RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
        • 등재정보
        • 학술지명
        • 주제분류
        • 발행연도
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • KCI등재

        Low METTL3 level in midgut of the Bombyx mori inhibit the proliferation of nucleopolyhedrovirus

        Xue Peng,Jiangtao Zhai,Zhu Juan,Wang Meixian,Zhao Qiaoling,Huang Jinshan,Tang Shunming,Shen Xingjia 한국응용곤충학회 2021 Journal of Asia-Pacific Entomology Vol.24 No.1

        N6-methyladeosine (m 6 A) plays an important role in virus infection and replication. Bombyx mori nuclear polyhedrosis is caused by Bombyx mori nucleopolyhedrovirus (BmNPV) infection. Expression levels of m 6 Amodification-related genes after the infection of BmNPV were detected at first. Then, expression levels of BmNPV nucleocapsid protein gene VP39 and envelope fusion protein gene GP64 after knockdown of METTL3in vitro were quantified to identify the effect of m 6 A modification on BmNPV. BmNPV firstly infects the larval midgut in case of oral infection. Subsequently, to clarify the relationship between m 6 A modification and resistance of the silkworm to BmNPV, we detected the expression levels of m 6 A-modification-related genes invivo before and after infection of BmNPV. The results indicated that low METTL3 level hindered the proliferation of BmNPV to some extent, and silkworm strain with low METTL3 level showed stronger resistance against BmNPV. This study will accumulate new experimental data for elucidating the resistance mechanism of silkworm against BmNPV.

      • SCISCIESCOPUSKCI등재

        Refined identification of hybrid traffic in DNS tunnels based on regression analysis

        Bai, Huiwen,Liu, Guangjie,Zhai, Jiangtao,Liu, Weiwei,Ji, Xiaopeng,Yang, Luhui,Dai, Yuewei Electronics and Telecommunications Research Instit 2021 ETRI Journal Vol.43 No.1

        DNS (Domain Name System) tunnels almost obscure the true network activities of users, which makes it challenging for the gateway or censorship equipment to identify malicious or unpermitted network behaviors. An efficient way to address this problem is to conduct a temporal-spatial analysis on the tunnel traffic. Nevertheless, current studies on this topic limit the DNS tunnel to those with a single protocol, whereas more than one protocol may be used simultaneously. In this paper, we concentrate on the refined identification of two protocols mixed in a DNS tunnel. A feature set is first derived from DNS query and response flows, which is incorporated with deep neural networks to construct a regression model. We benchmark the proposed method with captured DNS tunnel traffic, the experimental results show that the proposed scheme can achieve identification accuracy of more than 90%. To the best of our knowledge, the proposed scheme is the first to estimate the ratios of two mixed protocols in DNS tunnels.

      • KCI등재

        Detection and Parameter Estimation for Jitterbug Covert Channel Based on Coefficient of Variation

        ( Hao Wang ),( Guangjie Liu ),( Jiangtao Zhai ),( Yuewei Dai ) 한국인터넷정보학회 2016 KSII Transactions on Internet and Information Syst Vol.10 No.4

        Jitterbug is a passive network covert timing channel supplying reliable stealthy transmission. It is also the basic manner of some improved covert timing channels designed for higher undetectability. The existing entropy-based detection scheme based on training sample binning may suffer from model mismatching, which results in detection performance deterioration. In this paper, a new detection method based on the feature of Jitterbug covert channel traffic is proposed. A fixed binning strategy without training samples is used to obtain bins distribution feature. Coefficient of variation (CV) is calculated for several sets of selected bins and the weighted mean is used to calculate the final CV value to distinguish Jitterbug from normal traffic. Furthermore, the timing window parameter of Jitterbug is estimated based on the detected traffic. Experimental results show that the proposed detection method can achieve high detection performance even with interference of network jitter, and the parameter estimation method can provide accurate values after accumulating plenty of detected samples.

      • KCI등재

        Designing Rich-Secure Network Covert Timing Channels Based on Nested Lattices

        ( Weiwei Liu ),( Guangjie Liu ),( Xiaopeng Ji ),( Jiangtao Zhai ),( Yuewei Dai ) 한국인터넷정보학회 2019 KSII Transactions on Internet and Information Syst Vol.13 No.4

        As the youngest branch of information hiding, network covert timing channels conceal the existence of secret messages by manipulating the timing information of the overt traffic. The popular model-based framework for constructing covert timing channels always utilizes cumulative distribution function (CDF) of the inter-packet delays (IPDs) to modulate secret messages, whereas discards high-order statistics of the IPDs completely. The consequence is the vulnerability to high-order statistical tests, e.g., entropy test. In this study, a rich security model of covert timing channels is established based on IPD chains, which can be used to measure the distortion of multi-order timing statistics of a covert timing channel. To achieve rich security, we propose two types of covert timing channels based on nested lattices. The CDF of the IPDs is used to construct dot-lattice and interval-lattice for quantization, which can ensure the cell density of the lattice consistent with the joint distribution of the IPDs. Furthermore, compensative quantization and guard band strategy are employed to eliminate the regularity and enhance the robustness, respectively. Experimental results on real traffic show that the proposed schemes are rich-secure, and robust to channel interference, whereas some state-of-the-art covert timing channels cannot evade detection under the rich security model.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