffer overflow caused by integer overflow. We have implemented our approach in three buffer overflow types: format string overflow, stack overflow and heap overflow. Experiments results show that our approach is effective and efficient. We have detected more than 5 known integer overflow vulnerabilities via buffer overflow.展开更多
Large-scale national disasters have recently occurred worldwide, causing tremendous damage to life and property. Therefore, urban safety has become a critical issue, and disaster prevention and mitigation are also con...Large-scale national disasters have recently occurred worldwide, causing tremendous damage to life and property. Therefore, urban safety has become a critical issue, and disaster prevention and mitigation are also considered in urban development and infrastructure construction. When earthquake disasters occur, road networks play major roles in rescue activity for responding to urban damage. The urban-disaster prevention spatial system attempts to mitigate hazards by considering shelters, routes for evacuation and rescue and necessary logistics. A literature review shows numerous studies related to a disaster-prevention shelter survey before or after hazards, however, they are less concerned with the reliability of shelter evaluation. This study assesses shelter evaluation by considering road networks. The authors construct 10 selected indices individually related to road networks. Three integrated composite indices are established to explain planned-shelter risks using the Arc GIS diagram of a spatial concept of an urban-planning review process. The relationship between shelters and evacuation/rescue routes is important for disaster-prevention planning. This survey investigates the factors of road networks, fire engine rescue routes, fire station location and road/population density for vulnerability evaluations.展开更多
As the opportunities offered, most individuals and businesses feel that E-banking energies are great. Thus, threats are unavoidable to banks if they fail to identify consequences and vulnerabilities accompanying e-ban...As the opportunities offered, most individuals and businesses feel that E-banking energies are great. Thus, threats are unavoidable to banks if they fail to identify consequences and vulnerabilities accompanying e-banking practices. The usage rate of e-banking in a top international commercial bank in Malaysia is rather diminutive compare to its other bases in countries like Singapore, China and India. Interestingly, it is on decreasing mode year by year. This study aimed to offer a good set of information of the factors influencing low usage and possibilities to suggest ways to increase the usage among the bank customers. In this study, a comprehensive survey data gathering were used to collect and analyze the respondents and results indicate that ease of use is the most significant contributor to the low usage. 204 valid feedbacks were obtained from the SCM bank's customers, with the research indicating that e-banking still has a gap to fill between customers, the bank and the e-system in maximizing the desire of existing clients to go over the net.展开更多
In the light of the defect of web vulnerability detection system, combined with the characteristics of high efficient and sharing in the cloud environment, a design proposal is presented based on cloud environment, wh...In the light of the defect of web vulnerability detection system, combined with the characteristics of high efficient and sharing in the cloud environment, a design proposal is presented based on cloud environment, which analyses the key technology of gaining the URL, task allocation and scheduling and the design of attack detection. Experiment shows its feasibility and effectiveness in this paper.展开更多
基金The National Natural Science Foundation of China(No.71071033)the Innovation Project of Jiangsu Postgraduate Education(No.CX10B_058Z)
文摘The integrated linkage control problem based on attack detection is solved with the analyses of the security model including firewall, intrusion detection system (IDS) and vulnerability scan by game theory. The Nash equilibrium for two portfolios of only deploying IDS and vulnerability scan and deploying all the technologies is investigated by backward induction. The results show that when the detection rates of IDS and vulnerability scan are low, the firm will not only inspect every user who raises an alarm, but also a fraction of users that do not raise an alarm; when the detection rates of IDS and vulnerability scan are sufficiently high, the firm will not inspect any user who does not raise an alarm, but only inspect a fraction of users that raise an alarm. Adding firewall into the information system impacts on the benefits of firms and hackers, but does not change the optimal strategies of hackers, and the optimal investigation strategies of IDS are only changed in certain cases. Moreover, the interactions between IDS & vulnerability scan and firewall & IDS are discussed in detail.
基金This work was supported by the Program for Changjiang Scholars and Innovative Research Team in University under Grant No. IRT1078 the Key Program of NSFC-Guangdong Union Foundation under Grant No.U1135002+3 种基金 the Major National S&T Program under Grant No.2011ZX03005-002 the National Natural Science Foundation of China under Grants No. 61072066, No.61173135, No.61100230, No.61100233, No.61202389, No.61202390 the Natural Science Basic Research Plan in Shaanxi Province of China under Grants No.2012JQ8043, No. 2012JM8030, No. 2012JM8025, No2011JQ8003 the Fundamental Research Funds for the Central Universities under Cxants No. JY10000903001, No. K50511030004. The authors would like to thank the anonymous reviewers and the editor for their constructive comments that have helped us to improve this paper.
