The authors, first of all, discuss the importance of implementing application layer protocol ofLAN. A study in this area is required in order to speed up its practical uses as well as further de-velopment in the direc...The authors, first of all, discuss the importance of implementing application layer protocol ofLAN. A study in this area is required in order to speed up its practical uses as well as further de-velopment in the direction. The present paper is a brief report of the authors’ design methodologyand development of File Transfer Access and Management in reference to the ISO / OSI Moduleand implementation of its service protocol in a LAN,展开更多
To enhance the security of network systems, puts forward a kind of software agent is put forward, which has the induction ability of network frameworks and the ability of behavior independence. It is mobile scanning a...To enhance the security of network systems, puts forward a kind of software agent is put forward, which has the induction ability of network frameworks and the ability of behavior independence. It is mobile scanning agent. More attentions is paid to expound how to design and realize mobile scanning agent. Besides, it is also explained the programs of mobile scanning agent system. In the end, it expects mobile scanning agent.展开更多
Concurrent multipath transfer(CMT) using stream control transmission protocol(SCTP) multihoming has become an appealing option to increase the throughput and improve the performance of increasingly bandwidth-hungr...Concurrent multipath transfer(CMT) using stream control transmission protocol(SCTP) multihoming has become an appealing option to increase the throughput and improve the performance of increasingly bandwidth-hungry applications.To investigate the rate allocation for applications in CMT,this paper analyzes the capacities of paths shared by competing sources,then proposes the rate allocation model for elastic flows based on the framework of network utility maximization(NUM).In order to obtain the global optimum of the model,a distributed algorithm is presented which depends only on local available information.Simulation results confirm that the proposed algorithm can achieve the global optimum within reasonable convergence times.展开更多
超文本传输协议(Hyper Text Transfer Protocol,HTTP)隧道具有穿越防火墙和规避入侵检测系统识别的能力,给信息安全带来严重威胁。然而现阶段的HTTP隧道检测方法识别能力不足、难以应对特征复杂的HTTP隧道。文中分析了HTTP隧道数据包与...超文本传输协议(Hyper Text Transfer Protocol,HTTP)隧道具有穿越防火墙和规避入侵检测系统识别的能力,给信息安全带来严重威胁。然而现阶段的HTTP隧道检测方法识别能力不足、难以应对特征复杂的HTTP隧道。文中分析了HTTP隧道数据包与正常HTTP数据包之间的差别,针对目前HTTP隧道检测方法存在的不足,提出了一种仅需提取小部分流量数据的基于卷积神经网络的HTTP隧道检测方法。实验结果表明,基于卷积神经网络的HTTP隧道检测方法能有效识别网络中的HTTP隧道流量,检测精确率、召回率、F1分数均达到99%以上,且不需要人工选择大量的专家特征,对网络流量监管有重要意义。展开更多
明确了计算机网络业务可靠性的概念,着重强调了业务不同,可靠性不同.基于网络业务可靠性分层指数的评价法,讨论了局域网FTP(File Transfer Protocol)业务可靠性的试验流程,给出了一种新的测评方法,并对实验室计算机局域网进行了试验测评...明确了计算机网络业务可靠性的概念,着重强调了业务不同,可靠性不同.基于网络业务可靠性分层指数的评价法,讨论了局域网FTP(File Transfer Protocol)业务可靠性的试验流程,给出了一种新的测评方法,并对实验室计算机局域网进行了试验测评.在案例中,针对局域网中的FTP业务可靠性试验中存在的问题,设计了一个基于Windows批处理.bat脚本程序的FTP数据包发生器作为流量生成器,并研究了基于网络嗅探器Sniffer Pro的业务可靠性试验数据收集方法,给出了试验的具体步骤和试验结果.案例中得到的统计数据与实际网络状况相符.由此,该可靠性试验与评估技术得到了实证,同时也为其他业务的可靠性研究提供了参考.展开更多
文摘The authors, first of all, discuss the importance of implementing application layer protocol ofLAN. A study in this area is required in order to speed up its practical uses as well as further de-velopment in the direction. The present paper is a brief report of the authors’ design methodologyand development of File Transfer Access and Management in reference to the ISO / OSI Moduleand implementation of its service protocol in a LAN,
文摘To enhance the security of network systems, puts forward a kind of software agent is put forward, which has the induction ability of network frameworks and the ability of behavior independence. It is mobile scanning agent. More attentions is paid to expound how to design and realize mobile scanning agent. Besides, it is also explained the programs of mobile scanning agent system. In the end, it expects mobile scanning agent.
基金supported by the National Natural Science Foundation of China (60833002)the National Basic Research Program of China (973 Program) (2007CB307100)+2 种基金the National High Technology Research and Development Program of China (863 Program) (2007AA01Z202)the Program for Changjiang Scholars and Innovative Research Team in University (IRT0707)the Program of Introducing Talents of Discipline to Universities (111 Project) (B08002)
文摘Concurrent multipath transfer(CMT) using stream control transmission protocol(SCTP) multihoming has become an appealing option to increase the throughput and improve the performance of increasingly bandwidth-hungry applications.To investigate the rate allocation for applications in CMT,this paper analyzes the capacities of paths shared by competing sources,then proposes the rate allocation model for elastic flows based on the framework of network utility maximization(NUM).In order to obtain the global optimum of the model,a distributed algorithm is presented which depends only on local available information.Simulation results confirm that the proposed algorithm can achieve the global optimum within reasonable convergence times.
文摘超文本传输协议(Hyper Text Transfer Protocol,HTTP)隧道具有穿越防火墙和规避入侵检测系统识别的能力,给信息安全带来严重威胁。然而现阶段的HTTP隧道检测方法识别能力不足、难以应对特征复杂的HTTP隧道。文中分析了HTTP隧道数据包与正常HTTP数据包之间的差别,针对目前HTTP隧道检测方法存在的不足,提出了一种仅需提取小部分流量数据的基于卷积神经网络的HTTP隧道检测方法。实验结果表明,基于卷积神经网络的HTTP隧道检测方法能有效识别网络中的HTTP隧道流量,检测精确率、召回率、F1分数均达到99%以上,且不需要人工选择大量的专家特征,对网络流量监管有重要意义。
文摘明确了计算机网络业务可靠性的概念,着重强调了业务不同,可靠性不同.基于网络业务可靠性分层指数的评价法,讨论了局域网FTP(File Transfer Protocol)业务可靠性的试验流程,给出了一种新的测评方法,并对实验室计算机局域网进行了试验测评.在案例中,针对局域网中的FTP业务可靠性试验中存在的问题,设计了一个基于Windows批处理.bat脚本程序的FTP数据包发生器作为流量生成器,并研究了基于网络嗅探器Sniffer Pro的业务可靠性试验数据收集方法,给出了试验的具体步骤和试验结果.案例中得到的统计数据与实际网络状况相符.由此,该可靠性试验与评估技术得到了实证,同时也为其他业务的可靠性研究提供了参考.