Pub Date : 2019-03-19DOI: 10.3969/J.ISSN.1671-1122.2019.03.003
Chen Liangchen, Gao Shu, Liu Baoxu, L. Zhigang
{"title":"Research Status and Development Trends on Network Encrypted Traffic Identification","authors":"Chen Liangchen, Gao Shu, Liu Baoxu, L. Zhigang","doi":"10.3969/J.ISSN.1671-1122.2019.03.003","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2019.03.003","url":null,"abstract":"","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133472315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-12-20DOI: 10.3969/J.ISSN.1671-1122.2017.12.001
Hongyang Zhang, Li Xu, Limei Lin
{"title":"Research on Pairwise Key Establishment Scheme Based on Hypercube in Wireless Sensor Network","authors":"Hongyang Zhang, Li Xu, Limei Lin","doi":"10.3969/J.ISSN.1671-1122.2017.12.001","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2017.12.001","url":null,"abstract":"","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114322575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-20DOI: 10.3969/J.ISSN.1671-1122.2017.09.001
Xinming Yin, Cao Zhiwei, Huang Haiye, Fan Zhijie
{"title":"Application of SSL VPN Technology in Mobile Police Video Access Link","authors":"Xinming Yin, Cao Zhiwei, Huang Haiye, Fan Zhijie","doi":"10.3969/J.ISSN.1671-1122.2017.09.001","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2017.09.001","url":null,"abstract":"","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125868867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-09-30DOI: 10.3969/J.ISSN.1671-1122.2015.09.014
Yuan Fan, Zhilan Liu, Ji-wen Wang
Recently, the network security has become a severe issue. Obtaining the current network security status and predicting the future network security status may contribute to the decisions given by the decision makers. Under the large-scale and complex network environment, the traditional network management method cannot completely meet the demand of network situation awareness, and the network situation awareness based on information fusion has become the development direction of the future. Because network situation assessment is the core of network situation awareness, this paper introduces fuzzy rough set theory based on technologies of network security situation assessment, overcoming the defect that rough set method has to discretize while lost accuracy. By combining the advantages of the fuzzy set and rough set in dealing with uncertainty and vagueness of the data, this paper establishes a network security situation assessment model based on fuzzy rough set. The experiment shows that the model can provide high accuracy, and can provide a more accurate and reasonable evaluation results for the network security situation assessment.
{"title":"Research on Network Situation Assessment Method Based on Fuzzy Rough Set","authors":"Yuan Fan, Zhilan Liu, Ji-wen Wang","doi":"10.3969/J.ISSN.1671-1122.2015.09.014","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2015.09.014","url":null,"abstract":"Recently, the network security has become a severe issue. Obtaining the current network security status and predicting the future network security status may contribute to the decisions given by the decision makers. Under the large-scale and complex network environment, the traditional network management method cannot completely meet the demand of network situation awareness, and the network situation awareness based on information fusion has become the development direction of the future. Because network situation assessment is the core of network situation awareness, this paper introduces fuzzy rough set theory based on technologies of network security situation assessment, overcoming the defect that rough set method has to discretize while lost accuracy. By combining the advantages of the fuzzy set and rough set in dealing with uncertainty and vagueness of the data, this paper establishes a network security situation assessment model based on fuzzy rough set. The experiment shows that the model can provide high accuracy, and can provide a more accurate and reasonable evaluation results for the network security situation assessment.","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126588788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-02-10DOI: 10.3969/J.ISSN.1671-1122.2015.02.009
Feng Qi, Chun-guang Ma, Yongzhe Zhou, Jun Miao
In order to solve opportunistic social network with negative factors that the low success rate of data transmission and the large average network latency, we proposed the a routing algorithm of opportunistic social networks based on network coding(OSN-NC). The intermediate nodes of OSNNC routing algorithm are coded again only on the same target nodes of the coded data packet, so this can reduce the overall number of coded coeffi cients and the complexity of Gaussian elimination, and increase the reliability of data transmission. We use the message transmission strategy of combining PROPHET with network coding within the community, transmission the encoded data packets to the next hop node with greater encounter probability, until it reaches the destination node. We select the greater cumulative probability as the encoding node to complete message forwarding between the communities, until encounter intermediate nodes with the same community, then according to the messaging strategy within community. The simulation results show OSN-NC in improving network throughput and success rate of data transmission, reducing he average transmission delay other properties have signifi cantly improved.
