期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
DDoS Attack in Software Defined Networks: A Survey 被引量:1
1
作者 XU Xiaoqiong YU Hongfang YANG Kun 《ZTE Communications》 2017年第3期13-19,共7页
Distributed Denial of Service(DDoS) attacks have been one of the most destructive threats to Internet security. By decoupling the network control and data plane, software defined networking(SDN) offers a flexible netw... Distributed Denial of Service(DDoS) attacks have been one of the most destructive threats to Internet security. By decoupling the network control and data plane, software defined networking(SDN) offers a flexible network management paradigm to solve DDoS attack in traditional networks. However, the centralized nature of SDN is also a potential vulnerability for DDo S attack. In this paper, we first provide some SDN-supported mechanisms against DDoS attack in traditional networks. A systematic review of various SDN-self DDo S threats are then presented as well as the existing literatures on quickly DDoS detection and defense in SDN. Finally, some promising research directions in this field are introduced. 展开更多
关键词 software defined networks SDN security DDOS detection method defense mechanism
在线阅读 下载PDF
HTTP-sCAN:Detecting HTTP-Flooding Attack by Modeling Multi-Features of Web Browsing Behavior from Noisy Web-Logs 被引量:3
2
作者 WANG Jin ZHANG Min +2 位作者 YANG Xiaolong LONG Keping XU Jie 《China Communications》 SCIE CSCD 2015年第2期118-128,共11页
HTTP-flooding attack disables the victimized web server by sending a large number of HTTP Get requests.Recent research tends to detect HTTP-flooding with the anomaly-based approaches,which detect the HTTP-flooding by ... HTTP-flooding attack disables the victimized web server by sending a large number of HTTP Get requests.Recent research tends to detect HTTP-flooding with the anomaly-based approaches,which detect the HTTP-flooding by modeling the behavior of normal web surfers.However,most of the existing anomaly-based detection approaches usually cannot filter the web-crawling traces from unknown searching bots mixed in normal web browsing logs.These web-crawling traces can bias the base-line profile of anomaly-based schemes in their training phase,and further degrade their detection performance.This paper proposes a novel web-crawling tracestolerated method to build baseline profile,and designs a new anomaly-based HTTP-flooding detection scheme(abbr.HTTP-sCAN).The simulation results show that HTTP-sCAN is immune to the interferences of unknown webcrawling traces,and can detect all HTTPflooding attacks. 展开更多
关键词 IP network DDoS relative entropy cluster algorithm
在线阅读 下载PDF
Reconstruction of geological surfaces using chance-constrained programming
3
作者 Yu Shi-Cheng Lu Cai Hu Guang-Min 《Applied Geophysics》 SCIE CSCD 2019年第1期125-136,共12页
Geological surface modeling is typically based on seismic data, well data, and models of regional geology. However, structural interpretation of these data is error-prone, especially in the absence of structural morph... Geological surface modeling is typically based on seismic data, well data, and models of regional geology. However, structural interpretation of these data is error-prone, especially in the absence of structural morphology information, Existing geological surface models suffer from high levels of uncertainty, which exposes oil and gas exploration and development to additional risk. In this paper, we achieve a reconstruction of the uncertainties associated with a geological surface using chance-constrained programming based on multisource data. We also quantifi ed the uncertainty of the modeling data and added a disturbance term to the objective function. Finally, we verifi ed the applicability of the method using both synthetic and real fault data. We found that the reconstructed geological models met geological rules and reduced the reconstruction uncertainty. 展开更多
关键词 ROUGHNESS UNCERTAINTY PERTURBATION chance-constrained PROGRAMMING
在线阅读 下载PDF
Inter-carrier Interference Analysis for MIMO-OFDM Systems in High-Speed Train Environment
4
作者 王军华 焦戊臣 方勇 《Journal of Donghua University(English Edition)》 EI CAS 2015年第3期411-418,共8页
The orthogonality between the subcarriers of multipleinput multiple-output orthogonal frequency division multiplexing( MIMO-OFDM) systems is destroyed due to the Doppler frequency offset,particularly in the high-speed... The orthogonality between the subcarriers of multipleinput multiple-output orthogonal frequency division multiplexing( MIMO-OFDM) systems is destroyed due to the Doppler frequency offset,particularly in the high-speed train( HST) environment,which leads to severe inter-carrier interference( ICI). Therefore,it is necessary to analyze the mechanism and influence factor of ICI in HST environment. In this paper, by using a non-stationary geometry-based stochastic model( GBSM) for MIMO HST channels, ICI is analyzed through investigating the channel coefficients and the carrier-to-interference power ratio( CIR). It is a fact that most of signal energy spreads on itself and its several neighborhood subcarriers. By investigating the amplitude of subcarriers, CIR is used to evaluate the ICI power level. The simulation results show that the biggest impact factor for the CIR is the multipath number L and the minimum impact factor K; when the train speed υR> 400 km / h,the normalized Doppler frequency offset ε > 0. 35,the CIR tends to zero,and the communication quality will be very poor at this condition. Finally,bit error rate( BER) is investigated by simulating a specific channel environment. 展开更多
