Editors Recommend

    Please wait a minute...
    For Selected: Toggle Thumbnails
    Traceability permissioned chain consensus mechanism based on double-layer architecture
    Qingyang DING, Jianming ZHU, Jin ZHANG, Biao SONG, Yanjing XU, Chuanchang JIA, Zheng GAO
    Chinese Journal of Network and Information Security    2019, 5 (2): 1-12.   DOI: 10.11959/j.issn.2096-109x.2019011
    Abstract2211)   HTML276)    PDF(pc) (1291KB)(1515)       Save

    The blocks in the blockchain are arranged in chronological and historical order,and the blockchain is incapable of modification through data encryption technology and consensus mechanism,which makes product trace ability to be an important application scenario of blockchain.To choose product information traceability technology,not only the feasibility of the technology but also the market attributes of the product and the producer should be considered,which makes the permissioned chain replace the public chain as an important deployment method of product information traceability.In the existing research results,the research on the traceability license chain mainly focuses on mechanism design and framework construction,and the consensus algorithm applicable to product information traceability is rarely studied.In the process of technology of engineering practice,practical byzantine fault tolerance was chosen more in league chain as the consensus of traceability chain mechanism (such as Hyperledger),but with the increasing number of participating nodes of the traceability chain efficiency will be significantly reduced,and the delay time will be significantly improved,resulting in most of the project is still in the stage of experiment.Based on this,a traceability license chain consensus mechanism based on double-layer architecture (DLPCM) is proposed,and its security is analyzed.Participants are divided into two layers on the vertical dimension,and different consensus mechanisms are adopted at different levels according to different deployment modes of blockchain.Finally,the traceability information query mechanism under the consensus mechanism is introduced,an important reference for the development and design of traceability system based on license chain is provided.

    Table and Figures | Reference | Related Articles | Metrics
    Delegation authorization mechanism with controllable permissions propagation for IoT devices sharing
    Yubo SONG, Shanshan QI, Aiqun HU
    Chinese Journal of Network and Information Security    2019, 5 (2): 40-49.   DOI: 10.11959/j.issn.2096-109x.2019015
    Abstract859)   HTML272)    PDF(pc) (689KB)(750)       Save

    In order to solve the problems of privilege sensitivity protection and the abuse of authorization by the agent when the device owner delegates authorization in IoT devices sharing environment,a trust-based delegation mechanism for controllable partial permissions was proposed with the trust access control model and the proxy signature.This mechanism generates trust values and authorization policies based on the relationship between the users,and implements controllable partial authority delegation through the proxy signature.According to the security analysis,the mechanism can meet the security attributes such as verifiability,non-repudiation,distinguishability,identifiability and non-abuse required by the permission transfer,and ensure the controllable security transfer of the device owner's permission.The problem of over authorization of an intermediary agent is effectively prevented.

    Table and Figures | Reference | Related Articles | Metrics
    Survey on static software vulnerability detection for source code
    Zhen LI, Deqing ZOU, Zeli WANG, Hai JIN
    Chinese Journal of Network and Information Security    2019, 5 (1): 1-14.   DOI: 10.11959/j.issn.2096-109x.2019001
    Abstract1276)   HTML51)    PDF(pc) (1054KB)(3062)       Save

    Static software vulnerability detection is mainly divided into two types according to different analysis objects:vulnerability detection for binary code and vulnerability detection for source code.Because the source codecontains more semantic information,it is more favored by code auditors.The existing vulnerability detection research works for source code are summarized from four aspects:code similarity-based vulnerability detection,symbolic execution-based vulnerability detection,rule-based vulnerability detection,and machine learning-based vulnerability detection.The vulnerability detection system based on source code similarity and the intelligent software vulnerability detection system for source code are taken as two examples to introduce the process of vulnerability detection in detail.

    Table and Figures | Reference | Related Articles | Metrics
    Comparative study of anonymous network Tor and I2P
    Yun YANG, Lingyan LI, Qingzheng WEI
    Chinese Journal of Network and Information Security    2019, 5 (1): 66-77.   DOI: 10.11959/j.issn.2096-109x.2019008
    Abstract1188)   HTML42)    PDF(pc) (1719KB)(1345)       Save

    Tor is the most deployed anonymous communication system,providing online anonymity and privacy protection,while the invisible Internet project allows applications to send messages to each other anonymously and securely by using garlic routing.The anonymous network Tor and I2P have been highly valued by the academic community and the industry,and are also welcomed by users.The key difference between the design concept between the Tor network and the I2P is that I2P attempts to transfer the existing Internet service to the I2P network,and service implementation is provided within the framework,while Thor allows anonymous access to implement and operate external Internet services separately.The anonymous networks Tor and I2P in terms of terminology,project development,anonymous services,key technologies,threat types,etc.were compared,revealing the inherent and essential differences between the two anonymous networks.

