Enterprise collaborative systems often focus on building useful connections among people, tools, and information, access control is particularly important in the environment. This paper is concerned with enterprise ac...
详细信息
How to distinguish abnormal access from normal ones is the key problem in Distribution Denial of service(DDoS) attack detection. This research aims at finding out the major difference between the abnormal access and t...
详细信息
Database audit can strengthen the security of database. Logging database activities is usually the first step of implementing database audit. In this paper, we present a logging scheme for database audit. Unlike nativ...
详细信息
Database audit can strengthen the security of database. Logging database activities is usually the first step of implementing database audit. In this paper, we present a logging scheme for database audit. Unlike native database logging and auditing mechanism, our scheme is to monitor and log database activities through analyzing network traffic. The architecture of our scheme contains three principal components: packets capturing, packets parsing and data storage. First capture the packets to and from the database; then, by analyzing database communication protocols, parse the captured packets; finally, use the parsed results to support database audit.
Database auditing can help strengthen the security of database. In this paper, we present a framework of database auditing, which log the database activities through analyzing network traffic, execute audit analysis t...
详细信息
ISBN:
(纸本)9781424452446
Database auditing can help strengthen the security of database. In this paper, we present a framework of database auditing, which log the database activities through analyzing network traffic, execute audit analysis through event correlation and generate alarms if an anomaly or a violation of security regulations is detected. Compared with native auditing mechanism in database, our approach has an obvious advantage of providing zero-impact to the performance of the database or the applications that access it. In addition, using third-party auditing component complies with the principle of separation of duties.
It is important to construct more efficient index used for query over encrypted character strings in database. A few of approaches to deal with such issues have been worked out. In this paper, an bloom filter based in...
详细信息
It is important to construct more efficient index used for query over encrypted character strings in database. A few of approaches to deal with such issues have been worked out. In this paper, an bloom filter based index to support fuzzy query over encrypted character data is proposed on the principle of two-phase query. Firstly a triple is used to express a character string, then we use bloom filter compression algorithm on this triple to build encoded index, which will be saved in database as a numeric data. Optimal parameters are selected with the tradeoff between security and efficiency. In this way, the scheme minimizes not-match records by simple bit-and operation on the numeric index. Finally the improved query performance is proofed by experiment result.
To overcome the drawback that switched Ethernet does not guarantee the timely delivery of real-time messages in industrial communication, an improved FTT (flexible time-triggered communication) paradigm was proposed f...
详细信息
ISBN:
(纸本)9781424447374;9781424447541
To overcome the drawback that switched Ethernet does not guarantee the timely delivery of real-time messages in industrial communication, an improved FTT (flexible time-triggered communication) paradigm was proposed for hard real-time communications of periodic messages on switched Ethernet. In addition, an optimization condition for feasibility check of periodic messages was given. Particularly, we proposed an EDF-based algorithm to schedule periodic messages to be transmitted within their deadlines over COTS switched Ethernet running in the cut-through mode. Simulation results showed the advantages of the proposed real-time scheduling algorithm in terms of using the aggregated switch throughput.
The increase of the business and management complexity requires more adaptive and higher selfmanaged equipments, application processes and management systems, which promotes the development of autonomic computing and ...
详细信息
ISBN:
(纸本)9781615676606
The increase of the business and management complexity requires more adaptive and higher selfmanaged equipments, application processes and management systems, which promotes the development of autonomic computing and communication networks. The meteorological and hydrological business system (MHBS) is a typical composite functional system, which includes data collecting, transporting, convergence and clean up, distributing and publishing, pre-processing, storage, and weather forecasting. In order to realize self-management of MHBS, autonomic concept is introduced and autonomic network management architecture with associated model is proposed firstly. According to the measured data from observation and / or detection devices, the system may perceive the work situations of these devices by means of prediction models. Driven by a set of system management polices, some well-defined events can be processed, which enable generating configuration and adjustment suggestions automatically. The instances of policy-driven data communication management with multiple channels are given literally to show the model's mechanisms.
Existing techniques based on behavior semantics for information theft malware detection have the main shortcomings of low path coverage and disability of finding hidden malicious behaviors. In this paper we propose a ...
详细信息
This paper presents a new mesh simplification algorithm based on edge collapse, it combines surface curvature and quadric error metric, the position of a new vertex for edge collapse depends on multiple-weighted appro...
详细信息
Since most of current intrusion detection systems (IDS) only use one of the two detection methods, misused detection or anomaly detection, both of them have their own limitations. In this paper, the technique that com...
详细信息
Since most of current intrusion detection systems (IDS) only use one of the two detection methods, misused detection or anomaly detection, both of them have their own limitations. In this paper, the technique that combines misuse detection system with anomaly detection system (ADS) is used. The hybrid intrusion detection system (HIDS) contains three sub-modules, misused detection module, anomaly detection module and signature generation module. The basis of misused detection module is snort. Anomaly detection module is constructed by using frequent episode rule. And signature generation module is based on a variant of Apriori algorithm. Misused detection module uses the signature of attacks to detection the known attacks. Anomaly detection module can detect the unknown attacks and signature generation module extracts the signature of attacks that are detected by ADS module, and maps the signatures into snort rules.
暂无评论