The diversity and complexity of the user population on the campus network increase the risk of computer virus infection during terminal information interactions.Therefore,it is crucial to explore how computer viruses ...The diversity and complexity of the user population on the campus network increase the risk of computer virus infection during terminal information interactions.Therefore,it is crucial to explore how computer viruses propagate between terminals in such a network.In this study,we establish a novel computer virus spreading model based on the characteristics of the basic network structure and a classical epidemic-spreading dynamics model,adapted to real-world university scenarios.The proposed model contains six groups:susceptible,unisolated latent,isolated latent,infection,recovery,and crash.We analyze the proposed model's basic reproduction number and disease-free equilibrium point.Using real-world university terminal computer virus propagation data,a basic computer virus infection rate,a basic computer virus removal rate,and a security protection strategy deployment rate are proposed to define the conversion probability of each group and perceive each group's variation tendency.Furthermore,we analyze the spreading trend of computer viruses in the campus network in terms of the proposed computer virus spreading model.We propose specific measures to suppress the spread of computer viruses in terminals,ensuring the safe and stable operation of the campus network terminals to the greatest extent.展开更多
The future Wireless Cloud Networks (WCNs) are required to satisfy both extremely high levels of service resilience and security assurance (i.e., Blue criteria) by overproviding backup network resources and cryptograph...The future Wireless Cloud Networks (WCNs) are required to satisfy both extremely high levels of service resilience and security assurance (i.e., Blue criteria) by overproviding backup network resources and cryptographic protection on wireless communication respectively, as well as minimizing energy consumption (i.e., Green criteria) by switching off unnecessary resources as much as possible. There is a contradiction to satisfy both Blue and Green design criteria simultaneously. In this paper, we propose a new BlueGreen topological control scheme to leverage the wireless link connectivity for WCNs using an adaptive encryption key allocation mechanism, named as Shared Backup Path Keys (SBPK). The BlueGreen SBPK can take into account the network dependable requirements such as service resilience, security assurance and energy efficiency as a whole, so as trading off between them to find an optimal solution. Actually, this challenging problem can be modeled as a global optimization problem, where the network working and backup elements such as nodes, links, encryption keys and their energy consumption are considered as a resource, and their utilization should be minimized. The case studies confirm that there is a trade-off optimal solution between the capacity efficiency and energy efficiency to achieve the dependable WCNs.展开更多
The increasing popularity of wireless networks makes the protection of online privacy be a common concern of users and internet service providers.Because of the difference of wireless networks and wired networks,it is...The increasing popularity of wireless networks makes the protection of online privacy be a common concern of users and internet service providers.Because of the difference of wireless networks and wired networks,it is proved to be easier for hackers to steal information related to users' privacy in wireless networks than that of wired networks.The issue that whether online privacy protection is necessary or reasonable has given rise to much controversy.In this paper,the discussion of this issue includes what online protection of privacy is,current problems of online privacy protection in wireless networks,exploration of solutions and problems that may caused by the protection.No matter what extent the protection will be,it is proved to be essential for experts,users and IT staff to enhance the protection in wireless networks via new technologies,policy and law.It is also a way for improving the security of information management and business communication in wireless networks.展开更多
