期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Network Security Situation Awareness Framework based on Threat Intelligence 被引量:3
1
作者 Hongbin Zhang Yuzi Yi +2 位作者 junshe wang Ning Cao Qiang Duan 《Computers, Materials & Continua》 SCIE EI 2018年第9期381-399,共19页
Network security situation awareness is an important foundation for network security management,which presents the target system security status by analyzing existing or potential cyber threats in the target system.In... Network security situation awareness is an important foundation for network security management,which presents the target system security status by analyzing existing or potential cyber threats in the target system.In network offense and defense,the network security state of the target system will be affected by both offensive and defensive strategies.According to this feature,this paper proposes a network security situation awareness method using stochastic game in cloud computing environment,uses the utility of both sides of the game to quantify the network security situation value.This method analyzes the nodes based on the network security state of the target virtual machine and uses the virtual machine introspection mechanism to obtain the impact of network attacks on the target virtual machine,then dynamically evaluates the network security situation of the cloud environment based on the game process of both attack and defense.In attack prediction,cyber threat intelligence is used as an important basis for potential threat analysis.Cyber threat intelligence that is applicable to the current security state is screened through the system hierarchy fuzzy optimization method,and the potential threat of the target system is analyzed using the cyber threat intelligence obtained through screening.If there is no applicable cyber threat intelligence,using the Nash equilibrium to make predictions for the attack behavior.The experimental results show that the network security situation awareness method proposed in this paper can accurately reflect the changes in the network security situation and make predictions on the attack behavior. 展开更多
关键词 SITUATION awareness stochastic game cloud computing virtual machine INTROSPECTION CYBER THREAT INTELLIGENCE NASH equilibrium
在线阅读 下载PDF
Improvement of the Round Key Generation of AES
2
作者 junshe wang Han Xu Mingqiu Yao 《International Journal of Communications, Network and System Sciences》 2012年第12期850-853,共4页
The key generation algorithm of AES was introduced;the weaknesses of the key generation design of AES were investigated. According to the key demand put forward a kind of new design idea, and this designing strategy w... The key generation algorithm of AES was introduced;the weaknesses of the key generation design of AES were investigated. According to the key demand put forward a kind of new design idea, and this designing strategy was developed, which can be used to improve the key generation algorithm of AES. An analysis shows that such improvement can enhance the safety of the original algorithm without reducing its efficiency. 展开更多
关键词 AES Data ENCRYPTION Standard (DES) KEY Generation Rijndeal
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部