实现对卫星网络空间威胁的态势感知,是太空网络安全防御的前提。针对卫星网络空间安全防御,提出了卫星网络空间威胁态势感知需要回答的一系列问题,构建了卫星网络空间态势感知本体(ontology of cyberspace situational awareness for sa...实现对卫星网络空间威胁的态势感知,是太空网络安全防御的前提。针对卫星网络空间安全防御,提出了卫星网络空间威胁态势感知需要回答的一系列问题,构建了卫星网络空间态势感知本体(ontology of cyberspace situational awareness for satellite,OntoCSA4Sat),用于对卫星网络空间多源情报进行自动关联和推理。通过对一个案例进行表示和推理实验,验证了OntoCSA4Sat的一致性和用于推理解决卫星网络空间威胁态势感知问题的可行性,表明OntoCSA4Sat可为卫星网络空间威胁的态势感知提供分析框架,为太空网络安全防御辅助决策提供支撑。展开更多
The proliferation of cloud computing and internet of things has led to the connectivity of states and nations(developed and developing countries)worldwide in which global network provide platform for the connection.Di...The proliferation of cloud computing and internet of things has led to the connectivity of states and nations(developed and developing countries)worldwide in which global network provide platform for the connection.Digital forensics is a field of computer security that uses software applications and standard guidelines which support the extraction of evidences from any computer appliances which is perfectly enough for the court of law to use and make a judgment based on the comprehensiveness,authenticity and objectivity of the information obtained.Cybersecurity is of major concerned to the internet users worldwide due to the recent form of attacks,threat,viruses,intrusion among others going on every day among internet of things.However,it is noted that cybersecurity is based on confidentiality,integrity and validity of data.The aim of this work is make a systematic review on the application of machine learning algorithms to cybersecurity and cyber forensics and pave away for further research directions on the application of deep learning,computational intelligence,soft computing to cybersecurity and cyber forensics.展开更多
The article is dedicated to the development of software application with graphical user interface for analyzing of the operation of Integrated System of Data Defense from cyber-threats (ISDD) which includes subsystems...The article is dedicated to the development of software application with graphical user interface for analyzing of the operation of Integrated System of Data Defense from cyber-threats (ISDD) which includes subsystems of detection and elimination of vulnerabilities existing in the system, as well as Requests of Unauthorized Access (RUA). In the subsystems of eliminations of vulnerabilities and queues of unauthorized access considered as multichannel queueing systems with corresponding servers and queues, at random times there come requests to fix threats detected by the system. It is supposed that flows of requests demanding to eliminate threats coming to the mentioned subsystems of queueing systems are described with the Poisson distribution of probabilities, but processes of their elimination obey exponential law. For the system described above, there has been developed software realization of graphical interface which allows easily to change input parameters and observe graphical reflection of changes of the output indicators of the system.展开更多
文摘实现对卫星网络空间威胁的态势感知,是太空网络安全防御的前提。针对卫星网络空间安全防御,提出了卫星网络空间威胁态势感知需要回答的一系列问题,构建了卫星网络空间态势感知本体(ontology of cyberspace situational awareness for satellite,OntoCSA4Sat),用于对卫星网络空间多源情报进行自动关联和推理。通过对一个案例进行表示和推理实验,验证了OntoCSA4Sat的一致性和用于推理解决卫星网络空间威胁态势感知问题的可行性,表明OntoCSA4Sat可为卫星网络空间威胁的态势感知提供分析框架,为太空网络安全防御辅助决策提供支撑。
文摘The proliferation of cloud computing and internet of things has led to the connectivity of states and nations(developed and developing countries)worldwide in which global network provide platform for the connection.Digital forensics is a field of computer security that uses software applications and standard guidelines which support the extraction of evidences from any computer appliances which is perfectly enough for the court of law to use and make a judgment based on the comprehensiveness,authenticity and objectivity of the information obtained.Cybersecurity is of major concerned to the internet users worldwide due to the recent form of attacks,threat,viruses,intrusion among others going on every day among internet of things.However,it is noted that cybersecurity is based on confidentiality,integrity and validity of data.The aim of this work is make a systematic review on the application of machine learning algorithms to cybersecurity and cyber forensics and pave away for further research directions on the application of deep learning,computational intelligence,soft computing to cybersecurity and cyber forensics.
文摘The article is dedicated to the development of software application with graphical user interface for analyzing of the operation of Integrated System of Data Defense from cyber-threats (ISDD) which includes subsystems of detection and elimination of vulnerabilities existing in the system, as well as Requests of Unauthorized Access (RUA). In the subsystems of eliminations of vulnerabilities and queues of unauthorized access considered as multichannel queueing systems with corresponding servers and queues, at random times there come requests to fix threats detected by the system. It is supposed that flows of requests demanding to eliminate threats coming to the mentioned subsystems of queueing systems are described with the Poisson distribution of probabilities, but processes of their elimination obey exponential law. For the system described above, there has been developed software realization of graphical interface which allows easily to change input parameters and observe graphical reflection of changes of the output indicators of the system.