Given the challenges facing the cyberspace of the nation, this paper presents the tripartite theory of cyberspace, based on the status quo of cyberspace. Corresponding strategies and a research architecture are propos...
详细信息
Given the challenges facing the cyberspace of the nation, this paper presents the tripartite theory of cyberspace, based on the status quo of cyberspace. Corresponding strategies and a research architecture are proposed for common public networks (C space), secure classified networks (S space), and key infras- tructure networks (K space), based on their individual characteristics. The features and security require- ments of these networks are then discussed. Taking C space as an example, we introduce the SMCRC (which stands for "situation awareness, monitoring and management, cooperative defense, response and recovery, and countermeasures and traceback") loop for constructing a cyberspace security ecosys- tem. Following a discussion on its characteristics and information exchange, our analysis focuses on the critical technologies of the SMCRC loop. To obtain more insight into national cyberspace security, special attention should be paid to global sensing and precise mapping, continuous detection and active manage- ment, cross-domain cooperation and systematic defense, autonomous response and rapid processing, and accurate traceback and countermeasure deterrence.
This paper mainly studies an attack effectiveness evaluation method for AD hoc networks based on rough set theory. Firstly, we use OPNET to build AD hoc network simulation scenario, design and develop attack module, a...
详细信息
With the strong development momentum of the Internet, network not only brings convenience to our life, but also poses threats to our network security. Users can hide their IP and identity information through encryptio...
详细信息
In order to calculate the packet loss rate in OBS network, this paper proposes a method, which performs good in both accuracy and rapidity, based on Erlang B formula to estimate the packet loss probability in OBS netw...
详细信息
A method of time difference of arrival (TDOA) location for shortwave signal source by four receiving stations is introduced. The precision of time difference and the Geometric Dilution of Precision (GDOP) of TDOA loca...
详细信息
Chaos characteristic analysis of the phase-locked loop (PLL) synthesizer has been made in this paper based on the phase model of it, and we conclude the state equation of this model and the condition when the system b...
详细信息
Based on stochastic geometry, this paper proposes a mathematical method to estimate the traffic in a D2D based cellular network. The purpose is to determine the normal flow of network to exclude heterogeneous Darknet ...
详细信息
Role identification for network user plays a very important role in function and behaviour network analysis against criminal groups. Therefore, a network key role identification algorithm based on behaviour accumulati...
详细信息
ISBN:
(纸本)9781849198455
Role identification for network user plays a very important role in function and behaviour network analysis against criminal groups. Therefore, a network key role identification algorithm based on behaviour accumulation is proposed in the paper. Firstly, behaviour attribution of node (user) in network instance is extracted in the algorithm, description and abstraction of user behaviour by vector mode is performed, simultaneously, K mean algorithm is adopted to make clustering analysis for user behaviour;on the basis of conditions described as above, Hybrid Ant-Colony Algorithm (HBACA) is modified to search relationships between variety of grouping sets in the network instance, and identify each user role in the performing process of network instance. Simulation result shows that the algorithm can extract internal relations of communication behaviours between each network member, in order to obtain key role in a specific network instance.
The explosive growth of network traffic and the limited storage node resources make the existing network architecture bear great pressure, and network congestion appears in work and life from time to time. In order to...
详细信息
Passive location system that locates 'silent' targets using an non-cooperative opportunistic source (also called external illuminator) is great importance in a variety of applications. To solve the problem of ...
详细信息
暂无评论