Campus network provides a critical stage to student service and campus administration,which assumes a paramount part in the strategy of‘Rejuvenating the Country through Science and Education’and‘Revitalizing China ...Campus network provides a critical stage to student service and campus administration,which assumes a paramount part in the strategy of‘Rejuvenating the Country through Science and Education’and‘Revitalizing China through Talented Persons’.However,with the rapid development and continuous expansion of campus network,network security needs to be an essential issue that could not be overlooked in campus network construction.In order to ensure the normal operation of various functions of the campus network,the security risk level of the campus network is supposed to be controlled within a reasonable range at any moment.Through literature research,theory analysis and other methods,this paper systematically combs the research on campus network security at home and abroad,analyzing and researching the campus network security issues from a theoretical perspective.A series of efficient solutions accordingly were also put forward.展开更多
The Internet of Things (IoT) describes the future where every day physical objects will be connected to the internet and be able to identify themselves to other devices. IoT is a new revolution of the Internet and It ...The Internet of Things (IoT) describes the future where every day physical objects will be connected to the internet and be able to identify themselves to other devices. IoT is a new revolution of the Internet and It will effect in a large number of applications such as smart living, smart home, healthcare systems, smart manufacturing, environment monitoring, and smart logistics. This paper provides integration, summarizes and surveys some of the security techniques especially hybrid techniques that can be applied with healthcare applications in IoT environment.展开更多
One of the significant challenges that smart grid networks face is cyber-security. Several studies have been conducted to highlight those security challenges. However, the majority of these surveys classify attacks ba...One of the significant challenges that smart grid networks face is cyber-security. Several studies have been conducted to highlight those security challenges. However, the majority of these surveys classify attacks based on the security requirements, confidentiality, integrity, and availability, without taking into consideration the accountability requirement. In this survey paper, we provide a classification of attacks based on the OSI model and discuss in more detail the cyber-attacks that can target the different layers of smart grid networks communication. We also propose new classifications for the detection and countermeasure techniques and describe existing techniques under each category. Finally, we discuss challenges and future research directions.展开更多
Along with the deepening of the reform and opening-up policy and the entering of the WTO,international exchange of economy and culture has become more and more frequent,Internet has become an indispensable part of our...Along with the deepening of the reform and opening-up policy and the entering of the WTO,international exchange of economy and culture has become more and more frequent,Internet has become an indispensable part of our life,its rapid development brings great convenience to us,and all of the computers will be connected by Internet in the 21 century,thus the meaning of information security has changed substantially.It not only changes from a general guarding to a common defence,but from a specific field to a public subject as well.However,the opening and sharing of the Internet resource,unefficient supervision as well as various virus make people's information and belongings being in an extremely dangerous environment.The fight between hackers and anti-hackers,destruction and anti-destruction has already affected the stable running of the network and users' legal right,caused great economy damages and it could also threat our country's security.So a right understanding and in-time measures should be paid special attention to.The thesis firstly expatiates the current state of the network security and its importance,and discusses some major factors and threats that affect the network security.And the thesis also introduce some catalogues of the security techniques,some relevant information and their major characters,besides that,I enumerate some popular and effective methods of protecting our network,including the widely used firewall,and the meticulous techniques such as security scan techniques and techniques of intrusion detection.Lastly,some protective measures are stated.展开更多
Through the correct teaching and game design,not only can innovation be carried out,but the highly effective network security teaching and the training solution countermeasure can also develop the student’s correct s...Through the correct teaching and game design,not only can innovation be carried out,but the highly effective network security teaching and the training solution countermeasure can also develop the student’s correct social behavior and value idea.Furthermore,through rule design and role play,students can improve the overall level of network security awareness and enhance their sense of cooperation during their studies.This paper defines the concept of a serious game and its significance to the network security curriculum of schools and designs the corresponding card game according to the feature of network security.The purpose of this paper is to strengthen overall network security awareness,cultivate professional skills,and enhance network security.展开更多
