期刊文献+
共找到670篇文章
< 1 2 34 >
每页显示 20 50 100
Security and Availability of SDN and NFV
1
作者 CHEN Yan 《ZTE Communications》 2018年第4期1-2,共2页
Software defined networking (SDN) and network function virtualization (NFV) have attracted significant attention from both academia and industry. Fortunately, by virtue of unique advantages of programmability and cent... Software defined networking (SDN) and network function virtualization (NFV) have attracted significant attention from both academia and industry. Fortunately, by virtue of unique advantages of programmability and centralized control, SDN has been widely used in various scenarios, such 展开更多
关键词 security SDN Editorial security and Availability of SDN and nfv
下载PDF
An Analysis of Cybersecurity Attacks against Internet of Things and Security Solutions 被引量:1
2
作者 Mohammad Rafsun Islam K. M. Aktheruzzaman 《Journal of Computer and Communications》 2020年第4期11-25,共15页
Internet of Things (IoT) has become a prevalent topic in the world of technology. It helps billion of devices to connect to the internet so that they can exchange data with each other. Nowadays, the IoT can be applied... Internet of Things (IoT) has become a prevalent topic in the world of technology. It helps billion of devices to connect to the internet so that they can exchange data with each other. Nowadays, the IoT can be applied in anything, from cellphones, coffee makers, cars, body sensors to smart surveillance, water distribution, energy management system, and environmental monitoring. However, the rapid growth of IoT has brought new and critical threats to the security and privacy of the users. Due to the millions of insecure IoT devices, an adversary can easily break into an application to make it unstable and steal sensitive user information and data. This paper provides an overview of different kinds of cybersecurity attacks against IoT devices as well as an analysis of IoT architecture. It then discusses the security solutions we can take to protect IoT devices against different kinds of security attacks. The main goal of this research is to enhance the development of IoT research by highlighting the different kinds of security challenges that IoT is facing nowadays, and the existing security solutions we can implement to make IoT devices more secure. In this study, we analyze the security solutions of IoT in three forms: secure authentication, secure communications, and application security to find suitable security solutions for protecting IoT devices. 展开更多
关键词 Internet of THINGS IOT IOT Architecture CYBERsecurity ATTACKS security solutions
