Please wait a minute...

����Ŀ¼

    15 January 2018, Volume 4 Issue 1
    Perspective
    Define cyberspace security
    Binxing FANG
    2018, 4(1):  1-5.  doi:10.11959/j.issn.2096-109x.2018002
    Asbtract ( 4983 )   HTML ( 335)   PDF (456KB) ( 10704 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The booming development of the Internet brought unparalleled revolution to production and social life style,and the Internet itself has become the new driving force of economy in almost every country.However,It is embraced that not only development opportunities,but also enormous security challenges in the cyberspace.So as to enhance the healthiness of cyberspace and social form,every state and nation is actively promoting the construction of cyberspace security system and in-depth research of key technologies.A comprehensive view of cyberspace security development status was provided in the globe and in major areas,with systematic analysis on its core elements as well as the hierarchical model.

    Papers
    Scheme of virtual machine trusted migration in cloud environment
    Jianbiao ZHANG,Yuanxi ZHU,Jun HU,Xiao WANG
    2018, 4(1):  6-14.  doi:10.11959/j.issn.2096-109x.2018009
    Asbtract ( 1470 )   HTML ( 16)   PDF (665KB) ( 2275 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the rapid development of cloud computing,as an advantage of cloud services,virtual machine migration technology has been widely noticed and applied.However,there are some problems about VMs migration which should be solved,such as the complication of authentication of platform and the security issues of data transmission,etc.For these problems,firstly,the existing virtual machine migration scheme based on trusted computing technology was analyzed.Secondly,three secure needs that the virtual machine migration scheme which based on trusted computing technology should meet were proposed:the authenticated platform,confidentiality and integrity preserving transfer and atomicity of the vTPCM.Thirdly,a trusted migration scheme of virtual machines for cloud environment was proposed,in which the virtual machine central migration engine and trusted migration agent were introduced to solve the atomicity protection of vTPCM during the migration process.Finally,the concrete scheme was given with verification.

    AMTD:a way of adaptive moving target defense
    Danjun LIU,Guilin CAI,Baosheng WANG
    2018, 4(1):  15-25.  doi:10.11959/j.issn.2096-109x.2018008
    Asbtract ( 1652 )   HTML ( 12)   PDF (1206KB) ( 2975 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Moving target defense is a new way to change the asymmetry state between attack and defense,by dynamically moving target’s attacking surface.Frequency conversion of MTD is of great importance for the weighing between usability,security and defense cost.Nowadays,however,frequency conversion is usually determined by manager’s experience,which cannot create a balance between usability and security cost for the lack of theory basis.An adaptive moving target defense framework(AMTD)was proposed.AMTD can maximize system security at the lowest cost while ensuring that the system is available.The adaptability of AMTD has two modes.Firstly,the defense mode,it contains an adaptive conversion strategy to provide reacting defense triggered by security alerts and active defense triggered by timer expiration events.The other mode is the frequency conversion,which obtain the optimal conversion frequency by establishing mathematical models.Four series of simulation experiments were taken to verify the effectiveness of the solution.

    Research on forensics of privacy violations in cloud environment
    Weifeng LI,Weizhong QIANG,Weiming LI,Deqing ZOU
    2018, 4(1):  26-35.  doi:10.11959/j.issn.2096-109x.2018004
    Asbtract ( 1781 )   HTML ( 15)   PDF (625KB) ( 3010 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Cloud computing is the mainstream information system technology,however,privacy protection of user and privacy violation tracking and forensics in the cloud computing environment have always been a challenge.The current mainstream cloud computing forensics system and standard are not mature and complete,and are far from the target of computer forensics.With the focus on privacy violation and forensics in the cloud environment,status and challenges of cloud forensics and cloud privacy violation were reported firstly.Then,the research content and technical route of privacy forensics in the cloud environments were analyzed.Finally,a specific privacy violation forensics system for cloud environments was presented.

    Design and implementation of the controller scheduling-time in SDN
    Zhenping LU,Fucai CHEN,Guozhen CHENG
    2018, 4(1):  36-44.  doi:10.11959/j.issn.2096-109x.2018003
    Asbtract ( 1262 )   HTML ( 6)   PDF (883KB) ( 1708 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Introducing multiple controllers to software defined network so that dynamically altering the mapping relationship between controller and the underlying network is an effective method to ease the security threats in control plane.However,little previous work has been done to investigate the economical time in dynamic-scheduling controllers.Firstly,the importance of scheduling-time in dynamic control plane based on security in SDN and dynamic control plane was introduced.Further,this problem was modeled as a renewal reward process and an optimal algorithm in deciding the right time to schedule was proposed.In our experiments,Simulations based on real network attack dataset are conducted and it demonstrate that proposed algorithm outperforms fixed-cycle algorithms and random algorithm.

