The distributed hybrid processing optimization problem of non-cooperative targets is an important research direction for future networked air-defense and anti-missile firepower systems. In this paper, the air-defense ...The distributed hybrid processing optimization problem of non-cooperative targets is an important research direction for future networked air-defense and anti-missile firepower systems. In this paper, the air-defense anti-missile targets defense problem is abstracted as a nonconvex constrained combinatorial optimization problem with the optimization objective of maximizing the degree of contribution of the processing scheme to non-cooperative targets, and the constraints mainly consider geographical conditions and anti-missile equipment resources. The grid discretization concept is used to partition the defense area into network nodes, and the overall defense strategy scheme is described as a nonlinear programming problem to solve the minimum defense cost within the maximum defense capability of the defense system network. In the solution of the minimum defense cost problem, the processing scheme, equipment coverage capability, constraints and node cost requirements are characterized, then a nonlinear mathematical model of the non-cooperative target distributed hybrid processing optimization problem is established, and a local optimal solution based on the sequential quadratic programming algorithm is constructed, and the optimal firepower processing scheme is given by using the sequential quadratic programming method containing non-convex quadratic equations and inequality constraints. Finally, the effectiveness of the proposed method is verified by simulation examples.展开更多
Although the perimeter security model works well enough when all internal hosts are credible, it is becoming increasingly difficult to enforce as companies adopt mobile and cloud technologies, i.e., the rise of bring ...Although the perimeter security model works well enough when all internal hosts are credible, it is becoming increasingly difficult to enforce as companies adopt mobile and cloud technologies, i.e., the rise of bring your own device(BYOD). It is observed that advanced targeted cyber-attacks usually follow a cyber kill chain;for instance, advanced targeted attacks often rely on network scanning techniques to gather information about potential targets. In response to this attack method, we propose a novel approach, i.e., an "isolating and dynamic"cyber defense, which cuts these potential chains to reduce the cumulative availability of the gathered information.First, we build a zero-trust network environment through network isolation, and then multiple network properties are maneuvered so that the host characteristics and locations needed to identify vulnerabilities cannot be located.Second, we propose a software-defined proactive cyber defense solution(SPD) for enterprise networks and design a general framework to strategically maneuver the IP address, network port, domain name, and path, while limiting the performance impact on the benign network user. Third, we implement our SPD proof-of-concept system over a software-defined network controller(OpenDaylight). Finally, we build an experimental platform to verify the system's ability to prevent scanning, eavesdropping, and denial-of-service attacks. The results suggest that our system can significantly reduce the availability of network reconnaissance scan information, block network eavesdropping, and sharply increase the cost of cyber-attacks.展开更多
Plants reshape their transcriptomes, proteomes and metabolomes in response to insect damage. In this study, we used suppression subtractive hybridization to investigate the transcriptomes of two cotton varieties (CCR...Plants reshape their transcriptomes, proteomes and metabolomes in response to insect damage. In this study, we used suppression subtractive hybridization to investigate the transcriptomes of two cotton varieties (CCRI41 and CCRI23) under Apolygus lucorum damage. From the CCRI23 libraries we obtained 92 transcripts and from the CCRI41 libraries we obtained 96 transcripts. 26 and 63 of the transcripts from CCRI23 and CCRI41, respectively, had known functions. Using reverse transcription PCR, we detected expression proifle of genes with known functions. Ultimately, we identiifed eight signiifcantly regulated genes, including one downregulated and four upregulated genes from the CCRI41 libraries, and one downregulated and two upregulated genes from the CCRI23 libraries. Only the gene encoding the polyphenol oxidase (PPO) is involved in plant defense against insect herbivores, and the others are related to improving tolerance to insect damage. Quantitative real-time PCR was used to study changes in expression levels during A. lucorum damage in CCRI23 and CCRI41. Signiifcantly regulated genes from CCRI23 showed a response in CCRI23 but not response in CCRI41. Similarly, signiifcantly regulated genes from CCRI41 showed a response in CCRI41 but not response in CCRI23. The results showed that, among transcriptomes of cotton varieties, there are different responses to A. lucorum damage.展开更多
基金supported by the National Natural Science Foundation of China (61903025)the Fundamental Research Funds for the Cent ral Universities (FRF-IDRY-20-013)。
文摘The distributed hybrid processing optimization problem of non-cooperative targets is an important research direction for future networked air-defense and anti-missile firepower systems. In this paper, the air-defense anti-missile targets defense problem is abstracted as a nonconvex constrained combinatorial optimization problem with the optimization objective of maximizing the degree of contribution of the processing scheme to non-cooperative targets, and the constraints mainly consider geographical conditions and anti-missile equipment resources. The grid discretization concept is used to partition the defense area into network nodes, and the overall defense strategy scheme is described as a nonlinear programming problem to solve the minimum defense cost within the maximum defense capability of the defense system network. In the solution of the minimum defense cost problem, the processing scheme, equipment coverage capability, constraints and node cost requirements are characterized, then a nonlinear mathematical model of the non-cooperative target distributed hybrid processing optimization problem is established, and a local optimal solution based on the sequential quadratic programming algorithm is constructed, and the optimal firepower processing scheme is given by using the sequential quadratic programming method containing non-convex quadratic equations and inequality constraints. Finally, the effectiveness of the proposed method is verified by simulation examples.
