首页 > 最新文献

Other Conferences最新文献

英文 中文
Research on network topology visualization under HTML5 technology HTML5 技术下的网络拓扑可视化研究
Pub Date : 2024-06-06 DOI: 10.1117/12.3032035
Jian Liu
With the rapid development of computer network technology, the network structure has become increasingly complex, and the number and types of network devices have also shown explosive growth. In order to better understand, manage and optimize the network, visualization of network topology has become an important research field. However, the current visualization framework and tools have some problems in the practical process, such as complicated application process, single display effect and insufficient interaction ability, which can not meet the actual needs of users. In this regard, this paper will take network topology visualization as the research object, and build a network topology visualization system based on HTML5 through Web technology to realize the innovation of network topology management. Practice has proved that the whole system adopts B/S architecture design, and the front end is mainly based on HTML5, CSS and JavaScript, combined with BootStrap layout framework to complete the design and construction. At the same time, the Canvas is used to complete the drawing and rendering of visual graphics, which greatly improves the efficiency of network monitoring, conforms to the expected goal of network management system in displaying topological functions, and has certain practical application value.
随着计算机网络技术的飞速发展,网络结构变得日益复杂,网络设备的数量和种类也呈现爆炸式增长。为了更好地理解、管理和优化网络,网络拓扑可视化已成为一个重要的研究领域。然而,目前的可视化框架和工具在实际应用过程中存在一些问题,如应用流程复杂、显示效果单一、交互能力不足等,无法满足用户的实际需求。为此,本文将以网络拓扑可视化为研究对象,通过Web技术构建基于HTML5的网络拓扑可视化系统,实现网络拓扑管理的创新。实践证明,整个系统采用B/S架构设计,前端主要基于HTML5、CSS和JavaScript,结合BootStrap布局框架完成设计和构建。同时,利用Canvas完成可视化图形的绘制和渲染,大大提高了网络监控的效率,符合网管系统在拓扑功能展示方面的预期目标,具有一定的实际应用价值。
{"title":"Research on network topology visualization under HTML5 technology","authors":"Jian Liu","doi":"10.1117/12.3032035","DOIUrl":"https://doi.org/10.1117/12.3032035","url":null,"abstract":"With the rapid development of computer network technology, the network structure has become increasingly complex, and the number and types of network devices have also shown explosive growth. In order to better understand, manage and optimize the network, visualization of network topology has become an important research field. However, the current visualization framework and tools have some problems in the practical process, such as complicated application process, single display effect and insufficient interaction ability, which can not meet the actual needs of users. In this regard, this paper will take network topology visualization as the research object, and build a network topology visualization system based on HTML5 through Web technology to realize the innovation of network topology management. Practice has proved that the whole system adopts B/S architecture design, and the front end is mainly based on HTML5, CSS and JavaScript, combined with BootStrap layout framework to complete the design and construction. At the same time, the Canvas is used to complete the drawing and rendering of visual graphics, which greatly improves the efficiency of network monitoring, conforms to the expected goal of network management system in displaying topological functions, and has certain practical application value.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141376696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on health evaluation method of data center security protection system 数据中心安全保护系统健康评估方法研究
Pub Date : 2024-06-06 DOI: 10.1117/12.3032059
Ranxin Gao, Sen Jing, Min Li, Yue Sun, Guanlin Si, Yue Zhang
The data center has complete equipment, professional management, and a comprehensive application service platform. A good data center security protection system can help prevent dangers and violations that have a serious impact on the business. However, the level of security protection in data centers varies greatly, and the effectiveness of protection lacks means of testing and verification. This article studies the health evaluation method of data center security protection system, proposes a security protection measure evaluation mechanism. The evaluation method provides strong technical support for the effectiveness verification and promotion of existing data center security protection measures.
