首页 > 最新文献

Netinfo Security最新文献

英文 中文
Research Status and Development Trends on Network Encrypted Traffic Identification 网络加密流量识别的研究现状及发展趋势
Pub Date : 2019-03-19 DOI: 10.3969/J.ISSN.1671-1122.2019.03.003
Chen Liangchen, Gao Shu, Liu Baoxu, L. Zhigang
{"title":"Research Status and Development Trends on Network Encrypted Traffic Identification","authors":"Chen Liangchen, Gao Shu, Liu Baoxu, L. Zhigang","doi":"10.3969/J.ISSN.1671-1122.2019.03.003","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2019.03.003","url":null,"abstract":"","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133472315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research on Pairwise Key Establishment Scheme Based on Hypercube in Wireless Sensor Network 无线传感器网络中基于超立方体的成对密钥建立方案研究
Pub Date : 2017-12-20 DOI: 10.3969/J.ISSN.1671-1122.2017.12.001
Hongyang Zhang, Li Xu, Limei Lin
{"title":"Research on Pairwise Key Establishment Scheme Based on Hypercube in Wireless Sensor Network","authors":"Hongyang Zhang, Li Xu, Limei Lin","doi":"10.3969/J.ISSN.1671-1122.2017.12.001","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2017.12.001","url":null,"abstract":"","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114322575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of SSL VPN Technology in Mobile Police Video Access Link SSL VPN技术在移动警用视频接入链路中的应用
Pub Date : 2017-09-20 DOI: 10.3969/J.ISSN.1671-1122.2017.09.001
Xinming Yin, Cao Zhiwei, Huang Haiye, Fan Zhijie
{"title":"Application of SSL VPN Technology in Mobile Police Video Access Link","authors":"Xinming Yin, Cao Zhiwei, Huang Haiye, Fan Zhijie","doi":"10.3969/J.ISSN.1671-1122.2017.09.001","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2017.09.001","url":null,"abstract":"","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125868867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Program Behavior Anomaly Detection Method Based on Improved HMM 基于改进HMM的程序行为异常检测方法
Pub Date : 2016-09-20 DOI: 10.3969/J.ISSN.1671-1122.2016.09.022
X. Wu, Yuesong Yan, Xiaoran Liu
{"title":"Program Behavior Anomaly Detection Method Based on Improved HMM","authors":"X. Wu, Yuesong Yan, Xiaoran Liu","doi":"10.3969/J.ISSN.1671-1122.2016.09.022","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2016.09.022","url":null,"abstract":"","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129946993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RSSP-II Protocol Security Analysis Based on Communicating Sequential Process Method 基于通信顺序过程方法的RSSP-II协议安全性分析
Pub Date : 2016-07-20 DOI: 10.3969/J.ISSN.1671-1122.2016.07.002
Debiao Lu, Shengjiao He, Jian Wang
{"title":"RSSP-II Protocol Security Analysis Based on Communicating Sequential Process Method","authors":"Debiao Lu, Shengjiao He, Jian Wang","doi":"10.3969/J.ISSN.1671-1122.2016.07.002","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2016.07.002","url":null,"abstract":"","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129800427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Network Situation Assessment Method Based on Fuzzy Rough Set 基于模糊粗糙集的网络态势评估方法研究
Pub Date : 2015-09-30 DOI: 10.3969/J.ISSN.1671-1122.2015.09.014
Yuan Fan, Zhilan Liu, Ji-wen Wang
Recently, the network security has become a severe issue. Obtaining the current network security status and predicting the future network security status may contribute to the decisions given by the decision makers. Under the large-scale and complex network environment, the traditional network management method cannot completely meet the demand of network situation awareness, and the network situation awareness based on information fusion has become the development direction of the future. Because network situation assessment is the core of network situation awareness, this paper introduces fuzzy rough set theory based on technologies of network security situation assessment, overcoming the defect that rough set method has to discretize while lost accuracy. By combining the advantages of the fuzzy set and rough set in dealing with uncertainty and vagueness of the data, this paper establishes a network security situation assessment model based on fuzzy rough set. The experiment shows that the model can provide high accuracy, and can provide a more accurate and reasonable evaluation results for the network security situation assessment.