The number of botnet malware attacks on Internet devices has grown at an equivalent rate to the number of Internet devices that are connected to the Internet.Bot detection using machine learning(ML)with flow-based fea...The number of botnet malware attacks on Internet devices has grown at an equivalent rate to the number of Internet devices that are connected to the Internet.Bot detection using machine learning(ML)with flow-based features has been extensively studied in the literature.Existing flow-based detection methods involve significant computational overhead that does not completely capture network communication patterns that might reveal other features ofmalicious hosts.Recently,Graph-Based Bot Detection methods using ML have gained attention to overcome these limitations,as graphs provide a real representation of network communications.The purpose of this study is to build a botnet malware detection system utilizing centrality measures for graph-based botnet detection and ML.We propose BotSward,a graph-based bot detection system that is based on ML.We apply the efficient centrality measures,which are Closeness Centrality(CC),Degree Centrality(CC),and PageRank(PR),and compare them with others used in the state-of-the-art.The efficiency of the proposed method is verified on the available Czech Technical University 13 dataset(CTU-13).The CTU-13 dataset contains 13 real botnet traffic scenarios that are connected to a command-and-control(C&C)channel and that cause malicious actions such as phishing,distributed denial-of-service(DDoS)attacks,spam attacks,etc.BotSward is robust to zero-day attacks,suitable for large-scale datasets,and is intended to produce better accuracy than state-of-the-art techniques.The proposed BotSward solution achieved 99%accuracy in botnet attack detection with a false positive rate as low as 0.0001%.展开更多
In-network data aggregation is severely affected due to information in transmits attack. This is an important problem since wireless sensor networks (WSN) are highly vulnerable to node compromises due to this attack. ...In-network data aggregation is severely affected due to information in transmits attack. This is an important problem since wireless sensor networks (WSN) are highly vulnerable to node compromises due to this attack. As a result, large error in the aggregate computed at the base station due to false sub aggregate values contributed by compromised nodes. When falsified event messages forwarded through intermediate nodes lead to wastage of their limited energy too. Since wireless sensor nodes are battery operated, it has low computational power and energy. In view of this, the algorithms designed for wireless sensor nodes should be such that, they extend the lifetime, use less computation and enhance security so as to enhance the network life time. This article presents Vernam Cipher cryptographic technique based data compression algorithm using huff man source coding scheme in order to enhance security and lifetime of the energy constrained wireless sensor nodes. In addition, this scheme is evaluated by using different processor based sensor node implementations and the results are compared against to other existing schemes. In particular, we present a secure light weight algorithm for the wireless sensor nodes which are consuming less energy for its operation. Using this, the entropy improvement is achieved to a greater extend.展开更多
基金sponsored by the JSPIGKZ Project (No.2911121110)Innovative and Entrepreneurial Doctor of Jiangsu Province (No.JSSCBS20210598)+1 种基金Jiangsu Provincial University Nature Science Foundation Project (No.2020KX007Z)Jiangsu Provincial Science and Technology Research Project (No.20KJB413002)。
文摘Campus network provides a critical stage to student service and campus administration,which assumes a paramount part in the strategy of‘Rejuvenating the Country through Science and Education’and‘Revitalizing China through Talented Persons’.However,with the rapid development and continuous expansion of campus network,network security needs to be an essential issue that could not be overlooked in campus network construction.In order to ensure the normal operation of various functions of the campus network,the security risk level of the campus network is supposed to be controlled within a reasonable range at any moment.Through literature research,theory analysis and other methods,this paper systematically combs the research on campus network security at home and abroad,analyzing and researching the campus network security issues from a theoretical perspective.A series of efficient solutions accordingly were also put forward.
文摘The Internet of Things (IoT) describes the future where every day physical objects will be connected to the internet and be able to identify themselves to other devices. IoT is a new revolution of the Internet and It will effect in a large number of applications such as smart living, smart home, healthcare systems, smart manufacturing, environment monitoring, and smart logistics. This paper provides integration, summarizes and surveys some of the security techniques especially hybrid techniques that can be applied with healthcare applications in IoT environment.
文摘One of the significant challenges that smart grid networks face is cyber-security. Several studies have been conducted to highlight those security challenges. However, the majority of these surveys classify attacks based on the security requirements, confidentiality, integrity, and availability, without taking into consideration the accountability requirement. In this survey paper, we provide a classification of attacks based on the OSI model and discuss in more detail the cyber-attacks that can target the different layers of smart grid networks communication. We also propose new classifications for the detection and countermeasure techniques and describe existing techniques under each category. Finally, we discuss challenges and future research directions.