基金Project supported by the Information Engineering University Emerging Direction Cultivation Fund,China(No.2016610708)the Science and Technology Research Project of Henan,China(No.172102210615)+1 种基金the National Natural Science Foundation of China(Nos.61521003 and 61602509)the National Key Research and Development Program of China(Nos.2016YFB0800100 and 2016YFB0800101)
文摘Although the perimeter security model works well enough when all internal hosts are credible, it is becoming increasingly difficult to enforce as companies adopt mobile and cloud technologies, i.e., the rise of bring your own device(BYOD). It is observed that advanced targeted cyber-attacks usually follow a cyber kill chain;for instance, advanced targeted attacks often rely on network scanning techniques to gather information about potential targets. In response to this attack method, we propose a novel approach, i.e., an "isolating and dynamic"cyber defense, which cuts these potential chains to reduce the cumulative availability of the gathered information.First, we build a zero-trust network environment through network isolation, and then multiple network properties are maneuvered so that the host characteristics and locations needed to identify vulnerabilities cannot be located.Second, we propose a software-defined proactive cyber defense solution(SPD) for enterprise networks and design a general framework to strategically maneuver the IP address, network port, domain name, and path, while limiting the performance impact on the benign network user. Third, we implement our SPD proof-of-concept system over a software-defined network controller(OpenDaylight). Finally, we build an experimental platform to verify the system's ability to prevent scanning, eavesdropping, and denial-of-service attacks. The results suggest that our system can significantly reduce the availability of network reconnaissance scan information, block network eavesdropping, and sharply increase the cost of cyber-attacks.
基金supported by the National Natural Science Foundation of China (31201518)
文摘Plants reshape their transcriptomes, proteomes and metabolomes in response to insect damage. In this study, we used suppression subtractive hybridization to investigate the transcriptomes of two cotton varieties (CCRI41 and CCRI23) under Apolygus lucorum damage. From the CCRI23 libraries we obtained 92 transcripts and from the CCRI41 libraries we obtained 96 transcripts. 26 and 63 of the transcripts from CCRI23 and CCRI41, respectively, had known functions. Using reverse transcription PCR, we detected expression proifle of genes with known functions. Ultimately, we identiifed eight signiifcantly regulated genes, including one downregulated and four upregulated genes from the CCRI41 libraries, and one downregulated and two upregulated genes from the CCRI23 libraries. Only the gene encoding the polyphenol oxidase (PPO) is involved in plant defense against insect herbivores, and the others are related to improving tolerance to insect damage. Quantitative real-time PCR was used to study changes in expression levels during A. lucorum damage in CCRI23 and CCRI41. Signiifcantly regulated genes from CCRI23 showed a response in CCRI23 but not response in CCRI41. Similarly, signiifcantly regulated genes from CCRI41 showed a response in CCRI41 but not response in CCRI23. The results showed that, among transcriptomes of cotton varieties, there are different responses to A. lucorum damage.