下载PDF
NFV安全需术及应对策略 被引量:3
3
作者 郭志斌 陈扬帆 刘露 《电信科学》 北大核心 2016年第3期39-42,共4页
云计算技术的快速发展不仅带来了高速运算的便利,也埋下了很多不安全因素。欧洲电信标准化协会(European Telecommunications Standards Institute,ETSI)指出虚拟化安全问题成为电信运营商和企业明年将面临的大问题。针对NFV架构中的安... 云计算技术的快速发展不仅带来了高速运算的便利,也埋下了很多不安全因素。欧洲电信标准化协会(European Telecommunications Standards Institute,ETSI)指出虚拟化安全问题成为电信运营商和企业明年将面临的大问题。针对NFV架构中的安全技术进行研究,指出安全对NFV技术的重要性,分析管理支持设施的可用性及安全启动相关问题,并总结了NFV的软件安全隐患,通过不断完善NFV安全技术使得云计算环境可以更加安全有序地发展。 展开更多
关键词 nfv 安全 VFN
下载PDF
5G网络NFVI安全防护架构 被引量:3
4
作者 张鉴 冯晓东 唐洪玉 《移动通信》 2019年第10期43-48,共6页
基于5G网络“云化”和“虚拟化”的特点,NFV技术将在5G网络中发挥关键性的作用,提出了NFVI的安全防护架构,并针对物理层、网络层、虚拟化层、安全管理层等各层面提出具体的安全技术措施。
关键词 5G网络 nfv 安全架构
下载PDF
NFV中虚拟化网络功能生命周期安全管理措施 被引量:4
5
作者 苏坚 肖子玉 《电信科学》 北大核心 2016年第11期127-133,共7页
网络功能虚拟化的动态特性需要引入灵活可靠、能够实现自动化快速部署和资源弹性可扩展的嵌入式安全防护体系,要求安全技术和安全策略能够在VNF整个生命周期进行安全管理。描述了从VNF实例化、运行到退役的安全历程,并针对网络运营商需... 网络功能虚拟化的动态特性需要引入灵活可靠、能够实现自动化快速部署和资源弹性可扩展的嵌入式安全防护体系,要求安全技术和安全策略能够在VNF整个生命周期进行安全管理。描述了从VNF实例化、运行到退役的安全历程,并针对网络运营商需要在VNF生命周期关注的相应动态和静态安全策略进行分析探讨。 展开更多
关键词 nfv VNF 生命周期 安全管理
下载PDF
UDM:基于NFV的防止DDoS攻击SDN控制器的机制 被引量:4
6
作者 钱红燕 薛昊 陈鸣 《通信学报》 EI CSCD 北大核心 2019年第3期116-124,共9页
广泛存在的分布式拒绝服务(DDoS)攻击对于软件定义网络(SDN)的控制器形成了致命威胁,至今还没有一种安全机制能够防御。将SDN和网络功能虚拟化(NFV)结合,提出了一种新颖的防范DDoS攻击SDN控制器的前置检测中间盒(UDM)机制,在SDN交换机... 广泛存在的分布式拒绝服务(DDoS)攻击对于软件定义网络(SDN)的控制器形成了致命威胁,至今还没有一种安全机制能够防御。将SDN和网络功能虚拟化(NFV)结合,提出了一种新颖的防范DDoS攻击SDN控制器的前置检测中间盒(UDM)机制,在SDN交换机端口与用户主机之间分布式部署UDM以检测并拒止DDoS攻击报文。此外,还提出了一种基于NFV的前置中间盒的实现方法,使这种UDM机制更为经济和有效,实现了基于该机制的原型系统,并对其进行大量测试。实验结果表明,基于NFV的UDM机制能够实时有效地检测和防止对控制器的DDoS攻击。 展开更多
关键词 DDOS攻击 控制器安全 软件定义网络与网络功能虚拟化 前置检测中间盒
下载PDF
基于NFV架构下核心网安全问题分析 被引量:1
7
作者 常雯 《电信网技术》 2017年第4期65-67,共3页
基于NFV技术的移动通信网络彻底颠覆了传统的网络架构,NFV倡导的网络开放化、虚拟化、智能化、融合化对传统基于固定形态核心网的安全问题提出了巨大挑战。本文概述了NFV技术国内外标准研制的现状,并结合NFV网络架构分析在核心网引入NF... 基于NFV技术的移动通信网络彻底颠覆了传统的网络架构,NFV倡导的网络开放化、虚拟化、智能化、融合化对传统基于固定形态核心网的安全问题提出了巨大挑战。本文概述了NFV技术国内外标准研制的现状,并结合NFV网络架构分析在核心网引入NFV技术后面临的一系列安全问题。 展开更多
关键词 nfv 核心网 安全 5G
下载PDF
NFV安全保障的需求场景与关键技术研究 被引量:1
8
作者 罗成 《数字技术与应用》 2021年第7期25-27,共3页
NFV技术是构建5G承载和5G核心网的关键技术之一,但NFV技术由于其开放性,对5G网络安全提出了新挑战。在5G网络中采用NFV技术的应用场景各异,除了通用安全需求,NFV特有的安全需求也值得重视。本文描述了典型NFV的安全需求场景,提出了使用... NFV技术是构建5G承载和5G核心网的关键技术之一,但NFV技术由于其开放性,对5G网络安全提出了新挑战。在5G网络中采用NFV技术的应用场景各异,除了通用安全需求,NFV特有的安全需求也值得重视。本文描述了典型NFV的安全需求场景,提出了使用NFV场景下的关键安全技术手段与措施。 展开更多
关键词 nfv技术 安全保障 5G网络
下载PDF
基于NFV的网络安全技术研究 被引量:1
9
作者 刘晓童 《无线互联科技》 2022年第19期153-155,共3页
伴随着我国网络的普及,网络安全问题越来越受民众关注,我国对网络安全的研究力度也不断增加。网络功能虚拟化(Network Functions Virtualization,NFV)技术具有灵活性、共享性特点,可以高效、优质地完成新业务部署,因此备受研究人员关注... 伴随着我国网络的普及,网络安全问题越来越受民众关注,我国对网络安全的研究力度也不断增加。网络功能虚拟化(Network Functions Virtualization,NFV)技术具有灵活性、共享性特点,可以高效、优质地完成新业务部署,因此备受研究人员关注。文章基于NFV网络的试验系统及分析,针对NFV网络安全技术展开了详细论述,供相关人员参考使用。 展开更多
