Please wait a minute...


    15 February 2017, Volume 3 Issue 2
    Survey of quantum crypto currency
    Heng-yue JIA,Xia WU,Jian-ming ZHU
    2017, 3(2):  1-8.  doi:10.11959/j.issn.2096-109x.2017.00112
    Asbtract ( 1593 )   HTML ( 2)   PDF (445KB) ( 4706 )   Knowledge map   
    References | Related Articles | Metrics

    The development history of quantum crypto currency was explained briefly, and different kinds of quantum crypto currency (including quantum bank note, quantum coin, quantum check, and quantum Bitcoin) respectively from the aspects of basic scheme models, security requirements, key technologies and research progress were introduced. Fi-nally, the issue problems which are needed to be further improved and explored in the future were pointed out.

    Review of domestic and international financial security
    Lian-peng LI,Hong LUO
    2017, 3(2):  9-19.  doi:10.11959/j.issn.2096-109x.2017.00124
    Asbtract ( 1476 )   HTML ( 4)   PDF (699KB) ( 4271 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Based on financial informatization, financial information security concept, current major risks to financial information security in domestic and international were overviewed and summarized, including network security, data security and business & services continuity, etc. Some effective techniques and control measures in this areas were introduced. Finally, relevant implications and recommendations were proposed.

    Academic paper
    Successive memory image analysis method for malicious codes
    Wei-ming LI,De-qing ZOU,Guo-zhong SUN
    2017, 3(2):  20-30.  doi:10.11959/j.issn.2096-109x.2017.00144
    Asbtract ( 1363 )   HTML ( 3)   PDF (989KB) ( 1330 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to detect the behavior of malicious code more comprehensively, the technology of continuous memory image analysis was proposed. The core idea was to run malicious code in QEMU virtual machine, to obtain the memory image of the continuous increment in the running period, and then to analyze the memory image of the base and increment as the memory image. On the basis of the analysis of a single memory image, different memory images were analysised comparatively. At the same time, the visualization tool D3.js was used to visually display the change of the memory state in the process of system operation. Finally, the prototype system was tested by 40 kinds of malicious code samples, and the number of malicious code behavior was increased by 19.7% than traditional sin-gle memory image.

    Financial phishing detection method based on sensitive characteristics of webpage
    Xiang-dong HU,Ke LIU,Feng ZHANG,Jia-fu LIN,Jun FU,Zhi-hui GUO
    2017, 3(2):  31-38.  doi:10.11959/j.issn.2096-109x.2017.00122
    Asbtract ( 1936 )   HTML ( 2)   PDF (797KB) ( 2935 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A financial phishing detection method based on sensitive characteristics of webpage was proposed, which acquired sensitive text information of specific hypertext markup language tags and computes sensitive text eigen-value. The method matches number of sensitive text using multiple pattern matching algorithm AC_SC (AC suitable for Chinese). Then, the method locates and cuts logo image of webpage, and utilizes PCA-SIFT algorithm to extract image features and match features with library of webpage logo which was established beforehand. Meanwhile, it calculates similarity of two logo image. Finally, the decision can be concluded by the text eigenvalue and image similarity. It shows that the method is better in pertinence and timeliness according to experiment, and achieves no less than 97% detection accuracy.

    Ontology model based on security parameters capturing process for network systems
    Tao LI,NJiu-chuan LI,Ai-qun HU
    2017, 3(2):  39-45.  doi:10.11959/j.issn.2096-109x.2017.00131
    Asbtract ( 1387 )   HTML ( 3)   PDF (534KB) ( 1861 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A general security data capturing process for network system was proposed, which combined hierarchical capturing framework and ontology model to whole network architecture. Attributes of security parameter were di-vided and relationships of parameter were descripted. Security parameters were extended to multiple dimensions. Multiple attributes such as information source and hierarchy were abstracted, which were benefit for analysis of se-curity parameters. Based on the proposed framework, the process of application in real systems were described. The whole processes and framework efficiently provided guidance for network security evaluation and supporting of ba-sic parameters.

    Passive forensics for video object removal tampering
    Ye YAO,Wei-tong HU,Yi-zhi REN
    2017, 3(2):  46-52.  doi:10.11959/j.issn.2096-109x.2017.00123
    Asbtract ( 1166 )   HTML ( 0)   PDF (802KB) ( 1407 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Firstly, the concept and importance of digital video object removal tampering forensics were introduced. Then, several current passive forensics algorithms for object removal tampering were selected and divided into two categories that based on correlation analysis and based on machine learning algorithm according to development trends. The selected passive forensics algorithms were introduced in detail. Finally, some possible research trends in video object removal tampering detections in the future were looked forward to.

    Visualization analysis and design of DDoS attack
    Yi-fan ZHANG,Xiao-ju DONG
    2017, 3(2):  53-65.  doi:10.11959/j.issn.2096-109x.2017.00135
    Asbtract ( 1367 )   HTML ( 5)   PDF (8665KB) ( 598 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Firstly, the IP address of the Web log were visualized, and an integral system was presented by using proper visualization methods. Secondly, the whole system was related to the IP address, containing source IP address, target IP address and their relationship respectively. It provided users with different views of data, which could show more details and undetected relations among massive data. Besides, some interactions were added into the system, which made it more effective and useful. Finally, it ended up with the comparison of the systems when loading data with the DDoS attack and without it. It made much sense in the application field.

    Trusted computing mobile terminal application research based on biometric trusted access protocol
    Jun XU
    2017, 3(2):  66-76.  doi:10.11959/j.issn.2096-109x.2017.00143
    Asbtract ( 1116 )   HTML ( 2)   PDF (2695KB) ( 1007 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The architecture of safety production monitoring platform was discussed based on the discussion of the TPM trusted platform, the hardware architecture based on trusted mobile platform of ARM + DSP dual core proces-sor was proposed, the user access to the process of biometric authentication and user terminal hardware authentica-tion properties of registration protocol were proposed, and its performance was analyzed. The experimental results show that the new protocol has a small increase in the time overhead, and the fingerprint template is updated in TPM, which effectively increases the recognition rate.

Copyright Information
Bimonthly, started in 2015
Authorized by:Ministry of Industry and Information Technology of the People's Republic of China
Sponsored by:Posts and Telecommunications Press
Co-sponsored by:Xidian University, Beihang University, Huazhong University of Science and Technology, Zhejiang University
Edited by:Editorial Board of Chinese Journal of Network and Information Security
Editor-in-Chief:FANG Bin-xing
Executive Editor-in-Chief:LI Feng-hua
Director:YI Dong-shan
Address:F8,You Dian Publisher Building,No.11,Chengshousi Road,Fengtai District,Beijing 100078,PR China
Tel:+8610-81055479, 81055456
ISSN 2096-109X
CN 10-1366/TP
Total visitors:
Visitors of today:
Now online: