In cloud computing, the resources of service are widely distributed, complex and fickle. The trust relationship between service entities is hard to establish and maintain with high uncertainty. The characteristics of ...
详细信息
ISBN:
(纸本)9781785610899
In cloud computing, the resources of service are widely distributed, complex and fickle. The trust relationship between service entities is hard to establish and maintain with high uncertainty. The characteristics of randomness and fuzziness of services could not be responded by traditional trust evaluation approach comprehensively, a service trust evaluation method based on weighted multi-attribute cloud was proposed. Time decay factor was introduced to reflect the timeliness of trust-and multi-attribute trust cloud was used to refine the evaluation granularity. In order to prevent conspiracy to defraud and malicious attacks, the reliability and weight of recommender were confirmed by similarity of evaluation. The trust rating could be confirmed by cloud similarity calculation, which could provide security decisions for the user's services selection. Simulation results show that this method can improve the success rate of services interaction obviously, and be applied to service trust evaluation under cloud computing environment.
With the development of the research in data mining, cluster analysis has been widely used in several areas. Aiming at the issue that traditional clustering methods are not appropriate to high-dimensional data, a cuck...
详细信息
ISBN:
(纸本)9781785610899
With the development of the research in data mining, cluster analysis has been widely used in several areas. Aiming at the issue that traditional clustering methods are not appropriate to high-dimensional data, a cuckoo search fuzzy-weighting algorithm for subspace clustering is proposed on the basis of the existing soft subspace clustering algorithms. In the proposed algorithm, a novel objective function is firstly designed by considering the fuzzy weighting within-cluster compactness and the between-cluster separation, and loosening the constraints of dimension weight matrix. Then gradual membership and improved cuckoo search, a global search strategy, are introduced to optimize the objective function and search subspace clusters, giving novel learning rules for clustering. At last, the performance of the proposed algorithm on the clustering analysis of various low and high dimensional datasets is experimentally compared with that of several competitive subspace clustering algorithms. Experimental studies demonstrate that the proposed algorithm can obtain better performance than most of the existing soft subspace clustering algorithms.
The method based on index system is a typical quantitative method for information security risk assessment. But, because of the complexity of the safety-related factors, during the process ofbuilding its index system,...
详细信息
ISBN:
(纸本)9781785610899
The method based on index system is a typical quantitative method for information security risk assessment. But, because of the complexity of the safety-related factors, during the process ofbuilding its index system, it will inevitably produce some irrelevant and redundant indicators index, thereby resulting in the deviation of the assessment results. To solve this problem, this paper proposes a new analysis method named SGCAM (Sobol and Gray relational clustering Comprehensive Analysis Method) based on Sobol based global sensitivity analysis method and gray relational clustering analysis method. Using this method, we can cut irrelevant indicators, merge redundant indicators, and optimize the index system ultimately.
Nowadays, network security defense based on game theory mostly used complete information or static game model. In order to get closer to the actual network and defend actively, we proposed a network attack-defense gam...
详细信息
ISBN:
(纸本)9781785610899
Nowadays, network security defense based on game theory mostly used complete information or static game model. In order to get closer to the actual network and defend actively, we proposed a network attack-defense game model based on signaling game, which was modeled in a dynamic and incomplete way. We improved the attack-defense strategies quantitative method of the completed static game model to meet the needs of the network signaling game model. Moreover, we put forward an active defense strategy selecting algorithm to select optimal defense strategy for different characters of defender. At last, we analyzed and proved the feasibility and validity of the model and method through a network example.
Aiming at the clustering problems in selected features and the shortcomings that fuzzy C- means clustering is sensitive to initial value and easy to fall into local optimum, a new fuzzy subspace clustering algorithm b...
详细信息
ISBN:
(纸本)9781785610899
Aiming at the clustering problems in selected features and the shortcomings that fuzzy C- means clustering is sensitive to initial value and easy to fall into local optimum, a new fuzzy subspace clustering algorithm based on improved firefly algorithms is proposed. Based on fuzzy C-means clustering algorithm, the algorithm uses a method of calculating feature weighting in reliability-based k-means algorithm, and combines with the global search capability of firefly algorithm to search for all the subspace. An objective function is designed to evaluate the clustering results and feature-dimension included in subspace, and it is used to improve the search formula of firefly algorithm. Experimental results show that the proposed algorithm can effectively converge to the global optimal solution, and has good clustering effect and noise immunity.
Focusing on the problem of high efficiency resource scheduling in cloud computing environment, since current resource scheduling algorithm has been less given consideration to the shortest completion time and the leas...
详细信息
ISBN:
(纸本)9781785610899
Focusing on the problem of high efficiency resource scheduling in cloud computing environment, since current resource scheduling algorithm has been less given consideration to the shortest completion time and the least cost of the services, the fitness function which can comprehensive response the time and cost was designed, and an estimation of distribution-shuffled frog leaping algorithm (EDSFLA) was proposed. This algorithm redefined the evolutional operators of shuffled frog leaping algorithm (SFLA), utilizing the cross operators of genetic algorithm, targeted in applying to scheduling problem with integer-coded. EDSFLA introduced evolutionary strategy of estimation of distribution to break the confine of search pattern in the standard SFLA, and made the learning ability of this algorithm more comprehensive. Experimental results show that this algorithm has more capability in convergence and searching ability compared with the standard SFLA and EDA in solving cloud resource scheduling problems.
In order to assess network security threats better, we model the attacker's and defender's behavior based on attackdefense graph from the perspective of both attacker and defender, which lays the foundation of...
详细信息
ISBN:
(纸本)9781785610899
In order to assess network security threats better, we model the attacker's and defender's behavior based on attackdefense graph from the perspective of both attacker and defender, which lays the foundation of the further research for the scientific and precise information security threat assessment. Due to the existing problems of generating traditional attack-defense graph (e.g. explosion of state space, and the large-scale and complex generation of attack-defense graph), we in this paper propose a method for generating attack-defense graph based on state reduction, then we model the behavior of attacker and defender in network security. Finally, the method and the model proposed in this paper are proved to be scientific and effective within a typical network scenario.
To the active-basis-choice decoy-state quantum-key-distribution systems with detector efficiency mismatch, we present a modified attack strategy, which is based on the faked states attack, with quantum nondemolition m...
详细信息
To the active-basis-choice decoy-state quantum-key-distribution systems with detector efficiency mismatch, we present a modified attack strategy, which is based on the faked states attack, with quantum nondemolition measurement ability to restress the threat of detector efficiency mismatch. Considering that perfect quantum nondemolition measurement ability doesn't exist in real life, we also propose a practical attack strategy using photon number resolving detectors. Theoretical analysis and numerical simulation results show that, without changing the channel, our attack strategies are serious threats to decoy-state quantum-key-distribution systems. The eavesdropper may get some information about the secret key without causing any alarms. Besides, the lower bound of detector efficiency mismatch to run our modified faked states attack successfully with perfect quantum nondemolition measurement ability is also given out, which provides the producers of quantum-key-distribution systems with a reference and can be treated as the approximate secure bound of detector efficiency mismatch in decoy-state quantum-key-distribution systems.
Current intrusion detection systems are mostly for detecting external attacks, but sometimes the internal staff may bring greater harm to organizations in information security. Traditional insider threat detection met...
详细信息
Topological semimetal, a novel state of quantum matter hosting exotic emergent quantum phenomena dictated by the non-trivial band topology, has emerged as a new frontier in condensed-matter physics. Very recently, a c...
详细信息
暂无评论