Cyber Security : : 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers.
Saved in:
Superior document: | Communications in Computer and Information Science Series ; v.1299 |
---|---|
: | |
TeilnehmendeR: | |
Place / Publishing House: | Singapore : : Springer Singapore Pte. Limited,, 2021. ©2020. |
Year of Publication: | 2021 |
Edition: | 1st ed. |
Language: | English |
Series: | Communications in Computer and Information Science Series
|
Online Access: | |
Physical Description: | 1 online resource (235 pages) |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Table of Contents:
- Intro
- Preface
- Organization
- Contents
- Access Control
- PassEye: Sniffing Your Password from HTTP Sessions by Deep Neural Network
- 1 Introduction
- 2 Background
- 2.1 Password Attack
- 2.2 Password Sniffing Attack
- 2.3 Neural Network in Network Traffic Classification
- 3 Attack Model
- 4 PassEye Design
- 4.1 Overview
- 4.2 Feature Extraction and Selection
- 4.3 Neural Network Model
- 5 Evaluation
- 5.1 Environment Setup
- 5.2 Dataset
- 5.3 Effectiveness of PassEye
- 5.4 Discussion
- 6 Conclusion and Future Work
- References
- Research on the Development Route of International Communication Accesses
- 1 Background
- 2 Current Situation of International Communication Networks
- 2.1 International Communication Access
- 2.2 International Submarine Cable Construction
- 2.3 Cross-Border Terrestrial Cable Construction
- 3 Factors Affecting International Access Establishment
- 3.1 Policy Environment
- 3.2 Geographical Environment
- 3.3 Necessity of International Access Construction
- 3.4 Feasibility of International Access Construction
- 3.5 Security Assurance Measures
- 4 International Access Establishment Case
- 4.1 Environment Factor
- 4.2 Necessity Analysis
- 4.3 Construction Feasibility Analysis
- 5 International Access Development Recommendations
- 6 Conclusion
- References
- Cryptography
- A Secure Ranked Search Model Over Encrypted Data in Hybrid Cloud Computing
- 1 Introduction
- 2 Related Work
- 2.1 The Okapi BM25 Model Over Plain Text
- 2.2 Fully Homomorphic Encryption
- 2.3 The Applicability of Hybrid Cloud Computing
- 3 Secure Ranked Search Model Over Hybrid Cloud
- 3.1 The Architecture of the Secure Ranked Search Model Over Hybrid Cloud
- 3.2 The Implementation of Fully Homomorphic Encryption Based Secure Ranking Scheme
- 4 Experiment Result and Future Work.
- 4.1 Preliminary Experimental Result
- 4.2 Future Work
- 5 Conclusion
- References
- Based on GAN Generating Chaotic Sequence
- 1 Introduction
- 2 Basic Adversarial Encryption Algorithm and Chaotic Map
- 2.1 Basic Adversarial Encryption Communication Model
- 2.2 Logistic Chaotic Map
- 3 Adversarial Encryption Algorithm Based on Logistic Mapping
- 3.1 Key Generator Based on GAN
- 3.2 The Overall Encryption Algorithm Design
- 4 Experimental Procedure
- 4.1 Experimental Environment
- 4.2 Key Security Analysis
- 4.3 Analysis of Encryption Model Performance
- 5 Conclusion
- References
- MinerGate: A Novel Generic and Accurate Defense Solution Against Web Based Cryptocurrency Mining Attacks
- 1 Introduction
- 2 Background
- 2.1 Cryptocurrency Mining and Cryptojacking Attacks
- 2.2 Related Web Techniques
- 3 System Overview
- 3.1 Challenges and Our Solutions
- 3.2 JavaScript Instrumentation
- 3.3 Machine Learning Based Detection
- 3.4 Data-Driven Feature Selection
- 3.5 Security Enforcement
- 4 Evaluation
- 4.1 Dataset
- 4.2 Accuracy
- 4.3 Overhead
- 5 Related Work
- 6 Conclusions and Future Work
- References
- Research on Industrial Internet Security Emergency Management Framework Based on Blockchain: Take China as an Example
- 1 Introduction
- 2 Situation and Challenge
- 2.1 Organizational Structure
- 2.2 Technical Status
- 2.3 Challenge
- 3 Overview of Blockchain
- 3.1 Principle
- 3.2 Research Status
- 4 Consortium-Blockchain-Based ISEMS
- 4.1 Base Model
- 4.2 Architecture
- 4.3 Organization Structure
- 4.4 Critical Process
- 5 Summary and Prospect
- References
- Research Status and Prospect of Blockchain Technology in Agriculture Field
- 1 Introduction
- 2 Overview of Blockchain
- 2.1 Core of Blockchain Technology in Agriculture
- 2.2 Application of Blockchain in Agriculture.
