Network Security Situation Awareness System YHSAS acquires,understands and displays the security factors which cause changes of network situation,and predicts the future development trend of these security factors.YHS...Network Security Situation Awareness System YHSAS acquires,understands and displays the security factors which cause changes of network situation,and predicts the future development trend of these security factors.YHSAS is developed for national backbone network,large network operators,large enterprises and other large-scale network.This paper describes its architecture and key technologies:Network Security Oriented Total Factor Information Collection and High-Dimensional Vector Space Analysis,Knowledge Representation and Management of Super Large-Scale Network Security,Multi-Level,Multi-Granularity and Multi-Dimensional Network Security Index Construction Method,Multi-Mode and Multi-Granularity Network Security Situation Prediction Technology,and so on.The performance tests show that YHSAS has high real-time performance and accuracy in security situation analysis and trend prediction.The system meets the demands of analysis and prediction for large-scale network security situation.展开更多
The assessment of water security is an important content in the security management of water resources due to the fact that the state of water security directly affects both the sustainable development of regional eco...The assessment of water security is an important content in the security management of water resources due to the fact that the state of water security directly affects both the sustainable development of regional economy and the improvement on the living quality of mankind. Grey associative analysis is introduced and applied to assessment of water security on the basis of grey characteristics of the assessment index system of water security. As a case study shows, grey associative analysis is used for evaluating water security of some provinces in China, and the satisfactory assessment results are obtained. The sequence of provinces in China with regard to water security from good to poor is obtained and, moreover, the water security level of each region is also confirmed. The results obtained accord with the actual state of each region. They are of practical significance and can be used to guide the management of regional water security and a sustainable development of the economy therein. At the same time, the results demonstrate that grey associative analysis provides a new method for assessing water展开更多
Association rules are useful for determining correlations between items. Applying association rules to intrusion detection system (IDS) can improve the detection rate, but false positive rate is also increased. Weight...Association rules are useful for determining correlations between items. Applying association rules to intrusion detection system (IDS) can improve the detection rate, but false positive rate is also increased. Weighted association rules are used in this paper to mine intrustion models, which can increase the detection rate and decrease the false positive rate by some extent. Based on this, the structure of host-based IDS using weighted association rules is proposed.展开更多
As critical components in SDN,controllers are prone to suffer from a series of potential attacks which result in system crashes.To prevent the compromise caused by single failure of controller or flow-tampering attack...As critical components in SDN,controllers are prone to suffer from a series of potential attacks which result in system crashes.To prevent the compromise caused by single failure of controller or flow-tampering attacks,Mcad-SA,an aware decision-making security architecture with multiple controllers was proposed,which coordinates heterogeneous controllers internally as an"associated"controller.This architecture extends existing control plane and takes advantage of various controllers’merits to improve the difficulty and cost of probes and attacks from attackers.In this framework,flow rules distributed to switches are no longer relying on a single controller but according to the vote results from the majority of controllers,which significantly enhances the reliability of flow rules.As to the vote process of flow rules,segmentation and grading is adopted to pick up the most trustful one from multiple flow rules and implement flow consistency.This mechanism avoids comparison between rules via bit by bit which is impractical among several controllers.Theory analysis and simulation results demonstrates the effectiveness,availability and resilience of the proposed methods and their better security gain over general SDN architectures.展开更多
文章提出了一种基于多特征要素的网络安全审计中的特征数据关联方法。该方法以国际移动设备识别码(International Mobile Equipment Identity,IMEI)、国际移动用户识别码(International Mobile Subscriber Identification,IMSI)、移动终...文章提出了一种基于多特征要素的网络安全审计中的特征数据关联方法。该方法以国际移动设备识别码(International Mobile Equipment Identity,IMEI)、国际移动用户识别码(International Mobile Subscriber Identification,IMSI)、移动终端MAC(TERMINAL_MAC)地址三个特征要素为关联因子,通过持续更新完善特征信息串的方式,有效解决了在接入网络的移动终端MAC地址可能发生周期变化的情况下,构建移动终端用户唯一虚拟画像的问题。展开更多
Microsoft SQL Server是一个c/s模式的强大的关系型数据库管理系统,应用领域十分广泛.获取SQLServer 2000 SA权限,导致安装SQL Server 2000的计算机被远程控制,将对数据库和服务器带来很大的安全隐患.保障数据库的安全性是我们最关心的...Microsoft SQL Server是一个c/s模式的强大的关系型数据库管理系统,应用领域十分广泛.获取SQLServer 2000 SA权限,导致安装SQL Server 2000的计算机被远程控制,将对数据库和服务器带来很大的安全隐患.保障数据库的安全性是我们最关心的问题,将详细分析SQL Server 2000数据库SA权限安全性与防范问题进行的探索性研究.展开更多
对含有系统误差的测量进行配准是准确进行数据关联的前提.实际中,许多不确定性因素导致系统误差,使其演化模型难以建立,从而导致传统配准方法不再适用.为此,提出一种基于优化SA-PSO(simulated annealing particle swarm optimization)...对含有系统误差的测量进行配准是准确进行数据关联的前提.实际中,许多不确定性因素导致系统误差,使其演化模型难以建立,从而导致传统配准方法不再适用.为此,提出一种基于优化SA-PSO(simulated annealing particle swarm optimization)的配准算法.由于传感器监视空域经常受到杂波的影响,在利用SA-PSO优化算法对系统误差进行配准时,不仅要考虑外界因素所引发系统误差的不确定性问题,还要考虑目标多个量测的归属问题.基于此,提出一种联合改进退火粒子群优化和概率数据关联的算法SA-PSO-PDA(simulated annealing and particle swarm optimization and probability data association),它综合考虑系统误差的随机性、寻优的最佳化和目标量测的多样性.仿真结果表明了所提算法具有可行性,且能较好地寻优系统误差参数.展开更多
基金This work is funded by the National Natural Science Foundation of China under Grant U1636215the National key research and development plan under Grant Nos.2018YFB0803504,2016YFB0800303.
