首页 > 最新文献

2009 Fourth International Conference on Internet Computing for Science and Engineering最新文献

英文 中文
Software Evolution Method Considering Software Historical Behavior 考虑软件历史行为的软件演化方法
Qian Zhao, Huiqiang Wang, Guangsheng Feng, Xu Lu
The goal of software evolution research is to use the history of a software system to analyze its present state and to predict its future development, which made people can better use and management software In this paper, a process of changing normal software into autonomic software is described, which add autonomic attribute in software. Relationship and operation of components for software evolution is defined and the process of software evolution mechanism is depicted in this paper. A software evolution method considering software historical behavior is proposed for maintaining the dependability of software in a stable and non-reduced level. The simulated results produced by the designed experiment show that the method is validity in maintaining and increasing the dependability of software.
软件进化研究的目标是利用软件系统的历史来分析软件的现状,预测软件的未来发展,使人们能够更好地使用和管理软件。本文描述了一个将普通软件转变为自主软件的过程,在软件中加入自主属性。定义了软件演化中各组成部分的关系和作用,描述了软件演化机制的过程。提出了一种考虑软件历史行为的软件演化方法,使软件的可靠性保持在稳定和不降低的水平。设计的仿真实验结果表明,该方法在维护和提高软件可靠性方面是有效的。
{"title":"Software Evolution Method Considering Software Historical Behavior","authors":"Qian Zhao, Huiqiang Wang, Guangsheng Feng, Xu Lu","doi":"10.1109/ICICSE.2009.21","DOIUrl":"https://doi.org/10.1109/ICICSE.2009.21","url":null,"abstract":"The goal of software evolution research is to use the history of a software system to analyze its present state and to predict its future development, which made people can better use and management software In this paper, a process of changing normal software into autonomic software is described, which add autonomic attribute in software. Relationship and operation of components for software evolution is defined and the process of software evolution mechanism is depicted in this paper. A software evolution method considering software historical behavior is proposed for maintaining the dependability of software in a stable and non-reduced level. The simulated results produced by the designed experiment show that the method is validity in maintaining and increasing the dependability of software.","PeriodicalId":193621,"journal":{"name":"2009 Fourth International Conference on Internet Computing for Science and Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129845116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Topology Awareness on Network Damage Assessment and Control Strategies Generation 基于拓扑感知的网络损伤评估与控制策略生成
Hui He, Hongli Zhang, Lihua Yin, Yongtan Liu
Threatens faced by large-scale network attacks, it is of great importance to exert an emergency response, in order to mitigate the further hazardous caused by network attacks. To implement a reasonable control strategy, a minimal set of routers is computed in a network that can be used to control and reduce damage done by a large-scale attack such as worm or DDOS attacks. Our work focuses on large network while previous works focuse on LANs. We proposed rules to choose these routers based on the network topology and based on risk assessment. Many topological factors are considered into the control strategy process, the control router sets selecting algorithm based on entropy was put forward. According to the incidents distribution on the topology, the factor of macroscopic epidemic status is proposed by the method of quantitative and qualitative analysis, which offers administrators the direct decisive advice to prevent network security event from overspreading and minimize the costs. At last, the experiment effectively proved the evaluation framework and the control algorithm.
