期刊文献+
共找到15篇文章
< 1 >
每页显示 20 50 100
Towards Efficient Security Policy Lookup on ManyCore Network Processing Platforms 被引量:1
1
作者 WANG Xiang QI Yaxuan +2 位作者 WANG Kai XUE Yibo LI Jun 《China Communications》 SCIE CSCD 2015年第8期146-160,共15页
Modem network security devices employ packet classification and pattern matching algorithms to inspect packets. Due to the complexity and heterogeneity of different search data structures, it is difficult for existing... Modem network security devices employ packet classification and pattern matching algorithms to inspect packets. Due to the complexity and heterogeneity of different search data structures, it is difficult for existing algorithms to leverage modern hardware platforms to achieve high performance. This paper presents a Structural Compression (SC) method that optimizes the data structures of both algorithms. It reviews both algorithms under the model of search space decomposition, and homogenizes their search data structures. This approach not only guarantees deterministic lookup speed but also optimizes the data structure for efficient implementation oi1 many-core platforms. The performance evaluation reveals that the homogeneous data structure achieves 10Gbps line-rate 64byte packet classification throughput and multi-Gbps deep inspection speed. 展开更多
关键词 packet classification patternmatching ALGORITHMS data structures
在线阅读 下载PDF
Social-Aware Cooperation Among Mobile Terminals for Wireless Downlink Transmission 被引量:1
2
作者 Mao Hongliang Feng Wei Ge Ning 《China Communications》 SCIE CSCD 2015年第9期1-10,共10页
This paper investigates the social-aware cooperation(SAC) among mobile terminals(MTs), motivated by the fact that modern smart devices have much improved context awareness. Aware of the social ties, the cooperative ne... This paper investigates the social-aware cooperation(SAC) among mobile terminals(MTs), motivated by the fact that modern smart devices have much improved context awareness. Aware of the social ties, the cooperative network contains two layers of property: social and physical. In order to observe how the social awareness benefit the cooperation performance, we first formulate the social ties between MTs into parameters that can describe the cooperative behaviors by taking the mobility feature into account, defined as the conviction-approval-suspicion(CAS) model. Limited by the processing capability, partner selection is of great practical significance. To this end, the social-aware partner selection strategy is analyzed, and a significant superiority is observed compared to social-unaware selection. By analyzing the cooperative throughput, an explicit relationship between the degrees-of-freedom gain and the social-physical property is finally derived. Simulation results validate the theoretical analysis. 展开更多
关键词 social-aware cooperation partner selection degrees-of-freedom
在线阅读 下载PDF
Collaborative Network Security in Multi-Tenant Data Center for Cloud Computing 被引量:5
3
作者 Zhen Chen Wenyu Dong +3 位作者 Hang Li Peng Zhang Xinming Chen Junwei Cao 《Tsinghua Science and Technology》 SCIE EI CAS 2014年第1期82-94,共13页
A data center is an infrastructure that supports Internet service. Cloud comput the face of the Internet service infrastructure, enabling even small organizations to quickly ng is rapidly changing build Web and mobile... A data center is an infrastructure that supports Internet service. Cloud comput the face of the Internet service infrastructure, enabling even small organizations to quickly ng is rapidly changing build Web and mobile applications for millions of users by taking advantage of the scale and flexibility of shared physical infrastructures provided by cloud computing. In this scenario, multiple tenants save their data and applications in shared data centers, blurring the network boundaries between each tenant in the cloud. In addition, different tenants have different security requirements, while different security policies are necessary for different tenants. Network virtualization is used to meet a diverse set of tenant-specific requirements with the underlying physical network enabling multi-tenant datacenters to automatically address a large and diverse set of tenants requirements. In this paper, we propose the system implementation of vCNSMS, a collaborative network security prototype system used n a multi-tenant data center. We demonstrate vCNSMS with a centralized collaborative scheme and deep packet nspection with an open source UTM system. A security level based protection policy is proposed for simplifying the security rule management for vCNSMS. Different security levels have different packet inspection schemes and are enforced with different security plugins. A smart packet verdict scheme is also integrated into vCNSMS for ntelligence flow processing to protect from possible network attacks inside a data center network 展开更多
