Some problems involved with passwords and user authentication are discussed. Making poor password choices, which leave them vulnerable to password cracking tools and social engineering, is one common problem. Other pr...
详细信息
Some problems involved with passwords and user authentication are discussed. Making poor password choices, which leave them vulnerable to password cracking tools and social engineering, is one common problem. Other problems include, sharing them with friends and colleagues, writing the information down, using the same password for long periods and using the same password on multiple systems. Other options for user authentication, such as biometrics, are also discussed.
Most existing Distributed Intrusion Detection Systems (DIDS) take a master/slave or principal/subordinate structure, where a master or principal station plays important role in intrusion detection. This paper presents...
详细信息
Most existing Distributed Intrusion Detection Systems (DIDS) take a master/slave or principal/subordinate structure, where a master or principal station plays important role in intrusion detection. This paper presents a framework of Peer-to-Peer Distributed Network Intrusion Detection System (P2P DNIDS) based on the experience gained in a project sponsored by 30th Research Institute of Administration of Information Industry. In a P2P DNIDS all the IDS stations or sub-systems have same detection capability and perform similar functions and in case of single subsystem failure other subsystem can take over its responsibility and makes the whole system more robust and flexible. With the increase in the network truck speed from M bps to G bps, intrusion detection systems have to face the packet leaking problem, in which part of the incoming packets are unchecked and have to let them bypass the detection routine for inadequate checking strategy or processing speed. This paper handles this problem by introducing various techniques and tactics such as load balancing, increasing checking coverage, and better matching algorithms.
Based on Additive-Multiplicative Fuzzy Neural Network (AMFNN), a novel congestion control sch.me for ATM network is presented. This sch.me uses AMFNN to accurately predict the traffic arrival patterns. The predicted t...
详细信息
ISBN:
(纸本)0780378407
Based on Additive-Multiplicative Fuzzy Neural Network (AMFNN), a novel congestion control sch.me for ATM network is presented. This sch.me uses AMFNN to accurately predict the traffic arrival patterns. The predicted traffic with the current queue information of the buffer can be used as a measure of congestion. When the congestion level is reached, a control signal is generated to throttle the input arrival rate. Here, the AMFNN model and its learning algorithm are discussed. The simulation results show that this method can improve the congestion processing capability in real time, and raise the utilization of the network resource at the same time.
By means of block design theory of combinatorial mathematics, a new class of linear block codes called bilateral checking codes is constructed in this paper. Since in this kind of bilateral checking codes not only all...
详细信息
By means of block design theory of combinatorial mathematics, a new class of linear block codes called bilateral checking codes is constructed in this paper. Since in this kind of bilateral checking codes not only all the information bits can be checked by check bits, but also the check bits can be examined by information bits, the error correcting capabilities can thus be effectively enhanced.
Frequent itemsets mining plays an essential role in data mining. In this paper, a new algorithm PFP-growth (Parallel FP-growth), which is based on the improved FP-growth, is proposed for parallel frequent itemset mini...
详细信息
Frequent itemsets mining plays an essential role in data mining. In this paper, a new algorithm PFP-growth (Parallel FP-growth), which is based on the improved FP-growth, is proposed for parallel frequent itemset mining. The new algorithm distributes the task fairly among the parallel processors. We devise partitioning strategies at different stages of the mining process to achieve balance between processors and adopt some data structure to reduce the information transportation between processors. The experiments on national high performance parallel comp.ter show that the PFP-growth is an efficient parallel algorithm for mining frequent itemset.
The comp.ter networks design is a nonlinear combinatorial optimization problem with constraint set identical to that of the multiple choice multiconstrainted knapsack problem,which is known to be NP-comp.ete. This pap...
详细信息
ISBN:
(纸本)0780378407
The comp.ter networks design is a nonlinear combinatorial optimization problem with constraint set identical to that of the multiple choice multiconstrainted knapsack problem,which is known to be NP-comp.ete. This paper presents a new approach in which a Multi-Criterion satisfactory optimization is used in the comp.ter networks design. The optimal comp.ting model is proposed. The satisfactory rate function of the criteria, which represents the importance of performance specification,and the synthesis satisfactory rate function representing the optimization are designed. An improved genetic algorithm is used for optimization comp.ting. comp.tational experience shows that this method is efficient and effective.
The merging trend of three separate networks, i.e. telephone, cable TV and comp.ter networks, demands underlying commun.cation systems to provide a mechanism to transmit and switch bit streams at very high speed, and ...
详细信息
ISBN:
(纸本)0780378407
The merging trend of three separate networks, i.e. telephone, cable TV and comp.ter networks, demands underlying commun.cation systems to provide a mechanism to transmit and switch bit streams at very high speed, and to satisfy different users' QoS requirements. DWDM, with its transmission rate at tens of tera bits per second in a single fiber, becomes the most promising candidate for such convergence. However, switching techniques in DWDM have not yet fledged for such a merged high-speed network. This paper presents a novel concept called the Physical Frame Time-slot Switching (PFTS). With PFTS, transmission time of a fixed-length physical frame is defined as a "time-slot", and used for multiplexing a single lambda channel and for user data switching over a DWDM platform. A maximum length of Ethernet MAC frame is exactly fitted into a PFT (Physical Frame Time-slot), and one or more PFT(s) can be assigned to a time-critical user data stream according to required QoS parameters, such as throughput and time delay. PFT switching operates in an asynchronous mode on the basis of single PFT in a lambda;and hence eliminates the need of lambda switching and global synchronization among clocks in a network. In an "out-band signaling" network, PFTS enables user data transfer platform to be reduced to a single physical layer.
In this paper, the construction of quadriphase sequences and sequence pairs with purely imaginary odd-periodic correlation sidelobes is discussed and a new binary odd-periodic comp.ementary sequence set is constructed...
详细信息
In this paper, the construction of quadriphase sequences and sequence pairs with purely imaginary odd-periodic correlation sidelobes is discussed and a new binary odd-periodic comp.ementary sequence set is constructed from odd-perfect almost binary sequences.
A parallel unconditionally stable solver for three-dimensional convection-diffusion equations is proposed by applying the upwind Crank-Nicolson difference sch.mes combined with alternating bar parallelization. This so...
详细信息
A parallel unconditionally stable solver for three-dimensional convection-diffusion equations is proposed by applying the upwind Crank-Nicolson difference sch.mes combined with alternating bar parallelization. This solver can be applied numerically to any variation of convection-diffusion equations with Dirichlet boundary conditions. Making use of a fractional step iteration technique for linear systems, this approach yields good runtime performance. To validate the accuracy and efficiency of the method, sample experiments are done on a software tool, Codie4D, which was implemented using the MPICH library.
In this paper we propose a CAM architecture and its corresponding reasoning algorithm, which is novel in three aspects comp.red with the conventional CAM structure requiring a considerable number of logic circuits for...
详细信息
In this paper we propose a CAM architecture and its corresponding reasoning algorithm, which is novel in three aspects comp.red with the conventional CAM structure requiring a considerable number of logic circuits for matching within its individual cells and in its peripherals. The architecture design issues and its corresponding reasoning algorithm have been discussed. In our opinion, this new associative memory presents one with a broad range of trade-offs based on cost requirements, speed requirements, and storage and logic technology parameters.
暂无评论