面对大规模网络攻击的威胁,为了减轻网络攻击带来的进一步危害,应急响应具有重要意义。为了实现合理的控制策略,需要在网络中计算出最小的路由器数量,以控制和减少大规模攻击(如蠕虫攻击或DDOS攻击)所造成的破坏。我们的工作重点是大型网络,而以往的工作主要集中在局域网。提出了基于网络拓扑结构和风险评估的路由器选择规则。在控制策略过程中考虑了多种拓扑因素,提出了基于熵的控制路由器集选择算法。根据网络安全事件在拓扑上的分布情况,采用定量和定性分析相结合的方法,提出了宏观疫情因素,为管理者提供了直接的决策建议,以防止网络安全事件的过度蔓延,使成本最小化。最后,通过实验验证了评价框架和控制算法的有效性。
{"title":"Topology Awareness on Network Damage Assessment and Control Strategies Generation","authors":"Hui He, Hongli Zhang, Lihua Yin, Yongtan Liu","doi":"10.1109/ICICSE.2009.50","DOIUrl":"https://doi.org/10.1109/ICICSE.2009.50","url":null,"abstract":"Threatens faced by large-scale network attacks, it is of great importance to exert an emergency response, in order to mitigate the further hazardous caused by network attacks. To implement a reasonable control strategy, a minimal set of routers is computed in a network that can be used to control and reduce damage done by a large-scale attack such as worm or DDOS attacks. Our work focuses on large network while previous works focuse on LANs. We proposed rules to choose these routers based on the network topology and based on risk assessment. Many topological factors are considered into the control strategy process, the control router sets selecting algorithm based on entropy was put forward. According to the incidents distribution on the topology, the factor of macroscopic epidemic status is proposed by the method of quantitative and qualitative analysis, which offers administrators the direct decisive advice to prevent network security event from overspreading and minimize the costs. At last, the experiment effectively proved the evaluation framework and the control algorithm.","PeriodicalId":193621,"journal":{"name":"2009 Fourth International Conference on Internet Computing for Science and Engineering","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115014248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ontology Security Strategy of Security Data Integrity 安全数据完整性的本体安全策略
Yulong Meng, Guisheng Yin, Ke Geng
There exists a variety of heterogeneous data that need to be integrated within a secure domain. How to integrate the security data from various data source safely is a challenge for database researchers. In this paper, we introduce a new model for security data integrity, Weight-value-Extended MLS (WEMLS), which is development based on MLS. Compared with MLS, WEMLS can not only guarantee the security and integrity of data accessing, but also provide a more flexible mechanism for data accessing. Finally, WEMLS has been verified by proposing a security data integration model based on ontology.
存在各种各样需要集成到安全域中的异构数据。如何安全地集成来自不同数据源的安全数据是数据库研究人员面临的一个挑战。本文介绍了一种新的安全数据完整性模型,即权重值扩展MLS (Weight-value-Extended MLS, WEMLS)。与MLS相比,WEMLS不仅可以保证数据访问的安全性和完整性,还提供了更灵活的数据访问机制。最后,提出了一种基于本体的安全数据集成模型,对WEMLS进行了验证。
{"title":"Ontology Security Strategy of Security Data Integrity","authors":"Yulong Meng, Guisheng Yin, Ke Geng","doi":"10.1109/ICICSE.2009.43","DOIUrl":"https://doi.org/10.1109/ICICSE.2009.43","url":null,"abstract":"There exists a variety of heterogeneous data that need to be integrated within a secure domain. How to integrate the security data from various data source safely is a challenge for database researchers. In this paper, we introduce a new model for security data integrity, Weight-value-Extended MLS (WEMLS), which is development based on MLS. Compared with MLS, WEMLS can not only guarantee the security and integrity of data accessing, but also provide a more flexible mechanism for data accessing. Finally, WEMLS has been verified by proposing a security data integration model based on ontology.","PeriodicalId":193621,"journal":{"name":"2009 Fourth International Conference on Internet Computing for Science and Engineering","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115215398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data Cache Strategy Based on Colony Algorithm in Mobile Computing Environment 移动计算环境下基于群体算法的数据缓存策略
Yan Chu, Jianpei Zhang, C. Zhao
In mobile computing environments, the limited bandwidth of wireless communications, the weak capability of mobile computing equipments and the valuable power make it difficult for mobile devices to be maintained with the network all the time. Cache technique caches part of data in the clients to reduce the query of database server, so it solves the problem to some extent. Research on cache strategy for mobile computing environment has become an important research direction. Based on the analysis of existing cache strategy, we studied the cache strategy based on mobile agent further. In order to make Mobile Agents have the real and effective collaboration and not limited reference to the conceptual level, we use the ant colony algorithm to propose the data cache strategy based on ant colony algorithm. Finally, we give the experiment to show the superiority.