关键词 data center network network security software defined network collaborative network security multi- tenant network virtualization intelligent flow processing cloud computing
原文传递
Mitigation Strategy against Cascading Failures on Social Networks 被引量:4
4
作者 YI Chengqi BAO Yuanyuan +1 位作者 JIANG Jingchi XUE Yibo 《China Communications》 SCIE CSCD 2014年第8期37-46,共10页
Cascading failures are common phenomena in many of real-world networks,such as power grids,Internet,transportation networks and social networks.It's worth noting that once one or a few users on a social network ar... Cascading failures are common phenomena in many of real-world networks,such as power grids,Internet,transportation networks and social networks.It's worth noting that once one or a few users on a social network are unavailable for some reasons,they are more likely to influence a large portion of social network.Therefore,an effective mitigation strategy is very critical for avoiding or reducing the impact of cascading failures.In this paper,we firstly quantify the user loads and construct the processes of cascading dynamics,then elaborate the more reasonable mechanism of sharing the extra user loads with considering the features of social networks,and further propose a novel mitigation strategy on social networks against cascading failures.Based on the realworld social network datasets,we evaluate the effectiveness and efficiency of the novel mitigation strategy.The experimental results show that this mitigation strategy can reduce the impact of cascading failures effectively and maintain the network connectivity better with lower cost.These findings are very useful for rationally advertising and may be helpful for avoiding various disasters of cascading failures on many real-world networks. 展开更多
关键词 social networks mitigationstrategy cascading failures betweennesscentrality cascading dynamics
在线阅读 下载PDF
PPP: Towards Parallel Protocol Parsing 被引量:1
5
作者 SHAO Yiyang 《China Communications》 SCIE CSCD 2014年第10期106-116,共11页
Network traffic classification plays an important role and benefits many practical network issues,such as Next-Generation Firewalls(NGFW),Quality of Service(QoS),etc.To face the challenges brought by modern high speed... Network traffic classification plays an important role and benefits many practical network issues,such as Next-Generation Firewalls(NGFW),Quality of Service(QoS),etc.To face the challenges brought by modern high speed networks,many inspiring solutions have been proposed to enhance traffic classification.However,taking many factual network conditions into consideration,e.g.,diversity of network environment,traffic classification methods based on Deep Inspection(DI) technique still occupy the top spot in actual usage.In this paper,we propose a novel classification system employing Deep Inspection technique,aiming to achieve Parallel Protocol Parsing(PPP).We start with an analytical study of the existing popular DI methods,namely,regular expression based methods and protocol parsing based methods.Motivated by their relative merits,we extend traditional protocol parsers to achieve parallel matching,which is the representative merit of regular expression.We build a prototype system,and evaluation results show that significant improvement has been made comparing to existing open-source solutions in terms of both memory usage and throughput. 展开更多
关键词 trafficinspection regularparsingclassification deepexpression PROTOCOL
在线阅读 下载PDF
MCC: A Message and Command Correlation Method for Identifying New Interactive Protocols via Session Analyses
6
作者 Chenglong Li Yibo Xue +1 位作者 Yingfei Dong Dongsheng Wang 《Tsinghua Science and Technology》 EI CAS 2012年第3期344-353,共10页
Traffic classification is critical to effective network management. However, more and more pro- prietary, encrypted, and dynamic protocols make traditional traffic classification methods less effective. A Message and ... Traffic classification is critical to effective network management. However, more and more pro- prietary, encrypted, and dynamic protocols make traditional traffic classification methods less effective. A Message and Command Correlation (MCC) method was developed to identify interactive protocols (such as P2P file sharing protocols and Instant Messaging (IM) protocols) by session analyses. Unlike traditional packet-based classification approaches, this method exploits application session information by clustering packets into application messages which are used for further classification. The efficacy and accuracy of the MCC method was evaluated with real world traffic, including P2P file sharing protocols Thunder and Bit- Torrent, and IM protocols QQ and GTalk. The tests show that the false positive rate is less than 3% and the false negative rate is below 8%, and that MCC only needs to check 8.7% of the packets or 0.9% of the traffic. Therefore, this approach has great potential for accurately and quickly discovering new types of interactive application protocols. 展开更多
