Distributed Denial of Service(DDoS) attacks have been one of the most destructive threats to Internet security. By decoupling the network control and data plane, software defined networking(SDN) offers a flexible netw...Distributed Denial of Service(DDoS) attacks have been one of the most destructive threats to Internet security. By decoupling the network control and data plane, software defined networking(SDN) offers a flexible network management paradigm to solve DDoS attack in traditional networks. However, the centralized nature of SDN is also a potential vulnerability for DDo S attack. In this paper, we first provide some SDN-supported mechanisms against DDoS attack in traditional networks. A systematic review of various SDN-self DDo S threats are then presented as well as the existing literatures on quickly DDoS detection and defense in SDN. Finally, some promising research directions in this field are introduced.展开更多
HTTP-flooding attack disables the victimized web server by sending a large number of HTTP Get requests.Recent research tends to detect HTTP-flooding with the anomaly-based approaches,which detect the HTTP-flooding by ...HTTP-flooding attack disables the victimized web server by sending a large number of HTTP Get requests.Recent research tends to detect HTTP-flooding with the anomaly-based approaches,which detect the HTTP-flooding by modeling the behavior of normal web surfers.However,most of the existing anomaly-based detection approaches usually cannot filter the web-crawling traces from unknown searching bots mixed in normal web browsing logs.These web-crawling traces can bias the base-line profile of anomaly-based schemes in their training phase,and further degrade their detection performance.This paper proposes a novel web-crawling tracestolerated method to build baseline profile,and designs a new anomaly-based HTTP-flooding detection scheme(abbr.HTTP-sCAN).The simulation results show that HTTP-sCAN is immune to the interferences of unknown webcrawling traces,and can detect all HTTPflooding attacks.展开更多
Geological surface modeling is typically based on seismic data, well data, and models of regional geology. However, structural interpretation of these data is error-prone, especially in the absence of structural morph...Geological surface modeling is typically based on seismic data, well data, and models of regional geology. However, structural interpretation of these data is error-prone, especially in the absence of structural morphology information, Existing geological surface models suffer from high levels of uncertainty, which exposes oil and gas exploration and development to additional risk. In this paper, we achieve a reconstruction of the uncertainties associated with a geological surface using chance-constrained programming based on multisource data. We also quantifi ed the uncertainty of the modeling data and added a disturbance term to the objective function. Finally, we verifi ed the applicability of the method using both synthetic and real fault data. We found that the reconstructed geological models met geological rules and reduced the reconstruction uncertainty.展开更多
The orthogonality between the subcarriers of multipleinput multiple-output orthogonal frequency division multiplexing( MIMO-OFDM) systems is destroyed due to the Doppler frequency offset,particularly in the high-speed...The orthogonality between the subcarriers of multipleinput multiple-output orthogonal frequency division multiplexing( MIMO-OFDM) systems is destroyed due to the Doppler frequency offset,particularly in the high-speed train( HST) environment,which leads to severe inter-carrier interference( ICI). Therefore,it is necessary to analyze the mechanism and influence factor of ICI in HST environment. In this paper, by using a non-stationary geometry-based stochastic model( GBSM) for MIMO HST channels, ICI is analyzed through investigating the channel coefficients and the carrier-to-interference power ratio( CIR). It is a fact that most of signal energy spreads on itself and its several neighborhood subcarriers. By investigating the amplitude of subcarriers, CIR is used to evaluate the ICI power level. The simulation results show that the biggest impact factor for the CIR is the multipath number L and the minimum impact factor K; when the train speed υR> 400 km / h,the normalized Doppler frequency offset ε > 0. 35,the CIR tends to zero,and the communication quality will be very poor at this condition. Finally,bit error rate( BER) is investigated by simulating a specific channel environment.展开更多
To enhance user perceived performance,Akamai' s content distribution network(CDN) utilizes the domain name system(DNS) effectively to redirect users to close-by content replicas over short time scale.The use of DN...To enhance user perceived performance,Akamai' s content distribution network(CDN) utilizes the domain name system(DNS) effectively to redirect users to close-by content replicas over short time scale.The use of DNS redirection has brought a significant advantage to Akamai' s CDN.However,the reliance on DNS also poses a fundamental threat to Akamai' s content distribution model.In particular,systematic evaluation and quantification illustrates the impact of recent emerging public DNS resolving services on Akamai' s CDN,including the degradation of corresponding user perceived performance and the benefit damnification of collaborating internet services providers(ISPs) that host Akamai's edge servers.The measurement demonstrates that a considerable penetration of public DNS resolving services(e.g.,OpenDNS and GoogleDNS) effectively corrupts the Akamai' s serving model,namely the large-scale server distribution and quick DNS redirection.展开更多
