期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
Bottleneck Analysis for Data Acquisition in High-Speed Network Traffic Monitoring 被引量:2
1
作者 JIANG Wei TIAN Zhihong +1 位作者 CAI Chao GONG Bei 《China Communications》 SCIE CSCD 2014年第1期110-118,共9页
The increasing network throughput challenges the current network traffic monitor systems to have compatible high-performance data processing.The design of packet processing systems is guided by the requirements of hig... The increasing network throughput challenges the current network traffic monitor systems to have compatible high-performance data processing.The design of packet processing systems is guided by the requirements of high packet processing throughput.In this paper,we depict an in-depth research on the related techniques and an implementation of a high-performance data acquisition mechanism.Through the bottleneck analysis with the aid of queuing network model,several performance optimising methods,such as service rate increasing,queue removing and model simplification,are integrated.The experiment results indicate that this approach is capable of reducing the CPU utilization ratio while improving the efficiency of data acquisition in high-speed networks. 展开更多
关键词 数据采集 高速网络 流量监控 排队网络模型 CPU利用率 网络吞吐量 数据处理 监控系统
下载PDF
Semisupervised Encrypted Traffic Identification Based on Auxiliary Classification Generative Adversarial Network 被引量:1
2
作者 Jiaming Mao Mingming Zhang +5 位作者 Mu Chen Lu Chen Fei Xia Lei Fan ZiXuan Wang Wenbing Zhao 《Computer Systems Science & Engineering》 SCIE EI 2021年第12期373-390,共18页
The rapidly increasing popularity of mobile devices has changed the methods with which people access various network services and increased net-work traffic markedly.Over the past few decades,network traffic identific... The rapidly increasing popularity of mobile devices has changed the methods with which people access various network services and increased net-work traffic markedly.Over the past few decades,network traffic identification has been a research hotspot in the field of network management and security mon-itoring.However,as more network services use encryption technology,network traffic identification faces many challenges.Although classic machine learning methods can solve many problems that cannot be solved by port-and payload-based methods,manually extract features that are frequently updated is time-consuming and labor-intensive.Deep learning has good automatic feature learning capabilities and is an ideal method for network traffic identification,particularly encrypted traffic identification;Existing recognition methods based on deep learning primarily use supervised learning methods and rely on many labeled samples.However,in real scenarios,labeled samples are often difficult to obtain.This paper adjusts the structure of the auxiliary classification generation adversarial network(ACGAN)so that it can use unlabeled samples for training,and use the wasserstein distance instead of the original cross entropy as the loss function to achieve semisupervised learning.Experimental results show that the identification accuracy of ISCX and USTC data sets using the proposed method yields markedly better performance when the number of labeled samples is small compared to that of convolutional neural network(CNN)based classifier. 展开更多
关键词 Encrypted traffic recognition deep learning generative adversarial network traffic classification semisupervised learning
下载PDF
Investigating the Implications of Virtualization for Digital Forensics
3
作者 Song Zheng Jin Bo +1 位作者 Zhu Yinghong Sun Yongqing 《China Communications》 SCIE CSCD 2010年第6期100-106,共7页
关键词 虚拟化技术 调查取证 数字取证 计算机取证 调制解调器 潜在作用 法医 共享
下载PDF
Face and Lip Tracking For Person Identification 被引量:1
4
作者 Zhang Ying 《China Communications》 SCIE CSCD 2010年第6期141-144,共4页
关键词 跟踪 CANNY边缘检测 计算机取证 唇部 面部 彩色图像 组成部分 图像处理
下载PDF
Research and Review on Computer Forensics
5
作者 Guo Hong Jin Bo Huang Daoli 《China Communications》 SCIE CSCD 2010年第6期37-43,共7页
关键词 计算机取证 综述 信息技术 上升趋势 数字证据 互联网 模型
下载PDF
Threshold Ring Signature Scheme Based on TPM
6
作者 Gong Bei Jiang Wei +2 位作者 Lin Li Li Yu Zhang Xing 《China Communications》 SCIE CSCD 2012年第1期80-85,共6页
The conventional ring signature schemes cannot address the scenario where the rank of members of the ring needs to be distinguished, for example, in electronically commerce application. To solve this problem, we prese... The conventional ring signature schemes cannot address the scenario where the rank of members of the ring needs to be distinguished, for example, in electronically commerce application. To solve this problem, we presented a Trusted Platform Module (TPM)-based threshold ring signature scheme. Employing a reliable secret Share Distribution Center (SDC), the proposed approach can authenticate the TPM-based identity rank of members of the ring but not track a specific member's identity. A subset including t members with the same identity rank is built. With the signing cooperation of t members of the subset, the ring signature based on Chinese remainder theorem is generated. We proved the anonymity and unforgeability of the proposed scheme and compared it with the threshold ring signature based on Lagrange interpolation polynomial. Our scheme is relatively simpler to calculate. 展开更多
关键词 签名方案 TPM LAGRANGE插值多项式 门限 中国剩余定理 环签名 电子商贸 秘密份额
下载PDF
Data Security and Privacy in Bitcoin System:A Survey 被引量:1
7
作者 Lie-Huang Zhu Bao-Kun Zheng +3 位作者 Meng Shen Feng Gao Hong-Yu Li Ke-Xin Shi 《Journal of Computer Science & Technology》 SCIE EI CSCD 2020年第4期843-862,共20页
To date,bitcoin has been the most successful application of blockchain technology and has received considerable attention from both industry and academia.Bitcoin is an electronic payment system based on cryptography r... To date,bitcoin has been the most successful application of blockchain technology and has received considerable attention from both industry and academia.Bitcoin is an electronic payment system based on cryptography rather than on credit.Regardless of whether people are in the same city or country,bitcoin can be sent by any one person to any other person when they reach an agreement.The market value of bitcoin has been rising since its advent in 2009,and its current market value is US160 billion.Since its development,bitcoin itself has exposed many problems and is facing challenges from all the sectors of society;therefore,adversaries may use bitcoin's weakness to make considerable profits.This survey presents an overview and detailed investigation of data security and privacy in bitcoin system.We examine the studies in the literature/Web in two categories:1)analyses of the attacks to the privacy,availability,and consistency of bitcoin data and 2)summaries of the countermeasures for bitcoin data security.Based on the literature/Web,we list and describe the research methods and results for the two categories.We compare the performance of these methods and illustrate the relationship between the performance and the methods.Moreover,we present several important open research directions to identify the follow-up studies in this area. 展开更多
关键词 SECURITY PRIVACY bitcoin AVAILABILITY CONSISTENCY
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部