    Table and Figures | Reference | Related Articles | Metrics
    Access control model for multi-source heterogeneous data in big data environment
    Qiuyue SU, Xingshu CHEN, Yonggang LUO
    Chinese Journal of Network and Information Security    2019, 5 (1): 78-86.   DOI: 10.11959/j.issn.2096-109x.2019009
    Abstract1644)   HTML30)    PDF(pc) (688KB)(587)       Save

    The big data platform is open and shared,but with the increasing amount of data and the complex and variable user access context,the RBAC model is difficult to meet the fine-grained and flexible access control in big data environment.To solve this problem,an access control model for multi-source heterogeneous data in big data platform is proposed.The model dynamically determines role permissions based on attributes and builds a hierarchical structure based on data groups to achieve simple management of data attributes.The model is formally defined,and the implementation and workflow in Hadoop platform are described.The experimental results show that the performance overhead of the proposed scheme is relatively small.

    Table and Figures | Reference | Related Articles | Metrics
    Survey of software-defined networking data plane security
    Zhongfu GUO, Xingming ZHANG, Bo ZHAO, Sunan WANG
    Chinese Journal of Network and Information Security    2018, 4 (11): 1-12.   DOI: 10.11959/j.issn.2096-109x.2018087
    Abstract1064)   HTML13)    PDF(pc) (648KB)(1206)       Save

    The software-defined network decouples the data plane from the control plane,aiming to introduce network innovation faster and fundamentally automate the management of large networks.Architecture innovation brings challenges and opportunities.Security issues limit the widespread adoption of software-defined networks.Attacks on the data plane may damage the entire software-defined network.The data plane structure and development trends were introduced,data plane security risks were analyzed,vulnerabilities were pointed out,and potential attack scenarios were identified.It also presents two specific solutions,discusses the significance and limitations,and looks forward to future security research directions.

    Table and Figures | Reference | Related Articles | Metrics
    Intrusion detection model based on non-symmetric convolution auto-encode and support vector machine
    Jialin WANG, Jiqiang LIU, Di ZHAO, Yingdi WANG, Yingxiao XIANG, Tong CHEN, Endong TONG, Wenjia NIU
    Chinese Journal of Network and Information Security    2018, 4 (11): 57-68.   DOI: 10.11959/j.issn.2096-109x.2018086
    Abstract1490)   HTML17)    PDF(pc) (787KB)(1737)       Save

    Network intrusion detection system plays an important role in protecting network security.With the continuous development of science and technology,the current intrusion technology cannot cope with the modern complex and volatile network abnormal traffic,without taking into account the scalability,sustainability and training time of the detection technology.Aiming at these problems,a new deep learning method was proposed,which used unsupervised non-symmetric convolutional auto-encoder to learn the characteristics of the data.In addition,a new method based on the combination of non-symmetric convolutional auto-encoder and multi-class support vector machine was proposed.Experiments on the data set of KDD99 show that the method achieves good results,significantly reduces training time compared with other methods,and further improves the network intrusion detection technology.

    Table and Figures | Reference | Related Articles | Metrics
    Overview of mobile communication network authentication
    Xinxin HU, Caixia LIU, Shuxin LIU, Wei YOU, Kang QIAO
    Chinese Journal of Network and Information Security    2018, 4 (12): 1-15.   DOI: 10.11959/j.issn.2096-109x.2018096
    Abstract1455)   HTML26)    PDF(pc) (855KB)(3135)       Save

    With the increasingly serious security situation of mobile communication network,it becomes an important issue about how to protect the privacy of legitimate users while providing high-quality communication services,and how to protect the carrier network from being invaded becomes an important issue in the field of mobile communication security.Authentication is an important means for users and networks to authenticate each other's legitimacy.Authentication methods are also evolving along with network evolution.Starting with the authentication methods of past mobile communication networks (GSM,CDMA,UMTS,LTE),the advantages and disadvantages of each generation of authentication technology are analysed,along with which the authentication technology and unified authentication technology of the fifth-generation (5G) mobile communication to be commercialized are emphatically analysed.In the last,reasonable prospect for the development of authentication technology in the future are proposed.

