Cyber defenses based on heterogeneous redundant techniques have been proposed as a way to make systems more resistant to attacks. These defense approaches depend on the heterogeneous resources within the system in ord...
ISBN:
(数字)9781538682463
ISBN:
(纸本)9781538682470
Cyber defenses based on heterogeneous redundant techniques have been proposed as a way to make systems more resistant to attacks. These defense approaches depend on the heterogeneous resources within the system in order to make attacks more complicated. However, little work has been done on evaluating or measuring heterogeneity among systems. In this work, we first build the attack surface model of information system with dissimilar redundant architecture. The attack surface model helps us identify the special system resources applied to the attack instances on a tested. Based on the analysis results, we get the attack surface resources of instance object. For the sake of increasing the system security, we construct the more heterogeneous executive entities by the attack surface resources. When we evaluate the heterogeneity among them, we conclude that the attack surface model administers to improve system security and its security increases as the heterogeneity of its executive entities becomes larger.
Dear editor,We present a new algorithm to search for effective disturbance vectors with a complexity of 2;based on the following two properties of disturbance *** property is the weight correlation between the first 1...
详细信息
Dear editor,We present a new algorithm to search for effective disturbance vectors with a complexity of 2;based on the following two properties of disturbance *** property is the weight correlation between the first 16-step disturbance vectors and the60-step disturbance *** other property requires all the differences of the active bit positions of the first 16-step disturbance vectors to be
We introduce the concept of a socio-rational secret sharing scheme, in which shares are delivered based on players' reputation and the way they contact with other participants. At the secret sharing stage, weights...
详细信息
Although many classical IP geolocation algorithms are suitable to rich-connected networks, their performances are seriously affected in poor-connected networks with weak delay-distance correlation. This paper tries to...
详细信息
Although many classical IP geolocation algorithms are suitable to rich-connected networks, their performances are seriously affected in poor-connected networks with weak delay-distance correlation. This paper tries to improve the performances of classical IP geolocation algorithms by finding rich-connected sub-networks inside poor-connected networks. First, a new delay-distance correlation model (RTD-Corr model) is proposed. It builds the relationship between delay-distance correlation and actual network factors such as the tortuosity of the network path and the ratio of propagation delay. Second, based on the RTD-Corr model and actual network characteristics, this paper discusses about how to find rich-connected networks inside China Intemet which is a typical actual poor-connected network. Then we find rich-connected sub-networks of China Intemet through a large-scale network measurement which covers three major ISPs and thirty provinces. At last, based on the founded rich-connected sub-networks, we modify two classical IP geolocation algorithms and the experiments in China Intemet show that their accuracy is significantly increased.
Light field cameras are considered to have many potential applications since angular and spatial information is captured simultaneously. However, the limited spatial resolution has brought lots of difficulties in deve...
Light field cameras are considered to have many potential applications since angular and spatial information is captured simultaneously. However, the limited spatial resolution has brought lots of difficulties in developing related applications and becomes the main bottleneck of light field cameras. In this paper, a learning-based method using residual convolutional networks is proposed to reconstruct light fields with higher spatial resolution. The view images in one light field are first grouped into different image stacks with consistent sub-pixel offsets and fed into different network branches to implicitly learn inherent corresponding relations. The residual information in different spatial directions is then calculated from each branch and further integrated to supplement high-frequency details for the view image. Finally, a flexible solution is proposed to super-resolve entire light field images with various angular resolutions. Experimental results on synthetic and real-world datasets demonstrate that the proposed method outperforms other state-of-the-art methods by a large margin in both visual and numerical evaluations. Furthermore, the proposed method shows good performances in preserving the inherent epipolar property in light field images.
The large scale and distribution of cloud computing storage have become the major challenges in cloud forensics for file extraction. Current disk forensic methods do not adapt to cloud computing well and the forensic ...
详细信息
The large scale and distribution of cloud computing storage have become the major challenges in cloud forensics for file extraction. Current disk forensic methods do not adapt to cloud computing well and the forensic research on distributed file system is inadequate. To address the forensic problems, this paper uses the Hadoop distributed file system (HDFS) as a case study and proposes a forensic method for efficient file extraction based on three-level (3L) mapping. First, HDFS is analyzed from overall architecture to local file system. Second, the 3L mapping of an HDFS file from HDFS namespace to data blocks on local file system is established and a recovery method for deleted files based on 3L mapping is presented. Third, a multi-node Hadoop framework via Xen virtualization platform is set up to test the performance of the method. The results indicate that the proposed method could succeed in efficient location of large files stored across data nodes, make selective image of disk data and get high recovery rate of deleted files.
As more and more software products are threatened by malicious reverse analysis, along with software products are pirated, tampered with and so on, it is of great significance to study software security protection tec...
As more and more software products are threatened by malicious reverse analysis, along with software products are pirated, tampered with and so on, it is of great significance to study software security protection technology in depth. As a software security protection technology, software diversification introduces uncertainty into the target program and provides probabilistic protection for the target program. Multi-Variant Execution (MVE) are fine-grained implementation of software diversification that produces functionally identical variants at the system call level. This article first introduces the related concepts of multi-variant execution. Secondly, it expounds the key technologies of multi-variant execution implementation-variant generation, variant monitor, input/output and synchronization, monitor-variant communication. Security of monitors and different variant communication technologies are analyzed and compared, their advantages and defects are pointed out respectively. Several implementation methods of multi-variant execution design are summarized. Finally, the reasons for the false negatives and false positives of attack events are analyzed, and the prospects and challenges of using multi-variant execution techniques to implement security systems are summarized.
In the original article,1 the line spectrum in Fig. 2(b) is missing. The correct Fig. 2(b), given here, shows how we get the frequency difference from this spec
In the original article,1 the line spectrum in Fig. 2(b) is missing. The correct Fig. 2(b), given here, shows how we get the frequency difference from this spec
The increasing availability of folksonomy data makes them vital for user profiling approaches to precisely detect user preferences and better understand user interests, so as to render some personalized recommendation...
详细信息
The increasing availability of folksonomy data makes them vital for user profiling approaches to precisely detect user preferences and better understand user interests, so as to render some personalized recommendation or re- trieval results. This paper presents a rigorous probabilis- tic framework to discover user preference from folkson- omy data. Furthermore, we incorporate three models into the framework with the corresponding inference methods, expectation-maximization or Gibbs sampling algorithms. The user preference is expressed through topical conditional distributions. Moreover, to demonstrate the versatility of our framework, a recommendation method is introduced to show the possible usage of our framework and evaluate the applica- bility of the engaged models. The experimental results show that, with the help of the proposed framework, the user pref- erence can be effectively discovered.
The goal of range analysis is to determine a program variable's minimum and maximum value at runtime and it becomes more complex to calculate the range space when the variable is a pointer. In this paper, we analy...
详细信息
ISBN:
(纸本)9781728111421;9781728111414
The goal of range analysis is to determine a program variable's minimum and maximum value at runtime and it becomes more complex to calculate the range space when the variable is a pointer. In this paper, we analyzed the optimization problem of data transmission in parallelization for heterogeneous structure and distributed memory structure. On the basis of symbolic range analysis, we proposed a demand-driven pointer-range analysis technique for data transmission optimization. At first, we introduced the analysis framework of this technique and the representations of pointer range. Then we described the algorithm of the demand-driven pointer-range analysis. The experimental results with various benchmarks demonstrate that our technique can bring about significant performance improvement.
暂无评论