首页 > 最新文献

Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007)最新文献

英文 中文
A Web service discovery algorithm based on dynamic composition 一种基于动态组合的Web服务发现算法
Fu-cun Zhang, Yan Wang, L. Wang
The growing number of Web services has greatly placed pressure on discovering Web services. It is a very desiderate to solve the problem how we can discover Web services accurately. The paper proposes a method based on service composition by describing Web services with OWLS. We firstly analyzed the process model of the service. Then, we make matchmaking and return the result to the requester. Compared with the algorithms based on service profile, it has made use of the process model and taken the composition and repeating execution of Web services into consideration, which can discover the services accurately .The effectiveness of the algorithm is proved by us with experiment.
Web服务数量的增长极大地增加了发现Web服务的压力。如何准确地发现Web服务是一个迫切需要解决的问题。通过使用owl描述Web服务,提出了一种基于服务组合的方法。首先分析了服务的流程模型。然后,我们进行配对并将结果返回给请求者。与基于服务概要的算法相比,该算法利用了流程模型,考虑了Web服务的组成和重复执行,能够更准确地发现服务,并通过实验证明了算法的有效性。
{"title":"A Web service discovery algorithm based on dynamic composition","authors":"Fu-cun Zhang, Yan Wang, L. Wang","doi":"10.1109/SNPD.2007.400","DOIUrl":"https://doi.org/10.1109/SNPD.2007.400","url":null,"abstract":"The growing number of Web services has greatly placed pressure on discovering Web services. It is a very desiderate to solve the problem how we can discover Web services accurately. The paper proposes a method based on service composition by describing Web services with OWLS. We firstly analyzed the process model of the service. Then, we make matchmaking and return the result to the requester. Compared with the algorithms based on service profile, it has made use of the process model and taken the composition and repeating execution of Web services into consideration, which can discover the services accurately .The effectiveness of the algorithm is proved by us with experiment.","PeriodicalId":197058,"journal":{"name":"Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127170915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Improved Identity-based Fault-tolerant Conference Key Distribution Scheme 一种改进的基于身份的容错会议密钥分发方案
Yongquan Cai, Xiuying Li
Fault-tolerance is an important property of conference key distribution protocol. Recently, Yang et al. proposed an identity-based fault-tolerant conference key distribution scheme which is much different to the traditional ones. But their scheme can not withstand passive attack and modification attack, moreover, it also can not provide forward security. An improved identity-based fault-tolerant conference key distribution scheme is proposed in this paper. Compared with the Yang et al. 's scheme, Tzeng's (2002) scheme and Xun's scheme, the new scheme has illustrated the highest security and its communication cost is intervenient Yang et al. 's scheme and Tzeng's (2002) scheme. As security is the first-line property in conference key establishment protocol, our scheme is the most practical one in the mass.
容错性是会议密钥分发协议的一个重要特性。最近,Yang等人提出了一种不同于传统的基于身份的容错会议密钥分发方案。但该方案不能抵御被动攻击和修改攻击,也不能提供前向安全性。提出了一种改进的基于身份的容错会议密钥分发方案。与Yang等人比较。的方案,Tzeng的(2002)方案和Xun的方案,新方案显示了最高的安全性,其通信成本是干预的Yang等。’s方案和Tzeng’s(2002)方案。由于安全是会议密钥建立协议的第一线属性,因此我们的方案是目前最实用的方案。
{"title":"An Improved Identity-based Fault-tolerant Conference Key Distribution Scheme","authors":"Yongquan Cai, Xiuying Li","doi":"10.1109/SNPD.2007.262","DOIUrl":"https://doi.org/10.1109/SNPD.2007.262","url":null,"abstract":"Fault-tolerance is an important property of conference key distribution protocol. Recently, Yang et al. proposed an identity-based fault-tolerant conference key distribution scheme which is much different to the traditional ones. But their scheme can not withstand passive attack and modification attack, moreover, it also can not provide forward security. An improved identity-based fault-tolerant conference key distribution scheme is proposed in this paper. Compared with the Yang et al. 's scheme, Tzeng's (2002) scheme and Xun's scheme, the new scheme has illustrated the highest security and its communication cost is intervenient Yang et al. 's scheme and Tzeng's (2002) scheme. As security is the first-line property in conference key establishment protocol, our scheme is the most practical one in the mass.","PeriodicalId":197058,"journal":{"name":"Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127509225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Infrared Point Target Detection and Tracking Based on DSP 基于DSP的红外点目标检测与跟踪
Zhao Hong-wei, Zhang Xiao-lin, Qi Yi-ming
In the embedded real-time image processing system, moving mini point target was detected and tracked. The self-adaptive threshold division and corresponding matching method were employed to detect the moving target and restrain the background noise. And with the memory extrapolate image processing method, the sheltered target was tracked. According to the requirement of image data and algorithm complexity, the simulation was realized on TMS320DM642 board based on TI Company. The results show CPU utilization rate is 83.3%, which could satisfy the real-time requirement, and the image output is smooth with high reliability.