    Table and Figures | Reference | Related Articles | Metrics
    VMI-based virtual machine remote attestation scheme
    Wei WANG, Xingshu CHEN, Xiao LAN, Xin JIN
    Chinese Journal of Network and Information Security    2018, 4 (12): 32-43.   DOI: 10.11959/j.issn.2096-109x.2018098
    Abstract1024)   HTML17)    PDF(pc) (1044KB)(1227)       Save

    The virtual machine attestation scheme proposed by trusted computing group (TCG) can provide attestation service of virtual machine for cloud computing.However,the service using the scheme proposed by the TCG directly would be threatened by the cuckoo attack and its performance would be lower.Therefore,a new virtual machine remote attestation scheme based on virtual machine introspection (VMI) was proposed.Firstly,it eliminated the path to perform cuckoo attacks in virtual machines via obtaining virtual machines′ remote attestation evidence in virtual machine monitor (VMM).Secondly,it used physical trusted platform module (TPM) to ensure the integrity of virtual machines’ remote attestation evidence and reduced the number of attestation identity key (AIK) certificates required during remote attestation to balance the load of private CA.Experiments show that the proposed scheme can verify the status of virtual machines correctly and increase the performance of bulk virtual machines’ remote attestation significantly.

    Table and Figures | Reference | Related Articles | Metrics
    Ontology summarization technology survey
    Yuehang DING, Hongtao YU, Ruiyang HUANG, Yingle LI
    Chinese Journal of Network and Information Security    2018, 4 (10): 12-21.   DOI: 10.11959/j.issn.2096-109x.2018081
    Abstract545)   HTML7)    PDF(pc) (695KB)(1063)       Save

    Ontology is an important tool for knowledge sharing,while it is also the upper structure of knowledge graph.With the explosion of data and ontology complexity,ontology understanding and application are becoming more and more difficult.As a technique to shrink ontology scale,ontology summarization accelerated ontology understanding and application technologically.Different definitions of ontology summarization were shown,ontology summarization methods were compared and analyzed,ontology summarization evaluation parameter system was introduced,and at last,possible future research area was given.

    Table and Figures | Reference | Related Articles | Metrics
    Method of botnet network nodes detection base on communication similarity
    Yuquan JIN, Bin XIE, Yi ZHU
    Chinese Journal of Network and Information Security    2018, 4 (10): 31-38.   DOI: 10.11959/j.issn.2096-109x.2018078
    Abstract1021)   HTML8)    PDF(pc) (968KB)(1391)       Save

    At present,the botnet detection method mostly relies on the analysis of the network communication activity or the communication content.The former carries on the statistical analysis to the characteristic of the data flow,does not involve the content in the data flow,has the strong superiority in the detection encryption type aspect,but the accuracy is low.The latter relies on the prior knowledge to examine,has the strong accuracy,but the generality of detection is low.The communication similarity was defined according to Jaccard similarity coefficient,and a method of calculating communication similarity based on user request DNS (domain name system) was proposed,which was used for botnet node detection based on network traffic.Finally,based on the spark framework,the experimental results show that the proposed method can be used in the detection of botnet nodes effectively.

    Table and Figures | Reference | Related Articles | Metrics
    Survey of attack graph based network security metric
    Hao HU, Yuling LIU, Yuchen ZHANG, Hongqi ZHANG
    Chinese Journal of Network and Information Security    2018, 4 (9): 1-16.   DOI: 10.11959/j.issn.2096-109x.2018072
    Abstract962)   HTML22)    PDF(pc) (633KB)(2159)       Save

    One of the main challenges of network security metrics is how to accurately identify the intrusion of the intruders exploiting the dependence between the vulnerabilities for threat propagation in the target network system as well as to quantify the potential impact on the network system.Because of its superior performance of visual display,the attack graph becomes one of the effective ways to solve the problem.Firstly,the concept,development and general metric models of security metrics were introduced.Secondly,the related researches with respect to attack graph construction,classification and application were discussed.Thirdly,a hierarchical framework for security metric using attack graph was proposed,and then existing methods of network security metric were summarized from three levels (key “point”,attack “line” and situation “plane”).Finally,the difficult issues and development trends for the current research were discussed.