数据中心拥有完备的设备、专业的管理和全面的应用服务平台。一个良好的数据中心安全保护系统可以帮助预防对业务造成严重影响的危险和违规行为。然而,数据中心的安全防护水平参差不齐,防护效果缺乏检测和验证手段。本文研究了数据中心安全防护系统的健康评估方法,提出了一种安全防护措施评估机制。该评价方法为现有数据中心安全防护措施的有效性验证和推广提供了有力的技术支撑。
{"title":"Research on health evaluation method of data center security protection system","authors":"Ranxin Gao, Sen Jing, Min Li, Yue Sun, Guanlin Si, Yue Zhang","doi":"10.1117/12.3032059","DOIUrl":"https://doi.org/10.1117/12.3032059","url":null,"abstract":"The data center has complete equipment, professional management, and a comprehensive application service platform. A good data center security protection system can help prevent dangers and violations that have a serious impact on the business. However, the level of security protection in data centers varies greatly, and the effectiveness of protection lacks means of testing and verification. This article studies the health evaluation method of data center security protection system, proposes a security protection measure evaluation mechanism. The evaluation method provides strong technical support for the effectiveness verification and promotion of existing data center security protection measures.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141380414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Can large language model replace static analysis tools 大型语言模型能否取代静态分析工具
Pub Date : 2024-06-06 DOI: 10.1117/12.3031920
Han Cui
Static analysis tools are widely used to ensure code quality and security, especially in large software projects. Recently, the advent of Large Language Models (LLM), such as the Generative Pre-trained Transformer (GPT), seems to present a strong ability to handle tasks about static code analysis. This paper aims to answer the question, can large language model replace static analysis tools? We present an extensive evaluation of ChatGPT’s capabilities in identifying and analyzing issues detectable by three well-known Java static analysis tools: PMD, SpotBugs, and SonarQube. Through a series of experiments, we assess the performance of two versions of GPT, GPT-3.5 and GPT-4, across various categories of code issues. We conduct a detailed analysis of the experiment results and discuss the limitation of using ChatGPT to perform as a static analysis tool. The findings during our research suggest that while GPT, especially GPT-4 performs outstanding marks on the dataset we chose, it is improper to fully replace the static code analyzers at the time. Working as the supplementary of static code analyzers can be a nice way to enhance the code quality ensuring projects.
静态分析工具被广泛用于确保代码质量和安全性,尤其是在大型软件项目中。最近,大型语言模型(LLM)的出现,如生成预训练变换器(GPT),似乎展示了处理静态代码分析任务的强大能力。本文旨在回答这样一个问题:大型语言模型能否取代静态分析工具?我们对 ChatGPT 在识别和分析三种著名 Java 静态分析工具所检测到的问题方面的能力进行了广泛评估:PMD、SpotBugs 和 SonarQube。通过一系列实验,我们评估了两个版本的 GPT(GPT-3.5 和 GPT-4)在各类代码问题上的性能。我们对实验结果进行了详细分析,并讨论了将 ChatGPT 用作静态分析工具的局限性。我们的研究结果表明,虽然 GPT,尤其是 GPT-4 在我们选择的数据集上表现出色,但它目前还不能完全取代静态代码分析器。作为静态代码分析器的辅助工具,GPT 可以很好地提高代码质量,确保项目的顺利进行。
{"title":"Can large language model replace static analysis tools","authors":"Han Cui","doi":"10.1117/12.3031920","DOIUrl":"https://doi.org/10.1117/12.3031920","url":null,"abstract":"Static analysis tools are widely used to ensure code quality and security, especially in large software projects. Recently, the advent of Large Language Models (LLM), such as the Generative Pre-trained Transformer (GPT), seems to present a strong ability to handle tasks about static code analysis. This paper aims to answer the question, can large language model replace static analysis tools? We present an extensive evaluation of ChatGPT’s capabilities in identifying and analyzing issues detectable by three well-known Java static analysis tools: PMD, SpotBugs, and SonarQube. Through a series of experiments, we assess the performance of two versions of GPT, GPT-3.5 and GPT-4, across various categories of code issues. We conduct a detailed analysis of the experiment results and discuss the limitation of using ChatGPT to perform as a static analysis tool. The findings during our research suggest that while GPT, especially GPT-4 performs outstanding marks on the dataset we chose, it is improper to fully replace the static code analyzers at the time. Working as the supplementary of static code analyzers can be a nice way to enhance the code quality ensuring projects.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141377183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CATL: contrast adaptive transfer learning for cross-system log anomaly detection CATL:用于跨系统日志异常检测的对比自适应迁移学习
Pub Date : 2024-06-06 DOI: 10.1117/12.3031960