在嵌入式实时图像处理系统中,对运动的微型点目标进行检测和跟踪。采用自适应阈值分割和匹配方法检测运动目标,抑制背景噪声。采用记忆外推图像处理方法对被遮挡目标进行跟踪。根据图像数据的要求和算法复杂度,仿真在TI公司的TMS320DM642板上实现。结果表明,该算法的CPU利用率为83.3%,能够满足实时性要求,图像输出平滑,可靠性高。
{"title":"Infrared Point Target Detection and Tracking Based on DSP","authors":"Zhao Hong-wei, Zhang Xiao-lin, Qi Yi-ming","doi":"10.1109/SNPD.2007.319","DOIUrl":"https://doi.org/10.1109/SNPD.2007.319","url":null,"abstract":"In the embedded real-time image processing system, moving mini point target was detected and tracked. The self-adaptive threshold division and corresponding matching method were employed to detect the moving target and restrain the background noise. And with the memory extrapolate image processing method, the sheltered target was tracked. According to the requirement of image data and algorithm complexity, the simulation was realized on TMS320DM642 board based on TI Company. The results show CPU utilization rate is 83.3%, which could satisfy the real-time requirement, and the image output is smooth with high reliability.","PeriodicalId":197058,"journal":{"name":"Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125684337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The existence of periodic solutions for a class impulsive differential equations 一类脉冲微分方程周期解的存在性
Yanping Guo, Wei Xiang, Xiujun Liu
This paper is devoted to study existence of multiple periodic positive solutions for a class of nonautonomous functional differential equations with impulse actions at fixed moments. The main results here is established by employing the theory of fixed point index in cones.
研究了一类具有脉冲作用的非自治泛函微分方程的多周期正解的存在性。本文的主要结果是利用锥的不动点指数理论得到的。
{"title":"The existence of periodic solutions for a class impulsive differential equations","authors":"Yanping Guo, Wei Xiang, Xiujun Liu","doi":"10.1109/SNPD.2007.157","DOIUrl":"https://doi.org/10.1109/SNPD.2007.157","url":null,"abstract":"This paper is devoted to study existence of multiple periodic positive solutions for a class of nonautonomous functional differential equations with impulse actions at fixed moments. The main results here is established by employing the theory of fixed point index in cones.","PeriodicalId":197058,"journal":{"name":"Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130564480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Modified Model for Private Data Security Facing E-commerce 面向电子商务的私有数据安全改进模型
Chunyong Yin, Jianshi Li, Ruxia Sun
In order to improve personal data security in the electronic commerce, and to avoid information exposing of personal privacy, personal data was used as the encrypted principle, applying homomorphism and random perturbation to strengthen personal data security. This paper analyze the usage of personal data in electronic commerce firstly, then discuss the P3P to realize security of personal data. This mechanism cannot guarantee that Web sites do act according to their policies once they have obtained user's personal data. In light of this, a new algorithm was used to acquire improved security. The proposed algorithm uses homomorphism as principle to preserve privacy. This method can make the important data to be appeared with secret content in the web service, and prevent personal data from being misused. The simulation results proved that the modified method can protect personal privacy effectively, and can carry on data mining to provide the characteristic service for the customer, and modified method has shorter response time.