在移动计算环境下,无线通信的带宽有限,移动计算设备的能力较弱,功耗昂贵,使得移动设备难以随时与网络保持联系。缓存技术通过在客户端缓存部分数据,减少对数据库服务器的查询,在一定程度上解决了这个问题。移动计算环境下的缓存策略研究已成为一个重要的研究方向。在分析现有缓存策略的基础上,进一步研究了基于移动代理的缓存策略。为了使移动代理具有真实有效的协作,而不局限于概念层面的参考,我们利用蚁群算法提出了基于蚁群算法的数据缓存策略。最后通过实验证明了该方法的优越性。
{"title":"Data Cache Strategy Based on Colony Algorithm in Mobile Computing Environment","authors":"Yan Chu, Jianpei Zhang, C. Zhao","doi":"10.1109/ICICSE.2009.60","DOIUrl":"https://doi.org/10.1109/ICICSE.2009.60","url":null,"abstract":"In mobile computing environments, the limited bandwidth of wireless communications, the weak capability of mobile computing equipments and the valuable power make it difficult for mobile devices to be maintained with the network all the time. Cache technique caches part of data in the clients to reduce the query of database server, so it solves the problem to some extent. Research on cache strategy for mobile computing environment has become an important research direction. Based on the analysis of existing cache strategy, we studied the cache strategy based on mobile agent further. In order to make Mobile Agents have the real and effective collaboration and not limited reference to the conceptual level, we use the ant colony algorithm to propose the data cache strategy based on ant colony algorithm. Finally, we give the experiment to show the superiority.","PeriodicalId":193621,"journal":{"name":"2009 Fourth International Conference on Internet Computing for Science and Engineering","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123797212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Intelligent Image Identification to Human Cells 人体细胞的智能图像识别
Duan Jun, Zhao Yang, J. Ni
the paper presents an image processing, aiming at understanding and exploring the image identification technology for human cells. The paper reports several algorithm improvements in the processing including the Gauss-Laplace algorithm that makes image of human cells be identified effectively, and combination of texture match that using pixels statistics method makes several algorithms together. With the consideration of the precision of image recognition, we combine image texture characteristics with other image processing technology. The texture characteristics of human cells are considered as specific information to be added in the knowledge-based biological systems. The knowledge reasoning is introduced and knowledge storage is established using artificial intelligence process of identifying the human cells
本文提出了一种图像处理方法,旨在理解和探索人体细胞的图像识别技术。本文报道了几种算法在处理上的改进,包括高斯-拉普拉斯算法使人体细胞图像得到有效的识别,以及结合像素统计方法的纹理匹配使几种算法结合在一起。考虑到图像识别的精度,我们将图像纹理特征与其他图像处理技术相结合。人类细胞的纹理特征被认为是在基于知识的生物系统中添加的特定信息。引入知识推理,利用人工智能识别人体细胞的过程建立知识存储
{"title":"Intelligent Image Identification to Human Cells","authors":"Duan Jun, Zhao Yang, J. Ni","doi":"10.1109/ICICSE.2009.40","DOIUrl":"https://doi.org/10.1109/ICICSE.2009.40","url":null,"abstract":"the paper presents an image processing, aiming at understanding and exploring the image identification technology for human cells. The paper reports several algorithm improvements in the processing including the Gauss-Laplace algorithm that makes image of human cells be identified effectively, and combination of texture match that using pixels statistics method makes several algorithms together. With the consideration of the precision of image recognition, we combine image texture characteristics with other image processing technology. The texture characteristics of human cells are considered as specific information to be added in the knowledge-based biological systems. The knowledge reasoning is introduced and knowledge storage is established using artificial intelligence process of identifying the human cells","PeriodicalId":193621,"journal":{"name":"2009 Fourth International Conference on Internet Computing for Science and Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130360572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Double-Layer Evolvable Hardware Method 双层可演化硬件方法
Shuyong Liu, Guoyin Zhang
One of the bottlenecks in traditional evolvable hardware is that the fitness evaluation process is restricted by the performance of the reconfigurable hardware, so that the overall evolution efficiency is very low. In order to solve the problem we propose a double-layer evolvable hardware method, which is composed of logical evolving layer and physical evolving layer. The chromosome coding based on the logic operation unit is used in logical evolving, which can implement the rapid fitness evaluation process in computer without the FPGA and other hardware. Based on the result of logical evolving, the physical evolving uses classical evolving method to evolve the physical characters of target circuit. Thus, the efficiency and the popularity of the evolvable hardware can both be improved.