    Behavior authentication of Web users based on machine learning
    Zenan WU,Liqin TIAN,Zhigang WANG
    2018, 4(1):  45-51.  doi:10.11959/j.issn.2096-109x.2018011
    Asbtract ( 2181 )   HTML ( 29)   PDF (648KB) ( 2837 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    According to the security problem of Web user information,the user behavior was analyzed and authenticated by the method of machine learning.First of all,through the principal component analysis to reduce the dimension of the original data set,then use the SVM algorithm to allow the computer to learn the history of user behavior evidence,to get a model to identify the user's identity.The practical application and theoretical analysis show that the model in user behavior identification authentication,can be more accurate and efficient classification of dangerous users and trusted users,analysis lay a solid theoretical and practical basis for the high performance user behavior such as electronic commerce,network finance and other key of Internet applications.

    Research on security multi-party computing based on game theory
    Xinglan ZHANG,Wei ZHENG
    2018, 4(1):  52-56.  doi:10.11959/j.issn.2096-109x.2018010
    Asbtract ( 1292 )   HTML ( 12)   PDF (543KB) ( 2351 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In the classic millionaire agreement,one party can get the final wealth comparison results,you can not tell the other party,you can not comply with this agreement,combined with game theory can avoid this problem,you can make the participants away from the agreement proceeds less than compliance with the agreement,compliance with the agreement is the optimal strategy for the participant.At present,the problem of computational efficiency based on game theory is low,and the protocol greatly improves the computational efficiency by introducing a binary tree.

    Research on active defense application based on honeypot
    Dequan YANG,Weimin LIU,Zhou YU
    2018, 4(1):  57-62.  doi:10.11959/j.issn.2096-109x.2018006
    Asbtract ( 2604 )   HTML ( 50)   PDF (761KB) ( 3376 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Abstract:With the rapid development of financial information technology,cyber security events on the financial system have also increased greatly.Active defense plays an important role in improving the defense level of defined private network.How to quickly and effectively deploy and apply honeypot to capture and attack behavior,analyze the attack intention and raise the threshold of attack is the key to ensure the security of the defined private network.From the perspective of active defense,the advantage of honeypot active defense was analyzed,an active defense and defense filling passive defense integration was designed,and a honeypot within private network experimental environment was set up,the results show that the active defense technology can effectively improve the threshold of the attacker's attack,so as to improve the security level of the whole network.

    Anti-obfuscation Android application similarity detection method based on API call
    Jieming GU,Bowen SUN,Peng WU,Qi LI,Yanhui GUO
    2018, 4(1):  63-68.  doi:10.11959/j.issn.2096-109x.2018001
    Asbtract ( 1800 )   HTML ( 8)   PDF (599KB) ( 2723 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The traditional Android application similarity detection methods have the problem of complex feature extraction and low detecting efficiency.Regarding the issue above,an anti-obfuscation Android application similarity detection method based on API call was proposed.Firstly,it extracts referenced API sequence from the dex file.Counting the number of referenced API after decompiling the application to build feature vector.Finally,calculate the application similarity through feature vector.The experimental results show that the method has high accuracy.

    Study of Row Hammer attack
    Wenwei WANG,Peishun LIU
    2018, 4(1):  69-75.  doi:10.11959/j.issn.2096-109x.2018007
    Asbtract ( 1300 )   HTML ( 37)   PDF (577KB) ( 6322 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The related technologies and defense methods of the current Row Hammer vulnerabilities were analyzed and summarized,and the security problems and possible precautions were pointed out.At the end,the current research work both at home and abroad is summarized.Two valuable directions for security research in the future are pointed out:Row Hammer exploit techniques and precautions in the ARM architecture,and accurate and controlled attacks on Row Hammer vulnerabilities.

Copyright Information
Bimonthly, started in 2015
Authorized by:Ministry of Industry and Information Technology of the People's Republic of China
Sponsored by:Posts and Telecommunications Press
Co-sponsored by:Xidian University, Beihang University, Huazhong University of Science and Technology, Zhejiang University
Edited by:Editorial Board of Chinese Journal of Network and Information Security
Editor-in-Chief:FANG Bin-xing
Executive Editor-in-Chief:LI Feng-hua
Director:Xing Jianchun
Address:F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Tel:010-53879136/53879138/53879139
Fax:+86-81055464
ISSN 2096-109X
CN 10-1366/TP
visited
Total visitors:
Visitors of today:
Now online: