您的位置: 专家智库 > >

国家自然科学基金(61379145)

作品数:9 被引量:61H指数:5
相关作者:蔡志平宋勇李阳董德尊刘强更多>>
相关机构:国防科学技术大学湖南民族职业学院更多>>
发文基金:国家自然科学基金更多>>
相关领域:自动化与计算机技术电子电信更多>>

文献类型

  • 8篇中文期刊文章

领域

  • 8篇自动化与计算...

主题

  • 4篇网络
  • 2篇带宽
  • 2篇带宽测量
  • 2篇延迟测量
  • 2篇SDN
  • 1篇丢包
  • 1篇虚拟机
  • 1篇云计算
  • 1篇支持向量
  • 1篇支持向量机
  • 1篇入侵
  • 1篇入侵检测
  • 1篇入侵检测方法
  • 1篇贪婪
  • 1篇特征提取
  • 1篇平台管理
  • 1篇自监控
  • 1篇拓扑
  • 1篇网络安全
  • 1篇网络安全检测

机构

  • 5篇国防科学技术...
  • 2篇湖南民族职业...

作者

  • 5篇蔡志平
  • 2篇李阳
  • 2篇宋勇
  • 1篇唐勇
  • 1篇张一鸣
  • 1篇殷建平
  • 1篇刘强
  • 1篇董德尊
  • 1篇夏竟
  • 1篇张恒

传媒

  • 3篇Comput...
  • 1篇华中科技大学...
  • 1篇计算机工程与...
  • 1篇计算机科学
  • 1篇中国科学:信...
  • 1篇长春师范大学...