Junwei Zhou, Yafei Li, Xiangtian Yu, Yuxuan Zhao
Syslogs play a crucial role in maintenance and troubleshooting, as they document the operational status and key events within computer systems. However, traditional methods of anomaly detection in Syslog face challenges due to the sheer volume and diversity of logs, making cross-system anomaly detection difficult. To address those challenges, this paper introduces CATL, a pioneering Contrast Adaptive Transfer Learning with Bidirectional Long Short-Term Memory (BiLSTM), which can effectively extract contextual features of the log sequence from both directions. CATL overcomes the difficulties arising from massive, less-correlated logs between different systems by leveraging a combination of labeled data from source and target systems and optimizing the Contrastive Domain Discrepancy (CDD) metric. This allows CATL to accurately model discrepancies within and across log classes, minimizing intra-class domain discrepancy while maximizing inter-class domain discrepancy in log sequence features from different domains to match existing anomaly detection decision boundaries better. Our empirical studies, conducted on prominent benchmarks including HDFS, Hadoop, Thunderbird, BGL, and Spirit, demonstrate that CATL addresses the syntactic diversity of log systems and outperforms existing methods in cross-system anomaly detection.
Syslog 记录了计算机系统的运行状态和关键事件,在维护和故障排除方面发挥着至关重要的作用。然而,传统的 Syslog 异常检测方法因日志数量庞大、种类繁多而面临挑战,难以进行跨系统异常检测。为了应对这些挑战,本文介绍了 CATL,这是一种具有双向长短期记忆(BiLSTM)的开创性对比自适应迁移学习方法,可以有效地从两个方向提取日志序列的上下文特征。CATL 综合利用源系统和目标系统的标记数据,优化对比域差异 (CDD) 指标,从而克服了不同系统之间的大量不相关日志所带来的困难。这样,CATL 就能对日志类别内和类别间的差异进行精确建模,将不同领域日志序列特征的类内领域差异最小化,同时将类间领域差异最大化,从而更好地匹配现有的异常检测决策边界。我们在 HDFS、Hadoop、Thunderbird、BGL 和 Spirit 等著名基准上进行的实证研究表明,CATL 可以解决日志系统的语法多样性问题,在跨系统异常检测方面优于现有方法。
{"title":"CATL: contrast adaptive transfer learning for cross-system log anomaly detection","authors":"Junwei Zhou, Yafei Li, Xiangtian Yu, Yuxuan Zhao","doi":"10.1117/12.3031960","DOIUrl":"https://doi.org/10.1117/12.3031960","url":null,"abstract":"Syslogs play a crucial role in maintenance and troubleshooting, as they document the operational status and key events within computer systems. However, traditional methods of anomaly detection in Syslog face challenges due to the sheer volume and diversity of logs, making cross-system anomaly detection difficult. To address those challenges, this paper introduces CATL, a pioneering Contrast Adaptive Transfer Learning with Bidirectional Long Short-Term Memory (BiLSTM), which can effectively extract contextual features of the log sequence from both directions. CATL overcomes the difficulties arising from massive, less-correlated logs between different systems by leveraging a combination of labeled data from source and target systems and optimizing the Contrastive Domain Discrepancy (CDD) metric. This allows CATL to accurately model discrepancies within and across log classes, minimizing intra-class domain discrepancy while maximizing inter-class domain discrepancy in log sequence features from different domains to match existing anomaly detection decision boundaries better. Our empirical studies, conducted on prominent benchmarks including HDFS, Hadoop, Thunderbird, BGL, and Spirit, demonstrate that CATL addresses the syntactic diversity of log systems and outperforms existing methods in cross-system anomaly detection.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141376675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on distributed heterogeneous task scheduling and resource allocation algorithms based on deep learning 基于深度学习的分布式异构任务调度和资源分配算法研究
Pub Date : 2024-06-06 DOI: 10.1117/12.3032073
Qiu Zhen, Fan Xu, Wenpu Li, Fan Yang, Hongyu Wu, Huanhuan Li
With the rapid development and application of deep learning, its dataset size and network model are becoming increasingly large, and distributed model training is becoming increasingly popular. This article proposes a distributed heterogeneous task scheduling and resource allocation algorithm based on deep learning to address issues such as heterogeneity in resource usage, inability to predict task convergence time, communication time bottlenecks, and resource waste caused by static resource allocation during distributed collaborative training. This algorithm achieves dynamic scheduling and resource allocation of heterogeneous tasks and reduces task completion time in clusters. The experiment shows that the algorithm proposed in this article has significant improvements in both task completion time and system duration.