近年来,网络安全已成为一个严重的问题。获取当前的网络安全状态,预测未来的网络安全状态,有助于决策者做出决策。在大规模、复杂的网络环境下,传统的网络管理方法已不能完全满足网络态势感知的需求,基于信息融合的网络态势感知已成为未来的发展方向。由于网络态势评估是网络态势感知的核心,本文在网络安全态势评估技术的基础上引入模糊粗糙集理论,克服了粗糙集方法离散化而失去准确性的缺陷。结合模糊集和粗糙集在处理数据不确定性和模糊性方面的优势,建立了基于模糊粗糙集的网络安全态势评估模型。实验表明,该模型能够提供较高的准确率,能够为网络安全态势评估提供更加准确合理的评估结果。
{"title":"Research on Network Situation Assessment Method Based on Fuzzy Rough Set","authors":"Yuan Fan, Zhilan Liu, Ji-wen Wang","doi":"10.3969/J.ISSN.1671-1122.2015.09.014","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2015.09.014","url":null,"abstract":"Recently, the network security has become a severe issue. Obtaining the current network security status and predicting the future network security status may contribute to the decisions given by the decision makers. Under the large-scale and complex network environment, the traditional network management method cannot completely meet the demand of network situation awareness, and the network situation awareness based on information fusion has become the development direction of the future. Because network situation assessment is the core of network situation awareness, this paper introduces fuzzy rough set theory based on technologies of network security situation assessment, overcoming the defect that rough set method has to discretize while lost accuracy. By combining the advantages of the fuzzy set and rough set in dealing with uncertainty and vagueness of the data, this paper establishes a network security situation assessment model based on fuzzy rough set. The experiment shows that the model can provide high accuracy, and can provide a more accurate and reasonable evaluation results for the network security situation assessment.","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126588788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Routing Algorithm of Opportunistic Social Networks Based on Network Coding 基于网络编码的机会主义社交网络路由算法
Pub Date : 2015-02-10 DOI: 10.3969/J.ISSN.1671-1122.2015.02.009
Feng Qi, Chun-guang Ma, Yongzhe Zhou, Jun Miao
In order to solve opportunistic social network with negative factors that the low success rate of data transmission and the large average network latency, we proposed the a routing algorithm of opportunistic social networks based on network coding(OSN-NC). The intermediate nodes of OSNNC routing algorithm are coded again only on the same target nodes of the coded data packet, so this can reduce the overall number of coded coeffi cients and the complexity of Gaussian elimination, and increase the reliability of data transmission. We use the message transmission strategy of combining PROPHET with network coding within the community, transmission the encoded data packets to the next hop node with greater encounter probability, until it reaches the destination node. We select the greater cumulative probability as the encoding node to complete message forwarding between the communities, until encounter intermediate nodes with the same community, then according to the messaging strategy within community. The simulation results show OSN-NC in improving network throughput and success rate of data transmission, reducing he average transmission delay other properties have signifi cantly improved.
为了解决机会主义社交网络存在的数据传输成功率低、网络平均时延大等负面因素,提出了一种基于网络编码的机会主义社交网络路由算法(OSN-NC)。OSNNC路由算法的中间节点只在编码数据包的同一目标节点上再次编码,这样可以减少编码系数的总数和高斯消去的复杂度,提高数据传输的可靠性。我们采用PROPHET与社区内网络编码相结合的消息传输策略,将编码后的数据包传输到遇到概率较大的下一跳节点,直至到达目的节点。我们选择累积概率较大的节点作为编码节点完成社团间的消息转发,直到遇到具有相同社团的中间节点,再根据社团内的消息传递策略进行转发。仿真结果表明,OSN-NC在提高网络吞吐量和数据传输成功率、降低平均传输时延等性能方面都有明显改善。
{"title":"A Routing Algorithm of Opportunistic Social Networks Based on Network Coding","authors":"Feng Qi, Chun-guang Ma, Yongzhe Zhou, Jun Miao","doi":"10.3969/J.ISSN.1671-1122.2015.02.009","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2015.02.009","url":null,"abstract":"In order to solve opportunistic social network with negative factors that the low success rate of data transmission and the large average network latency, we proposed the a routing algorithm of opportunistic social networks based on network coding(OSN-NC). The intermediate nodes of OSNNC routing algorithm are coded again only on the same target nodes of the coded data packet, so this can reduce the overall number of coded coeffi cients and the complexity of Gaussian elimination, and increase the reliability of data transmission. We use the message transmission strategy of combining PROPHET with network coding within the community, transmission the encoded data packets to the next hop node with greater encounter probability, until it reaches the destination node. We select the greater cumulative probability as the encoding node to complete message forwarding between the communities, until encounter intermediate nodes with the same community, then according to the messaging strategy within community. The simulation results show OSN-NC in improving network throughput and success rate of data transmission, reducing he average transmission delay other properties have signifi cantly improved.","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123410854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New Trend of Information Security in Industrial Control Systems 工业控制系统信息安全的新趋势
Pub Date : 2015-01-20 DOI: 10.3969/J.ISSN.1671-1122.2015.01.002
Wang Xiaoshan, Yang An, Shi Zhiqiang, Sun Limin
{"title":"New Trend of Information Security in Industrial Control Systems","authors":"Wang Xiaoshan, Yang An, Shi Zhiqiang, Sun Limin","doi":"10.3969/J.ISSN.1671-1122.2015.01.002","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2015.01.002","url":null,"abstract":"","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134473435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Research on the Method of Attributes-Based Cross-Domain Access 基于属性的跨域访问方法研究
Pub Date : 1900-01-01 DOI: 10.1115/1.859759.paper55
Fu Lee Wang, Jiajing Zhou
This paper purposes a cross-domain access control framework base on the attributes synchronization, and purposes a cross-domain access control method in the framework, this method achieves the attributes synchronization between the base domains and outside domains. The method can timely and actively response the changing of the subject attributes to the outside domain, achieves fast matching of the mandated rules and dynamic authority in the cross-domain process. This method improves dynamic cross-domain access problems of IRBAC2000 too.