关键词 traffic classification SESSION network management correlation INTERACTIVE
原文传递
A new method of fabricating strained Silicon materials
7
作者 YANG Zongren LIANG Renrong XU Jun 《Rare Metals》 SCIE EI CAS CSCD 2006年第z2期41-44,共4页
Strain-relaxed SiGe virtual substrates are of great importance for fabricating strained Si materials. Instead of using graded buffer method to obtain fully relaxed SiGe film, in this study a new method to obtain relax... Strain-relaxed SiGe virtual substrates are of great importance for fabricating strained Si materials. Instead of using graded buffer method to obtain fully relaxed SiGe film, in this study a new method to obtain relaxed SiGe film and strained Si film with much thinner SiGe film was proposed. Almost fully relaxed thin SiGe buffer layer was obtained by Si/SiGe/Si multi-structure oxidation and the SiO2 layer removing before SiGe regrowth. Raman spectroscopy analysis indicates that the regrown SiGe film has a strain relaxation ratio of about 93% while the Si cap layer has a strain of 0.63%. AFM shows good surface roughness. This new method is proved to be a useful approach to fabricate thin relaxed epilayers and strain Si films. 展开更多
关键词 strained Si SiGe oxidation strain relaxation
在线阅读 下载PDF
Mobile Internet Big Data Platform in China Unicom 被引量:6
8
作者 Wenliang Huang Zhen Chen +3 位作者 Wenyu Dong Hang Li Bin Cao Junwei Cao 《Tsinghua Science and Technology》 SCIE EI CAS 2014年第1期95-101,共7页
China Unicorn, the largest WCDMA 3G operator in China, meets the requirements of the historical Mobile Internet Explosion, or the surging of Mobile Internet Traffic from mobile terminals. According to the internal sta... China Unicorn, the largest WCDMA 3G operator in China, meets the requirements of the historical Mobile Internet Explosion, or the surging of Mobile Internet Traffic from mobile terminals. According to the internal statistics of China Unicom, mobile user traffic has increased rapidly with a Compound Annual Growth Rate (CAGR) of 135%. Currently China Unicorn monthly stores more than 2 trillion records, data volume is over 525 TB, and the highest data volume has reached a peak of 5 PB. Since October 2009, China Unicom has been developing a home-brewed big data storage and analysis platform based on the open source Hadoop Distributed File System (HDFS) as it has a long-term strategy to make full use of this Big Data. All Mobile Internet Traffic is well served using this big data platform. Currently, the writing speed has reached 1 390 000 records per second, and the record retrieval time in the table that contains trillions of records is less than 100 ms. To take advantage of this opportunity to be a Big Data Operator, China Unicom has developed new functions and has multiple innovations to solve space and time constraint challenges presented in data processing. In this paper, we will introduce our big data platform in detail. Based on this big data platform, China Unicom is building an industry ecosystem based on Mobile Internet Big Data, and considers that a telecom operator centric ecosystem can be formed that is critical to reach prosperity in the modern communications business. 展开更多
关键词 big data platform China Unicorn 3G wireless network Hadoop Distributed File System (HDFS) mobilenternet network forensic data warehouse HBASE
原文传递
Droid Detector:Android Malware Characterization and Detection Using Deep Learning 被引量:37
9
作者 Zhenlong Yuan Yongqiang Lu Yibo Xue 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2016年第1期114-123,共10页
Smartphones and mobile tablets are rapidly becoming indispensable in daily life. Android has been the most popular mobile operating system since 2012. However, owing to the open nature of Android, countless malwares a... Smartphones and mobile tablets are rapidly becoming indispensable in daily life. Android has been the most popular mobile operating system since 2012. However, owing to the open nature of Android, countless malwares are hidden in a large number of benign apps in Android markets that seriously threaten Android security. Deep learning is a new area of machine learning research that has gained increasing attention in artificial intelligence. In this study, we propose to associate the features from the static analysis with features from dynamic analysis of Android apps and characterize malware using deep learning techniques. We implement an online deep-learning-based Android malware detection engine(Droid Detector) that can automatically detect whether an app is a malware or not. With thousands of Android apps, we thoroughly test Droid Detector and perform an indepth analysis on the features that deep learning essentially exploits to characterize malware. The results show that deep learning is suitable for characterizing Android malware and especially effective with the availability of more training data. Droid Detector can achieve 96.76% detection accuracy, which outperforms traditional machine learning techniques. An evaluation of ten popular anti-virus softwares demonstrates the urgency of advancing our capabilities in Android malware detection. 展开更多