随着深度学习的快速发展和应用,其数据集规模和网络模型越来越大,分布式模型训练也越来越受欢迎。本文提出了一种基于深度学习的分布式异构任务调度和资源分配算法,以解决分布式协同训练过程中资源使用异构、任务收敛时间无法预测、通信时间瓶颈以及静态资源分配造成的资源浪费等问题。该算法实现了异构任务的动态调度和资源分配,缩短了集群中的任务完成时间。实验表明,本文提出的算法在任务完成时间和系统持续时间上都有显著改善。
{"title":"Research on distributed heterogeneous task scheduling and resource allocation algorithms based on deep learning","authors":"Qiu Zhen, Fan Xu, Wenpu Li, Fan Yang, Hongyu Wu, Huanhuan Li","doi":"10.1117/12.3032073","DOIUrl":"https://doi.org/10.1117/12.3032073","url":null,"abstract":"With the rapid development and application of deep learning, its dataset size and network model are becoming increasingly large, and distributed model training is becoming increasingly popular. This article proposes a distributed heterogeneous task scheduling and resource allocation algorithm based on deep learning to address issues such as heterogeneity in resource usage, inability to predict task convergence time, communication time bottlenecks, and resource waste caused by static resource allocation during distributed collaborative training. This algorithm achieves dynamic scheduling and resource allocation of heterogeneous tasks and reduces task completion time in clusters. The experiment shows that the algorithm proposed in this article has significant improvements in both task completion time and system duration.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141376422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cross-language entity alignment based on graph convolution neural network and attribute information 基于图卷积神经网络和属性信息的跨语言实体对齐
Pub Date : 2024-06-06 DOI: 10.1117/12.3031901
Xiaozhan Hu, Yuan Sun
Knowledge graphs are widely used in the field of natural language processing applications. In order to study how to use the structural and attribute information of entities for cross language entity alignment, we have successively borrowed the high-speed gate mechanism of the HGCN model and the relationship aware neighborhood matching model of the RNM model. Firstly, using Graph Convolutional Neural Network (GCN) for knowledge graph embedding learning, and then introducing the method of attribute information and highway gates mechanism to jointly embed the structure and attributes for learning. In entity alignment, relationship aware neighborhood matching is used to improve alignment performance. Therefore, this article proposes a research method for entity alignment based on graph convolutional neural networks and attribute information. Experiments were conducted on the publicly available dataset DBP15k, and from the results, it can be seen that Hits@1 The indicators reached 85.24%, 87.26%, and 94.76% respectively, achieving better experimental results.
