The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Botnet is one of the most serious threats to the security of the Internet nowadays. This paper introduces Botnet-based distributed denial of service (DDoS) attacks and the characteristics of botnet, research botnet detection and control technologies, summarized the botnet trends.
With the development of wireless local area network (WLAN), the problem of WLAN security becomes increasingly severe. This article discusses the security issues that should be taken into consideration in the construction of WLAN. Besides, this paper comes up with two types of intrusion detection structures on the basis of infrastructure mode and mobile AD HOC network mode respectively, therefore,...
The paper Puts forward a novel feedback chaotic block cipher algorithm based on external key control. The prominent advantage of the algorithm is that the cipherkey of the system is composed of 128-bit external keys. The system parameters, initial conditions and iterations of the chaotic system generate dynamically in line with the ciphertext feedbacks. In this way, the randomness and complexity of...
WCF (Windows Communication Foundation) developed by Microsoft is a unified programming model for building SOA and it is highly extensible. The extensibility provides the ability to change the product more easily over time and the flexibility to custom WCF for fitting specific requirements of applications. The extensible characteristics are what make WCF a strong distributed application platform. In...
Dynamic test generation approach is becoming increasingly popular to find security vulnerabilities in software. However, existing such approaches and tools have bad system performance because they perform slow symbolic execution on all instructions. This paper presents a new dynamic test generation technique and a tool, Hunter that implements this technique. Unlike other such techniques, Hunter combines...
Dynamic test generation approach is becoming increasingly popular to find security vulnerabilities in software. However, such existing approaches and tools are not retargetable and can only find vulnerabilities over a specific OS because the execution trace is totally OS-independently recorded in these tools. This paper presents a new dynamic test generation technique and a tool, ReTBLDTG, short for...
WCF (Windows Communication Foundation), one of Microsoft's revolutionary products, represents a new step in distributed programming. In this paper, after the concepts of WCF are introduced, its pillars (SOA, interoperability and integration, unification) are discussed and layered architecture is explored, then the difference between WCF and Web services is summarized . Finally, current state of popular...
The existing analytic models on network worm propagation rarely consider the effect of topology structure, and it usually considers the probability and spread parameter as fixed values. They are not coinciding with real situation. Here in the paper, a microstructure based propagation model is proposed to inflect the variability with time. In this model, many probability factors are considered, for...
Dynamic test generation approach is becoming increasingly popular to find security vulnerabilities in software. More and more research institutes and organizations use this approach to find security vulnerabilities in binary code. However, the existing binary level dynamic test generation approaches and tools are not retargetable, and can only find vulnerabilities in binaries for a specific ISA. This...
To improve the survivability of distributed storage systems, using the theory of similarity transformation of Jordan standard shape in theory of matrix, combining the method of Lagrange interpolation method, we design a safe and high-efficient data distributing algorithm with (r,n) threshold scheme. This algorithm has higher efficiency, stronger security and survivability than reference. It has important...
A novel watermarking technique based on iamge features and neural network is proposed. The watermark is the fusion of a binary copyright symbol and image feature label which is gotten by analyzing the image fractal dimension. Then the watermark is pretreated by Arnold transform in order to increase the security, and embedded into the multiwavelet transform domain. At the same time, the back propagation...
Coordinated defense is one of network security technology development directions, and how to make security systems work cooperatively is a critical problem. So uniform coordinated working mechanisms and policies are necessary. In Intelligent Security Defendable Software (ISDS), Execution Components can work cooperatively and implement coordinated tasks, and they need uniform commands. Hence coordinated-control...
This paper discusses that Role-Based Management (RBM) is applied in a Web-based teaching system. A user may have multiple roles. A role may be given to multiple users. Different roles have different privileges. From the implementation, it is found that roles are good mechanisms in designing a learning system.
WS-Security is an essential component of the Web services protocol stack. WS-Security provides end-to-end security properties (integrity, confidentiality, and authentication) through open XML standards. End-to-end message security assures the participation of non-secure transport intermediaries in message exchanges, which is a key advantage for Web-based systems and service-oriented architectures...
Pattern matching and regular expression matching are all the critical components for content inspection based applications. But current regular expression matching algorithms or architecture cannot provide a perfect solution for whole matching problem. In some real network security applications, exact strings are the biggest part of rule set, and the second part is simple regular expressions (dot-star...
Security protocols provide the basic guarantee to open network of secure communications, but practice proved that the analysis and design of a protocol is not easy even it is very simple. The paper describes an automatic design approach of network security protocols based on the evolutionary algorithm and BEN logic and illustrates the approach can automatic design large-scale security protocols, such...
Pattern matching is one of the most important components for the content inspection based applications of network security, and it requires well designed algorithms and architectures to keep up with the increasing network speed. For most of the solutions, AC and its derivative algorithms are widely used. They are based on the DFA model but utilize large amount of memory because of so many transition...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.