为提高企业网络环境的安全性和稳定性,使用防火墙双机热备技术进行网络安全策略配置。整个网络采用接入层、汇聚层、核心层的3层拓扑结构进行架构,利用VLAN(虚拟局域网,Virtual Local Area Network,简称VLAN)技术进行地址配置,采用trun...为提高企业网络环境的安全性和稳定性,使用防火墙双机热备技术进行网络安全策略配置。整个网络采用接入层、汇聚层、核心层的3层拓扑结构进行架构,利用VLAN(虚拟局域网,Virtual Local Area Network,简称VLAN)技术进行地址配置,采用trunk模式配置接入层,由两台交换机汇聚接入层流量,采用MSTP(多生成树协议,Multiple Spanning Tree Protocol,简称MSTP)解决环路问题,采用VRRP(虚拟路由冗余协议,Virtual Router Redundancy Protocol,简称VRRP)提高网络的可靠性,核心层使用两台防火墙,配置OSPF协议(开放式最短路径优先协议,Open Shortest Path First,简称OSPF)。内外网连通性测试和模拟宕机测试结果表明,防火墙双机热备技术能使企业网络环境更高效、稳定、安全。展开更多
基金Project supported by the National Natural Science Foundation of China(Nos.62266030 and 61863025)。
文摘The diversity and complexity of the user population on the campus network increase the risk of computer virus infection during terminal information interactions.Therefore,it is crucial to explore how computer viruses propagate between terminals in such a network.In this study,we establish a novel computer virus spreading model based on the characteristics of the basic network structure and a classical epidemic-spreading dynamics model,adapted to real-world university scenarios.The proposed model contains six groups:susceptible,unisolated latent,isolated latent,infection,recovery,and crash.We analyze the proposed model's basic reproduction number and disease-free equilibrium point.Using real-world university terminal computer virus propagation data,a basic computer virus infection rate,a basic computer virus removal rate,and a security protection strategy deployment rate are proposed to define the conversion probability of each group and perceive each group's variation tendency.Furthermore,we analyze the spreading trend of computer viruses in the campus network in terms of the proposed computer virus spreading model.We propose specific measures to suppress the spread of computer viruses in terminals,ensuring the safe and stable operation of the campus network terminals to the greatest extent.
文摘The future Wireless Cloud Networks (WCNs) are required to satisfy both extremely high levels of service resilience and security assurance (i.e., Blue criteria) by overproviding backup network resources and cryptographic protection on wireless communication respectively, as well as minimizing energy consumption (i.e., Green criteria) by switching off unnecessary resources as much as possible. There is a contradiction to satisfy both Blue and Green design criteria simultaneously. In this paper, we propose a new BlueGreen topological control scheme to leverage the wireless link connectivity for WCNs using an adaptive encryption key allocation mechanism, named as Shared Backup Path Keys (SBPK). The BlueGreen SBPK can take into account the network dependable requirements such as service resilience, security assurance and energy efficiency as a whole, so as trading off between them to find an optimal solution. Actually, this challenging problem can be modeled as a global optimization problem, where the network working and backup elements such as nodes, links, encryption keys and their energy consumption are considered as a resource, and their utilization should be minimized. The case studies confirm that there is a trade-off optimal solution between the capacity efficiency and energy efficiency to achieve the dependable WCNs.
文摘The increasing popularity of wireless networks makes the protection of online privacy be a common concern of users and internet service providers.Because of the difference of wireless networks and wired networks,it is proved to be easier for hackers to steal information related to users' privacy in wireless networks than that of wired networks.The issue that whether online privacy protection is necessary or reasonable has given rise to much controversy.In this paper,the discussion of this issue includes what online protection of privacy is,current problems of online privacy protection in wireless networks,exploration of solutions and problems that may caused by the protection.No matter what extent the protection will be,it is proved to be essential for experts,users and IT staff to enhance the protection in wireless networks via new technologies,policy and law.It is also a way for improving the security of information management and business communication in wireless networks.
文摘为提高企业网络环境的安全性和稳定性,使用防火墙双机热备技术进行网络安全策略配置。整个网络采用接入层、汇聚层、核心层的3层拓扑结构进行架构,利用VLAN(虚拟局域网,Virtual Local Area Network,简称VLAN)技术进行地址配置,采用trunk模式配置接入层,由两台交换机汇聚接入层流量,采用MSTP(多生成树协议,Multiple Spanning Tree Protocol,简称MSTP)解决环路问题,采用VRRP(虚拟路由冗余协议,Virtual Router Redundancy Protocol,简称VRRP)提高网络的可靠性,核心层使用两台防火墙,配置OSPF协议(开放式最短路径优先协议,Open Shortest Path First,简称OSPF)。内外网连通性测试和模拟宕机测试结果表明,防火墙双机热备技术能使企业网络环境更高效、稳定、安全。