关键词 nfv技术 网络安全 异常定位 拓扑探测与评估
下载PDF
NFV安全风险分析及应对建议 被引量:2
10
作者 吴宏建 张如意 芦玥 《信息通信技术与政策》 2018年第11期68-72,共5页
网络功能虚拟化(NFV)是未来电信网络演进的方向和技术基础,也是5G核心网关键技术之一。随着NFV技术的成熟和5G步伐的临近,NFV将迎来大规模商用浪潮。但NFV技术存在的一些安全问题尚未得到有效解决,相关研究还比较滞后。本文从NFV架构的... 网络功能虚拟化(NFV)是未来电信网络演进的方向和技术基础,也是5G核心网关键技术之一。随着NFV技术的成熟和5G步伐的临近,NFV将迎来大规模商用浪潮。但NFV技术存在的一些安全问题尚未得到有效解决,相关研究还比较滞后。本文从NFV架构的基础设施层、Hypervisor、虚机、虚拟网元层和编排管理5个方面分析了NFV技术面临的安全风险和威胁,提出了一些可用于缓解NFV安全风险和威胁的技术及措施,并对NFV未来发展之路提出了一些思考和建议。 展开更多
关键词 网络功能虚拟化 安全 虚机 虚拟化管理程序
下载PDF
The Essence of Non-Traditional Security Issues and Their Solutions 被引量:1
11
作者 Huang Zhaoyu Su Qin 《Contemporary International Relations》 2009年第6期28-45,共18页
Non-traditional security issues have arisen since the 1960s,especially after the end of the Cold War,and are becoming a major issue in world security and politics.This reflects tremendous changes in the world situatio... Non-traditional security issues have arisen since the 1960s,especially after the end of the Cold War,and are becoming a major issue in world security and politics.This reflects tremendous changes in the world situation.With diverse causes and plural referent objects,non-traditional security issues cover nearly all the problems in the world today and make development difficult to sustain.This raises the question of whether human society and the earth can survive.Power politics one-sidedly stresses the role of power,endangering the harmonious development of nations and the whole of human society.It is not at all conducive to the solution of non-traditional security issues.The solution of non-traditional security issues demands cooperation from all actors in the international community.Multiple means are needed to solve these issues.Equal dialogue between all the actors,which can easily be attained,will play an effective role,as long as all actors respect each other's differences. 展开更多
关键词 The Essence of Non-Traditional security Issues and Their solutions security
下载PDF
RS2与ICD Security Solutions合作拓展亚太市场
12
《A&S(安全&自动化)》 2008年第3期37-37,共1页
门禁控制系统的领袖企业RS2Technologies宣布,他们与亚太地区系统整合解决方案的世界级供应商ICD Security Solutions结成合作伙伴关系。ICD将在其中国、印度。新加坡和日本的办公网络中示范并安装RS2的先进门禁管理硬件和软件。RS2的... 门禁控制系统的领袖企业RS2Technologies宣布,他们与亚太地区系统整合解决方案的世界级供应商ICD Security Solutions结成合作伙伴关系。ICD将在其中国、印度。新加坡和日本的办公网络中示范并安装RS2的先进门禁管理硬件和软件。RS2的经销商发展主管DaveBarnard说:“RS2对于亚太地区的门禁控制市场非常兴奋.对于ICD作为公司在该地区的合作伙伴也很高兴。 展开更多
关键词 solutionS security 合作伙伴关系 亚太市场 ICD RS2 门禁控制系统 亚太地区
原文传递
The COVID-19 and the“European Solution”of Data-based Approach to Governance:Public Security or Data Protection?