关键词 Android security malware detection characterization deep learning association rules mining
原文传递
Efficiency of Cache Mechanism for Network Processors 被引量:2
10
作者 徐波 常剑 +2 位作者 黄诗萌 薛一波 李军 《Tsinghua Science and Technology》 SCIE EI CAS 2009年第5期575-585,共11页
With the explosion of network bandwidth and the ever-changing requirements for diverse network-based applications,the traditional processing architectures,i.e.,general purpose processor(GPP) and application specific... With the explosion of network bandwidth and the ever-changing requirements for diverse network-based applications,the traditional processing architectures,i.e.,general purpose processor(GPP) and application specific integrated circuits(ASIC) cannot provide sufficient flexibility and high performance at the same time.Thus,the network processor(NP) has emerged as an alternative to meet these dual demands for today's network processing.The NP combines embedded multi-threaded cores with a rich memory hierarchy that can adapt to different networking circumstances when customized by the application developers.In today's NP architectures,multithreading prevails over cache mechanism,which has achieved great success in GPP to hide memory access latencies.This paper focuses on the efficiency of the cache mechanism in an NP.Theoretical timing models of packet processing are established for evaluating cache efficiency and experiments are performed based on real-life network backbone traces.Testing results show that an improvement of nearly 70% can be gained in throughput with assistance from the cache mechanism.Accordingly,the cache mechanism is still efficient and irreplaceable in network processing,despite the existing of multithreading. 展开更多
关键词 CACHE network processor efficiency evaluation
原文传递
Accelerating Application Identification with Two-Stage Matching and Pre-Classification 被引量:1
11
作者 何飞 项帆 +2 位作者 邵熠阳 薛一波 李军 《Tsinghua Science and Technology》 SCIE EI CAS 2011年第4期422-431,共10页
Modern datacenter and enterprise networks require application identification to enable granular traffic control that eJther Jmproves data transfer rates or ensures network security. Providing application visi- bility ... Modern datacenter and enterprise networks require application identification to enable granular traffic control that eJther Jmproves data transfer rates or ensures network security. Providing application visi- bility as a core network function is challenging due to its performance requirements, including high through- put, low memory usage, and high identification accuracy. This paper presents a payload-based application identification method using a signature matching engine utilizing characteristics of the application identifica- tion. The solution uses two-stage matching and pre-classification to simultaneously improve the throughput and reduce the memory. Compared to a state-of-the-art common regular expression engine, this matching engine achieves 38% memory use reduction and triples the throughput. In addition, the solution is orthogonal to most existing optimization techniques for regular expression matching, which means it can be leveraged to further increase the performance of other matching algorithms. 展开更多
关键词 application identification deep inspection regular expression traffic classification
原文传递
MN-SLA: A Modular Networking SLA Framework for Cloud Management System 被引量:1
12
作者 Zhi Liu Shijie Sun +6 位作者 Ju Xing Zhe Fu Xiaohe Hu Jianwen Pi Xiaofeng Yang Yunsong Lu Jun Li 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2018年第6期635-644,共10页
With the proliferation of cloud services and development of fine-grained virtualization techniques, the Cloud Management System (CMS) is required to manage multiple resources efficiently for the large-scale, highden... With the proliferation of cloud services and development of fine-grained virtualization techniques, the Cloud Management System (CMS) is required to manage multiple resources efficiently for the large-scale, highdensity computing units. Specifically, providing guaranteed networking Service Level Agreement (SLA) has become a challenge. This paper proposes MN-SLA (Modular Networking SLA), a framework to provide networking SLA and to enable its seamless integration with existing CMSes. Targeting at a modular, general, robust, and efficient design, MN-SLA abstracts general interacting Application Programming Interfaces (APIs) between CMS and SLA subsystem, and it is able to accomplish the integration with minor modifications to CMS. The evaluations based on large scale simulation show that the proposed networking SLA scheduling is promising in terms of resource utilization, being able to accommodate at least 1.4x the number of instances of its competitors. 展开更多
