Internet traffic classification plays an important role in network management. Many approaches have been proposed to clas-sify different categories of Internet traffic. However, these approaches have specific us-age c...Internet traffic classification plays an important role in network management. Many approaches have been proposed to clas-sify different categories of Internet traffic. However, these approaches have specific us-age contexts that restrict their ability when they are applied in the current network envi-ronment. For example, the port based ap-proach cannot identify network applications with dynamic ports; the deep packet inspec-tion approach is invalid for encrypted network applications; and the statistical based approach is time-onsuming. In this paper, a novel tech-nique is proposed to classify different catego-ries of network applications. The port based, deep packet inspection based and statistical based approaches are integrated as a multi-stage classifier. The experimental results demonstrate that this approach has high rec-ognition rate which is up to 98% and good performance of real-time for traffic identifica-tion.展开更多
In order to achieve an intelligent and automated self-management network,dynamic policy configuration and selection are needed.A certain policy only suits to a certain network environment.If the network environment ch...In order to achieve an intelligent and automated self-management network,dynamic policy configuration and selection are needed.A certain policy only suits to a certain network environment.If the network environment changes,the certain policy does not suit any more.Thereby,the policy-based management should also have similar "natural selection" process.Useful policy will be retained,and policies which have lost their effectiveness are eliminated.A policy optimization method based on evolutionary learning was proposed.For different shooting times,the priority of policy with high shooting times is improved,while policy with a low rate has lower priority,and long-term no shooting policy will be dormant.Thus the strategy for the survival of the fittest is realized,and the degree of self-learning in policy management is improved.展开更多
With the development of information networks, the problem of power security has increasingly caused many attention of people, but the simple power security defense system has been difficult to meet the current complex...With the development of information networks, the problem of power security has increasingly caused many attention of people, but the simple power security defense system has been difficult to meet the current complex network environment. Aiming at this situation, by using the method of T-S fuzzy neural network model to analyze the characteristics of the data transmission in network, it has obtained corresponding threat information. By processing these threat information, it completes the construction of three-dimensional power security defense system. The paper carries on the corresponding data training methods by using T-shirt model fuzzy neural network, which has certain reference significance for the data analysis of other similar fields. At the same time, the study of building on the three-dimensional power security defense system aims to provide a theoretical reference for solving the security defense of the current complex network environment.展开更多
The gradual hybrid anti-worm (GHAW) was presented. percentage of vulnerable hosts present in the network. For GHAW It changed its confrontation scheme in real time according to the its process of countering maliciou...The gradual hybrid anti-worm (GHAW) was presented. percentage of vulnerable hosts present in the network. For GHAW It changed its confrontation scheme in real time according to the its process of countering malicious internet worms was modeled. The performance of GHAW on two factors was also estimated: confronting validity against worms and consumption of network resources. Factors governing its performance, specifically the transformation threshold and the transformation rate, were analyzed. The simulation experiments show that GHAW has dynamical adaptability to changes of network conditions and offers the same level of effectiveness on confronting internet worms as the divide-and-rule hybrid anti-worm, with significantly less cost to network resources. The experiments also indicate that the transformation threshold is the key factor affecting the performance of GHAW.展开更多
The open and dynamic environment of Internet computing demands new software reliability technologies.How to efficiently and effectively build highly reliable Internet applications becomes a critical research problem.T...The open and dynamic environment of Internet computing demands new software reliability technologies.How to efficiently and effectively build highly reliable Internet applications becomes a critical research problem.This paper proposes a research framework for predicting reliability of individual software entities as well as the whole Internet application.Characteristics of the Internet environment are comprehensively analyzed and several reliability prediction approaches are proposed.A prototype is implemented and practical use of the proposed framework is also demonstrated.展开更多
In the era of rapid technological development, business English teaching methods are in the development and changes and multimedia network technology gradually appeared. It has brought great convenience to business En...In the era of rapid technological development, business English teaching methods are in the development and changes and multimedia network technology gradually appeared. It has brought great convenience to business English teaching.This paper starts from the feasibility and necessity of multimedia network teaching in Business English to discuss the advantages of multimedia network Teaching Business English. Finally, it is to put forward multimedia network teaching mode, to provide practical recommendations for the majority of business English teacher during the multimedia network teaching.展开更多
This paper focuses on the key technologies of P2P and network traffic monitoring, research and analyze the traditional P2P flow control technology and the working principle of deployment, discuss on the straight loss ...This paper focuses on the key technologies of P2P and network traffic monitoring, research and analyze the traditional P2P flow control technology and the working principle of deployment, discuss on the straight loss and bypass interference control technology, and the reasonable combination of two kinds of technology to design straight bypass joint deployment. On basis of it, we design a new P2P traffic monitoring system. Through the design and implementation of computer network traffic monitoring system based on C/S mode to achieve automatic control, maintenance, and monitor network traffic, which is suitable for the current engineering software to monitor a network application environment. From the network users and network operator' s perspective, monitoring of network traffic is scientific, reasonable that improve network management and it has important research value.展开更多
This paper summarizes the basic content of network curriculum design based on online learning mode and the basic flow, as well as network course should have the factors that suitable of the mode and attention matters ...This paper summarizes the basic content of network curriculum design based on online learning mode and the basic flow, as well as network course should have the factors that suitable of the mode and attention matters in the design collaboration mode of network course. Based on this, other researchers and practitioners can conveniently and effectively design network course based on the cooperation mode. Through the analysis of the network curriculum development and the actual case, verify advantage of collaborative online learning mode.展开更多
基金supported by the National Key Technology R&D Program under Grant No. 2012BAH18B05
文摘Internet traffic classification plays an important role in network management. Many approaches have been proposed to clas-sify different categories of Internet traffic. However, these approaches have specific us-age contexts that restrict their ability when they are applied in the current network envi-ronment. For example, the port based ap-proach cannot identify network applications with dynamic ports; the deep packet inspec-tion approach is invalid for encrypted network applications; and the statistical based approach is time-onsuming. In this paper, a novel tech-nique is proposed to classify different catego-ries of network applications. The port based, deep packet inspection based and statistical based approaches are integrated as a multi-stage classifier. The experimental results demonstrate that this approach has high rec-ognition rate which is up to 98% and good performance of real-time for traffic identifica-tion.