13
作者 刘洋 李益斌 NIU Huizi(Translated) 《The Journal of Human Rights》 2022年第3期483-503,共21页
To cope with the challenges of CoViD-19,europe has adopted relevant measures of a data-based approach to governance,on which scholars have huge differences,and the related researches are conducive to further discussio... To cope with the challenges of CoViD-19,europe has adopted relevant measures of a data-based approach to governance,on which scholars have huge differences,and the related researches are conducive to further discussion on the differences.By sorting out the challenges posed by the pandemic to public security and data protection in europe,we can summarize the“european Solution”of the data-based approach to governance,including legislation,instruments,supervision,international cooperation,and continuity.The“Solution”has curbed the spread of the pandemic to a certain extent.However,due to the influence of the traditional values of the EU,the“Solution”is too idealistic in the balance between public security and data protection,which intensifies the dilemma and causes many problems,such as ambiguous legislation,inadequate effectiveness and security of instruments,an arduous endeavor in inter national cooperation,and imperfect regulations on digital green certificates.Therefore,in a major public health crisis,there is still a long way to go in exploring a balance between public security and data protection. 展开更多
关键词 European solution data-based approach to governance data protection public security
下载PDF
Unmanned Aerial Vehicle Multi-Access Edge Computing as Security Enabler for Next-Gen 5G Security Frameworks
14
作者 Jaime Ortiz Córdoba Alejandro Molina Zarca Antonio Skármeta 《Intelligent Automation & Soft Computing》 SCIE 2023年第8期2307-2333,共27页
5G/Beyond 5G(B5G)networks provide connectivity to many heterogeneous devices,raising significant security and operational issues and making traditional infrastructure management increasingly complex.In this regard,new... 5G/Beyond 5G(B5G)networks provide connectivity to many heterogeneous devices,raising significant security and operational issues and making traditional infrastructure management increasingly complex.In this regard,new frameworks such as Anastacia-H2020 or INSPIRE-5GPlus automate the management of next-generation infrastructures,especially regarding policy-based security,abstraction,flexibility,and extensibility.This paper presents the design,workflow,and implementation of a security solution based on Unmanned Aerial Vehicles(UAVs),able to extend 5G/B5G security framework capabilities with UAV features like dynamic service provisioning in specific geographic areas.The proposed solution allows enforcing UAV security policies in proactive and reactive ways to automate UAV dynamic deployments and provisioning security Virtual Network Functions(VNFs)in the onboard Multi-access Edge Computing(MEC)node.A UAV has been ensembled from scratch to validate the proposal,and a raspberry-pi has been onboarded as compute node.The implementation provides a VNF for dynamic UAV management,capable of dynamically loading waypoints into the flight controller to address reactive autonomous flights,and anMLbased VNF capable of detecting image patterns.According to the security policies,the onboard VNFs can be dynamically configured to generate alerts to the framework and apply local reactions depending on the detection made.In our experiments,we measured the time it takes for the solution to be ready after receiving a security policy for detecting patterns in a specific geographical area.The time it takes for the solution to react automatically was also measured.The results show that the proactive flow configuration considering ten waypoints can be enforced in less than 3 s,and a local reactive flow can be enforced in around 1 s.We consider that the results are promising and aligned with other security enabler solutions as part of existing 5G/6G security frameworks. 展开更多
关键词 UAV 5G AI nfv security
下载PDF
A Review of Security Concerns in Internet of Things 被引量:2
15
作者 Engin Leloglu 《Journal of Computer and Communications》 2017年第1期121-136,共16页