传统可重构硬件存在的瓶颈之一是适应度评估过程受到可重构硬件性能的限制,导致整体进化效率很低。为了解决这一问题,我们提出了一种由逻辑进化层和物理进化层组成的双层可进化硬件方法。在逻辑进化中采用基于逻辑运算单元的染色体编码,无需FPGA等硬件即可在计算机上实现快速适应度评估过程。物理演化是在逻辑演化结果的基础上,采用经典演化方法对目标电路的物理特性进行演化。从而提高可进化硬件的效率和普及程度。
{"title":"Double-Layer Evolvable Hardware Method","authors":"Shuyong Liu, Guoyin Zhang","doi":"10.1109/ICICSE.2009.16","DOIUrl":"https://doi.org/10.1109/ICICSE.2009.16","url":null,"abstract":"One of the bottlenecks in traditional evolvable hardware is that the fitness evaluation process is restricted by the performance of the reconfigurable hardware, so that the overall evolution efficiency is very low. In order to solve the problem we propose a double-layer evolvable hardware method, which is composed of logical evolving layer and physical evolving layer. The chromosome coding based on the logic operation unit is used in logical evolving, which can implement the rapid fitness evaluation process in computer without the FPGA and other hardware. Based on the result of logical evolving, the physical evolving uses classical evolving method to evolve the physical characters of target circuit. Thus, the efficiency and the popularity of the evolvable hardware can both be improved.","PeriodicalId":193621,"journal":{"name":"2009 Fourth International Conference on Internet Computing for Science and Engineering","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130302685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Localization Method for Spatial Information Grid in Underwater Environments 水下环境下空间信息网格的定位方法
Zhe Zhang, Min Song, Daxin Liu, Hongbin Wang
Position information is important for spatial information grids. In accurate position of datum may lead to mistake decisions or even disastrous actions. In this paper, we study the problem of localization for spatial information grid in underwater environments. There are many challenges facing the localization in underwater environments, because the unavailability of radio frequency. Besides, there are various uncontrolled effects disturbing distance estimation, hence degrades the accuracy of localization in underwater environments. We devise a new method to map distance information to measurement error in a virtual frame composed with beacons. Furthermore, we propose a linear transformation to infer the measurement error by which appropriate adjustments can be obtained to make accurate distance estimation. Simulation result show that the method proposed in this paper outperforms DV-Distance, especially when the number of beacons is low.
位置信息是空间信息网格的重要组成部分。在准确的基准位置可能导致错误的决定,甚至灾难性的行动。本文研究了水下环境下空间信息网格的定位问题。由于无线电频率的不可用性,水下环境下的定位面临着许多挑战。此外,在水下环境中,有各种不受控制的影响干扰距离估计,从而降低了定位精度。我们设计了一种在由信标组成的虚拟帧中,将距离信息映射到测量误差的新方法。此外,我们提出了一种线性变换来推断测量误差,通过适当的调整可以得到准确的距离估计。仿真结果表明,本文提出的方法优于DV-Distance算法,特别是在信标数较低的情况下。
{"title":"A Localization Method for Spatial Information Grid in Underwater Environments","authors":"Zhe Zhang, Min Song, Daxin Liu, Hongbin Wang","doi":"10.1109/ICICSE.2009.47","DOIUrl":"https://doi.org/10.1109/ICICSE.2009.47","url":null,"abstract":"Position information is important for spatial information grids. In accurate position of datum may lead to mistake decisions or even disastrous actions. In this paper, we study the problem of localization for spatial information grid in underwater environments. There are many challenges facing the localization in underwater environments, because the unavailability of radio frequency. Besides, there are various uncontrolled effects disturbing distance estimation, hence degrades the accuracy of localization in underwater environments. We devise a new method to map distance information to measurement error in a virtual frame composed with beacons. Furthermore, we propose a linear transformation to infer the measurement error by which appropriate adjustments can be obtained to make accurate distance estimation. Simulation result show that the method proposed in this paper outperforms DV-Distance, especially when the number of beacons is low.","PeriodicalId":193621,"journal":{"name":"2009 Fourth International Conference on Internet Computing for Science and Engineering","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129470602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Chromatic Statistical Landscape Features for Retrieval of Color Textured Images 用于彩色纹理图像检索的彩色统计景观特征
C. Xu, Xian Tong Zhen
This paper proposes a new texture description method named Chromatic Statistical Landscape Features(CSLF) for color images. The pro-hue pseudo intensity imageis extracted from a color image based on pro-hue pseudo function which measures the degree of a color containing the amount of the reference color component of hue. Besides prohue pseudo intensity image, the separate chromatic components saturation and intensity of a color image are also equivalent to two gray images. The graph of a gray image function is a rumpled surface appearing like a landscape, from which six novel texture feature curves are derived. In this way, eighteen feature curves can be obtained from the three gray images. The proposed Chromatic Statistical Landscape Features uses these eighteen feature curves to characterize the color texture and has been shown by systematic experiments to offer very high retrieval performance on the VisTex texture collection.