{"title":"A Routing Algorithm of Opportunistic Social Networks Based on Network Coding","authors":"Feng Qi, Chun-guang Ma, Yongzhe Zhou, Jun Miao","doi":"10.3969/J.ISSN.1671-1122.2015.02.009","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2015.02.009","url":null,"abstract":"In order to solve opportunistic social network with negative factors that the low success rate of data transmission and the large average network latency, we proposed the a routing algorithm of opportunistic social networks based on network coding(OSN-NC). The intermediate nodes of OSNNC routing algorithm are coded again only on the same target nodes of the coded data packet, so this can reduce the overall number of coded coeffi cients and the complexity of Gaussian elimination, and increase the reliability of data transmission. We use the message transmission strategy of combining PROPHET with network coding within the community, transmission the encoded data packets to the next hop node with greater encounter probability, until it reaches the destination node. We select the greater cumulative probability as the encoding node to complete message forwarding between the communities, until encounter intermediate nodes with the same community, then according to the messaging strategy within community. The simulation results show OSN-NC in improving network throughput and success rate of data transmission, reducing he average transmission delay other properties have signifi cantly improved.","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123410854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-01-20DOI: 10.3969/J.ISSN.1671-1122.2015.01.002
Wang Xiaoshan, Yang An, Shi Zhiqiang, Sun Limin
{"title":"New Trend of Information Security in Industrial Control Systems","authors":"Wang Xiaoshan, Yang An, Shi Zhiqiang, Sun Limin","doi":"10.3969/J.ISSN.1671-1122.2015.01.002","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2015.01.002","url":null,"abstract":"","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134473435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1115/1.859759.paper55
Fu Lee Wang, Jiajing Zhou
This paper purposes a cross-domain access control framework base on the attributes synchronization, and purposes a cross-domain access control method in the framework, this method achieves the attributes synchronization between the base domains and outside domains. The method can timely and actively response the changing of the subject attributes to the outside domain, achieves fast matching of the mandated rules and dynamic authority in the cross-domain process. This method improves dynamic cross-domain access problems of IRBAC2000 too.
{"title":"Research on the Method of Attributes-Based Cross-Domain Access","authors":"Fu Lee Wang, Jiajing Zhou","doi":"10.1115/1.859759.paper55","DOIUrl":"https://doi.org/10.1115/1.859759.paper55","url":null,"abstract":"This paper purposes a cross-domain access control framework base on the attributes synchronization, and purposes a cross-domain access control method in the framework, this method achieves the attributes synchronization between the base domains and outside domains. The method can timely and actively response the changing of the subject attributes to the outside domain, achieves fast matching of the mandated rules and dynamic authority in the cross-domain process. This method improves dynamic cross-domain access problems of IRBAC2000 too.","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114294777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.3923/itj.2013.198.203
Huajun Huang, Yaojun Wang, Liqing Jiang, Lili Xie
A novel countermeasure scheme is proposed in this paper based on semi-fragile watermark, including of declaring website identity based on semi-fragile watermark, and detecting phishing webpage. The semi-fragile watermark with domain name, URL, Logo features of website is generated, and then embedded into the webpage to express the identity. When the suspicious webpage is met, the inconsistence of the generated semi-fragile watermark and the extracted information shows the phishing attack. The simulating phishing experiments show the method can effective detect the phishing attack by downloading the tactic’s webpage and modifying a little to lure the victims. So our phishing detection entails high cost to the adversary.
{"title":"An Active Anti-phishing Solution Based on Semi-fragile Watermark","authors":"Huajun Huang, Yaojun Wang, Liqing Jiang, Lili Xie","doi":"10.3923/itj.2013.198.203","DOIUrl":"https://doi.org/10.3923/itj.2013.198.203","url":null,"abstract":"A novel countermeasure scheme is proposed in this paper based on semi-fragile watermark, including of declaring website identity based on semi-fragile watermark, and detecting phishing webpage. The semi-fragile watermark with domain name, URL, Logo features of website is generated, and then embedded into the webpage to express the identity. When the suspicious webpage is met, the inconsistence of the generated semi-fragile watermark and the extracted information shows the phishing attack. The simulating phishing experiments show the method can effective detect the phishing attack by downloading the tactic’s webpage and modifying a little to lure the victims. So our phishing detection entails high cost to the adversary.","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124548490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}