The Internet of Things (IoT) represents a technologically optimistic future where objects will be connected to the internet and make intelligent collaborations with other objects anywhere, anytime. Although it makes a... The Internet of Things (IoT) represents a technologically optimistic future where objects will be connected to the internet and make intelligent collaborations with other objects anywhere, anytime. Although it makes appreciable development, there are still uncertainties about security concepts of its usage that is usually considered as a major concern in the design of IoT architectures. This paper presents a general survey of all the security issues in IoT along with an analysis of IoT architectures. The study defines security requirements and challenges that are common in IoT implementations and discusses security threats and related solutions on each layer of IoT architecture to make this technology secure and more widespread accordingly. 展开更多
关键词 Internet of THINGS IOT security Requirements security Challenges security Threats security solutionS
下载PDF
Synthetic security assessment for incomplete interval-valued information system 被引量:1
16
作者 赵亮 Xue Zhi 《High Technology Letters》 EI CAS 2012年第2期160-166,共7页
In order to understand the security conditions of the incomplete interval-valued information system (IllS) and acquire the corresponding solution of security problems, this paper proposes a multi-attribute group dec... In order to understand the security conditions of the incomplete interval-valued information system (IllS) and acquire the corresponding solution of security problems, this paper proposes a multi-attribute group decision- making (MAGDM) security assessment method based on the technique for order performance by similarity to ideal solution (TOPSIS). For IllS with preference information, combining with dominance-based rough set approach (DRSA), the effect of incomplete interval-valued information on decision results is discussed. For the imprecise judgment matrices, the security attribute weight can be obtained using Gibbs sampling. A numerical example shows that the proposed method can acquire some valuable knowledge hidden in the incomplete interval-valued information. The effectiveness of the proposed method in the synthetic security assessment for IIIS is verified. 展开更多
关键词 security assessment incomplete interval-valued information system(IIIS) multi-attribute group decision-making(MAGDM) technique for order performance by similarity to ideal solution(TOPSIS) dominance- based rough set approach(DRSA) Gibbs sampling
下载PDF
Fifty-Six Big Data V’s Characteristics and Proposed Strategies to Overcome Security and Privacy Challenges (BD2)
17
作者 Abou_el_ela Abdou Hussein 《Journal of Information Security》 2020年第4期304-328,共25页
The amount of data that is traveling across the internet today, including very large and complex set of raw facts that are not only large, but also, complex, noisy, heterogeneous, and longitudinal data as well. Compan... The amount of data that is traveling across the internet today, including very large and complex set of raw facts that are not only large, but also, complex, noisy, heterogeneous, and longitudinal data as well. Companies, institutions, healthcare system, mobile application capturing devices and sensors, traffic management, banking, retail, education etc., use piles of data which are further used for creating reports in order to ensure continuity regarding the services that they have to offer. Recently, Big data is one of the most important topics in IT industry. Managing Big data needs new techniques because traditional security and privacy mechanisms are inadequate and unable to manage complex distributed computing for different types of data. New types of data have different and new challenges also. A lot of researches treat with big data challenges starting from Doug Laney’s landmark paper</span><span style="font-family:Verdana;">,</span><span style="font-family:Verdana;"> during the previous two decades;the big challenge is how to operate a huge volume of data that has to be securely delivered through the internet and reach its destination intact. The present paper highlights important concepts of Fifty</span><span style="font-family:Verdana;">-</span><span style="font-family:Verdana;">six Big Data V’s characteristics. This paper also highlights the security and privacy Challenges that Big Data faces and solving this problem by proposed technological solutions that help us avoiding these challenging problems. 展开更多