年份

  • 1篇2021
  • 1篇2019
  • 4篇2018
  • 2篇2017
9 条 记 录,以下是 1-8
排序方式:
一种SDN网络路径异常监控方法被引量:1
2017年
在SDN网络中,及时掌握网络中数据传输路径的运行状态对于控制器进行网络安全监控和流量的负载均衡至关重要。利用SDN网络架构的特点,提出了一种主动测量与被动测量相结合的路径异常监控方法,以对网络路径的运行状态进行异常监控。从路径的延迟和可用带宽两个方面分析网络路径的运行情况,并对出现异常的路径进行检测和报警,保障网络的正常运行。实验结果表明,在不同的网络条件下,所提方法都能有效测量网络路径的延迟和可用带宽,并且能够及时发现网络中出现的路径异常情况。
李阳蔡志平夏竟
关键词:SDN延迟测量可用带宽测量
网络安全检测框架与方法研究被引量:20
2017年
网络和信息系统已经成为关键基础设施乃至整个经济社会的核心,一旦遭受攻击破坏、发生重大安全事件,将严重危害国家经济安全和公共利益。如何检测网络攻击行为,保障网络基础设施的安全,是保障核心技术装备安全可控,构建国家网络安全保障体系的核心环节。系统地介绍了针对入侵检测框架、特征自动生成、安全检测理论及方法、网络拓扑监控与网络路由控制等问题已取得的若干创新成果,梳理出网络安全检测算法和框架、无线网络安全检测、网络监控和安全增强等若干科学发现,最后总结了网络安全检测与控制技术发展趋势。
刘强蔡志平殷建平董德尊唐勇张一鸣
关键词:网络安全检测无线网络安全路由控制
SDN网络测量技术综述被引量:9
2018年
近年来,随着网络规模的不断扩大,结构和功能日趋复杂,网络流量快速增长,各种新型网络应用不断出现,对传统网络的配置、运行和管理提出了严峻挑战.软件定义网络(software defined networking,SDN)作为新兴的网络架构,较好地适应了各种网络应用的需求.在SDN网络中进行测量任务能及时了解、监控和掌握网络状态,是优化网络结构、改善网络服务质量、实现网络故障诊断和恢复的重要手段.本文对SDN网络测量技术进行综述,研究网络性能测量中的延迟测量、丢包测量和带宽测量等方面以及网络流量测量等相关技术,从设计理念、测量方式、测量对象、技术特点,以及优缺点等方面做了详尽的描述.文章最后进行了总结并对未来工作进行了展望.
张恒蔡志平李阳
关键词:延迟测量带宽测量
基于深度学习特征提取的网络入侵检测方法被引量:15
2021年
针对在构建深度学习模型过程中,神经网络隐藏层的层数和每层神经元节点数主要通过人工专家的主观经验设置,深度学习模型智能化不够、适应性不强的问题,提出了一种应用于网络入侵检测的自适应、智能化的深度学习特征提取方法。该方法采用逐层贪婪训练的策略,通过改进稀疏自编码神经网络训练的方式,形成了一个自适应、智能化的特征提取神经网络。最后利用基于支持向量机的多类分类器,形成了一种基于深度学习特征提取的网络入侵检测系统。实验表明:与基于自编码网络的支持向量机入侵检测模型(AN-SVM)和基于核主成分分析与遗传算法相结合的支持向量机模型(KPCA-GA-SVM)入侵检测方法相比,准确率平均提高了5.01%,误报率平均降低了6.24%,检测时间平均降低了16%,说明了该方法优于其他类似方法。
宋勇宋勇蔡志平
关键词:特征提取支持向量机
Feature Selection Method Based on Class Discriminative Degree for Intelligent Medical Diagnosis被引量:5
2018年
By using efficient and timely medical diagnostic decision making,clinicians can positively impact the quality and cost of medical care.However,the high similarity of clinical manifestations between diseases and the limitation of clinicians’knowledge both bring much difficulty to decision making in diagnosis.Therefore,building a decision support system that can assist medical staff in diagnosing and treating diseases has lately received growing attentions in the medical domain.In this paper,we employ a multi-label classification framework to classify the Chinese electronic medical records to establish corresponding relation between the medical records and disease categories,and compare this method with the traditional medical expert system to verify the performance.To select the best subset of patient features,we propose a feature selection method based on the composition and distribution of symptoms in electronic medical records and compare it with the traditional feature selection methods such as chi-square test.We evaluate the feature selection methods and diagnostic models from two aspects,false negative rate(FNR)and accuracy.Extensive experiments have conducted on a real-world Chinese electronic medical record database.The evaluation results demonstrate that our proposed feature selection method can improve the accuracy and reduce the FNR compare to the traditional feature selection methods,and the multi-label classification framework have better accuracy and lower FNR than the traditional expert system.
Shengqun FangZhiping CaiWencheng SunAnfeng LiuFang LiuZhiyao LiangGuoyan Wang
关键词:EMR
一种基于Xen的云基础设施管理平台构建方法被引量:1
2018年
本文从软件架构的角度出发,对IAAS的管理工具Open Stack内部组件特性和管理平台的实现进行了分析,并利用开源社区Xen Server的免费API接口,构建了一个具有可信安全服务的虚拟化平台。在此基础上,通过部署多个Open Stack节点实现了IAAS管理平台。为验证基于Xen的多节点Open Stack管理平台在云基础设施管理方面的实际性能,本文以云平台的文件基准读写性能参数为指标,采用IOZONE工具进行了并发读写测试。研究结果表明,基于Xen的多节点Open Stack IAAS平台具有良好的容错能力和稳定的并发读写能力。
宋勇蔡志平
关键词:云计算虚拟机
Using Imbalanced Triangle Synthetic Data for Machine Learning Anomaly Detection被引量:4
2019年
The extreme imbalanced data problem is the core issue in anomaly detection.The amount of abnormal data is so small that we cannot get adequate information to analyze it.The mainstream methods focus on taking fully advantages of the normal data,of which the discrimination method is that the data not belonging to normal data distribution is the anomaly.From the view of data science,we concentrate on the abnormal data and generate artificial abnormal samples by machine learning method.In this kind of technologies,Synthetic Minority Over-sampling Technique and its improved algorithms are representative milestones,which generate synthetic examples randomly in selected line segments.In our work,we break the limitation of line segment and propose an Imbalanced Triangle Synthetic Data method.In theory,our method covers a wider range.In experiment with real world data,our method performs better than the SMOTE and its meliorations.
Menghua LuoKe WangZhiping CaiAnfeng LiuYangyang LiChak Fong Cheang
关键词:ANOMALYDATASYNTHETICDATA
Securing Display Path for Security-Sensitive Applications on Mobile Devices
2018年
While smart devices based on ARM processor bring us a lot of convenience,they also become an attractive target of cyber-attacks.The threat is exaggerated as commodity OSes usually have a large code base and suffer from various software vulnerabilities.Nowadays,adversaries prefer to steal sensitive data by leaking the content of display output by a security-sensitive application.A promising solution is to exploit the hardware visualization extensions provided by modern ARM processors to construct a secure display path between the applications and the display device.In this work,we present a scheme named SecDisplay for trusted display service,it protects sensitive data displayed from being stolen or tampered surreptitiously by a compromised OS.The TCB of SecDisplay mainly consists of a tiny hypervisor and a super light-weight rendering painter,and has only^1400 lines of code.We implemented a prototype of SecDisplay and evaluated its performance overhead.The results show that SecDisplay only incurs an average drop of 3.4%.
Jinhua CuiYuanyuan ZhangZhiping CaiAnfeng LiuYangyang Li
关键词:VIRTUALIZATION
共1页<1>
聚类工具0