    Table and Figures | Reference | Related Articles | Metrics
    Relation extraction based on CNN and Bi-LSTM
    Xiaobin ZHANG, Fucai CHEN, Ruiyang HUANG
    Chinese Journal of Network and Information Security    2018, 4 (9): 44-51.   DOI: 10.11959/j.issn.2096-109x.2018074
    Abstract8142)   HTML63)    PDF(pc) (618KB)(3356)       Save

    Relation extraction aims to identify the entities in the Web text and extract the implicit relationships between entities in the text.Studies have shown that deep neural networks are feasible for relation extraction tasks and are superior to traditional methods.Most of the current relation extraction methods apply convolutional neural network (CNN) and long short-term memory neural network (LSTM) methods.However,CNN just considers the correlation between consecutive words and ignores the correlation between discontinuous words.On the other side,although LSTM takes correlation between long-distance words into account,the extraction features are not sufficiently extracted.In order to solve these problems,a relation extraction method that combining CNN and LSTM was proposed.three methods were used to carry out the experiments,and confirmed the effectiveness of these methods,which had some improvement in F1 score.

    Table and Figures | Reference | Related Articles | Metrics
    Machine learning security and privacy:a survey
    Lei SONG, Chunguang MA, Guanghan DUAN
    Chinese Journal of Network and Information Security    2018, 4 (8): 1-11.   DOI: 10.11959/j.issn.2096-109x.2018067
    Abstract5008)   HTML92)    PDF(pc) (701KB)(7858)       Save

    As an important method to implement artificial intelligence,machine learning technology is widely used in data mining,computer vision,natural language processing and other fields.With the development of machine learning,it brings amount of security and privacy issues which are getting more and more attention.Firstly,the adversary model was described according to machine learning.Secondly,the common security threats in machine learning was summarized,such as poisoning attacks,adversarial attacks,oracle attacks,and major defense methods such as regularization,adversarial training,and defense distillation.Then,privacy issues such were summarized as stealing training data,reverse attacks,and membership tests,as well as privacy protection technologies such as differential privacy and homomorphic encryption.Finally,the urgent problems and development direction were given in this field.

    Table and Figures | Reference | Related Articles | Metrics
    Data protection impact assessment system in the mode of risk management
    Ying CHENG
    Chinese Journal of Network and Information Security    2018, 4 (8): 63-70.   DOI: 10.11959/j.issn.2096-109x.2018064
    Abstract1770)   HTML15)    PDF(pc) (525KB)(2372)       Save

    In the era of big data,the risk management approach has been broadly applied in the field of personal information protection.Data protection impact assessment has become an important system to promote data protection.It takes the provisions of the data protection impact assessment of the European General Data Protection Regulation (GDPR) 2016 as the sample.By using the literature research and empirical analysis method,it analyzes in depth the theoretical background,rise and evolution,meaning and scope of data protection impact assessment to establish a standardized and specific impact assessment system as well as promote personal information protection.Assessment content includes not only privacy risk assessment,but also data security,data quality and non-discrimination.Data protection impact assessment should be set as a mandatory obligation for data processing activities that are likely to result in high risks.The evaluation process shall take the advices from stakeholders to reflect their benefits.The external supervision should be strengthened and the assessment report shall be published properly.

    Reference | Related Articles | Metrics
    Research progress on moving target defense for SDN
    Jinglei TAN, Hongqi ZHANG, Cheng LEI, Xiaohu LIU, Shuo WANG
    Chinese Journal of Network and Information Security    2018, 4 (7): 1-12.   DOI: 10.11959/j.issn.2096-109x.2018061
    Abstract1434)   HTML12)    PDF(pc) (864KB)(2224)       Save

    Software-defined network is based on flexible and open standards,which manages network functions and services by the control layer.And it has the unique advantages of control-separation and centralized control.The moving target defense technology is dedicated to build an ever-changing environment to increase the uncertainty of the network system,which requires a flexible and customizable,centralized and controllable network architecture to implement it.Therefore,the combination of moving target defense and software-defined network have become a more valuable research hotspot.Firstly,the basic concepts of software-defined network and moving target defense were introduced,the security threats of software-defined network was summarized,and the realization model of moving target defense for SDN network was described.Secondly,the technical methods for moving target defense were summarized respectively form the data layer,control layer and application layer of the SDN.Finally,summing up the challenges of existing SDN dynamic defense,and looking forward to the development direction of moving target defense technologies for the SDN.

