期刊文献+
共找到36篇文章
< 1 2 >
每页显示 20 50 100
网通机及应用
1
作者 王新贤 《电子产品世界》 1998年第12期62-62,共1页
网通机是将最新的智能计算机技术融入网上专用通信装置,使最常应用的三种网上通信方式(电话、传真、E-MAIL)融为一体,成为新一代大众通信工具,就像我们最常用的电话机、传真机一样,快速、方便、经济,将成为人们的消费热点。
关键词 网通机 网上通信方式 因特网
下载PDF
Research and Implementation on HTTP Tunneling
2
作者 束坤 许勇 +1 位作者 吴国新 赵齐 《Journal of Southeast University(English Edition)》 EI CAS 2000年第2期52-57,共6页
The security problem of the Web system in the Internet based Intranet and the shortcomings of the methods used in solving this problem are analyzed and our system model of Web communication security are discussed, i... The security problem of the Web system in the Internet based Intranet and the shortcomings of the methods used in solving this problem are analyzed and our system model of Web communication security are discussed, i.e, adding local proxy to browser and reverse proxy to Web server based on present Web browser and server. The transformation between HTTP message and secure HTTP message is implemented in these two proxy modules. The architecture and implementing method is given and the features of this module is also discussed. 展开更多
关键词 computer network WEB communication security PROXY
下载PDF
Modeling of Intelligent Integrated Network Management System Using Object Oriented Approach *
3
作者 费翔 罗军舟 +1 位作者 顾冠群 吴介一 《Journal of Southeast University(English Edition)》 EI CAS 1998年第1期3-7,共5页
The concept of intelligent integrated network management (IINM) is briefly introduced. In order to analyze, design and implement IINM successfully, object oriented approach is testified to be an effective and efficien... The concept of intelligent integrated network management (IINM) is briefly introduced. In order to analyze, design and implement IINM successfully, object oriented approach is testified to be an effective and efficient way. In this paper, object oriented technique is applied to the structural model of IINM system, The Domain object class and the MU object class are used to represent the manager and the managed resources. Especially, NM IA is introduced which is a special object class with intelligent behaviors to manage the resources efficiently. 展开更多
关键词 object oriented approach computer communication network network management
下载PDF
An Adaptive Scheme for Neighbor Discovery in Mobile Ad Hoc Networks 被引量:5
4
作者 沈耀 蔡云泽 许晓鸣 《Journal of Shanghai Jiaotong university(Science)》 EI 2007年第5期602-609,617,共9页
The neighbor knowledge in mobile ad hoc networks is important information. However, the accuracy of neighbor knowledge is paid in terms of energy consumption. In traditional schemes for neighbor discovery, a mobile no... The neighbor knowledge in mobile ad hoc networks is important information. However, the accuracy of neighbor knowledge is paid in terms of energy consumption. In traditional schemes for neighbor discovery, a mobile node uses fixed period to send HELLO messages to notify its existence. An adaptive scheme was proposed. The objective is that when mobile nodes are distributed sparsely or move slowly, fewer HELLO messages are needed to achieve reasonable accuracy, while in a mutable network where nodes are dense or move quickly, they can adaptively send more HELLO messages to ensure the accuracy. Simulation results show that the adaptive scheme achieves the objective and performs effectively. 展开更多
关键词 ad hoc network neighbor discovery energy efficiency
下载PDF
A Novel Packet Marking Algorithm in Context-aware Autonomic QoS Framework 被引量:2
5
作者 Gong Xiangyang Wang Wendong Li Yan 《China Communications》 SCIE CSCD 2009年第4期98-107,共10页
Autonomic networking is one of the hot research topics in the research area of future network architectures.In this paper, we introduce context-aware and autonomic attributes into DiffServ QoS framework, and propose a... Autonomic networking is one of the hot research topics in the research area of future network architectures.In this paper, we introduce context-aware and autonomic attributes into DiffServ QoS framework, and propose a novel autonomic packet marking(APM) algorithm.In the proposed autonomic QoS framework, APM is capable of collecting various QoS related contexts, and adaptively adjusting its behavior to provide better QoS guarantee according to users' requirements and network conditions.Simulation results show that APM provides better performance than traditional packet marker, and significantly improves user's quality of experience. 展开更多
关键词 autonomic QoS framework DIFFSERV CONTEXT-AWARE packet marking
下载PDF
Vulnerability Testing of HTTP based on Vulnerability-testing Oriented Petri Net(VOPN) 被引量:1
6
作者 Li Weihai Ma Yan Huang Xiaohong 《China Communications》 SCIE CSCD 2009年第4期116-120,共5页
