In order to improve the transmission efficiency, security and anonymity of Tor anonymous communication system, this paper analyzes the efficiency of Tor anonymous system through research and analysis of the security a...
详细信息
In order to improve the transmission efficiency, security and anonymity of Tor anonymous communication system, this paper analyzes the efficiency of Tor anonymous system through research and analysis of the security and vulnerability of transmission mechanism, encryption rules and node distribution of Tor anonymous network system, and then proposes an efficient improved model EFTAN for Tor anonymous network, and finally obtains a network system that can improve the efficiency, security and anonymity of the anonymous communication.
With the widespread application of embedded devices,embedded software vulnerabilities and oriented attacks to embedded system are also *** being wellknown,the hardware architecture of the embedded devices is heterogen...
详细信息
With the widespread application of embedded devices,embedded software vulnerabilities and oriented attacks to embedded system are also *** being wellknown,the hardware architecture of the embedded devices is heterogeneous,and the software stacks on them are customizable and flexible as *** dynamic information extraction and analysis technologies have been successfully used for general platform in vulnerability mining,malicious code detection and so on,its usage on embedded system lags behind *** paper provides(1) a CrossPlatform-Dynamic Instrumentation Framework,which,by leveraging an extensible intermediate code module and a semantic constraint database,decouples the instrumentation plugins from underlying hardware and OS;(2) a set of instrumentation interfaces which may be implemented by plugins to extract runtime state of various code granularity;(3) ability of system semantic introspection to extract processes and modules information(system semantic views),by using system attribute description files and abstract state extraction *** with TEMU and DECAF,our method shows more advantages in performance of abstract state extraction,and reducing the time and memory overhead.
The virtual block device is the data carrier of virtual machine(VM) and user information,while the file system is the ultimate goal of many *** proposed a security device named virtual block device mapping to file(VBD...
详细信息
The virtual block device is the data carrier of virtual machine(VM) and user information,while the file system is the ultimate goal of many *** proposed a security device named virtual block device mapping to file(VBD-MF) that can translate block-level operations into file-level ones by building a mapping from blocks to ***-MF could provide an out-of-VM way to monitor the file system with no modification on the code of virtual machine monitor(VMM)and guest OS,and it also provided other security tools and methods with direct interface to operate the file *** implemented a prototype on Linux and *** evaluation shows that VBD-MF has a better capability of monitoring with some loss on performance of read and *** to the traditional monitoring of host-based file system,VBD-MF has a better hidden and safety property.
Graphs are an important abstraction used in many scientific fields. With the magnitude of graph-structured data constantly increasing, effective data analytics requires efficient and scalable graph processing systems....
详细信息
ISBN:
(纸本)9781538683859
Graphs are an important abstraction used in many scientific fields. With the magnitude of graph-structured data constantly increasing, effective data analytics requires efficient and scalable graph processing systems. Although HPC systems have long been used for scientific computing, people have only recently started to assess their potential for graph processing, a workload with inherent load imbalance, lack of locality, and access irregularity. We propose ShenTu 8 the first general-purpose graph processing framework that can efficiently utilize an entire Petascale system to process multi-trillion edge graphs in seconds. ShenTu embodies four key innovations: hardware specialization, supernode routing, on-chip sorting, and degree-aware messaging, which together enable its unprecedented performance and scalability. It can traverse a record-size 70-trillion-edge graph in seconds. Furthermore, ShenTu enables the processing of a spam detection problem on a 12-trillion edge Internet graph, making it possible to identify trustworthy and spam webpages directly at the fine-grained page level.
A periodic load balancing method is proposed according to the load imbalance of network server in a clustered system of high concurrency. It is divided into different load periods based on the load condition of server...
详细信息
A periodic load balancing method is proposed according to the load imbalance of network server in a clustered system of high concurrency. It is divided into different load periods based on the load condition of server node. Corresponding load balancing strategy is adopted for each period that the strategy of fast select is used in the period of small load while the server node with stable response time is first adopted in the period of large load. Periodic load strategy avoids the load imbalance caused by the single load strategy. It can be known from the experimental comparison that the improved periodic load balancing strategy is superior to the load balancing strategy of weighted least connection.
Program logical controllers(PLCs) are the kernel equipment of industrial control system(ICS) as they directly monitor and control industrial processes. Recently, ICS is suffering from various cyber th
ISBN:
(纸本)9781467389808
Program logical controllers(PLCs) are the kernel equipment of industrial control system(ICS) as they directly monitor and control industrial processes. Recently, ICS is suffering from various cyber th
With the rapid development and extensive use of the Internet,network security is the key point of the current research of computer *** router is the key interconnection equipment in the Internet system,and it is neces...
详细信息
With the rapid development and extensive use of the Internet,network security is the key point of the current research of computer *** router is the key interconnection equipment in the Internet system,and it is necessary to improve the security of the router *** routing protocol is used in the packet switching *** communication is implemented by each switching node in the network to forward data *** present,most of the router intrusion detection systems are based on the machine learning *** paper proposes a Long Short Term Memory(LSTM) architecture applied to the Recurrent Neural Network(RNN),and uses the KDD Cup 1999 data set to train the IDS *** performance testing,the ability to efficiently and accurately classify network traffic into attacks and normal capabilities.
To monitor and identify whether a mobile device is under threat or at risk effectively, in this paper, we summarize feature data from threat information of common mobile devices and set up an identification model of m...
详细信息
To monitor and identify whether a mobile device is under threat or at risk effectively, in this paper, we summarize feature data from threat information of common mobile devices and set up an identification model of mobile device threats based on PCA-fused BP neural network. When extracting features from raw sample data, we consider primary vector information of all training samples. While more than 95% of the information in raw data is reserved, interference information in the data is eliminated and the robustness of the BP network model built subsequently is optimized. Finally, the trained model is tested and compared with other model algorithms. Results show that the overall identification accuracy of the proposed model algorithm reaches 91%. The identification accuracy of test samples reaches 90.4%. Compared with previous identification models, it has higher identification accuracy.
The revolution of biotechnology has pushed forward life sciences into the Big Data ***,high-throughput bio-techniques have greatly accelerated the integration of biology,computing and informatics,and hence substantial...
详细信息
The revolution of biotechnology has pushed forward life sciences into the Big Data ***,high-throughput bio-techniques have greatly accelerated the integration of biology,computing and informatics,and hence substantially pushed forward the development of bioinformatics and computational *** to the latest report of data deposition within National Centre for Biotechnology Information(NCBI),the genome sequencing projects have increased 49.94%.
The accuracy of existing geolocation methods for WeChat users depends on the stable correspondence between reported distance and actual distance. In view of the difficulty to pinpoint users’ location in real-world du...
详细信息
暂无评论