http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Network Security Threat Situation Evaluation Based on Fusion Decision and Spread Analysis
Xiangdong Cai 보안공학연구지원센터 2015 International Journal of Security and Its Applicat Vol.9 No.3
Most situation evaluation methods suffer from the false positives and false negatives of detection systems seriously, without considering authorization and dependence relationships, unable to reflect indirect threats, and whose assessment results guide dynamic defense poorly. Upon these problems, an evaluation method whose core consists of multi-source fusion decision, threat spread analysis and attack intention guess is presented. First, the decision-level fusion of multi-source detection logs and attack alerts is introduced to improve detection rate or reduce false alarm rate. Afterwards, the direct threats imposed by attacks, the indirect threats caused by spreading along dependence relationships, and the nonlinear overlapping effects under multiple concurrent attacks are evaluated. Finally, covering and clustering method is utilized to guess attack intentions. Experiments show that the method proposed can not only weaken the impact imposed on assessment result by false positive or false negative effectively, reveal security situation more deeply and accurately, but also guide dynamic defense preferably.
Energy-Efficient Secure Multiuser Scheduling in Energy Harvesting Untrusted Relay Networks
Dechuan Chen,Yunpeng Cheng,Xiangdong Wang,Weiwei Yang,Jianwei Hu,Yueming Cai 한국통신학회 2019 Journal of communications and networks Vol.21 No.4
In this paper, we investigate opportunistic secure multiuserscheduling in energy harvesting untrusted relay networks,where an energy-constrained amplify-and-forward (AF) relay harvestsenergy from the received radio frequency signal via usingthe power splitting protocol. To exploit the potential advantages(e.g., multiuser diversity and direct links) for secrecy improvement,we examine three opportunistic user scheduling schemes,i.e., optimal scheduling scheme, maximum scheduling scheme, andminimum scheduling scheme. Specifically, the optimal schedulingscheme performs user selection by maximizing the ratio betweenthe signal-to-noise-ratio (SNR) at the destination and the correspondingSNR at the untrusted relay. The maximum schedulingscheme is conventional user selection that maximizes the channelgain of the direct links. For the minimum scheduling scheme, wetry to reduce the overheard information at the untrusted relay byselecting the user with the lowest channel gain of the relay links. For these three schemes, we comprehensively examine the achievablesecrecy performance including probability of positive secrecyrate, secrecy outage probability (SOP), asymptotic SOP, secrecythroughput (ST), as well as secure energy efficiency (SEE) to helpfacilitate an energy-efficient secure transmission design. Simulationresults demonstrate that the maximum scheduling scheme outperformsthe minimum scheduling scheme in terms of SOP at relativelylow SNRs and target secrecy rates.