A novel collaborative beamforming algorithm is proposed in a wireless communication system with multiple transmitters and one receiver. All transmitters take part in the collaboration and the weighted message is trans...A novel collaborative beamforming algorithm is proposed in a wireless communication system with multiple transmitters and one receiver. All transmitters take part in the collaboration and the weighted message is transmitted simultaneously. In order to maximize the beamforming gain, the transmitters use one bit feedback information to adjust the phase offset. It tracks the direction in which the signal strength at the receiver can increase. The directional search and perturbation theory is used to achieve the phase alignment. The feasibility of the proposed algorithm is proved both experimentally and theoretically. Simulation results show that the proposed algorithm can improve the convergent speed of the phase alignment.展开更多
We studied thermal stability and its relationship to the glass-forming ability (GFA) of the Ni62Nb38-xTax (x=5, 10, 15, 20, 25) bulk metallic glasses (BMG) fi'om a kinetic point of view. By fitting the heating-...We studied thermal stability and its relationship to the glass-forming ability (GFA) of the Ni62Nb38-xTax (x=5, 10, 15, 20, 25) bulk metallic glasses (BMG) fi'om a kinetic point of view. By fitting the heating-rate dependence of glass transition temperature (Tgonsct) and crystallization temperatures (Txonset and Txpcak) of the Ni62Nb38_xTax BMG using the Vogel-Fulcher-Tammann (VFT) equation, we obtained the ideal glass transition and crystallization temperatures (Tg0 and Tx2) and the fragility parameter (m), and also constructed continuous heating transition (CHT) diagrams for crystallization of the BMG. The CHT diagrams of the BMG indicate enhanced thermal stability by Ta addition; the Tg~ as well as the Tx~ also illustrates this improved stability limit. The compositional dependence of m, which agrees well with that of the reduced glass-transition temperature, indicates a strong correlation between liquid fragility and glass-forming ability in the present alloy system. These results provide new evidence for understanding thermal stability, liquid fragility, and GFA in BMG.展开更多
基金supported in part by the“973”Program of China under Grant No.2013CB329103the National Natural Science Foundation of China under Grant No.61271171 and No.61401070+1 种基金National Key Research and Development Program of China No.2016YFB0800105the“863”Program of China under Grant No.2015AA015702 and No.2015AA016102
文摘Distributed Denial of Service(DDoS) attacks have been one of the most destructive threats to Internet security. By decoupling the network control and data plane, software defined networking(SDN) offers a flexible network management paradigm to solve DDoS attack in traditional networks. However, the centralized nature of SDN is also a potential vulnerability for DDo S attack. In this paper, we first provide some SDN-supported mechanisms against DDoS attack in traditional networks. A systematic review of various SDN-self DDo S threats are then presented as well as the existing literatures on quickly DDoS detection and defense in SDN. Finally, some promising research directions in this field are introduced.
基金supported by National Key Basic Research Program of China(973 program)under Grant No.2012CB315905National Natural Science Foundation of China under grants 61172048,61100184,60932005 and 61201128the Fundamental Research Funds for the Central Universities under Grant No ZYGX2011J007
文摘HTTP-flooding attack disables the victimized web server by sending a large number of HTTP Get requests.Recent research tends to detect HTTP-flooding with the anomaly-based approaches,which detect the HTTP-flooding by modeling the behavior of normal web surfers.However,most of the existing anomaly-based detection approaches usually cannot filter the web-crawling traces from unknown searching bots mixed in normal web browsing logs.These web-crawling traces can bias the base-line profile of anomaly-based schemes in their training phase,and further degrade their detection performance.This paper proposes a novel web-crawling tracestolerated method to build baseline profile,and designs a new anomaly-based HTTP-flooding detection scheme(abbr.HTTP-sCAN).The simulation results show that HTTP-sCAN is immune to the interferences of unknown webcrawling traces,and can detect all HTTPflooding attacks.
基金by National Science and Technology Major Project(Grant No.2017ZX05018004004)the National Natural Science Foundation of China (No.U1562218 & 41604107).
文摘Geological surface modeling is typically based on seismic data, well data, and models of regional geology. However, structural interpretation of these data is error-prone, especially in the absence of structural morphology information, Existing geological surface models suffer from high levels of uncertainty, which exposes oil and gas exploration and development to additional risk. In this paper, we achieve a reconstruction of the uncertainties associated with a geological surface using chance-constrained programming based on multisource data. We also quantifi ed the uncertainty of the modeling data and added a disturbance term to the objective function. Finally, we verifi ed the applicability of the method using both synthetic and real fault data. We found that the reconstructed geological models met geological rules and reduced the reconstruction uncertainty.