    Table and Figures | Reference | Related Articles | Metrics
    Overview of searchable encryption research
    Ying LI, Chunguang MA
    Chinese Journal of Network and Information Security    2018, 4 (7): 13-21.   DOI: 10.11959/j.issn.2096-109x.2018062
    Abstract1364)   HTML31)    PDF(pc) (592KB)(5013)       Save

    With the development of cloud computing,there is an increasing number of companies and individuals outsourcing their data to cloud server in the encrypted form to protect data security and user privacy.As a result,efficient retrieval of encrypted data stored on cloud server has become the issue that users may pay attention to.Searchable encryption (SE) is a cryptographic primitive that supports keyword search over encrypted data,and migrates the cumbersome search operation to the cloud server to utilize its vast computational resources.Reviews previous research according to the different cryptosystems used,and divides SE into two groups,that is symmetric searchable encryption and asymmetric searchable encryption.Based on this classification,first introduces a typical program,and then introduces from the two aspects of the expression of searchable encryption and security.Finally,the need-to-be-solved problems and main research directions are discussed.

    Table and Figures | Reference | Related Articles | Metrics
    Research progress and trend of text summarization
    Tuosiyu MING, Hongchang CHEN
    Chinese Journal of Network and Information Security    2018, 4 (6): 1-10.   DOI: 10.11959/j.issn.2096-109x.2018048
    Abstract5087)   HTML40)    PDF(pc) (568KB)(9212)       Save

    With the explosive growth of information on the Internet,how to extract useful information from massive information has become a key technical issue.The text summarization technology can compress and extract refined and concise document information from big data,effectively reducing the user information overload problem,and it has become a research hotspot.The domestic and foreign text summarization methods and their concrete realization in recent years were analyzed,the advantages and disadvantages between traditional methods and deep learning summary methods were compared,and a reasonable outlook for future research directions was made.

    Table and Figures | Reference | Related Articles | Metrics
    Risk assessment method for network attack surface based on Bayesian attack graph
    Yuyang ZHOU, Guang CHENG, Chunsheng GUO
    Chinese Journal of Network and Information Security    2018, 4 (6): 11-22.   DOI: 10.11959/j.issn.2096-109x.2018053
    Abstract1446)   HTML7)    PDF(pc) (886KB)(2097)       Save

    Aiming at the lack of objective risk assessment for the network attack surface on moving target defense,in order to realize the security risk assessment for the network system,and calculate the potential attack paths,a risk assessment method for network attack surface based on Bayesian attack graph was proposed.The network system resources,vulnerability and dependencies between them were used to establish Bayesian attack graph.Considering dependencies between nodes,the correlation between the resource and the influence of attacks on the attack path,the probability of each state that attackers can reach and the maximum probability attack path can be inferred.The experimental results prove the feasibility and effectiveness of the proposed network attack surface risk assessment method,which can provide a good support for the selection of dynamic defensive measures of attack surface.

    Table and Figures | Reference | Related Articles | Metrics
    Adaptive selection method of differential privacy GAN gradient clipping thresholds
    Peng GUO, Shangping ZHONG, Kaizhi CHEN, Hang CHENG
    Chinese Journal of Network and Information Security    2018, 4 (5): 10-20.   DOI: 10.11959/j.issn.2096-109x.2018041
    Abstract1560)   HTML12)    PDF(pc) (781KB)(2048)       Save

    A method of adaptive selection of differential privacy GAN gradient clipping threshold was proposed.The method assumes that a small portion of public data that is identically distributed with the private data can be accessed,a batch of data is randomly selected from the public data,a clipping threshold is set as an average gradient norm of the batch of data,and the above operations are iterated until the network converges.The method was verified on the Mnist and Cifar10 data sets.The results show that under a reasonable privacy budget,the accuracy of CNN classifiers is improved by 1%~4% compared with the differential privacy auxiliary classifier GAN,inception scores increased by 0.6~1.2.