文摘Along with the deepening of the reform and opening-up policy and the entering of the WTO,international exchange of economy and culture has become more and more frequent,Internet has become an indispensable part of our life,its rapid development brings great convenience to us,and all of the computers will be connected by Internet in the 21 century,thus the meaning of information security has changed substantially.It not only changes from a general guarding to a common defence,but from a specific field to a public subject as well.However,the opening and sharing of the Internet resource,unefficient supervision as well as various virus make people's information and belongings being in an extremely dangerous environment.The fight between hackers and anti-hackers,destruction and anti-destruction has already affected the stable running of the network and users' legal right,caused great economy damages and it could also threat our country's security.So a right understanding and in-time measures should be paid special attention to.The thesis firstly expatiates the current state of the network security and its importance,and discusses some major factors and threats that affect the network security.And the thesis also introduce some catalogues of the security techniques,some relevant information and their major characters,besides that,I enumerate some popular and effective methods of protecting our network,including the widely used firewall,and the meticulous techniques such as security scan techniques and techniques of intrusion detection.Lastly,some protective measures are stated.
基金Supported by Hainan Provincial National Science Foundation of China,621MS0789.
文摘Through the correct teaching and game design,not only can innovation be carried out,but the highly effective network security teaching and the training solution countermeasure can also develop the student’s correct social behavior and value idea.Furthermore,through rule design and role play,students can improve the overall level of network security awareness and enhance their sense of cooperation during their studies.This paper defines the concept of a serious game and its significance to the network security curriculum of schools and designs the corresponding card game according to the feature of network security.The purpose of this paper is to strengthen overall network security awareness,cultivate professional skills,and enhance network security.
文摘The number of botnet malware attacks on Internet devices has grown at an equivalent rate to the number of Internet devices that are connected to the Internet.Bot detection using machine learning(ML)with flow-based features has been extensively studied in the literature.Existing flow-based detection methods involve significant computational overhead that does not completely capture network communication patterns that might reveal other features ofmalicious hosts.Recently,Graph-Based Bot Detection methods using ML have gained attention to overcome these limitations,as graphs provide a real representation of network communications.The purpose of this study is to build a botnet malware detection system utilizing centrality measures for graph-based botnet detection and ML.We propose BotSward,a graph-based bot detection system that is based on ML.We apply the efficient centrality measures,which are Closeness Centrality(CC),Degree Centrality(CC),and PageRank(PR),and compare them with others used in the state-of-the-art.The efficiency of the proposed method is verified on the available Czech Technical University 13 dataset(CTU-13).The CTU-13 dataset contains 13 real botnet traffic scenarios that are connected to a command-and-control(C&C)channel and that cause malicious actions such as phishing,distributed denial-of-service(DDoS)attacks,spam attacks,etc.BotSward is robust to zero-day attacks,suitable for large-scale datasets,and is intended to produce better accuracy than state-of-the-art techniques.The proposed BotSward solution achieved 99%accuracy in botnet attack detection with a false positive rate as low as 0.0001%.
文摘In-network data aggregation is severely affected due to information in transmits attack. This is an important problem since wireless sensor networks (WSN) are highly vulnerable to node compromises due to this attack. As a result, large error in the aggregate computed at the base station due to false sub aggregate values contributed by compromised nodes. When falsified event messages forwarded through intermediate nodes lead to wastage of their limited energy too. Since wireless sensor nodes are battery operated, it has low computational power and energy. In view of this, the algorithms designed for wireless sensor nodes should be such that, they extend the lifetime, use less computation and enhance security so as to enhance the network life time. This article presents Vernam Cipher cryptographic technique based data compression algorithm using huff man source coding scheme in order to enhance security and lifetime of the energy constrained wireless sensor nodes. In addition, this scheme is evaluated by using different processor based sensor node implementations and the results are compared against to other existing schemes. In particular, we present a secure light weight algorithm for the wireless sensor nodes which are consuming less energy for its operation. Using this, the entropy improvement is achieved to a greater extend.