知识图谱在自然语言处理领域应用广泛。为了研究如何利用实体的结构和属性信息进行跨语言实体配准,我们先后借鉴了HGCN模型的高速门机制和RNM模型的关系感知邻域匹配模型。首先,利用图卷积神经网络(GCN)进行知识图嵌入学习,然后引入属性信息和高速门机制的方法,共同嵌入结构和属性进行学习。在实体配准中,使用关系感知邻域匹配来提高配准性能。因此,本文提出了一种基于图卷积神经网络和属性信息的实体配准研究方法。在公开数据集 DBP15k 上进行了实验,从实验结果可以看出,Hits@1 指标分别达到了 85.24%、87.26% 和 94.76%,取得了较好的实验效果。
{"title":"Cross-language entity alignment based on graph convolution neural network and attribute information","authors":"Xiaozhan Hu, Yuan Sun","doi":"10.1117/12.3031901","DOIUrl":"https://doi.org/10.1117/12.3031901","url":null,"abstract":"Knowledge graphs are widely used in the field of natural language processing applications. In order to study how to use the structural and attribute information of entities for cross language entity alignment, we have successively borrowed the high-speed gate mechanism of the HGCN model and the relationship aware neighborhood matching model of the RNM model. Firstly, using Graph Convolutional Neural Network (GCN) for knowledge graph embedding learning, and then introducing the method of attribute information and highway gates mechanism to jointly embed the structure and attributes for learning. In entity alignment, relationship aware neighborhood matching is used to improve alignment performance. Therefore, this article proposes a research method for entity alignment based on graph convolutional neural networks and attribute information. Experiments were conducted on the publicly available dataset DBP15k, and from the results, it can be seen that Hits@1 The indicators reached 85.24%, 87.26%, and 94.76% respectively, achieving better experimental results.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141376529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-based federal learning program for drone safety 基于区块链的无人机安全联邦学习计划
Pub Date : 2024-06-06 DOI: 10.1117/12.3031895
Jingyuan Jing, Yanbo Yang, Mingchao Li, Baoshan Li, Jiawei Zhang, Jianfeng Ma
In order to study secure federated learning for resource-constrained devices such as drones to protect user privacy and data security in drone networks, a blockchain-based secure federated learning scheme for drones is proposed. Currently, researchers focus on transferring models for federated learning after local training using drones, but in reality, drones will be limited in accomplishing local training due to their own resource and arithmetic issues. In this paper, the scheme offloads the training task of the UAV to the local server, and the UAV is only responsible for performing model aggregation and delivery. At the same time, a new consensus algorithm PoE (Proof-of-Energy) is proposed to model the energy and evaluate the arithmetic power of drones, which assigns roles to each drone node within the blockchain network and ensures that the drones effectively participate in the federated learning process. Due to the open and transparent nature of the blockchain, ring signatures are used to replace the traditional signatures in order to protect the private information such as the behavior and identity of each node and the content of block transactions. The experimental results show that the proposed model can ensure that UAVs effectively participate in federated learning. In addition, when there is a poisoning sample to disrupt the training process, the accuracy of the global model can be effectively ensured compared to the traditional scheme.
为了研究无人机等资源受限设备的安全联合学习,保护无人机网络中的用户隐私和数据安全,提出了一种基于区块链的无人机安全联合学习方案。目前,研究人员主要关注利用无人机进行本地训练后传输模型进行联合学习,但在现实中,无人机由于自身的资源和运算问题,完成本地训练的能力有限。本文的方案将无人机的训练任务卸载给本地服务器,无人机只负责进行模型的聚合和传递。同时,提出了一种新的共识算法PoE(Proof-of-Energy),对无人机的能量进行建模,对无人机的算力进行评估,为区块链网络中的每个无人机节点分配角色,保证无人机有效参与联盟学习过程。由于区块链的公开透明性,为了保护每个节点的行为和身份、区块交易内容等隐私信息,采用环签名代替传统签名。实验结果表明,所提出的模型能确保无人机有效参与联盟学习。此外,与传统方案相比,当出现中毒样本破坏训练过程时,全局模型的准确性也能得到有效保证。
{"title":"Blockchain-based federal learning program for drone safety","authors":"Jingyuan Jing, Yanbo Yang, Mingchao Li, Baoshan Li, Jiawei Zhang, Jianfeng Ma","doi":"10.1117/12.3031895","DOIUrl":"https://doi.org/10.1117/12.3031895","url":null,"abstract":"In order to study secure federated learning for resource-constrained devices such as drones to protect user privacy and data security in drone networks, a blockchain-based secure federated learning scheme for drones is proposed. Currently, researchers focus on transferring models for federated learning after local training using drones, but in reality, drones will be limited in accomplishing local training due to their own resource and arithmetic issues. In this paper, the scheme offloads the training task of the UAV to the local server, and the UAV is only responsible for performing model aggregation and delivery. At the same time, a new consensus algorithm PoE (Proof-of-Energy) is proposed to model