Vulnerability-testing Oriented Petri Net (VOPN), a vulnerability testing model for communication protocol is brought forward first, which is combined Petri Net system with protocol Syntax analysis. Then vulnerabilit... Vulnerability-testing Oriented Petri Net (VOPN), a vulnerability testing model for communication protocol is brought forward first, which is combined Petri Net system with protocol Syntax analysis. Then vulnerability testing of implementation of HTTP protocol based on VOPN is made and the process is analyzed to prove the feasibility of the model. 展开更多
关键词 vulnerability testing testing model HTTP Petri net
下载PDF
Towards a Source-Code Oriented Attestation 被引量:1
7
作者 Ruan Anbang Shen Qingni +3 位作者 Wang Li Qin Chao Gu Liang Chen Zhong 《China Communications》 SCIE CSCD 2009年第4期82-87,共6页
The Binary-based attestation (BA) mechanism presented by the Trusted Computing Group can equip the application with the capability of genuinely identifying configurations of remote system. However, BA only supports ... The Binary-based attestation (BA) mechanism presented by the Trusted Computing Group can equip the application with the capability of genuinely identifying configurations of remote system. However, BA only supports the attestation for specific patterns of binary codes defined by a trusted party, mostly the software vendor, for a particular version of a software. In this paper, we present a Source-Code Oriented Attestation (SCOA) framework to enable custom built application to be attested to in the TCG attestation architecture. In SCOA, security attributes are bond with the source codes of an application instead of its binaries codes. With a proof chain generated by a Trusted Building System to record the building procedure, the challengers can determine whether the binary interacted with is genuinely built from a particular set of source codes. Moreover, with the security attribute certificates assigned to the source codes, they can determine the trustworthiness of the binary. In this paper, we present a TBS implementation with virtualization. 展开更多
关键词 remote attestation trusted building system VIRTUALIZATION source-code
下载PDF
An Early Stage Detecting Method against SYN Flooding Attacks 被引量:1
8
作者 Sun Qibo Wang Shangguang Yan Danfeng Yang Fangchun 《China Communications》 SCIE CSCD 2009年第4期108-115,共8页
Existing detection methods against SYN flooding attacks are effective only at the later stages when attacking signatures are obvious.In this paper an early stage detecting method(ESDM) is proposed.The ESDM is a simple... Existing detection methods against SYN flooding attacks are effective only at the later stages when attacking signatures are obvious.In this paper an early stage detecting method(ESDM) is proposed.The ESDM is a simple but effective method to detect SYN flooding attacks at the early stage.In the ESDM the SYN traffic is forecasted by autoregressive integrated moving average model, and non-parametric cumulative sum algorithm is used to find the SYN flooding attacks according to the forecasted traffic.Trace-driven simulations show that ESDM is accurate and efficient to detect the SYN flooding attacks. 展开更多
关键词 denial-of-service attacks autoregressive integrated moving average model non-parametric cumulative sum algorithm
下载PDF
Network Security Incidents Frequency Prediction Based on Improved Genetic Algorithm and LSSVM 被引量:2
9
作者 ZHAO Guangyao ZOU Peng HAN Weihong 《China Communications》 SCIE CSCD 2010年第4期126-131,共6页
Since the frequency of network security incidents is nonlinear,traditional prediction methods such as ARMA,Gray systems are difficult to deal with the problem.When the size of sample is small,methods based on artifici... Since the frequency of network security incidents is nonlinear,traditional prediction methods such as ARMA,Gray systems are difficult to deal with the problem.When the size of sample is small,methods based on artificial neural network may not reach a high degree of preciseness.Least Squares Support Vector Machines (LSSVM) is a kind of machine learning methods based on the statistics learning theory,it can be applied to solve small sample and non-linear problems very well.This paper applied LSSVM to predict the occur frequency of network security incidents.To improve the accuracy,it used an improved genetic algorithm to optimize the parameters of LSSVM.Verified by real data sets,the improved genetic algorithm (IGA) converges faster than the simple genetic algorithm (SGA),and has a higher efficiency in the optimization procedure.Specially,the optimized LSSVM model worked very well on the prediction of frequency of network security incidents. 展开更多
关键词 Genetic Algorithm LSSVM Network Security Incidents Time Series PREDICTION
下载PDF
Research on traffic congestion mechanism and countermeasures based on dynamic traffic assignment 被引量:3