- 3 Current Situation of Agricultural Supply Chain
- 3.1 Upstream Link
- 3.2 Mid-Stream Link
- 3.3 Downstream Link
- 3.4 Trading Link
- 4 Current Status of Agricultural Products Traceability
- 4.1 Solves the Problem of Accountability for Agricultural Products
- 4.2 Solves the Problem of Traceability Trust for Agricultural Products
- 5 Summary and Prospect
- References
- Denial-of-Service Attacks
- Practical DDoS Attack Group Discovery and Tracking with Complex Graph-Based Network
- 1 Introduction
- 2 Methodology and Background
- 3 DDoSAGD - DDoS Attack Group Discovery Framework
- 3.1 Basic Concepts and Fundamental Graph Initialization
- 3.2 Meta Path-Based Similarity Framework
- 3.3 Hierarchical Community Discovery
- 4 Evaluation
- 4.1 Statistics of Input Data and Graphs
- 4.2 Situation Awareness of DDoS Attack Groups
- 5 Conclusion
- References
- Hardware Security Implementation
- Research on the Remote Deployment Design of OTN Electrical Racks
- 1 Background
- 1.1 Current Situation
- 1.2 Inevitability of Remote Electrical Rack Deployment
- 2 Implementation Mode and Impact
- 2.1 Implementation Modes
- 2.2 Impact on System OSNR
- 2.3 Impact on the Receive Optical Power of the OM/OD or OTU Boards
- 2.4 Other Impacts
- 3 Applicability Analysis
- 3.1 Advantages and Disadvantages
- 3.2 Scenario Analysis
- 4 Test Models and Simulation
- 4.1 Scenario-Based Modeling
- 4.2 Solution-Based Simulation for Different Scenarios
- 4.3 Conclusion
- 5 Application on Live Networks
- 5.1 Live Network Description
- 5.2 Solution Selection
- 6 Conclusions and Suggestions
- Intrusion/Anomaly Detection and Malware Mitigation
- An Effective Intrusion Detection Model Based on Pls-Logistic Regression with Feature Augmentation
- 1 Introduction
- 2 Methodology
- 2.1 Feature Augmentation.
- 2.2 Pls-Logistic Regression Classification Model
- 3 Proposed Intrusion Detection Model: Fa-Plslogistic
- 4 Experimental Setting
- 4.1 Dataset Description
- 4.2 Experimental Results and Discussion
- 5 Conclusion
- References
- DeepHTTP: Anomalous HTTP Traffic Detection and Malicious Pattern Mining Based on Deep Learning
- 1 Introduction
- 2 Related Work
- 2.1 Malicious Traffic Detection
- 2.2 Pattern Mining Method
- 3 Preliminaries
- 3.1 DeepHTTP Architecture and Overview
- 3.2 Data Preprocessing
- 4 Our Approach
- 4.1 Anomaly HTTP Traffic Detection
- 4.2 Mining Stage
- 5 Evaluation
- 5.1 Dataset
- 5.2 Validation of Structural Feature Extraction Method
- 5.3 Model Comparison
- 5.4 Malicious Pattern Mining
- 6 Conclusion
- References
- Social Network Security and Privacy
- A Label Propagation Based User Locations Prediction Algorithm in Social Network
- 1 Introduction
- 2 Related Work
- 3 Related Concept and Problem Definition
- 4 Label Propagation Based User Location Prediction Algorithm
- 5 Experiment Result and Analysis
- 5.1 Data Set Description
- 5.2 Experimental Results Analysis
- 6 Conclusion
- References
- Perosonalized Differentially Private Location Collection Method with Adaptive GPS Discretization
- 1 Introduction
- 2 Related Work
- 3 System Overview
- 4 Module Design
- 4.1 Location Division Module
- 4.2 Personalized Location Privacy
- 4.3 Location Density Collection Module
- 5 Experimental Validation
- 5.1 Experiment Setup
- 5.2 Experiment Results
- 6 Conclusion
- References
- Systems Security
- Analysis on the Security of Satellite Internet
- 1 Introduction
- 2 Related Work
- 3 Analysis of SI Security
- 3.1 Overview of Security Issues of SI
- 3.2 National Security Issues
- 3.3 Network Security Issues
- 3.4 Equipment Security Issues
- 4 Conclusion
- References.
- A Survey on Cyberspace Search Engines
- 1 Introduction
- 2 Supporting Internet Protocols
- 3 Total Amounts of Detected Devices
- 4 Device Information
- 5 Scanning Frequency
- 6 System Architecture
- 7 Third Party Databases
- 8 Probes Distribution
- 9 Conclusion
- References
- Brief Introduction of Network Security Asset Management for Banks
- 1 Introduction
- 2 Detection of Network Security Assets
- 3 Management of Network Security Assets
- 4 Applications of Network Security Assets
- 5 Design of Network Security Assets Management System
- 6 Conclusions
- References
- Embedded Security-Critical Device Resource Isolation
- 1 Introduction
- 2 Related Work
- 2.1 Resource Software Isolation
- 2.2 Resource Hardware Isolation
- 2.3 Current Status of Research on Resource Isolation of Vehicle System
- 2.4 Current Status of Anti-virus Software Running on Vehicle Systems
- 3 Modeling of Vehicle Resource Isolation System
- 3.1 Isolation Model Design
- 3.2 Implementation and Verification of on-Board System
- 3.3 Test and Analysis
- 4 Conclusion
- References
- Author Index.