Network security situation awareness provides the unique high level security view based upon the security alert events. But the complexities and diversities of security alert data on modern networks make such analysis...
详细信息
Network security situation awareness provides the unique high level security view based upon the security alert events. But the complexities and diversities of security alert data on modern networks make such analysis extremely difficult. In this paper,we analyze the existing problems of network security situation awareness system and propose a framework for network security situation awareness based on knowledge discovery. The framework consists of the modeling of network security situation and the generation of network security situation. The purpose of modeling is to construct the formal model of network security situation measurement based upon the D-S evidence theory,and support the general process of fusing and analyzing security alert events collected from security situation sensors. The generation of network security situation is to extract the frequent patterns and sequential patterns from the dataset of network security situation based upon knowledge discovery method and transform these patterns to the correlation rules of network security situation,and finally to automatically generate the network security situation graph. Application of the integrated Network Security Situation Awareness system (Net-SSA) shows that the proposed framework supports for the accurate modeling and effective generation of network security situation.
This paper focuses on X-Y type in-circuit testers, which has two flying probes. The problem of finding the ordering of inspection points that minimizes the total time of inspection is an expansion of the travelling sa...
详细信息
ISBN:
(纸本)9781424476428
This paper focuses on X-Y type in-circuit testers, which has two flying probes. The problem of finding the ordering of inspection points that minimizes the total time of inspection is an expansion of the travelling salesman problem (TSP). We formulate the problem of finding the minimum traveling cost of flying probes as the 0-1 integer programming, and an algorithm to solve this problem is proposed. Experimental results show the effectiveness of the method.
The aim of this review is to study the methods of steganography using the video file as a cover carrier. The steganography is the art of protecting the information through embedding data in medium carrier, for instant...
详细信息
Resource hiding is commonly used by stealth malware to evade detection by anti-malware scanners. In this paper, we present the design, implementation, and evaluation of Libra, a new VM-based anti-stealth-malware appro...
详细信息
Resource hiding is commonly used by stealth malware to evade detection by anti-malware scanners. In this paper, we present the design, implementation, and evaluation of Libra, a new VM-based anti-stealth-malware approach. By introducing the novel local-booting technology of our previous work called Secure Virtual Execution Environment, Libra VM just boots from the underlying host OS but not a newly installed OS image. Consequently, Libra accurately reproduces the software environment of the underlying preinstalled OS within the Libra VM. In addition, with proposing a set of unique techniques to implicitly construct the trusted OS-level semantic view of resource from within the virtualized hardware layer, Libra is decoupled with the guest information which is subvertable to the privileged guest malware. Thus, Libra provides a promising way to detect the existing stealth malware in the host OS. We have implemented a prototype of Libra on Windows platforms and our evaluation results with real-world rootkits demonstrate the practicality and effectiveness of our approach.
Palacios is a new open-source VMM under development at Northwestern University and the University of New Mexico that enables applications executing in a virtualized environment to achieve scalable high performance on ...
详细信息
Palacios is a new open-source VMM under development at Northwestern University and the University of New Mexico that enables applications executing in a virtualized environment to achieve scalable high performance on large machines. Palacios functions as a modularized extension to Kitten, a high performance operating system being developed at Sandia National Laboratories to support large-scale supercomputing applications. Together, Palacios and Kitten provide a thin layer over the hardware to support full-featured virtualized environments alongside Kitten's lightweight native environment. Palacios supports existing, unmodified applications and operating systems by using the hardware virtualization technologies in recent AMD and Intel processors. Additionally, Palacios leverages Kitten's simple memory management scheme to enable low-overhead pass-through of native devices to a virtualized environment. We describe the design, implementation, and integration of Palacios and Kitten. Our benchmarks show that Palacios provides near native (within 5%), scalable performance for virtualized environments running important parallel applications. This new architecture provides an incremental path for applications to use supercomputers, running specialized lightweight host operating systems, that is not significantly performance-compromised.
This paper is concerned with a simultaneous design problems of structural and reduced-order H ∞ control systems. The purpose of this paper is to propose an iterative approach to the simultaneous design problem, whic...
详细信息
ISBN:
(纸本)9781424476428
This paper is concerned with a simultaneous design problems of structural and reduced-order H ∞ control systems. The purpose of this paper is to propose an iterative approach to the simultaneous design problem, which constructs a sequence of infeasible controller variables The feature of our approach is that it is easy to choose an initial point which is needed to carry out the iterative approach. The efficiency of our approach is shown by a numerical example.
This paper proposes validated control system design method based on verified numerical computation. The proposed method designs a controller and validates it using verified numerical computation. We also propose a met...
详细信息
ISBN:
(纸本)9781424476428
This paper proposes validated control system design method based on verified numerical computation. The proposed method designs a controller and validates it using verified numerical computation. We also propose a method to find the numerically most design-specification satisfied controller quickly by using multiple-precision arithmetic. And, this paper applies a proposed method to pole assignment problem.
Malicious attackers intended to annihilate the availability of network server with threats such as Transmission Control Protocol (TCP) Synchronized (SYN) Flood. The attackers usually make the server exhausted and unav...
详细信息
Speech recorded in real environments by distant microphones is degraded by factor like reverberation. This degradation strongly affects the performance of the speaker identification system. Three compensation approach...
详细信息
Speech recorded in real environments by distant microphones is degraded by factor like reverberation. This degradation strongly affects the performance of the speaker identification system. Three compensation approaches are investigated to improve the robustness of speaker identification in such scenarios. The first approach applies spectral subtraction before feature extraction in order to reduce the late reverberation effect. The second approach makes use of feature warping as robust features of distant speaker identification under mismatched training-testing conditions. The third approach presents a novel GMM parameters initialization method: combination division and k-means clustering. The experiment results show that the compensated system as compared with baseline system, the channel average identification rate has an increase of 11.4%, 15.4%, 17%, 17.8% on TIMIT database and 6.82%, 6.36%, 9.34%, 14% on JNAS database.
Voice over Internet Protocol (VoIP) is one of the emerging technologies today. This application offers the user a service by which one can call another person at a low cost as compare with traditional phone services. ...
详细信息
ISBN:
(纸本)9781424469925;9780769540436
Voice over Internet Protocol (VoIP) is one of the emerging technologies today. This application offers the user a service by which one can call another person at a low cost as compare with traditional phone services. One drawback to the Internet is spam, which are unsolicited or unwanted objects which often appear as unwanted messages in various email applications. For VoIP, spam refers to unsolicited and unwanted calls by the VoIP user. In this paper, we have purposed a solution to prevent the spam in VoIP. The CAPTCHA (Completely Automated Public Turing Test to Tell computers and Human Apart) method aims to determine whether the call is coming from a human or a machine. The key contribution of this paper is a proof-of-concept implementation of a CAPTCHA mechanism to prevent VoIP Spam.
暂无评论