10
作者 裴玉龙 郎益顺 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2005年第3期235-238,共4页
Traffic congestion is widely distributed around a network. Generally, to analyze traffic congestion, static traffic capacity is adopted. But dynamic characteristics must be studied because congestion is a dynamic proc... Traffic congestion is widely distributed around a network. Generally, to analyze traffic congestion, static traffic capacity is adopted. But dynamic characteristics must be studied because congestion is a dynamic process. A Dynamic Traffic Assignment modeling fundamental combined with an urban congestion analysis method is studied in this paper. Three methods are based on congestion analysis, and the stochastic user optimal DTA models are especially considered. Correspondingly, a dynamic system optimal model is suggested for responding congestion countermeasures and an ideal user optimal model for predicted congestion countermeasure respectively. 展开更多
关键词 dynamic traffic assignment traffic congestion dynamic user optimal dynamic system optimal
下载PDF
An Enhanced and Extensible Data Structure for Flow Export Engine
11
作者 Zhang Pei Huang Xiaohong +1 位作者 Jiang Xiaoxiao Ma Yan 《China Communications》 SCIE CSCD 2009年第4期121-126,共6页
Flow-based measurement is a popular method for various network monitoring usages.However, many flow exporting softwares have still low performance to collect all flows.In this paper, we propose a IPFIX-based flow expo... Flow-based measurement is a popular method for various network monitoring usages.However, many flow exporting softwares have still low performance to collect all flows.In this paper, we propose a IPFIX-based flow export engine with an enhanced and extensible data structure, called XFix, on the basis of a GPL tool,-nProbe.In the engine, we use an extensible two-dimensional hash table for flow aggregation, which is able to improve the performance of the metering process as well as support bidirectional flow.Experimental results have shown its efficiency in multi-thread processing activity. 展开更多
关键词 network monitoring flow exporting bidirectional flow two-dimensional hash table IPFIX
下载PDF
Application of GML and SVG in the development of WebGIS 被引量:3
12
作者 XI Yan-tao WU Jiang-guo 《Journal of China University of Mining and Technology》 EI 2008年第1期140-143,共4页
Our study deals with two major issues impacting current WebGIS development: interoperability of heterogeneous data and visualization of vector data on the Web. By using the combination of Geography Markup Language (... Our study deals with two major issues impacting current WebGIS development: interoperability of heterogeneous data and visualization of vector data on the Web. By using the combination of Geography Markup Language (GML), Scalable Vector Graphics (SVG) and Web Feature Service (WFS) Implementation Specifications developed by the OpenGIS Consortium (OGC), a strategy of WebGIS is proposed. The GML is used as a coding and data transportation mechanism to realize interoperability, the SVG to display GML data on the Web and the WFS as a data query mechanism to access and retrieve data at the feature level in real time on the Web. A case study shows that the combination mentioned above has enormous potential to achieve interoperability while not requiring considerable changes to existing legacy data. Original data formats need not be changed and could still be retrieved using WFS and transformed into GML in real time. SVG can oroduce suoerior ouality vector maps on a Web browser. 展开更多
关键词 GML SVG WFS INTEROPERABILITY WEBGIS
下载PDF
Traffic-prediction-assisted dynamic power saving mechanism for IEEE 802.16e wireless MANs 被引量:1
13
作者 陆绍飞 王建新 +1 位作者 荣辉桂 秦拯 《Journal of Central South University》 SCIE EI CAS 2013年第6期1552-1558,共7页
How to reduce the energy consumption powered mainly by battery to prolong the standby time is one of the crucial issues for IEEE 802.16e wireless MANs.By predicting the next downlink inter-packet arrival time,three tr... How to reduce the energy consumption powered mainly by battery to prolong the standby time is one of the crucial issues for IEEE 802.16e wireless MANs.By predicting the next downlink inter-packet arrival time,three traffic-prediction-assisted power saving mechanisms based on P-PSCI,i.e.,PSCI-PFD,PSCI-ED and PSCI-LD,were proposed.In addition,the corresponding adjustment strategies for P-PSCI were also presented when there were uplink packets to be transmitted during sleep mode.Simulation results reveal that compared with the sleep mode algorithm recommended by IEEE 802.16e,the proposed mechanism P-PSCI can improve both energy efficiency and packet delay for IEEE 802.16e due to the consideration of the traffic characteristics and rate changes.Moreover,the results also demonstrate that PSCI-PFD (a=-2) significantly outperforms PSCI-ED,PSCI-LD,and the standard sleep mode in IEEE 802.16e is in terms of energy efficiency and packet delay. 展开更多
