The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Managing the network security events data stream, which is very large and real-time, and mining useful information from the data stream to analyse and forecast security situation, are very difficult. In this paper, we present an architecture, hybrid data stream cube, and its incremental updating algorithm. Experimental results proved that this architecture could facilitate on-line, multi-dimension,...
Security has become the key issue in the development of large-scale information system. Piling security products and security technologies simply rather than functional integration and making full use of these products and technologies will cause resource wasting, and not meet the needs for flexible and diverse security requirements. This paper proposes a security architecture design based on SOA...
The network security situation assessment model based on artificial immune in this paper abstracts and expands the immune mechanism of self body tolerance, immune memory and immune monitor etc and the concepts related to antibody concentration, it can make real time and quantitative security situation assessment towards the system, and it provides evidence needed for the system to make real time adjustment...
Survivability which gives a new way to research the network security is different from traditional network security. First, this paper summarized the research of survivability for network system and the immunity principle. On this basis, network system survivability management architecture based on immunity principle is proposed. Then the process of multi-agent is introduced. At last the paper summarized...
The cloud security is a safe mode applied super Internet based on the cloud computing, also a new technology and the trend of development on network security. On the basis of outlining the cloud security's superiority, key technologies and the IPS technology, this paper proposes a new cloud security-based intelligent NIPS structure, function, characteristic and difference from general NIPS, finally...
The metrological management system incarnates the business rule, information transaction of the metrological management by computer aided management. It can administer the layout of humans, finance, facilities that concerned in the metrological management. This paper analyses business process, functional requirement of the energy sources metrological management system of Zhongzhou Filiale of China...
In this paper we show that it is possible to attack and gain control over PROFINET IO nodes and also that this can be done without any of the communicating peers detecting the attack. Analysis of attacks in both shared and packet switched networks show that the attacker can control the process data and thus the state of the machines connected to the I/O modules. As the security risks are increasing...
Exactly assessing the security risk of a network is the key to improving the security level of the network. The hidden Markov model based real time network security risk quantification method can get the risk value dynamically and in real-time, whose input is intrusion detection system alerts. The method is better than the traditional static assessment method. The paper resolves main fault of this...
Safe and stable operation of secondary of power system in power plant is the key part of electric power information security. By analyzing the system construction of protection solutions of secondary part of power system in the countries of the world, on the basis, according to the protection solutions of secondary part of power system, the paper gives the construction of protection solutions of secondary...
Detecting network intrusion has been not only critical but also difficult in the network security research area. Traditional supervised learning techniques are not appropriate to detect anomalous behaviors and new attacks because of temporal changes in network intrusion patterns and characteristics. Therefore, unsupervised learning techniques such as SOM (self-organizing map) are more appropriate...
Multi-core processors represent a major evolution in computing hardware technology. Multi-core provides a network security application with more processing power from the hardware perspective. However, there are still significant software design challenges that must be overcome. In this paper, we present new architecture for multi-core supported network security applications, which aims at providing...
According to the analysis of intrusion detection model based on the Bayesian theory, an intrusion detection evaluation method was proposed. After comparison with the former related work and the analysis of the key evaluation target result, difference and quality between the performances of various intrusion detection systems were obvious. It can be proved that this performance evaluation is precise.
Wireless sensor networks (WSNs) are highly vulnerable to attacks for the limitation of constrained resource and communicating via wireless links, especially running in a hostile environment such as battlefields. In such situation, an adversary may capture any node compromising critical security data including keys used for confidentiality and authentication. Consequently, it is necessary to provide...
The definition of e-commerce and classification, the distinction between traditional business and e-commerce and the effect of e-commerce on the society and economics are illustrated and discussed. The developing process and status of e-commerce are stated, which makes the rapid developing e-commerce face new challenges. The demand for network security, mechanisms, business needs, risk and technical...
The definition of e-commerce and classification, the distinction between traditional business and e-commerce and the effect of e-commerce on the society and economics are illustrated and discussed. The developing process and status of e-commerce are stated, which makes the rapid developing e-commerce face new challenges. The demand for network security, mechanisms, business needs, risk and technical...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.