提出了一种新的彩色图像纹理描述方法——彩色统计景观特征(Chromatic Statistical Landscape Features, CSLF)。基于pro-hue伪函数从彩色图像中提取pro-hue伪强度图像,该函数测量包含参考颜色分量的颜色的程度。除了伪强度图像外,彩色图像的单独色度分量饱和度和强度也相当于两幅灰度图像。灰度图像函数的图形是一个像风景一样的皱褶表面,从中导出了六条新的纹理特征曲线。这样可以从三幅灰度图像中得到18条特征曲线。所提出的彩色统计景观特征使用这18条特征曲线来表征颜色纹理,并通过系统的实验证明,在VisTex纹理集合上提供了非常高的检索性能。
{"title":"Chromatic Statistical Landscape Features for Retrieval of Color Textured Images","authors":"C. Xu, Xian Tong Zhen","doi":"10.1109/ICICSE.2009.12","DOIUrl":"https://doi.org/10.1109/ICICSE.2009.12","url":null,"abstract":"This paper proposes a new texture description method named Chromatic Statistical Landscape Features(CSLF) for color images. The pro-hue pseudo intensity imageis extracted from a color image based on pro-hue pseudo function which measures the degree of a color containing the amount of the reference color component of hue. Besides prohue pseudo intensity image, the separate chromatic components saturation and intensity of a color image are also equivalent to two gray images. The graph of a gray image function is a rumpled surface appearing like a landscape, from which six novel texture feature curves are derived. In this way, eighteen feature curves can be obtained from the three gray images. The proposed Chromatic Statistical Landscape Features uses these eighteen feature curves to characterize the color texture and has been shown by systematic experiments to offer very high retrieval performance on the VisTex texture collection.","PeriodicalId":193621,"journal":{"name":"2009 Fourth International Conference on Internet Computing for Science and Engineering","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128145115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Content-Based Self-Feedback E-government Network Security Model 基于内容的自反馈电子政务网络安全模型
Songzhu Xia, Jianpei Zhang, Jing Yang, Jun Ni
Based on the theories of the intrusion trapping and natural language understanding, oriented e-government affairs security issues, this paper proposed a content-based self-feedback model at the point of attackers. By this model, the concrete information under attacking can be focused and the attack methods would be ignored in a standard honey trap. With the supporting of honey nets, The target sensitivity is taken as the appraisement factor to demonstrate whether the information need be protected. Through adjusting the primitive feedback coefficients of the model, we can know the most important information as the attackers focusing on. At the same time, this paper introduced the concept of domain coefficients of the model. Through the experiments in the actual networks, it is the first successful model being of the prediction and feedback for e-government affairs.