the energy and evaluate the arithmetic power of drones, which assigns roles to each drone node within the blockchain network and ensures that the drones effectively participate in the federated learning process. Due to the open and transparent nature of the blockchain, ring signatures are used to replace the traditional signatures in order to protect the private information such as the behavior and identity of each node and the content of block transactions. The experimental results show that the proposed model can ensure that UAVs effectively participate in federated learning. In addition, when there is a poisoning sample to disrupt the training process, the accuracy of the global model can be effectively ensured compared to the traditional scheme.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141377786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Synergizing next-generation firewalls and defense-in-depth strategies in a dynamic cybersecurity landscape 在动态的网络安全环境中协同下一代防火墙和深度防御战略
Pub Date : 2024-06-06 DOI: 10.1117/12.3031957
Sun Lei
The ever-changing cyber threat landscape, characterized by increasingly sophisticated attacks and evolving malware, demands robust and layered security strategies. Traditional firewalls, while effective as a first line of defense, struggle to keep pace with the complexity of modern threats. This necessitates the adoption of Next-Generation Firewalls (NGFWs) as a vital component of a comprehensive defense-in-depth approach. This research delves into the limitations of traditional firewalls and explores the key capabilities offered by NGFWs. It examines how features like application awareness, deep packet inspection, and SSL/TLS decryption contribute to a more secure and resilient network infrastructure. Through in-depth analysis and relevant case studies, this paper aims to demonstrate the critical role of NGFWs in today's dynamic cybersecurity environment. It emphasizes the critical need for organizations to embrace a defense-in-depth approach, with NGFWs serving as the cornerstone for a robust and resilient network infrastructure. By deploying NGFWs and adopting a comprehensive layered security strategy, organizations can significantly improve their cybersecurity posture and effectively protect themselves against the ever-present and evolving threat actors.
网络威胁瞬息万变,其特点是攻击日益复杂,恶意软件不断演变,这就要求采取稳健、多层次的安全策略。传统防火墙虽然是有效的第一道防线,但难以跟上现代威胁的复杂性。因此,有必要采用下一代防火墙(NGFW)作为全面深度防御方法的重要组成部分。本研究深入探讨了传统防火墙的局限性,并探讨了 NGFW 所提供的关键功能。它探讨了应用感知、深度数据包检查和 SSL/TLS 解密等功能如何有助于提高网络基础设施的安全性和弹性。通过深入分析和相关案例研究,本文旨在展示 NGFW 在当今动态网络安全环境中的关键作用。本文强调,企业亟需采用深度防御方法,而 NGFW 则是建立稳健、弹性网络基础设施的基石。通过部署 NGFW 和采用全面的分层安全策略,企业可以显著改善其网络安全态势,并有效保护自己免受不断出现和演变的威胁行为者的攻击。
{"title":"Synergizing next-generation firewalls and defense-in-depth strategies in a dynamic cybersecurity landscape","authors":"Sun Lei","doi":"10.1117/12.3031957","DOIUrl":"https://doi.org/10.1117/12.3031957","url":null,"abstract":"The ever-changing cyber threat landscape, characterized by increasingly sophisticated attacks and evolving malware, demands robust and layered security strategies. Traditional firewalls, while effective as a first line of defense, struggle to keep pace with the complexity of modern threats. This necessitates the adoption of Next-Generation Firewalls (NGFWs) as a vital component of a comprehensive defense-in-depth approach. This research delves into the limitations of traditional firewalls and explores the key capabilities offered by NGFWs. It examines how features like application awareness, deep packet inspection, and SSL/TLS decryption contribute to a more secure and resilient network infrastructure. Through in-depth analysis and relevant case studies, this paper aims to demonstrate the critical role of NGFWs in today's dynamic cybersecurity environment. It emphasizes the critical need for organizations to embrace a defense-in-depth approach, with NGFWs serving as the cornerstone for a robust and resilient network infrastructure. By deploying NGFWs and adopting a comprehensive layered security strategy, organizations can significantly improve their cybersecurity posture and effectively protect themselves against the ever-present and evolving threat actors.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141377491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Physical layer secure transmission method based on MSK modulator structure hopping 基于 MSK 调制器结构跳变的物理层安全传输方法
Pub Date : 2024-06-06 DOI: 10.1117/12.3032071
Xiaoyu Wang, Yawei Yu, Long Yu, Yuanyuan Gao
