We outline an approach to investigate the limiting law of an absorbing Markov chain conditional on having not been absorbed for long time. The main idea is to employ Donsker-Varadhan's entropy functional which is typ...We outline an approach to investigate the limiting law of an absorbing Markov chain conditional on having not been absorbed for long time. The main idea is to employ Donsker-Varadhan's entropy functional which is typically used as the large deviation rate function for Markov processes. This approach provides an interpretation for a certain quasi-ergodicity展开更多
Advanced Persistent Threat(APT)is now the most common network assault.However,the existing threat analysis models cannot simultaneously predict the macro-development trend and micro-propagation path of APT attacks.The...Advanced Persistent Threat(APT)is now the most common network assault.However,the existing threat analysis models cannot simultaneously predict the macro-development trend and micro-propagation path of APT attacks.They cannot provide rapid and accurate early warning and decision responses to the present system state because they are inadequate at deducing the risk evolution rules of network threats.To address the above problems,firstly,this paper constructs the multi-source threat element analysis ontology(MTEAO)by integrating multi-source network security knowledge bases.Subsequently,based on MTEAO,we propose a two-layer threat prediction model(TL-TPM)that combines the knowledge graph and the event graph.The macro-layer of TL-TPM is based on the knowledge graph to derive the propagation path of threats among devices and to correlate threat elements for threat warning and decision-making;The micro-layer ingeniously maps the attack graph onto the event graph and derives the evolution path of attack techniques based on the event graph to improve the explainability of the evolution of threat events.The experiment’s results demonstrate that TL-TPM can completely depict the threat development trend,and the early warning results are more precise and scientific,offering knowledge and guidance for active defense.展开更多
Following up Neuts' idea, the SPH-distribution class associated with bounded Q matrices for infinite Markov chains is denned. The main result in this paper is to characterize the SPH class through the derivatives ...Following up Neuts' idea, the SPH-distribution class associated with bounded Q matrices for infinite Markov chains is denned. The main result in this paper is to characterize the SPH class through the derivatives of the distribution functions. Based on the characterization theorem, closure properties, the expansion, uniform approximation, and the matrix representations of the SPH class are also discussed by the derivatives of the distribution functions at origin.展开更多
Technology of cognitive radio networks has emerged as an effective method to enhance the utilization of the radio spectrum where the primary users have priority to use the spectrum, and the secondary users try to expl...Technology of cognitive radio networks has emerged as an effective method to enhance the utilization of the radio spectrum where the primary users have priority to use the spectrum, and the secondary users try to exploit the spectrum unoccupied by the primary users. In this paper, considering the non-saturated condition, the performance analysis for the IEEE 802.11-based cognitive radio networks is presented with single-channel and multi-channel, respectively. For the single-channel case, an absorbing Markov chain model describing the system transitions is constructed, and one-step transition probability matrix of the Markov chain is given. By using the method of probability generating function, the non-saturated throughput of the secondary users is obtained. For the multi-channel case, taking into account the negotiation-based sensing policy, the mean number of unused channels perceived by the second users is given, and then the non-saturated aggregate throughput of the secondary users is derived. Finally, numerical examples are provided to show the influences of the non-saturated degree, the number of the secondary users and the channel utilization of the primary users on the performance measures for the non-saturated throughput with single-channel and the non-saturated aggregate throughput with multi-channel.展开更多
基金Acknowledgements This work was supported by the Specialized Research Fund for the Doctoral Program of Higher Education (20120002110045) and the National Natural Science Foundation of China (Grant No. 11271220). The author was grateful to the referees for the careful reading of the first version of the paper.
文摘We outline an approach to investigate the limiting law of an absorbing Markov chain conditional on having not been absorbed for long time. The main idea is to employ Donsker-Varadhan's entropy functional which is typically used as the large deviation rate function for Markov processes. This approach provides an interpretation for a certain quasi-ergodicity
文摘Advanced Persistent Threat(APT)is now the most common network assault.However,the existing threat analysis models cannot simultaneously predict the macro-development trend and micro-propagation path of APT attacks.They cannot provide rapid and accurate early warning and decision responses to the present system state because they are inadequate at deducing the risk evolution rules of network threats.To address the above problems,firstly,this paper constructs the multi-source threat element analysis ontology(MTEAO)by integrating multi-source network security knowledge bases.Subsequently,based on MTEAO,we propose a two-layer threat prediction model(TL-TPM)that combines the knowledge graph and the event graph.The macro-layer of TL-TPM is based on the knowledge graph to derive the propagation path of threats among devices and to correlate threat elements for threat warning and decision-making;The micro-layer ingeniously maps the attack graph onto the event graph and derives the evolution path of attack techniques based on the event graph to improve the explainability of the evolution of threat events.The experiment’s results demonstrate that TL-TPM can completely depict the threat development trend,and the early warning results are more precise and scientific,offering knowledge and guidance for active defense.
基金Supported by the National Natural Science Foundation of China (70171059)
文摘Following up Neuts' idea, the SPH-distribution class associated with bounded Q matrices for infinite Markov chains is denned. The main result in this paper is to characterize the SPH class through the derivatives of the distribution functions. Based on the characterization theorem, closure properties, the expansion, uniform approximation, and the matrix representations of the SPH class are also discussed by the derivatives of the distribution functions at origin.
基金supported by the National Natural Science Foundation of China(71101124, 11201408)the Natural Science Foundation of Heibei Province(2012203093)
文摘Technology of cognitive radio networks has emerged as an effective method to enhance the utilization of the radio spectrum where the primary users have priority to use the spectrum, and the secondary users try to exploit the spectrum unoccupied by the primary users. In this paper, considering the non-saturated condition, the performance analysis for the IEEE 802.11-based cognitive radio networks is presented with single-channel and multi-channel, respectively. For the single-channel case, an absorbing Markov chain model describing the system transitions is constructed, and one-step transition probability matrix of the Markov chain is given. By using the method of probability generating function, the non-saturated throughput of the secondary users is obtained. For the multi-channel case, taking into account the negotiation-based sensing policy, the mean number of unused channels perceived by the second users is given, and then the non-saturated aggregate throughput of the secondary users is derived. Finally, numerical examples are provided to show the influences of the non-saturated degree, the number of the secondary users and the channel utilization of the primary users on the performance measures for the non-saturated throughput with single-channel and the non-saturated aggregate throughput with multi-channel.