    Table and Figures | Reference | Related Articles | Metrics
    Spammer detection technology of social network based on graph convolution network
    Qiang QU, Hongtao YU, Ruiyang HUANG
    Chinese Journal of Network and Information Security    2018, 4 (5): 39-46.   DOI: 10.11959/j.issn.2096-109x.2018042
    Abstract2063)   HTML21)    PDF(pc) (584KB)(3040)       Save

    In social networks,Spammer send advertisements that are useless to recipients without the recipient's permission,seriously threatening the information security of normal users and the credit system of social networking sites.In order to solve problems of extracting the shallow features and high computational complexity for the existing Spammer detection methods of social networks,a Spammer detection technology based on graph convolutional network(GCN) was proposed.Based on the network structure information,the method introduces the network representation learning algorithm to extract the network local structure feature,and combines the GCN algorithm under the re-regularization technology condition to obtain the network global structure feature to achieve the goal of detecting Spammer.Experiments are done on social network data of Tagged.com.The results show that this method has high accuracy and efficiency.

    Table and Figures | Reference | Related Articles | Metrics
    Review of key technology and its application of blockchain
    Feng ZHANG, Boxuan SHI, Wenbao JIANG
    Chinese Journal of Network and Information Security    2018, 4 (4): 22-29.   DOI: 10.11959/j.issn.2096-109x.2018028
    Abstract3672)   HTML101)    PDF(pc) (690KB)(6376)       Save

    The rise of blockchain technology is a paradigm shift,which is similar to the rise of the Internet,and it has attracted wide attention.Blockchain has characteristics of decentralization,tamper-resistant,traceability and so on.The achievements of some papers about blockchain at home and abroad have been analysed in recent years,and the core technology principle of blockchain has been parsed.The application scenarios of blockchain were disscussed,such as financial services,credit management,tenure management,public network service and other fields.The existing problems in various application fields were pointed out.Some opinions on the development and application of blockchain were put forward,dedicated to blockchain and hoped to do contribution for the research about blockchain and its applications.

    Table and Figures | Reference | Related Articles | Metrics
    Design and application of blockchain pattern for credit information industry
    Shuohang GUO, Ziqi SONG
    Chinese Journal of Network and Information Security    2018, 4 (4): 63-71.   DOI: 10.11959/j.issn.2096-109x.2018029
    Abstract2154)   HTML20)    PDF(pc) (1285KB)(5500)       Save

    Based on the current status of Chinese credit information system,expounding the problems arising from the traditional credit information system structure,a credit system structure based on blockchain technology and two data transaction pattern and the technical framework of the credit data trading platform was proposed,It has the characteristics of decentralization,safe and credible,collective maintenance,and untampering.And the process of data transaction were expounded.To explore the advantage of application of blockchain in the credit and information industry:promote credit data sharing,improve the quality of supervision of the credit and information industry,ensure the privacy of the information subject,effectively improve the dimension of credit information.

    Table and Figures | Reference | Related Articles | Metrics
    Research progress in code reuse attacking and defending
    Xiangdong QIAO, Rongxiao GUO, Yong ZHAO
    Chinese Journal of Network and Information Security    2018, 4 (3): 1-12.   DOI: 10.11959/j.issn.2096-109x.2018017
    Abstract2325)   HTML19)    PDF(pc) (697KB)(1910)       Save

    Code reuse attacks make use of binary code existed in the attacked target to perform attack action,such technique breaks out the traditional assumption that malicious behavior always be introduced from the outside,it is representative sample of the advanced memory corruption techniques and also the focus of attention in the software security research field.The generation background and implementation principle were described firstly,and then the recent progresses of the technique,including improvement and variants,implementation methods under the different architecture platforms,automatic construction and important extension including blind ROP and non-control data attacks based on code reuse attacks,were introduced respectively.Various defense mechanisms and possible counter-defense methods for code reuse attacks were also discussed.Finally a perspective of the future work in this research area was discussed.