本文设计了一个基于属性同步的跨域访问控制框架,并在框架中引入了一种跨域访问控制方法,该方法实现了基域与外部域之间的属性同步。该方法能够及时、主动地响应主体属性对外部域的变化,实现跨域过程中强制规则与动态权限的快速匹配。该方法也改善了IRBAC2000的动态跨域访问问题。
{"title":"Research on the Method of Attributes-Based Cross-Domain Access","authors":"Fu Lee Wang, Jiajing Zhou","doi":"10.1115/1.859759.paper55","DOIUrl":"https://doi.org/10.1115/1.859759.paper55","url":null,"abstract":"This paper purposes a cross-domain access control framework base on the attributes synchronization, and purposes a cross-domain access control method in the framework, this method achieves the attributes synchronization between the base domains and outside domains. The method can timely and actively response the changing of the subject attributes to the outside domain, achieves fast matching of the mandated rules and dynamic authority in the cross-domain process. This method improves dynamic cross-domain access problems of IRBAC2000 too.","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114294777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Active Anti-phishing Solution Based on Semi-fragile Watermark 基于半脆弱水印的主动反网络钓鱼解决方案
Pub Date : 1900-01-01 DOI: 10.3923/itj.2013.198.203
Huajun Huang, Yaojun Wang, Liqing Jiang, Lili Xie
A novel countermeasure scheme is proposed in this paper based on semi-fragile watermark, including of declaring website identity based on semi-fragile watermark, and detecting phishing webpage. The semi-fragile watermark with domain name, URL, Logo features of website is generated, and then embedded into the webpage to express the identity. When the suspicious webpage is met, the inconsistence of the generated semi-fragile watermark and the extracted information shows the phishing attack. The simulating phishing experiments show the method can effective detect the phishing attack by downloading the tactic’s webpage and modifying a little to lure the victims. So our phishing detection entails high cost to the adversary.
本文提出了一种新的基于半脆弱水印的对抗方案,包括基于半脆弱水印的网站身份声明和网络钓鱼网页检测。生成具有网站域名、URL、Logo等特征的半易碎水印,然后嵌入到网页中表达身份。当遇到可疑网页时,生成的半脆弱水印与提取的信息不一致即为网络钓鱼攻击。模拟网络钓鱼实验表明,该方法可以通过下载策略网页并稍加修改来引诱受害者,从而有效地检测到网络钓鱼攻击。因此,我们的网络钓鱼检测给对手带来了很高的成本。
{"title":"An Active Anti-phishing Solution Based on Semi-fragile Watermark","authors":"Huajun Huang, Yaojun Wang, Liqing Jiang, Lili Xie","doi":"10.3923/itj.2013.198.203","DOIUrl":"https://doi.org/10.3923/itj.2013.198.203","url":null,"abstract":"A novel countermeasure scheme is proposed in this paper based on semi-fragile watermark, including of declaring website identity based on semi-fragile watermark, and detecting phishing webpage. The semi-fragile watermark with domain name, URL, Logo features of website is generated, and then embedded into the webpage to express the identity. When the suspicious webpage is met, the inconsistence of the generated semi-fragile watermark and the extracted information shows the phishing attack. The simulating phishing experiments show the method can effective detect the phishing attack by downloading the tactic’s webpage and modifying a little to lure the victims. So our phishing detection entails high cost to the adversary.","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124548490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Netinfo Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1