关键词 sleep mode power saving traffic prediction IEEE 802.16e
下载PDF
Network Capacity Analysis of Server Version WDM Optical Networks
14
作者 Zhang Zhenrong Li Zhengbin +1 位作者 He Yongqi Xu Anshi 《China Communications》 SCIE CSCD 2009年第3期89-93,共5页
In this paper,a new architecture of optical networks—the optical network based on server system is considered.From the point of this new architecture,the network can be modeled as a server system with three type serv... In this paper,a new architecture of optical networks—the optical network based on server system is considered.From the point of this new architecture,the network can be modeled as a server system with three type servers—the access server,the node server and the link server. The network performances such as cost,energy consume and network capacity can be affected by the capability of these three type servers.New ILP formulations are proposed to analyze the network capacity under two types of node severs,with and without wavelength converter.Computer simulations are conducted to evaluate the effectiveness of these new formulations.The study has shown that the network can achieve the same throughput under the two types of node servers and the network throughput increases when the maximum allowed variation increases. 展开更多
关键词 network capacity sever version WDM optical networks node severs
下载PDF
A Kind of Multi-party Non-repudiation Protocol with Consistent Evidence
15
作者 Liu Dongmei Qing Sihan 《China Communications》 SCIE CSCD 2009年第4期88-96,共9页
With development of electronic com- merce, non-repudiation protocol as the basal component of non-repudiation service has done more and more important functions. Comparing with lots of work on two-party non-repudiatio... With development of electronic com- merce, non-repudiation protocol as the basal component of non-repudiation service has done more and more important functions. Comparing with lots of work on two-party non-repudiation, there are less work on multi-party non-repudiation protocol. Multi-party protocol is more complex and facing more challenge of collusion attack. In this paper we give a kind of multi-party non-repudiation protocol based on off-line TTP with consistent evidence. Consistent evidence is a property that can not only simplify the process of disputation resolving, but also make the service more friendly to users, which means that whether or not TTP involves, evidences participants obtained are consistent. In the meanwhile we analyze the collusion attack that multi-party protocol facing, our protocol can prevent collusion attack. 展开更多
关键词 multi-party fair non-repudiation protocol consistent evidence collusion attack freehess FAIRNESS
下载PDF
Coordinated node scheduling for energy-conserving in large wireless sensor networks
16
作者 石高涛 廖明宏 徐文旭 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2008年第4期558-563,共6页
Aiming at developing a node scheduling protocol for sensor networks with fewer active nodes,we propose a coordinated node scheduling protocol based on the presentation of a solution and its optimization to determine w... Aiming at developing a node scheduling protocol for sensor networks with fewer active nodes,we propose a coordinated node scheduling protocol based on the presentation of a solution and its optimization to determine whether a node is redundant.The proposed protocol can reduce the number of working nodes by turning off as many redundant nodes as possible without degrading the coverage and connectivity.The simulation result shows that our protocol outperforms the peer with respect to the working node number and dynamic coverage percentage. 展开更多
关键词 CONNECTIVITY COVERAGE node scheduling energy efficiency wireless sensor networks
下载PDF
The Performance Analysis of the THMLD-based Mobile Multicast Method
17
作者 Guan Jianfeng Zhou Huachun +1 位作者 Li Xin Zhang Hongke 《China Communications》 SCIE CSCD 2009年第4期127-135,共9页
Mobile multicast is important for the emerging applications such as mobile video or audio conference and mobile IPTV.Some mobile multicast schemes have been proposed in the past few years, but most of them study the r... Mobile multicast is important for the emerging applications such as mobile video or audio conference and mobile IPTV.Some mobile multicast schemes have been proposed in the past few years, but most of them study the reconstruc-tion of multicast delivery tree, and few consider the group membership management for mobile sub-scribers.In this paper, we propose a new mobile multicast method based on the Two-Hop Multicast Listener Discovery(THMLD) protocol which pro-vides the mobile multicast membership manage-ment function by forwarding the traditional MLD messages to its neighboring subnets.To evaluate its performance, we analyze the THMLD and set up the simulation platform to compare it with the several traditional mobile multicast methods.The results show that THMLD can reduce the multicast join time, and the THMLD-based mobile multicast method can reduce the multicast join delay at a cost of increasing additional multicast maintenance cost. 展开更多