为了提高电子商务中个人数据的安全性,避免个人隐私的信息泄露,采用个人数据作为加密原理,运用同态和随机摄动来加强个人数据的安全性。本文首先分析了个人数据在电子商务中的使用,然后讨论了P3P协议实现个人数据的安全。这种机制不能保证网站在获得用户的个人数据后按照其政策行事。针对这一点,采用了一种新的算法来提高安全性。该算法采用同态性作为保护隐私的原则。该方法可以使重要数据在web服务中以保密内容的形式出现,防止个人数据被滥用。仿真结果证明,改进后的方法能够有效地保护个人隐私,并能进行数据挖掘,为客户提供有特色的服务,且改进后的方法具有更短的响应时间。
{"title":"A Modified Model for Private Data Security Facing E-commerce","authors":"Chunyong Yin, Jianshi Li, Ruxia Sun","doi":"10.1109/SNPD.2007.10","DOIUrl":"https://doi.org/10.1109/SNPD.2007.10","url":null,"abstract":"In order to improve personal data security in the electronic commerce, and to avoid information exposing of personal privacy, personal data was used as the encrypted principle, applying homomorphism and random perturbation to strengthen personal data security. This paper analyze the usage of personal data in electronic commerce firstly, then discuss the P3P to realize security of personal data. This mechanism cannot guarantee that Web sites do act according to their policies once they have obtained user's personal data. In light of this, a new algorithm was used to acquire improved security. The proposed algorithm uses homomorphism as principle to preserve privacy. This method can make the important data to be appeared with secret content in the web service, and prevent personal data from being misused. The simulation results proved that the modified method can protect personal privacy effectively, and can carry on data mining to provide the characteristic service for the customer, and modified method has shorter response time.","PeriodicalId":197058,"journal":{"name":"Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131658923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Eliminating Redundant Communication of Code Generation for Distributed Memory Machines 消除分布式内存机代码生成中的冗余通信
Yanan Shen, Rongcai Zhao, Lei Wang
How to eliminate redundant communications is a key issue in developing parallelizing compilers for distributed memory machines. An important way to improve the performance of the code generated by parallelizing compiler in distributed memory systems is to eliminate as much communications as possible. This paper investigates algorithms for generating communications code from previously published work and modifies them to eliminate redundant communications. Based on the mathematical model of symbolic coefficient linear inequalities the revisited formal specification of communications sets are presented and the corresponding improved algorithms are given. Experimental results indicate that the new algorithms can reduce communication messages and improve the performance of parallelized code significantly.
如何消除冗余通信是开发分布式内存机并行编译器的关键问题。在分布式内存系统中,提高并行编译器生成的代码性能的一个重要方法是尽可能地消除通信。本文研究了从先前发表的作品中生成通信代码的算法,并对它们进行了修改以消除冗余通信。在符号系数线性不等式数学模型的基础上,重新提出了通信集的形式规范,并给出了相应的改进算法。实验结果表明,新算法可以显著减少通信消息,提高并行化代码的性能。
{"title":"Eliminating Redundant Communication of Code Generation for Distributed Memory Machines","authors":"Yanan Shen, Rongcai Zhao, Lei Wang","doi":"10.1109/SNPD.2007.482","DOIUrl":"https://doi.org/10.1109/SNPD.2007.482","url":null,"abstract":"How to eliminate redundant communications is a key issue in developing parallelizing compilers for distributed memory machines. An important way to improve the performance of the code generated by parallelizing compiler in distributed memory systems is to eliminate as much communications as possible. This paper investigates algorithms for generating communications code from previously published work and modifies them to eliminate redundant communications. Based on the mathematical model of symbolic coefficient linear inequalities the revisited formal specification of communications sets are presented and the corresponding improved algorithms are given. Experimental results indicate that the new algorithms can reduce communication messages and improve the performance of parallelized code significantly.","PeriodicalId":197058,"journal":{"name":"Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007)","volume":"267 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121339274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Filter Design Based on the Theory of the Generalized Morphological Filter with Omnidirectional Structuring Element 基于全向结构元广义形态滤波器理论的滤波器设计
Zhang Xiang-guang, Liu Yun, Wang Chuan-xu
The close-opening or open-closing filter based on the morphological filters with the same size structuring element cannot remove all the positive or negative impulse noise effectively. To improve the performance of these two kinds of filter, the generalized close- opening and open-closing filter based on the morphological filter with the different size structuring element are put forward. Based on the generalized morphological filter, this paper suggests a kind of designing project of the filter that applies a new structuring element to the generalized morphological filter. The theoretical analysis and the simulation experiments of the image processing indicate that this kind of filter can not only remove noise effectively but also keep the details of the image sufficiently.