关键词 multiple-input multiple-output orthogonal frequency division multiplexing(MIMO-OFDM) systems high-speed train(HST) inter-carrier interference(ICI) non-stationary geometry-based stochastic model(G BSM) carrier-to-interference power ratio(CIR)
在线阅读 下载PDF
Impact of public name resolving services on Akamai
5
作者 秦臻 Xiao Chunjing Li Lemin 《High Technology Letters》 EI CAS 2013年第4期359-363,共5页
To enhance user perceived performance,Akamai' s content distribution network(CDN) utilizes the domain name system(DNS) effectively to redirect users to close-by content replicas over short time scale.The use of DN... To enhance user perceived performance,Akamai' s content distribution network(CDN) utilizes the domain name system(DNS) effectively to redirect users to close-by content replicas over short time scale.The use of DNS redirection has brought a significant advantage to Akamai' s CDN.However,the reliance on DNS also poses a fundamental threat to Akamai' s content distribution model.In particular,systematic evaluation and quantification illustrates the impact of recent emerging public DNS resolving services on Akamai' s CDN,including the degradation of corresponding user perceived performance and the benefit damnification of collaborating internet services providers(ISPs) that host Akamai's edge servers.The measurement demonstrates that a considerable penetration of public DNS resolving services(e.g.,OpenDNS and GoogleDNS) effectively corrupts the Akamai' s serving model,namely the large-scale server distribution and quick DNS redirection. 展开更多
关键词 content distribution network (CDN) domain name system (DNS) public DNS resolving services DNS redirection
在线阅读 下载PDF
Collaborative beamforming based on directional perturbation using one bit feedback 被引量:2
6
作者 Haifen Yang Ning Ding +3 位作者 Zhi Zheng Shuisheng Lin Zhongpei Zhang Guangjun Li 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2016年第3期549-554,共6页
A novel collaborative beamforming algorithm is proposed in a wireless communication system with multiple transmitters and one receiver. All transmitters take part in the collaboration and the weighted message is trans... A novel collaborative beamforming algorithm is proposed in a wireless communication system with multiple transmitters and one receiver. All transmitters take part in the collaboration and the weighted message is transmitted simultaneously. In order to maximize the beamforming gain, the transmitters use one bit feedback information to adjust the phase offset. It tracks the direction in which the signal strength at the receiver can increase. The directional search and perturbation theory is used to achieve the phase alignment. The feasibility of the proposed algorithm is proved both experimentally and theoretically. Simulation results show that the proposed algorithm can improve the convergent speed of the phase alignment. 展开更多
关键词 collaborative beamforming one-bit feedback directional perturbation convergent speed
在线阅读 下载PDF
Kinetics and thermal stability of the Ni_(62)Nb_(38–x)Ta_x(x=5, 10, 15,20 and 25) bulk metallic glasses 被引量:1
7
作者 MengKe He Yi Zhang +1 位作者 Lei Xia Peng Yu 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS CSCD 2017年第7期70-75,共6页
We studied thermal stability and its relationship to the glass-forming ability (GFA) of the Ni62Nb38-xTax (x=5, 10, 15, 20, 25) bulk metallic glasses (BMG) fi'om a kinetic point of view. By fitting the heating-... We studied thermal stability and its relationship to the glass-forming ability (GFA) of the Ni62Nb38-xTax (x=5, 10, 15, 20, 25) bulk metallic glasses (BMG) fi'om a kinetic point of view. By fitting the heating-rate dependence of glass transition temperature (Tgonsct) and crystallization temperatures (Txonset and Txpcak) of the Ni62Nb38_xTax BMG using the Vogel-Fulcher-Tammann (VFT) equation, we obtained the ideal glass transition and crystallization temperatures (Tg0 and Tx2) and the fragility parameter (m), and also constructed continuous heating transition (CHT) diagrams for crystallization of the BMG. The CHT diagrams of the BMG indicate enhanced thermal stability by Ta addition; the Tg~ as well as the Tx~ also illustrates this improved stability limit. The compositional dependence of m, which agrees well with that of the reduced glass-transition temperature, indicates a strong correlation between liquid fragility and glass-forming ability in the present alloy system. These results provide new evidence for understanding thermal stability, liquid fragility, and GFA in BMG. 展开更多
关键词 bulk metallic glasses thermal stability KINETICS glass-forming ability
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部