The increasingly severe situation of information security puts forward higher requirements for wireless communication transmission. Minimum shift keying (MSK) offers outstanding advantages, including the constant signal envelope, the narrow main lobe of the power spectrum, and strong channel adaptability. It can be used to increase the modulation map diversity and achieve the purpose of waveform encryption of the transmit signal. As a result, this paper proposes the MSK modulator structure hopping (MSKMSH) method for physical layer secure transmission. Firstly, a set of MSK modulator structures with a space size of 16 is constructed according to signal waveform characteristics. Secondly, the pattern set generated by the structure hopping law is analyzed to ensure traceless conversion between different MSK modulators. Finally, a data-assisted synchronization scheme utilizing unique characters is designed to synchronize the legitimate destination and the source with structure hopping. Through simulation experiments and theoretical analysis, it is demonstrated that the MSKMSH method can realize reliable and secure transmission of radio signals.
日益严峻的信息安全形势对无线通信传输提出了更高的要求。微移键控(MSK)具有信号包络不变、功率谱主频带窄、信道适应性强等突出优点。它可以用来增加调制图多样性,实现发射信号波形加密的目的。因此,本文提出了用于物理层安全传输的 MSK 调制器结构跳变(MSKMSH)方法。首先,根据信号波形特征构建一组空间大小为 16 的 MSK 调制器结构。其次,分析结构跳变法产生的模式集,以确保不同 MSK 调制器之间的无迹转换。最后,设计了一种利用唯一字符的数据辅助同步方案,通过结构跳变实现合法目的地和源同步。通过仿真实验和理论分析,证明了 MSKMSH 方法可以实现可靠、安全的无线电信号传输。
{"title":"Physical layer secure transmission method based on MSK modulator structure hopping","authors":"Xiaoyu Wang, Yawei Yu, Long Yu, Yuanyuan Gao","doi":"10.1117/12.3032071","DOIUrl":"https://doi.org/10.1117/12.3032071","url":null,"abstract":"The increasingly severe situation of information security puts forward higher requirements for wireless communication transmission. Minimum shift keying (MSK) offers outstanding advantages, including the constant signal envelope, the narrow main lobe of the power spectrum, and strong channel adaptability. It can be used to increase the modulation map diversity and achieve the purpose of waveform encryption of the transmit signal. As a result, this paper proposes the MSK modulator structure hopping (MSKMSH) method for physical layer secure transmission. Firstly, a set of MSK modulator structures with a space size of 16 is constructed according to signal waveform characteristics. Secondly, the pattern set generated by the structure hopping law is analyzed to ensure traceless conversion between different MSK modulators. Finally, a data-assisted synchronization scheme utilizing unique characters is designed to synchronize the legitimate destination and the source with structure hopping. Through simulation experiments and theoretical analysis, it is demonstrated that the MSKMSH method can realize reliable and secure transmission of radio signals.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141381240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Text-based sentiment analysis for evaluating the service provider professionalism (SPP) of macro work on online labor platforms (OLPs) 基于文本的情感分析,评估在线劳务平台(OLP)上宏观工作的服务提供商专业性(SPP)
Pub Date : 2024-06-06 DOI: 10.1117/12.3031905
Hongbin Zhang, Jiajun Xu
Macro work is a significant Online Labor Platforms (OLPs) operation characterized by higher professionalism for service providers. Therefore, the professionalism assessment for providers of macro work is vital for OLPs. However, due to the high ambiguity of textual data, OLPs often overlook them when evaluating the Service Provider Professionalism (SPP) of macro work. Within OLPs, there is a large amount of textual data, which contains information reflecting their professionalism. Hence, this study proposes a method for evaluating the SPP of macro work on OLPs based on text sentiment analysis: (1) Select professional vocabulary related to a specific type of macro work as sentiment words; (2) Collect texts and score their professionalism values; (3) Calculate the sentiment word professionalism value based on the NBSP algorithm - an algorithm that combines the Naive Bayes and Semantic Orientation Pointwise Mutual Information (SO-PMI) algorithms; (4) Calculate the text professionalism value, namely the SPP value. Algorithm validation results show that compared to baseline algorithms, the NBSP algorithm achieves an increase in the accuracy of calculating text professionalism values by 4.45 - 27.75 percent points. To validate this method's effectiveness, this study conducted a comparative experiment on predicting the annual transaction amounts of IT service providers on a certain Chinese OLP under eight main-stream predictive models, incorporating the feature of SPP reduced MSE by 6% - 12%. This study contributes to expanding research in structuring textual data and text sentiment analysis in OLPs and enhances professionalism assessment for service providers of macro work on OLPs.