关键词 Big Data Big Data V’s Characteristics security PRIVACY CHALLENGES Technological solutions
下载PDF
A Motherland That One Cannot Return to An Interpretation on Song of The Chu From a Perspective of Cultural Security
18
作者 XIONG Xiao YANG Xi 《Journal of Literature and Art Studies》 2015年第6期438-446,共9页
Song of The Chu, a novel written by LAN Zi-- a Chinese Australian writer, recounts the struggle in Australia over 20 years (1988-2008) of a group of Chinese young people. Cultural difference or even conflict is one ... Song of The Chu, a novel written by LAN Zi-- a Chinese Australian writer, recounts the struggle in Australia over 20 years (1988-2008) of a group of Chinese young people. Cultural difference or even conflict is one of the inevitable issues in terms of migration. The Chinese (Han) culture which belongs to the continental civilization and the Australian (Western) culture which belongs to the maritime one are both mighty and cannot be conquered or assimilated by each other. This means that the Chinese immigrants to Australia, compared to the ones from a less mighty culture, are more sensitive and resistant to the impact of an alien culture, which leads to a conscious or unconscious sense of security of the mother culture. Cultural security, not unidirectional, also refers to the worry by the locals of the impact brought by the immigrants. The protagonist resorts to converting to Buddhism as a solution to the cultural schizophrenia 展开更多
关键词 Song of The Chu cultural security cultural schizophrenia solution
下载PDF
Improvement Of Rural Social Security System and the Service Government Construction
19
作者 Qian HongYing 《Review of Global Academics》 2014年第1期75-79,共5页
The establishment and improvement of the social system is an important indicator of a nation political cultures and social development, and is the basic guarantee of social harmony. In recent years, our urban social s... The establishment and improvement of the social system is an important indicator of a nation political cultures and social development, and is the basic guarantee of social harmony. In recent years, our urban social security system is maturing, but rural social security system is almost a blank, affecting the economic and political development, and the progress of the farmers, and restricting the process of service government construction.Service government is a new model of government, which orients the purpose of fundamental interests for the whole people. The rural and the farmers are the focus of our country, and the improvement of rural social security system is the key point for solving the problems. Therefore, it is really important to deal with the relationship between the improvement of rural social security system and the service government construction.In my essay, based on the analysis of the theory of rural social security system and the service government, I will put forward the ideas of the improvement of rural social security system and the service government construction. 展开更多
关键词 rural social security system service-government solutionS
下载PDF
无人机系统安全性综述
20
作者 王震 周超 +1 位作者 樊永文 石鹏飞 《计算机科学》 CSCD 北大核心 2024年第S01期864-869,共6页
近年来,无人机越来越受欢迎,无人机在军事、农业、交通运输、电影、供应链和监控等各个行业都有着巨大的潜力。尽管无人机给人们提供了种种便利,但如今与无人机相关的安全事件却层出不穷。恶意方可能对无人机进行攻击,并利用无人机进行... 近年来,无人机越来越受欢迎,无人机在军事、农业、交通运输、电影、供应链和监控等各个行业都有着巨大的潜力。尽管无人机给人们提供了种种便利,但如今与无人机相关的安全事件却层出不穷。恶意方可能对无人机进行攻击,并利用无人机进行危及生命的活动。因此,世界各国政府已经开始规范无人机的使用。无人机需要一种智能和自动化的防御机制,以确保人类、财产和无人机本身的安全。而无人机操作系统防护是防止入侵攻击的一个重要部分。首先,对无人机结构进行了简要介绍;然后,研究了用于消费和商用无人机的现有操作系统的安全性。最后,调查了无人机操作系统的各种安全问题和可能的解决方案。 展开更多
关键词 无人机 无人机安全 操作系统安全 解决方案
下载PDF
上一页 1 2 34 下一页 到第
使用帮助 返回顶部