基于入侵陷阱理论和自然语言理解理论,针对电子政务安全问题,提出了一种基于内容的攻击点自反馈模型。通过该模型,可以集中攻击的具体信息,而忽略标准美人计中的攻击方法。在蜜网的支持下,以目标灵敏度作为评价因子来评价信息是否需要保护。通过调整模型的原始反馈系数,我们可以知道攻击者关注的最重要信息。同时,引入了模型域系数的概念。通过在实际网络中的实验,该模型是第一个成功的电子政务预测与反馈模型。
{"title":"A Content-Based Self-Feedback E-government Network Security Model","authors":"Songzhu Xia, Jianpei Zhang, Jing Yang, Jun Ni","doi":"10.1109/ICICSE.2009.28","DOIUrl":"https://doi.org/10.1109/ICICSE.2009.28","url":null,"abstract":"Based on the theories of the intrusion trapping and natural language understanding, oriented e-government affairs security issues, this paper proposed a content-based self-feedback model at the point of attackers. By this model, the concrete information under attacking can be focused and the attack methods would be ignored in a standard honey trap. With the supporting of honey nets, The target sensitivity is taken as the appraisement factor to demonstrate whether the information need be protected. Through adjusting the primitive feedback coefficients of the model, we can know the most important information as the attackers focusing on. At the same time, this paper introduced the concept of domain coefficients of the model. Through the experiments in the actual networks, it is the first successful model being of the prediction and feedback for e-government affairs.","PeriodicalId":193621,"journal":{"name":"2009 Fourth International Conference on Internet Computing for Science and Engineering","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115266219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An Adaptive Traffic Sampling Method for Anomaly Detection 一种自适应流量采样异常检测方法
Xiaobing He, Wu Yang, Qing Wang
The random packet sampling method is the simplest methodology for reducing the amount of packets that the network monitoring system has to process. However, the accuracy of anomaly detection is affected by the fact that this method biases a large IP flow. In order to reduce the impact of sampled traffic on network anomaly detecting, an adaptive traffic sampling method is proposed. This method is developed based on time stratification. Our adaptive method lies in an innovative scheme. It divides time into strata and then samples an incoming packet with a probalility, which is a decreasing function f of the predicted size of the flow the packet belongs to. Instead of data streaming algorithms, we use packet samples and a sampling probability to estimate flow size, thus to save resources. A force sampling is also employed to increase the accuracy of estimation of smaller flows. Experiments results show that our scheme is more accurate than traditional random packet sampling for estimating anomalous traffic, thus the performance of anomalous detecting is improved.
随机数据包抽样方法是减少网络监控系统必须处理的数据包数量的最简单的方法。然而,该方法存在较大的IP流偏差,影响了异常检测的准确性。为了减少采样流量对网络异常检测的影响,提出了一种自适应流量采样方法。该方法是基于时间分层的。我们的适应性方法在于一个创新的方案。它将时间分成不同的层,然后对传入的数据包进行概率采样,概率是数据包所属流预测大小的递减函数f。我们没有使用数据流算法,而是使用数据包样本和采样概率来估计流量大小,从而节省资源。为了提高小流量的估计精度,还采用了力采样。实验结果表明,该方法比传统的随机分组采样方法更准确地估计了异常流量,从而提高了异常检测的性能。
{"title":"An Adaptive Traffic Sampling Method for Anomaly Detection","authors":"Xiaobing He, Wu Yang, Qing Wang","doi":"10.1109/ICICSE.2009.32","DOIUrl":"https://doi.org/10.1109/ICICSE.2009.32","url":null,"abstract":"The random packet sampling method is the simplest methodology for reducing the amount of packets that the network monitoring system has to process. However, the accuracy of anomaly detection is affected by the fact that this method biases a large IP flow. In order to reduce the impact of sampled traffic on network anomaly detecting, an adaptive traffic sampling method is proposed. This method is developed based on time stratification. Our adaptive method lies in an innovative scheme. It divides time into strata and then samples an incoming packet with a probalility, which is a decreasing function f of the predicted size of the flow the packet belongs to. Instead of data streaming algorithms, we use packet samples and a sampling probability to estimate flow size, thus to save resources. A force sampling is also employed to increase the accuracy of estimation of smaller flows. Experiments results show that our scheme is more accurate than traditional random packet sampling for estimating anomalous traffic, thus the performance of anomalous detecting is improved.","PeriodicalId":193621,"journal":{"name":"2009 Fourth International Conference on Internet Computing for Science and Engineering","volume":"341 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132495474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2009 Fourth International Conference on Internet Computing for Science and Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1