文摘In order to relvedy the security weaknesses of a robust user authentication framework for wireless sensor networks, an enhanced user authentication framework is presented. The enhanced scheme requires proof of the possession of both a password and a snort card, and provides more security guarantees in two aspects: 1) it addresses the untmceability property so that any third party accessing the communication channel cannot link two authentication sessions originated from the same user, and 2) the use of a smart card prevents offiine attacks to guess passwords. The security and efficiency analyses indicate that our enhanced scheme provides the highest level of security at reasonable computational costs. Therefore, it is a practical authentication scheme with attractive security features for wireless sensor networks.
基金supported by the opening fund from the State Key Laboratory of Cryospheric Sciences, Cold and Arid Regions Environmental and Engineering Research Institute,Chinese Academy of Sciences(SKLCS 08-07)the National Postdoctoral Scientific Foundation (20080440342)
文摘By using daily air temperature and precipitation data, and the weather phenomena data of daily snowfall from 98 meteorological stations over the Qinghai-Tibetan Plateau (QTP), this paper performs an "at-risk" evaluation on snowfall and accumulated snow over the QTP under current climate situation and future climate warming condition. When rainfall, snowfall, or accumulated snow weather phenomena occur, critical values are determined based on dally air temperature and precipitation for current climate conditions. Air temperature of 0 ℃ is defined as the critical value of temperature for rainfall or snowfall, while 0 ℃ air temperature and 4.0 mm (autumn) or 3.0 mm (spring) snowfall amounts are defined as the critical values for accumulated snowfall. Analyses based on the above critical values disclose that under current climate condition, stations with "at-risk" accumulated snow account for 33% and 36% of all stations, and the "at-risk" snowfall stations reach 78% and 81% in autumn and spring, respectively. Spatially, most stations with "at-risk" accumulated snow are located on the southern and eastern edge of the QTP, and stations with "at-risk" snowfall are also apparent at the northern edge. If the air temperature increases by 2.5 ℃ in 2050, only the snowfall at a few "at-risk" snowfall stations will transform into rainfall, while most "at-risk" accumulated snow stations will face the problem that snowfall is hardly accumulated. Additionally, most stations will become "at-risk" accumulated snow stations, indicating that both the snow depth and the snow cover duration will decline in most areas of the QTP, including a delay of the start date and an advancing of the end date of snow cover.
基金supported by the Research Foundation for Outstanding Young Teachers, China University of Geosciences (Wuhan)National Natural Science Foundation of China (No. 40872176/D0214)
文摘Building vulnerability evaluation is important in the risk assessment on earthquake and flood hazards. But for landslide hazard, it is also a very important part for the people in buildings. Most discussions or researches about building vulnerability are for landslide failure, few for landslide in deformation phase. For this objective, this paper discussed about building vulnerability evaluation using Zhaoshuling landslide as an example Zhaoshuling landslide named located in the Three Gorges Reservoir Area, China. After a field survey on the geological condition of landslide, detailed field investigation on the buildings' location and structure is carried out. To get landslide surface deformation, numerical simulation method is used under the combining condition of water fluctuation and rainfall. Then building deformation and probable damage degree is analyzed according to landslide surface deformation and the relative theory in mining. Based on the national standard building damage classification system, the vulnerability of all the buildings on the landslide is semi-quantitatively evaluated.
文摘Recent catastrophic events related to floods in Colombia reveal again the situation of disaster as a development issue not solved in the country. It is necessary to analyze in more detail the areas under threat and their respective vulnerability to the different mechanisms can generate flooding events and make adjustments in the assessment of disaster risks for the appropriate decision-making at local, regional and national levels. This paper presents a research project in its first phase, whose main objective is to develop a methodology for vulnerability assessment from a multiscale, multitemporal and multidisciplinary perspectives, combining the use of indicators and a spatial information system to analyze exposure and vulnerability at regional and local level in specific areas. This methodological tool will also enable local and regional authorities to identify the most appropriate strategies to reduce vulnerability and adaptation options, and make better decisions in assessing disaster risk. The information generated in this study will contribute to public policy action structured to correct short- and medium-term situations of actual or potential vulnerability, which can also be used in other activities of territorial and environmental planning, developing technology transfer activities and training associated with the research project in the service of the authorities and communities. Results obtained of the vulnerability analysis for a Colombian study area will relate to the hazards obtained in a parallel project whose goal is to identify the best risk management strategies through the development of GIS (geographic information system)-based scenarios for different risk and vulnerability reduction options.