基金National Natural Science Foundation of China(No.60534020)Cultivation Fund of the Key Scientific and Technical Innovation Project from Ministry of Education of China(No.706024)International Science Cooperation Foundation of Shanghai,China(No.061307041)
文摘In order to achieve an intelligent and automated self-management network,dynamic policy configuration and selection are needed.A certain policy only suits to a certain network environment.If the network environment changes,the certain policy does not suit any more.Thereby,the policy-based management should also have similar "natural selection" process.Useful policy will be retained,and policies which have lost their effectiveness are eliminated.A policy optimization method based on evolutionary learning was proposed.For different shooting times,the priority of policy with high shooting times is improved,while policy with a low rate has lower priority,and long-term no shooting policy will be dormant.Thus the strategy for the survival of the fittest is realized,and the degree of self-learning in policy management is improved.
文摘With the development of information networks, the problem of power security has increasingly caused many attention of people, but the simple power security defense system has been difficult to meet the current complex network environment. Aiming at this situation, by using the method of T-S fuzzy neural network model to analyze the characteristics of the data transmission in network, it has obtained corresponding threat information. By processing these threat information, it completes the construction of three-dimensional power security defense system. The paper carries on the corresponding data training methods by using T-shirt model fuzzy neural network, which has certain reference significance for the data analysis of other similar fields. At the same time, the study of building on the three-dimensional power security defense system aims to provide a theoretical reference for solving the security defense of the current complex network environment.
基金Project(61070194) supported by the National Natural Science Foundation of ChinaProject([2009]1886) supported by the Information Security Industrialization Fund from NDRC of China in 2009+1 种基金Project(CJ[2010]341) supported by the Major Achievements Transfer Projects of MOF and MIIT of China in 2010Project(2011FJ2003) supported by the Natural Science Foundation of Hunan Province, China
文摘The gradual hybrid anti-worm (GHAW) was presented. percentage of vulnerable hosts present in the network. For GHAW It changed its confrontation scheme in real time according to the its process of countering malicious internet worms was modeled. The performance of GHAW on two factors was also estimated: confronting validity against worms and consumption of network resources. Factors governing its performance, specifically the transformation threshold and the transformation rate, were analyzed. The simulation experiments show that GHAW has dynamical adaptability to changes of network conditions and offers the same level of effectiveness on confronting internet worms as the divide-and-rule hybrid anti-worm, with significantly less cost to network resources. The experiments also indicate that the transformation threshold is the key factor affecting the performance of GHAW.
基金supported by the National Natural Science Foundation of China(Project No.61472338,61332010)Guangdong Natural Science Foundation(Project No. 2014A030313151)+1 种基金the Fundamental Research Funds for the Central Universitiesthe Research Grants Council of the Hong Kong Special Administrative Region,China (No.415113)
文摘The open and dynamic environment of Internet computing demands new software reliability technologies.How to efficiently and effectively build highly reliable Internet applications becomes a critical research problem.This paper proposes a research framework for predicting reliability of individual software entities as well as the whole Internet application.Characteristics of the Internet environment are comprehensively analyzed and several reliability prediction approaches are proposed.A prototype is implemented and practical use of the proposed framework is also demonstrated.
文摘In the era of rapid technological development, business English teaching methods are in the development and changes and multimedia network technology gradually appeared. It has brought great convenience to business English teaching.This paper starts from the feasibility and necessity of multimedia network teaching in Business English to discuss the advantages of multimedia network Teaching Business English. Finally, it is to put forward multimedia network teaching mode, to provide practical recommendations for the majority of business English teacher during the multimedia network teaching.
文摘This paper focuses on the key technologies of P2P and network traffic monitoring, research and analyze the traditional P2P flow control technology and the working principle of deployment, discuss on the straight loss and bypass interference control technology, and the reasonable combination of two kinds of technology to design straight bypass joint deployment. On basis of it, we design a new P2P traffic monitoring system. Through the design and implementation of computer network traffic monitoring system based on C/S mode to achieve automatic control, maintenance, and monitor network traffic, which is suitable for the current engineering software to monitor a network application environment. From the network users and network operator' s perspective, monitoring of network traffic is scientific, reasonable that improve network management and it has important research value.
文摘This paper summarizes the basic content of network curriculum design based on online learning mode and the basic flow, as well as network course should have the factors that suitable of the mode and attention matters in the design collaboration mode of network course. Based on this, other researchers and practitioners can conveniently and effectively design network course based on the cooperation mode. Through the analysis of the network curriculum development and the actual case, verify advantage of collaborative online learning mode.