基于相同尺寸结构单元的形态滤波器的开合或开合滤波器不能有效去除所有的正、负脉冲噪声。为了提高这两种滤波器的性能,提出了基于不同尺寸结构单元的形态滤波器的广义开闭滤波器和开闭滤波器。在广义形态滤波器的基础上,提出了一种将新的结构元素应用于广义形态滤波器的滤波器设计方案。理论分析和图像处理仿真实验表明,该滤波器既能有效去除噪声,又能充分保留图像的细节。
{"title":"Filter Design Based on the Theory of the Generalized Morphological Filter with Omnidirectional Structuring Element","authors":"Zhang Xiang-guang, Liu Yun, Wang Chuan-xu","doi":"10.1109/SNPD.2007.443","DOIUrl":"https://doi.org/10.1109/SNPD.2007.443","url":null,"abstract":"The close-opening or open-closing filter based on the morphological filters with the same size structuring element cannot remove all the positive or negative impulse noise effectively. To improve the performance of these two kinds of filter, the generalized close- opening and open-closing filter based on the morphological filter with the different size structuring element are put forward. Based on the generalized morphological filter, this paper suggests a kind of designing project of the filter that applies a new structuring element to the generalized morphological filter. The theoretical analysis and the simulation experiments of the image processing indicate that this kind of filter can not only remove noise effectively but also keep the details of the image sufficiently.","PeriodicalId":197058,"journal":{"name":"Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121535873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Improved Attribute Reduction Algorithm Based on Rough Set 基于粗糙集的改进属性约简算法
X. Yang, Jiancheng Wan, Ling Zhang
An improved heuristic attribute reduction algorithm based on the attribute frequency is presented. After analyzing many other attribute reduction algorithms, we utilize the discernibility matrix and the appeared attribute frequencies to determine each attribute's significance, based on the principle of maximum attribute frequency, we achieved the reduction of the information system. An illustrative example demonstrate the algorithm's effectiveness and validity.
提出了一种改进的基于属性频率的启发式属性约简算法。在分析了许多其他属性约简算法的基础上,利用可分辨矩阵和出现的属性频率来确定每个属性的重要度,基于属性频率最大的原则,实现了信息系统的约简。算例验证了该算法的有效性和有效性。
{"title":"An Improved Attribute Reduction Algorithm Based on Rough Set","authors":"X. Yang, Jiancheng Wan, Ling Zhang","doi":"10.1109/SNPD.2007.181","DOIUrl":"https://doi.org/10.1109/SNPD.2007.181","url":null,"abstract":"An improved heuristic attribute reduction algorithm based on the attribute frequency is presented. After analyzing many other attribute reduction algorithms, we utilize the discernibility matrix and the appeared attribute frequencies to determine each attribute's significance, based on the principle of maximum attribute frequency, we achieved the reduction of the information system. An illustrative example demonstrate the algorithm's effectiveness and validity.","PeriodicalId":197058,"journal":{"name":"Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122241670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Video Transmission over Ad Hoc Networks Using Multiple Description Coding and Clustering-based Multiple Paths 基于多描述编码和多路径聚类的Ad Hoc网络视频传输
Yuan Chen, Sheng-sheng Yu, Jing-li Zhou, Jun Fan
Ad hoc networks are characterized with frequent link failures and network topology change. These features result in a great challenge to transmit video over ad hoc networks. We propose a novel scheme for robust video transmission over ad hoc networks. Video stream is coded by using multiple description coding strategy and then a clustering-based multiple paths algorithm is applied for routing over ad hoc networks. The paper describes the general issues of multiple description coding and the principle of clustering-based multiple paths algorithm. Simulation results clearly demonstrate the effectiveness of this scheme for supporting error resilient video transmission over ad hoc networks.