    Table and Figures | Reference | Related Articles | Metrics
    Research progress of abnormal user detection technology in social network
    Qiang QU, Hongtao YU, Ruiyang HUANG
    Chinese Journal of Network and Information Security    2018, 4 (3): 13-23.   DOI: 10.11959/j.issn.2096-109x.2018025
    Abstract4520)   HTML48)    PDF(pc) (542KB)(2959)       Save

    In social networks,the problem of anomalous users detection is one of the key problems in network security research.The anomalous users conduct false comments,cyberbullying or cyberattacks by creating multiple vests,which seriously threaten the information security of normal users and the credit system of social networks ,so a large number of researchers conducted in-depth study of the issue.The research results of the issue in recent years were reviewed and an overall structure was summarized.The data collection layer introduces the data acquisition methods and related data sets,and the feature presentation layer expounds attribute features,content features,network features,activity features and auxiliary features.The algorithm selection layer introduces supervised algorithms,unsupervised algorithms and graph algorithms.The result evaluation layer elaborates the method of data annotation method and index.Finally,the future research direction in this field was looked forward.

    Table and Figures | Reference | Related Articles | Metrics
    Survey on network topology visualization
    Song WANG, Ye ZHANG, Yadong WU
    Chinese Journal of Network and Information Security    2018, 4 (2): 1-17.   DOI: 10.11959/j.issn.2096-109x.2018014
    Abstract1800)   HTML12)    PDF(pc) (4459KB)(4807)       Save

    As the basis of network monitoring,network management,and network security situation awareness,network topology visualization plays an underlying role in reflecting the whole state of the network and discovering the potential rules in the network topology.The basic content of network topology visualization was introduced and the main challenges in the research of network topology visualization were summarized from two aspects:the internal characteristics of network data and the point of the applied demand angle of the users.A top-down VPI model for network topology visualization and analysis drawing from the experience of domain experts by analyzing and understanding the nodes and connection status of network topology,having an insight into the potential laws of topological information like performance bottleneck,network security,time-varying characteristics and so on.This model includes vision,procedure,and interaction.According to the VPI model,visualization methods based on perception enhance were summarized from three aspects:enhancement of visual perception,enhancement of time-varied procedure and enhancement of exploratory interaction.Finally,future development trend of those topics were discussed combined with application demand.

    Table and Figures | Reference | Related Articles | Metrics
    Survey on the visualization technologies of threatening security data in cyber space
    Fan ZHANG, Fan XIE, Jie JIANG
    Chinese Journal of Network and Information Security    2018, 4 (2): 34-39.   DOI: 10.11959/j.issn.2096-109x.2018013
    Abstract2020)   HTML23)    PDF(pc) (475KB)(5169)       Save

    With the rapid development of the cyber threatening methods,the requirements of network security data analysis become more and more imperative.Data visualization has already evolved as a requisite tool among all kinds of data analysis theory framework and applications,especially in the fields of scientific computation,business intelligence and cyber security.Threatening security data visualization provides various effective interaction means which improve the perception ability for the cyber security specialists to get a distinctive insight into the large amount of complicated cyber security problems.The state-of-art cyber security data visualization technologies were introduced.Some existing problems that were still challenging research topics were investigated.Some directions for future studies were outlined.

    Reference | Related Articles | Metrics
    Define cyberspace security
    Binxing FANG
    Chinese Journal of Network and Information Security    2018, 4 (1): 1-5.   DOI: 10.11959/j.issn.2096-109x.2018002
    Abstract3723)   HTML69)    PDF(pc) (456KB)(9134)       Save

    The booming development of the Internet brought unparalleled revolution to production and social life style,and the Internet itself has become the new driving force of economy in almost every country.However,It is embraced that not only development opportunities,but also enormous security challenges in the cyberspace.So as to enhance the healthiness of cyberspace and social form,every state and nation is actively promoting the construction of cyberspace security system and in-depth research of key technologies.A comprehensive view of cyberspace security development status was provided in the globe and in major areas,with systematic analysis on its core elements as well as the hierarchical model.

    Table and Figures | Reference | Related Articles | Metrics
Copyright Information
Bimonthly, started in 2015
Authorized by:Ministry of Industry and Information Technology of the People's Republic of China
Sponsored by:Posts and Telecommunications Press
Co-sponsored by:Xidian University, Beihang University, Huazhong University of Science and Technology, Zhejiang University
Edited by:Editorial Board of Chinese Journal of Network and Information Security
Editor-in-Chief:FANG Bin-xing
Executive Editor-in-Chief:LI Feng-hua
Director:YI Dong-shan
Address:F8,You Dian Publisher Building,No.11,Chengshousi Road,Fengtai District,Beijing 100078,PR China
Tel:+8610-81055479, 81055456
ISSN 2096-109X
CN 10-1366/TP
Total visitors:
Visitors of today:
Now online: