Mimic defense techniques can solve unknown vulnerabilities as well as backdoors without prior knowledge based on dHr structure. Compared with traditional defense methods, dHr structure brings dynamic and heterogeneous...
详细信息
ISBN:
(纸本)9781538683408
Mimic defense techniques can solve unknown vulnerabilities as well as backdoors without prior knowledge based on dHr structure. Compared with traditional defense methods, dHr structure brings dynamic and heterogeneous factors into systems to enhance security. In this paper, we discuss the security-critical scheduling problem in dHr-based processing system and propose MHF algorithm according to the characters of heterogeneous processing nodes with different performance. While ensuring task schedulability, MHF algorithm improves the average heterogeneity of processing nodes as high as possible when allocating redundant versions of a task. Simulation results show that the average heterogeneity of MHF algorithm is 22.7% higher than that of rF algorithm when tasks' guarantee ratio approaches 100%.
For preventing the leakage of confidential messages sent to a marcocell user in dense heterogeneous networks, a physical layer security scheme based on base station cooperation is proposed in the paper. To improve tra...
详细信息
Studying and constructing the intelligent decision-making model for simulation entity can effectively improve the credibility and immersion of wargaming, in which intelligent evaluation of decision scheme is the key m...
Studying and constructing the intelligent decision-making model for simulation entity can effectively improve the credibility and immersion of wargaming, in which intelligent evaluation of decision scheme is the key module. To lower the reasoning complexity and shorten the decision time, an intelligent evaluation model based on Stacked Auto-Encoder (SAE) is proposed, which simulates the reasoning mode of human decision-making, and learns commander's knowledge and experience through unsupervised and supervised training. Then, to improve the robustness and generalization ability of the deep learning model, a de-noising training method and sparsity constraints are introduced. Finally, simulation experiment is carried out to verify the scientificity and effectiveness of the proposed model.
routing optimization has been discussed in network design for a long time. In recent years, new methods of routing strategy based on reinforcement Learning are being considered. In this paper, we propose a reinforceme...
详细信息
ISBN:
(纸本)9781538683408
routing optimization has been discussed in network design for a long time. In recent years, new methods of routing strategy based on reinforcement Learning are being considered. In this paper, we propose a reinforcement learning based smart agent that can optimize routing strategy without human experience. Our proposed scheme is based on the collection of the traffic intensity in switches and the usage of a recurrent Neural Network baseddeep reinforcement learning model to train the agent. Simulation result shows that the proposed scheme can adjust the routing strategy dynamically according to the network condition and outperforms the traditional shortest path routing after trained.
Towards line speed and accurateness on-line content popularity monitoring on Content Centric Networking(CCN) routers, we propose a three-stage scheme based on Bloom filters and hash tables fordifferentiated traffic. ...
详细信息
Towards line speed and accurateness on-line content popularity monitoring on Content Centric Networking(CCN) routers, we propose a three-stage scheme based on Bloom filters and hash tables fordifferentiated traffic. At the first stage, we decide whether to deliver the content to the next stage depending on traffic types. The second stage consisting of Standard Bloom filters(SBF) and Counting Bloom filters(CBF) identifies the popular content. Meanwhile, a scalable sliding time window based monitoring scheme fordifferent traffic types is proposed to implement frequent andreal-time updates by the change of popularities. Hash tables according with sliding window are used to record the popularity at the third stage. Simulation results reveal that this methodreaches a 40 Gbps processing speed at lower error probability with less memory, and it is more sensitive to the change of popularity. Additionally, the architecture which can be implemented in CCN router is flexible and scalable.
router security defense technologies emerging in recent years could hardly detect and block the new booming threats with unknown signatures such as hardware Trojan, zero-day attacks, etc. We present a novel routerdef...
详细信息
router security defense technologies emerging in recent years could hardly detect and block the new booming threats with unknown signatures such as hardware Trojan, zero-day attacks, etc. We present a novel routerdefense technology, distributedrouter shadow, which builds a closed execution environment to deceive attacks entering into the router, thereby misleading the attackers into regarding it as the real attack target and executing the suspicious code to maximize the chances of detonating the system exploit; thus the original router is prevented from attacking and the suspicious code can be detected. Our experiment and analysis show that the router shadow can defend not only attacks with signature but also some new attacks without signature.
As critical components in SdN,controllers are prone to suffer from a series of potential attacks which result in system *** prevent the compromise caused by single failure of controller or flow-tampering attacks,Mcad-...
详细信息
As critical components in SdN,controllers are prone to suffer from a series of potential attacks which result in system *** prevent the compromise caused by single failure of controller or flow-tampering attacks,Mcad-SA,an aware decision-making security architecture with multiple controllers was proposed,which coordinates heterogeneous controllers internally as an"associated"*** architecture extends existing control plane and takes advantage of various controllers’merits to improve the difficulty and cost of probes and attacks from *** this framework,flow rules distributed to switches are no longerrelying on a single controller but according to the vote results from the majority of controllers,which significantly enhances the reliability of flow *** to the vote process of flow rules,segmentation and grading is adopted to pick up the most trustful one from multiple flow rules and implement flow *** mechanism avoids comparison between rules via bit by bit which is impractical among several *** analysis and simulation results demonstrates the effectiveness,availability andresilience of the proposed methods and their better security gain over general SdN architectures.
Aiming at the problem of failure recovery in current networks,a fast failure recovery method based on equivalent cooperative routing is ***,the transmission path between the source anddestination nodes is divided int...
详细信息
Aiming at the problem of failure recovery in current networks,a fast failure recovery method based on equivalent cooperative routing is ***,the transmission path between the source anddestination nodes is divided into several non-overlapping path ***,backup paths are deployed for each link in the path segment through segmentedrouting technology,which ensures fast routing recovery after ***,in order to avoiddamaging the QoS of the data stream through the failure recovery process,the transmission is guaranteed by the intersegment QoS *** experimental results show that the proposed method has a low failure recovery delay under a relatively small flow table cost.
This paperdeals with modulation classification under the alpha-stable noise condition. Our goal is to discriminate orthogonal frequency division multiplexing (OFdM) modulation type from single carrier lineardigital ...
详细信息
This paperdeals with modulation classification under the alpha-stable noise condition. Our goal is to discriminate orthogonal frequency division multiplexing (OFdM) modulation type from single carrier lineardigital (SCLd) modulations in this scenario. Based on the new results concerning the generalized cyclostationarity of these signals in alpha-stable noise which are presented in this paper, we construct new modulation classification features without any priori information of carrier frequency and timing offset of the received signals, and use support vector machine (SVM) as classifier to discriminate OFdM from SCLd. Simulation results show that the recognition accuracy of the proposed algorithm can be up to 95% when the mix signal to noise ratio (MSNr) is up to ?1 dB.
A theoretical model for array patterns of variable inclination continuous transverse stub(VICTS) antenna is proposed. The theoretical model is utilized to reveal the nonlinearrelationship in beam scanning between the...
详细信息
A theoretical model for array patterns of variable inclination continuous transverse stub(VICTS) antenna is proposed. The theoretical model is utilized to reveal the nonlinearrelationship in beam scanning between the angular position of beam and the rotation angle of the radiation layer. A dynamic coordination system is used to simplify the theoretical model andreduce errors. Based on the dynamic coordination system, array pattern of VICTS antenna with arbitrary amplitude distribution and arbitrary aperture shape can be calculated by the theoretical model. Both the full-wave simulations and computation of the theoretical model are carried out. The calculation errors of the angular position of beam between the proposed method and the full-wave simulation are less than 1°. By using the proposed method, the problem of nonlinear anddynamic beam steering in the VICTS antenna servo control system can be solved.
暂无评论