文摘Network Security Situation Awareness System YHSAS acquires,understands and displays the security factors which cause changes of network situation,and predicts the future development trend of these security factors.YHSAS is developed for national backbone network,large network operators,large enterprises and other large-scale network.This paper describes its architecture and key technologies:Network Security Oriented Total Factor Information Collection and High-Dimensional Vector Space Analysis,Knowledge Representation and Management of Super Large-Scale Network Security,Multi-Level,Multi-Granularity and Multi-Dimensional Network Security Index Construction Method,Multi-Mode and Multi-Granularity Network Security Situation Prediction Technology,and so on.The performance tests show that YHSAS has high real-time performance and accuracy in security situation analysis and trend prediction.The system meets the demands of analysis and prediction for large-scale network security situation.
基金This project is supported by the Hubei Key Laboratory Hydropower Construction and Management Project,China Three Gorges University,and Center of China Central Economic Development in Nanchang University
文摘The assessment of water security is an important content in the security management of water resources due to the fact that the state of water security directly affects both the sustainable development of regional economy and the improvement on the living quality of mankind. Grey associative analysis is introduced and applied to assessment of water security on the basis of grey characteristics of the assessment index system of water security. As a case study shows, grey associative analysis is used for evaluating water security of some provinces in China, and the satisfactory assessment results are obtained. The sequence of provinces in China with regard to water security from good to poor is obtained and, moreover, the water security level of each region is also confirmed. The results obtained accord with the actual state of each region. They are of practical significance and can be used to guide the management of regional water security and a sustainable development of the economy therein. At the same time, the results demonstrate that grey associative analysis provides a new method for assessing water
文摘Association rules are useful for determining correlations between items. Applying association rules to intrusion detection system (IDS) can improve the detection rate, but false positive rate is also increased. Weighted association rules are used in this paper to mine intrustion models, which can increase the detection rate and decrease the false positive rate by some extent. Based on this, the structure of host-based IDS using weighted association rules is proposed.
基金The National Natural Science Foundation of China(No.61521003,No.61602509)The National Key R&D Program of China(No.2016YFB0800100,No.2016YFB0800101)The Key Technologies Research and Development of Program of Henan Province(No.172102210615)
文摘As critical components in SDN,controllers are prone to suffer from a series of potential attacks which result in system crashes.To prevent the compromise caused by single failure of controller or flow-tampering attacks,Mcad-SA,an aware decision-making security architecture with multiple controllers was proposed,which coordinates heterogeneous controllers internally as an"associated"controller.This architecture extends existing control plane and takes advantage of various controllers’merits to improve the difficulty and cost of probes and attacks from attackers.In this framework,flow rules distributed to switches are no longer relying on a single controller but according to the vote results from the majority of controllers,which significantly enhances the reliability of flow rules.As to the vote process of flow rules,segmentation and grading is adopted to pick up the most trustful one from multiple flow rules and implement flow consistency.This mechanism avoids comparison between rules via bit by bit which is impractical among several controllers.Theory analysis and simulation results demonstrates the effectiveness,availability and resilience of the proposed methods and their better security gain over general SDN architectures.
文摘文章提出了一种基于多特征要素的网络安全审计中的特征数据关联方法。该方法以国际移动设备识别码(International Mobile Equipment Identity,IMEI)、国际移动用户识别码(International Mobile Subscriber Identification,IMSI)、移动终端MAC(TERMINAL_MAC)地址三个特征要素为关联因子,通过持续更新完善特征信息串的方式,有效解决了在接入网络的移动终端MAC地址可能发生周期变化的情况下,构建移动终端用户唯一虚拟画像的问题。
文摘Microsoft SQL Server是一个c/s模式的强大的关系型数据库管理系统,应用领域十分广泛.获取SQLServer 2000 SA权限,导致安装SQL Server 2000的计算机被远程控制,将对数据库和服务器带来很大的安全隐患.保障数据库的安全性是我们最关心的问题,将详细分析SQL Server 2000数据库SA权限安全性与防范问题进行的探索性研究.
文摘对含有系统误差的测量进行配准是准确进行数据关联的前提.实际中,许多不确定性因素导致系统误差,使其演化模型难以建立,从而导致传统配准方法不再适用.为此,提出一种基于优化SA-PSO(simulated annealing particle swarm optimization)的配准算法.由于传感器监视空域经常受到杂波的影响,在利用SA-PSO优化算法对系统误差进行配准时,不仅要考虑外界因素所引发系统误差的不确定性问题,还要考虑目标多个量测的归属问题.基于此,提出一种联合改进退火粒子群优化和概率数据关联的算法SA-PSO-PDA(simulated annealing and particle swarm optimization and probability data association),它综合考虑系统误差的随机性、寻优的最佳化和目标量测的多样性.仿真结果表明了所提算法具有可行性,且能较好地寻优系统误差参数.