关键词 NETWORKING service level agreement cloud management system
原文传递
NURBS curve blending using extension 被引量:4
13
作者 Yong-jin LIU Rong-qi QIU Xiao-hui LIANG 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2009年第4期570-576,共7页
Curve and surface blending is an important operation in CAD systems, in which a non-uniform rational B-spline (NURBS) has been used as the de facto standard. In local comer blending, two curves intersecting at that ... Curve and surface blending is an important operation in CAD systems, in which a non-uniform rational B-spline (NURBS) has been used as the de facto standard. In local comer blending, two curves intersecting at that comer are first made disjoint, and then the third blending curve is added-in to smoothly join the two curves with G^1- or G^2-continuity. In this paper we present a study to solve the joint problem based on curve extension. The following nice properties of this extension algorithm are exploited in depth: (1) The parameterization of the original shapes does not change; (2) No additional fragments are created. Various examples are presented to demonstrate that our solution is simple and efficient. 展开更多
关键词 Curve blending Curve fairing Curve extension Non-uniform rational B-spline (NURBS)
原文传递
HBD:Towards Efficient Reactive Rule Dispatching in Software-Defined Networks 被引量:1
14
作者 Chang Chen Xiaohe Hu +3 位作者 Kai Zheng Xiang Wang Yang Xiang Jun Li 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2016年第2期196-209,共14页
Most types of Software-Defined Networking (SDN) architectures employ reactive rule dispatching to enhance real-time network control. The rule dispatcher, as one of the key components of the network controller, gener... Most types of Software-Defined Networking (SDN) architectures employ reactive rule dispatching to enhance real-time network control. The rule dispatcher, as one of the key components of the network controller, generates and dispatches the cache rules with response for the packet-in messages from the forwarding devices. It is important not only for ensuring semantic integrity between the control plane and the data plane, but also for preserving the performance and efficiency of the forwarding devices. In theory, generating the optimal cache rules on demands is a knotty problem due to its high theoretical complexity. In practice, however, the characteristics lying in real-life traffic and rule sets demonstrate that temporal and spacial localities can be leveraged by the rule dispatcher to significantly reduce computational overhead. In this paper, we take a deep-dive into the reactive rule dispatching problem through modeling and complexity analysis, and then we propose a set of algorithms named Hierarchy-Based Dispatching (HBD), which exploits the nesting hierarchy of rules to simplify the theoretical model of the problem, and trade the strict coverage optimality off for a more practical but still superior rule generation result. Experimental result shows that HBD achieves performance gain in terms of rule cache capability and rule storage efficiency against the existing approaches. 展开更多
关键词 Software-Defined Networking (SDN) reactive rule dispatching rule cache performance
原文传递
Approach to extracting hot topics based on network traffic content
15
作者 Yadong ZHOU Xiaohong GUAN +2 位作者 Qindong SUN Wei LI Jing TAO 《Frontiers of Electrical and Electronic Engineering in China》 CSCD 2009年第1期20-23,共4页
This article presents the formal definition and description of popular topics on the Internet,analyzes the relationship between popular words and topics,and finally introduces a method that uses statistics and correla... This article presents the formal definition and description of popular topics on the Internet,analyzes the relationship between popular words and topics,and finally introduces a method that uses statistics and correlation of the popular words in traffic content and network flow characteristics as input for extracting popular topics on the Internet.Based on this,this article adapts a clustering algorithm to extract popular topics and gives formalized results.The test results show that this method has an accuracy of 16.7%in extracting popular topics on the Internet.Compared with web mining and topic detection and tracking(TDT),it can provide a more suitable data source for effective recovery of Internet public opinions. 展开更多
关键词 hot topic extraction network traffic content Internet public opinion analysis
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部