基金supported by Fundamental Research Funds of the Central Universities under Grant no. N120317001 and N100704001Program for New Century Excellent Talents in University (NCET13-0113)+1 种基金Natural Science Foundation of Liaoning Province of China under Grant no. 201202059Program for Liaoning Excellent Talents in University under LR2013011
文摘Along with the rapid development of social networks, social network worms have constituted one of the major internet security problems. The root of worm is the inevitable software vulnerability during the design and implementation process of software. So it is hard to completely avoid worms in the existing software engineering systems. Due to lots of bandwidth consumption, the patch cannot be transmitted simultaneously by the network administrator to all hosts. This paper studies how to prevent the propagation of social network worms through the immunization of key nodes. Unlike existing containment models for worm propagation, a novel immunization strategy is proposed based on network vertex influence. The strategy selects the critical vertices in the whole network. Then the immunization is applied on the selected vertices to achieve the maximal effect of worm containment with minimal cost. Different algorithms are implemented to select vertices. Simulation experiments are presented to analyze and evaluate the performance of different algorithms.
基金Supported by the National Natural Science Foundation of China (60903188), Shanghai Education Commission Innovation Foundation (11YZ192) and World Expo Science and Technology Special Fund of Shanghai Science and Technology Commission (08dz0580202).
文摘Integer overflow vulnerability will cause buffer overflow. The research on the relationship between them will help us to detect integer overflow vulnerability. We present a dynamic analysis methods RICB (Run-time Integer Checking via Buffer overflow). Our approach includes decompile execute file to assembly language; debug the execute file step into and step out; locate the overflow points and checking buffer overflow caused by integer overflow. We have implemented our approach in three buffer overflow types: format string overflow, stack overflow and heap overflow. Experiments results show that our approach is effective and efficient. We have detected more than 5 known integer overflow vulnerabilities via buffer overflow.
文摘Large-scale national disasters have recently occurred worldwide, causing tremendous damage to life and property. Therefore, urban safety has become a critical issue, and disaster prevention and mitigation are also considered in urban development and infrastructure construction. When earthquake disasters occur, road networks play major roles in rescue activity for responding to urban damage. The urban-disaster prevention spatial system attempts to mitigate hazards by considering shelters, routes for evacuation and rescue and necessary logistics. A literature review shows numerous studies related to a disaster-prevention shelter survey before or after hazards, however, they are less concerned with the reliability of shelter evaluation. This study assesses shelter evaluation by considering road networks. The authors construct 10 selected indices individually related to road networks. Three integrated composite indices are established to explain planned-shelter risks using the Arc GIS diagram of a spatial concept of an urban-planning review process. The relationship between shelters and evacuation/rescue routes is important for disaster-prevention planning. This survey investigates the factors of road networks, fire engine rescue routes, fire station location and road/population density for vulnerability evaluations.
文摘As the opportunities offered, most individuals and businesses feel that E-banking energies are great. Thus, threats are unavoidable to banks if they fail to identify consequences and vulnerabilities accompanying e-banking practices. The usage rate of e-banking in a top international commercial bank in Malaysia is rather diminutive compare to its other bases in countries like Singapore, China and India. Interestingly, it is on decreasing mode year by year. This study aimed to offer a good set of information of the factors influencing low usage and possibilities to suggest ways to increase the usage among the bank customers. In this study, a comprehensive survey data gathering were used to collect and analyze the respondents and results indicate that ease of use is the most significant contributor to the low usage. 204 valid feedbacks were obtained from the SCM bank's customers, with the research indicating that e-banking still has a gap to fill between customers, the bank and the e-system in maximizing the desire of existing clients to go over the net.
文摘In the light of the defect of web vulnerability detection system, combined with the characteristics of high efficient and sharing in the cloud environment, a design proposal is presented based on cloud environment, which analyses the key technology of gaining the URL, task allocation and scheduling and the design of attack detection. Experiment shows its feasibility and effectiveness in this paper.