宏观工作是在线劳务平台(OLP)的一项重要业务,其特点是服务提供者具有更高的专业性。因此,宏观工作提供者的专业性评估对 OLP 至关重要。然而,由于文本数据的模糊性较高,OLP 在评估宏观工作的服务提供者专业性(SPP)时往往会忽略这些数据。在开放式物流公司内部,有大量的文本数据,其中包含反映其专业性的信息。因此,本研究提出了一种基于文本情感分析的 OLP 宏观工作 SPP 评估方法:(1)选择与特定类型宏观工作相关的专业词汇作为情感词;(2)收集文本并对其专业度值进行评分;(3)基于 NBSP 算法计算情感词专业度值--该算法结合了 Naive Bayes 算法和语义定向点式互信息(SO-PMI)算法;(4)计算文本专业度值,即 SPP 值。算法验证结果表明,与基线算法相比,NBSP 算法计算文本专业度值的准确率提高了 4.45 - 27.75 个百分点。为了验证该方法的有效性,本研究在八个主流预测模型下,对某一中国 OLP 上的 IT 服务提供商的年度交易额进行了预测对比实验,结果显示,加入 SPP 特征后,MSE 降低了 6% - 12%。本研究有助于拓展OLP中文本数据结构和文本情感分析的研究,并加强对服务提供商在OLP上宏观工作的专业性评估。
{"title":"Text-based sentiment analysis for evaluating the service provider professionalism (SPP) of macro work on online labor platforms (OLPs)","authors":"Hongbin Zhang, Jiajun Xu","doi":"10.1117/12.3031905","DOIUrl":"https://doi.org/10.1117/12.3031905","url":null,"abstract":"Macro work is a significant Online Labor Platforms (OLPs) operation characterized by higher professionalism for service providers. Therefore, the professionalism assessment for providers of macro work is vital for OLPs. However, due to the high ambiguity of textual data, OLPs often overlook them when evaluating the Service Provider Professionalism (SPP) of macro work. Within OLPs, there is a large amount of textual data, which contains information reflecting their professionalism. Hence, this study proposes a method for evaluating the SPP of macro work on OLPs based on text sentiment analysis: (1) Select professional vocabulary related to a specific type of macro work as sentiment words; (2) Collect texts and score their professionalism values; (3) Calculate the sentiment word professionalism value based on the NBSP algorithm - an algorithm that combines the Naive Bayes and Semantic Orientation Pointwise Mutual Information (SO-PMI) algorithms; (4) Calculate the text professionalism value, namely the SPP value. Algorithm validation results show that compared to baseline algorithms, the NBSP algorithm achieves an increase in the accuracy of calculating text professionalism values by 4.45 - 27.75 percent points. To validate this method's effectiveness, this study conducted a comparative experiment on predicting the annual transaction amounts of IT service providers on a certain Chinese OLP under eight main-stream predictive models, incorporating the feature of SPP reduced MSE by 6% - 12%. This study contributes to expanding research in structuring textual data and text sentiment analysis in OLPs and enhances professionalism assessment for service providers of macro work on OLPs.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141380788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Other Conferences
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1