The backdoor or information leak of Web servers can be detected by using Web Mining techniques on some abnormal Web log and Web application log data. The security of Web servers can be enhanced and the damage of illeg...The backdoor or information leak of Web servers can be detected by using Web Mining techniques on some abnormal Web log and Web application log data. The security of Web servers can be enhanced and the damage of illegal access can be avoided. Firstly, the system for discovering the patterns of information leakages in CGI scripts from Web log data was proposed. Secondly, those patterns for system administrators to modify their codes and enhance their Web site security were provided. The following aspects were described: one is to combine web application log with web log to extract more information,so web data mining could be used to mine web log for discovering the information that firewall and Information Detection System cannot find. Another approach is to propose an operation module of web site to enhance Web site security. In cluster server session, Density -Based Clustering technique is used to reduce resource cost and obtain better efficiency.展开更多
Abstract: It was discussed that the way to reflect the internal relations between judgment and identification, the two most fundamental ways of thinking or cognition operations, during the course of the semantic netw...Abstract: It was discussed that the way to reflect the internal relations between judgment and identification, the two most fundamental ways of thinking or cognition operations, during the course of the semantic network knowledge representation processing. A new extended Petri net is defined based on qualitative mapping, which strengths the expressive ability of the feature of thinking and the mode of action of brain. A model of semantic network knowledge representation based on new Petri net is given. Semantic network knowledge has a more efficient representation and reasoning mechanism. This model not only can reflect the characteristics of associative memory in semantic network knowledge representation, but also can use Petri net to express the criterion changes and its change law of recognition judgment, especially the cognitive operation of thinking based on extraction and integration of sensory characteristics to well express the thinking transition course from quantitative change to qualitative change of human cognition.展开更多
This paper presents a passive monitoring mechanism, loss), nodes inference (LoNI), to identify loss), nodes in wireless sensor network using end-to-end application traffic. Given topology dynamics and bandwidth co...This paper presents a passive monitoring mechanism, loss), nodes inference (LoNI), to identify loss), nodes in wireless sensor network using end-to-end application traffic. Given topology dynamics and bandwidth constraints, a space-efficient packet marking scheme is first introduced. The scheme uses a Bloom filter as a compression tool so that path information can bc piggybacked by data packets. Based on the path information, LoNI then adopts a fast algorithm to detect lossy nodes. The algorithm formulates the inference problem as a weighted set-cover problem and solves it using a greedy approach with low complexity. Simulations show that LoNI can locate about 80% of lossy nodes when lossy nodes are rare in the network. Furthermore, LoNI performs better for the lossy nodes near the sink or with higher loss rates.展开更多
文摘The backdoor or information leak of Web servers can be detected by using Web Mining techniques on some abnormal Web log and Web application log data. The security of Web servers can be enhanced and the damage of illegal access can be avoided. Firstly, the system for discovering the patterns of information leakages in CGI scripts from Web log data was proposed. Secondly, those patterns for system administrators to modify their codes and enhance their Web site security were provided. The following aspects were described: one is to combine web application log with web log to extract more information,so web data mining could be used to mine web log for discovering the information that firewall and Information Detection System cannot find. Another approach is to propose an operation module of web site to enhance Web site security. In cluster server session, Density -Based Clustering technique is used to reduce resource cost and obtain better efficiency.
文摘Abstract: It was discussed that the way to reflect the internal relations between judgment and identification, the two most fundamental ways of thinking or cognition operations, during the course of the semantic network knowledge representation processing. A new extended Petri net is defined based on qualitative mapping, which strengths the expressive ability of the feature of thinking and the mode of action of brain. A model of semantic network knowledge representation based on new Petri net is given. Semantic network knowledge has a more efficient representation and reasoning mechanism. This model not only can reflect the characteristics of associative memory in semantic network knowledge representation, but also can use Petri net to express the criterion changes and its change law of recognition judgment, especially the cognitive operation of thinking based on extraction and integration of sensory characteristics to well express the thinking transition course from quantitative change to qualitative change of human cognition.
文摘This paper presents a passive monitoring mechanism, loss), nodes inference (LoNI), to identify loss), nodes in wireless sensor network using end-to-end application traffic. Given topology dynamics and bandwidth constraints, a space-efficient packet marking scheme is first introduced. The scheme uses a Bloom filter as a compression tool so that path information can bc piggybacked by data packets. Based on the path information, LoNI then adopts a fast algorithm to detect lossy nodes. The algorithm formulates the inference problem as a weighted set-cover problem and solves it using a greedy approach with low complexity. Simulations show that LoNI can locate about 80% of lossy nodes when lossy nodes are rare in the network. Furthermore, LoNI performs better for the lossy nodes near the sink or with higher loss rates.