基金National Natural Science Foundation of China(No.61271213)
文摘The orthogonality between the subcarriers of multipleinput multiple-output orthogonal frequency division multiplexing( MIMO-OFDM) systems is destroyed due to the Doppler frequency offset,particularly in the high-speed train( HST) environment,which leads to severe inter-carrier interference( ICI). Therefore,it is necessary to analyze the mechanism and influence factor of ICI in HST environment. In this paper, by using a non-stationary geometry-based stochastic model( GBSM) for MIMO HST channels, ICI is analyzed through investigating the channel coefficients and the carrier-to-interference power ratio( CIR). It is a fact that most of signal energy spreads on itself and its several neighborhood subcarriers. By investigating the amplitude of subcarriers, CIR is used to evaluate the ICI power level. The simulation results show that the biggest impact factor for the CIR is the multipath number L and the minimum impact factor K; when the train speed υR> 400 km / h,the normalized Doppler frequency offset ε > 0. 35,the CIR tends to zero,and the communication quality will be very poor at this condition. Finally,bit error rate( BER) is investigated by simulating a specific channel environment.
基金Supported by the National Basic Research Program of China(No.2013CB329103)the National Natural Science Foundation of China(No.61133016,61300191)+1 种基金the National High Technology Joint Research Program of China(No.2011AA010706)the Program of SichuanProvince Applied and Basic Research(No.2013JY0116)
文摘To enhance user perceived performance,Akamai' s content distribution network(CDN) utilizes the domain name system(DNS) effectively to redirect users to close-by content replicas over short time scale.The use of DNS redirection has brought a significant advantage to Akamai' s CDN.However,the reliance on DNS also poses a fundamental threat to Akamai' s content distribution model.In particular,systematic evaluation and quantification illustrates the impact of recent emerging public DNS resolving services on Akamai' s CDN,including the degradation of corresponding user perceived performance and the benefit damnification of collaborating internet services providers(ISPs) that host Akamai's edge servers.The measurement demonstrates that a considerable penetration of public DNS resolving services(e.g.,OpenDNS and GoogleDNS) effectively corrupts the Akamai' s serving model,namely the large-scale server distribution and quick DNS redirection.
基金supported by the National Natural Science Foundation of China(6130115561571003)+2 种基金the Ministry of Education(MCM20130111)the Funds for the Central Universities(ZYGX2014J001)the State Grid Power(W2015000333)
文摘A novel collaborative beamforming algorithm is proposed in a wireless communication system with multiple transmitters and one receiver. All transmitters take part in the collaboration and the weighted message is transmitted simultaneously. In order to maximize the beamforming gain, the transmitters use one bit feedback information to adjust the phase offset. It tracks the direction in which the signal strength at the receiver can increase. The directional search and perturbation theory is used to achieve the phase alignment. The feasibility of the proposed algorithm is proved both experimentally and theoretically. Simulation results show that the proposed algorithm can improve the convergent speed of the phase alignment.
基金supported by the National Natural Science Foundation of China(Grant Nos.51271103,51271210,and 51671119)the Chongqing Research Program of Basic Research and Frontier Technology(Grant No.cstc2015jcyjBX0039)the Foundation for the Creative Research Groups of Higher Education of Chongqing(Grant No.CXTDX201601016)
文摘We studied thermal stability and its relationship to the glass-forming ability (GFA) of the Ni62Nb38-xTax (x=5, 10, 15, 20, 25) bulk metallic glasses (BMG) fi'om a kinetic point of view. By fitting the heating-rate dependence of glass transition temperature (Tgonsct) and crystallization temperatures (Txonset and Txpcak) of the Ni62Nb38_xTax BMG using the Vogel-Fulcher-Tammann (VFT) equation, we obtained the ideal glass transition and crystallization temperatures (Tg0 and Tx2) and the fragility parameter (m), and also constructed continuous heating transition (CHT) diagrams for crystallization of the BMG. The CHT diagrams of the BMG indicate enhanced thermal stability by Ta addition; the Tg~ as well as the Tx~ also illustrates this improved stability limit. The compositional dependence of m, which agrees well with that of the reduced glass-transition temperature, indicates a strong correlation between liquid fragility and glass-forming ability in the present alloy system. These results provide new evidence for understanding thermal stability, liquid fragility, and GFA in BMG.