The security performance of cloud services is a key factor influencing users’selection of Cloud Service Providers(CSPs).Continuous monitoring of the security status of cloud services is ***,existing research lacks a ...
详细信息
The security performance of cloud services is a key factor influencing users’selection of Cloud Service Providers(CSPs).Continuous monitoring of the security status of cloud services is ***,existing research lacks a practical framework for such ongoing *** address this gap,this paper proposes the first NonCollaborative Container-Based Cloud Service Operation State Continuous Monitoring Framework(NCCMF),based on relevant *** operates without the CSP’s collaboration by:1)establishing a scalable supervisory index system through the identification of security responsibilities for each role,and 2)designing a Continuous Metrics Supervision Protocol(CMA)to automate the negotiation of supervisory *** framework also outlines the supervision process for cloud services across different deployment *** results demonstrate that NCCMF effectively monitors the operational state of two real-world IoT(Internet of Things)cloud services,with an average supervision error of less than 15%.
RESTful API fuzzing is a promising method for automated vulnerability detection in Kubernetes *** tools struggle with generating lengthy,high-semantic request sequences that can pass Kubernetes API gateway *** address...
详细信息
RESTful API fuzzing is a promising method for automated vulnerability detection in Kubernetes *** tools struggle with generating lengthy,high-semantic request sequences that can pass Kubernetes API gateway *** address this,we propose KubeFuzzer,a black-box fuzzing tool designed for Kubernetes RESTful *** utilizes Natural Language Processing(NLP)to extract and integrate semantic information from API specifications and response messages,guiding the generation of more effective request *** evaluation of KubeFuzzer on various Kubernetes clusters shows that it improves code coverage by 7.86%to 36.34%,increases the successful response rate by 6.7%to 83.33%,and detects 16.7%to 133.3%more bugs compared to three leading *** identified over 1000 service crashes,which were narrowed down to 7 unique *** tested these bugs on 10 real-world Kubernetes projects,including major providers like AWS(EKS),Microsoft Azure(AKS),and Alibaba Cloud(ACK),and confirmed that these issues could trigger service *** have reported and confirmed these bugs with the Kubernetes community,and they have been addressed.
Considering the stealthiness and persistence of Advanced Persistent Threats(APTs),system audit logs are leveraged in recent studies to construct system entity interaction provenance graphs to unveil threats in a ***-b...
详细信息
Considering the stealthiness and persistence of Advanced Persistent Threats(APTs),system audit logs are leveraged in recent studies to construct system entity interaction provenance graphs to unveil threats in a ***-based provenance graph APT detection approaches require elaborate rules and cannot detect unknown attacks,and existing learning-based approaches are limited by the lack of available APT attack samples or generally only perform graph-level anomaly detection,which requires lots of manual efforts to locate attack *** paper proposes an APT-exploited process detection approach called ThreatSniffer,which constructs the benign provenance graph from attack-free audit logs,fits normal system entity interactions and then detects APT-exploited processes by predicting the rationality of entity ***,ThreatSniffer understands system entities in terms of their file paths,interaction sequences,and the number distribution of interaction types and uses the multi-head self-attention mechanism to fuse these ***,based on the insight that APT-exploited processes interact with system entities they should not invoke,ThreatSniffer performs negative sampling on the benign provenance graph to generate non-existent edges,thus characterizing irrational entity interactions without requiring APT attack *** last,it employs a heterogeneous graph neural network as the interaction prediction model to aggregate the contextual information of entity interactions,and locate processes exploited by attackers,thereby achieving fine-grained APT *** results demonstrate that anomaly-based detection enables ThreatSniffer to identify all attack *** to the node-level APT detection method APT-KGL,ThreatSniffer achieves a 6.1%precision improvement because of its comprehensive understanding of entity semantics.
With the development of cloud computing and the digital transformation of the medical industry, the application scenarios and effects of smart healthcare are constantly expanding and improving. Smart healthcare plays ...
详细信息
In this paper, an uncertain nonlinear switched system with V-n jumps, characterized by its sensitivity to subjective uncertainties, is modeled using uncertain differential equations with V-n jumps. To account for the ...
详细信息
Triangular meshes provide an efficient representation of 3D shapes. Various applications such as 3D simulation suffer from degradation in geometric quality. This paper proposes a novel Multi-stream Structure-Enhanced ...
详细信息
Shui manuscripts are part of the national intangible cultural heritage of China. Owing to the particularity of text reading, the level of informatization and intelligence in the protection of Shui manuscript culture i...
详细信息
Shui manuscripts are part of the national intangible cultural heritage of China. Owing to the particularity of text reading, the level of informatization and intelligence in the protection of Shui manuscript culture is not adequate. To address this issue, this study created Shuishu_C, the largest image dataset of Shui manuscript characters that has been reported. Furthermore, after extensive experimental validation, we proposed ShuiNet-A,a lightweight artificial neural network model based on the attention mechanism, which combines channel and spatial dimensions to extract key features and finally recognize Shui manuscript characters. The effectiveness and stability of ShuiNet-A were verified through multiple sets of experiments. Our results showed that, on the Shui manuscript dataset with 113 categories, the accuracy of ShuiN et-A was 99.8%, which is 1.5% higher than those of similar studies. The proposed model could contribute to the classification accuracy and protection of ancient Shui manuscript characters.
Remote sensing image scene classification and remote sensing technology applications are hot research *** CNN-based models have reached high average accuracy,some classes are still misclassified,such as“freeway,”“s...
详细信息
Remote sensing image scene classification and remote sensing technology applications are hot research *** CNN-based models have reached high average accuracy,some classes are still misclassified,such as“freeway,”“spare residential,”and“commercial_area.”These classes contain typical decisive features,spatial-relation features,and mixed decisive and spatial-relation features,which limit high-quality image scene *** address this issue,this paper proposes a Grad-CAM and capsule network hybrid method for image scene *** Grad-CAM and capsule network structures have the potential to recognize decisive features and spatial-relation features,*** using a pre-trained model,hybrid structure,and structure adjustment,the proposed model can recognize both decisive and spatial-relation features.A group of experiments is designed on three popular data sets with increasing classification *** the most advanced experiment,92.67%average accuracy is ***,83%,75%,and 86%accuracies are obtained in the classes of“church,”“palace,”and“commercial_area,”*** research demonstrates that the hybrid structure can effectively improve performance by considering both decisive and spatial-relation ***,Grad-CAM-CapsNet is a promising and powerful structure for image scene classification.
Federated Learning (FL) is a decentralized learning framework that facilitates learning from large-scale datasets while keeping raw data locally. It dismantles data silos and addresses privacy concerns tied to direct ...
详细信息
This presents a significant challenge for detecting and combating malicious software. Users often grant software permissions unknowingly, exposing their devices to risks such as unauthorized access, file manipulation,...
This presents a significant challenge for detecting and combating malicious software. Users often grant software permissions unknowingly, exposing their devices to risks such as unauthorized access, file manipulation, and malware propagation. Traditional detection algorithms relying on limited permission-based strategies fall short in addressing this issue. To overcome this, we propose PVitNet (Network based On Pyramid Feature processing and Vision Transformer), an Android malware detection method. PVitNet incorporates pyramid feature processing, attention mechanisms, and an automatic feature extraction tool. By leveraging semantic information from feature pyramid models and learning shared characteristics among similar software, we successfully identify Android malware families. Our experiments on the CICMalDroid 2020 dataset demonstrate the effectiveness of our approach, with a 14.96% increase in accuracy and an F1 score of 98.31%.
暂无评论