关键词 mobile multicast MLD BT RS join delay COST
下载PDF
Precise Transformation of Feistel to SP Fuse into LFSR
18
作者 Luo Lan Qu Zehui Song Chaoming 《China Communications》 SCIE CSCD 2009年第4期168-171,共4页
For the published block cipher algorithm, two kinds of round functions have been researched.Block ciphers in network environments are taking more risks than ever before because of their initialization key's distri... For the published block cipher algorithm, two kinds of round functions have been researched.Block ciphers in network environments are taking more risks than ever before because of their initialization key's distribution in the internet.The security of block cipher algorithm is affected by linear bias and nonlinear bias which are restricted by confusion layer and diffusion layer.This article takes an approach on how block cipher's two round structures are initially transformed when they fuse into LFSR.The SP structure can be considered two F functions in one Feistel round function which combines both right and left of origin data transformation.Furthermore, the round number linear function and nonlinear function of Feistel and SP structure are compared.The merit of SP structure is that it can fuse in LFSR as a nonlinear filter without memory. 展开更多
关键词 block cipher algorithm precise transformation merit of SP structure fuse in LFSR
下载PDF
Traffic Labeller: Collecting Internet Traffic Samples with Accurate Application Information 被引量:2
19
作者 PENG Lizhi ZHANG Hongli +2 位作者 YANG Bo CHEN Yuehui WU Tong 《China Communications》 SCIE CSCD 2014年第1期69-78,共10页
Traffic classification research has been suffering from a trouble of collecting accurate samples with ground truth.A model named Traffic Labeller(TL) is proposed to solve this problem.TL system captures all user socke... Traffic classification research has been suffering from a trouble of collecting accurate samples with ground truth.A model named Traffic Labeller(TL) is proposed to solve this problem.TL system captures all user socket calls and their corresponding application process information in the user mode on a Windows host.Once a sending data call has been captured,its 5-tuple {source IP,destination IP,source port,destination port and transport layer protocol},associated with its application information,is sent to an intermediate NDIS driver in the kernel mode.Then the intermediate driver writes application type information on TOS field of the IP packets which match the 5-tuple.In this way,each IP packet sent from the Windows host carries their application information.Therefore,traffic samples collected on the network have been labelled with the accurate application information and can be used for training effective traffic classification models. 展开更多
关键词 network measurement traffic cla- ssification data collection ground truth
下载PDF
Seamless Handover for IMS over Mobile-IPv6 Using Context Transfer
20
作者 Reza Farahbakhsh Naser Movahhedinia 《China Communications》 SCIE CSCD 2009年第3期122-133,共12页
Mobility support for the next generation IPv6 networks has been one of the recent research issues due to the growing demand for wireless services over internet.In the other hand,3GPP has introduced IP Multimedia Subsy... Mobility support for the next generation IPv6 networks has been one of the recent research issues due to the growing demand for wireless services over internet.In the other hand,3GPP has introduced IP Multimedia Subsystem as the next generation IP based infrastructure for wireless and wired multimedia services.In this paper we present two context transfer mechanisms based on predictive and reactive schemes,to support seamless handover in IMS over Mobile IPv6.Those schemes reduce handover latency by transferring appropriate session information between the old and the new access networks.Moreover,we present two methods for QoS parameters negotiations to preserve service quality along the mobile user movement path.The performances of the proposed mechanisms are evaluated by simulations. 展开更多
关键词 context transfer seamless handover IP Multimedia Subsystem (IMS) mobile IPv6 Quality of Service (QoS)
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部