Ad hoc网络的特点是链路故障频繁,网络拓扑结构多变。这些特点给在自组织网络上传输视频带来了巨大的挑战。我们提出了一种在自组织网络上实现鲁棒视频传输的新方案。首先采用多描述编码策略对视频流进行编码,然后采用基于聚类的多路径算法在ad hoc网络上进行路由。本文介绍了多描述编码的一般问题和基于聚类的多路径算法的原理。仿真结果清楚地证明了该方案在支持自组织网络上的容错视频传输方面的有效性。
{"title":"Video Transmission over Ad Hoc Networks Using Multiple Description Coding and Clustering-based Multiple Paths","authors":"Yuan Chen, Sheng-sheng Yu, Jing-li Zhou, Jun Fan","doi":"10.1109/SNPD.2007.580","DOIUrl":"https://doi.org/10.1109/SNPD.2007.580","url":null,"abstract":"Ad hoc networks are characterized with frequent link failures and network topology change. These features result in a great challenge to transmit video over ad hoc networks. We propose a novel scheme for robust video transmission over ad hoc networks. Video stream is coded by using multiple description coding strategy and then a clustering-based multiple paths algorithm is applied for routing over ad hoc networks. The paper describes the general issues of multiple description coding and the principle of clustering-based multiple paths algorithm. Simulation results clearly demonstrate the effectiveness of this scheme for supporting error resilient video transmission over ad hoc networks.","PeriodicalId":197058,"journal":{"name":"Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126037502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Automatic attack plan recognition from intrusion alerts 从入侵警报自动识别攻击计划
Li Wang, Zhitang Li, Jie Ma, Yang-ming Ma, Aifang Zhang
The amount of security application products connected to the Internet increased so dramatically that they usually generate huge volumes of security audit data. Therefore, it is important to develop an advanced alert correlation system that can reduce data redundancy and provide effective direction. This paper describes the framework, SATA, for Security Alerts and Threats analysis. Using SATA, raw audit data is firstpreprocessed into hi-alerts, which are refined and verified as true threat. We further analyze the correlation-ship of real-time hi-alerts to achieve the goal of online attack plan recognition. A key contribution of the paper is thus in automatic "multistage attack plan recognition". It also solves the problem of detecting novel multi-stage attacks. Experiment shows our approach can effectively correlate multi-stage attack behaviors and identify true attack threats.
连接到Internet的安全应用产品数量急剧增加,通常会产生大量的安全审计数据。因此,开发一种先进的预警关联系统,减少数据冗余,提供有效的指导是非常重要的。本文描述了用于安全警报和威胁分析的框架SATA。使用SATA,原始审计数据首先被预处理成高警报,这些警报被提炼并验证为真正的威胁。我们进一步分析了实时高警报的相关性,以实现在线攻击计划识别的目标。因此,本文的一个关键贡献是自动“多阶段攻击计划识别”。同时也解决了新型多阶段攻击的检测问题。实验表明,该方法能够有效地关联多阶段攻击行为,识别真实的攻击威胁。
{"title":"Automatic attack plan recognition from intrusion alerts","authors":"Li Wang, Zhitang Li, Jie Ma, Yang-ming Ma, Aifang Zhang","doi":"10.1109/SNPD.2007.396","DOIUrl":"https://doi.org/10.1109/SNPD.2007.396","url":null,"abstract":"The amount of security application products connected to the Internet increased so dramatically that they usually generate huge volumes of security audit data. Therefore, it is important to develop an advanced alert correlation system that can reduce data redundancy and provide effective direction. This paper describes the framework, SATA, for Security Alerts and Threats analysis. Using SATA, raw audit data is firstpreprocessed into hi-alerts, which are refined and verified as true threat. We further analyze the correlation-ship of real-time hi-alerts to achieve the goal of online attack plan recognition. A key contribution of the paper is thus in automatic \"multistage attack plan recognition\". It also solves the problem of detecting novel multi-stage attacks. Experiment shows our approach can effectively correlate multi-stage attack behaviors and identify true attack threats.","PeriodicalId":197058,"journal":{"name":"Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007)","volume":"26 9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126050598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1