Please wait a minute...

Current Issue

    25 February 2009, Volume 30 Issue 2
    Academic paper
    Private data isolation for OpenSSH based on virtual machines
    Kang CHEN,Hong-liang YU,Wei-min ZHENG
    2009, 30(2):  1-5.  doi:1000-436X(2009)02-0001-05
    Asbtract ( 0 )   HTML ( 0)   PDF (461KB) ( 13 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    OpenSSH stores keys in the file system.The keys are easy to be exposed while the host has been invaded by illegal users.Methods are needed to protect these important data.For such purpose,virtual machine protection was pro-posed to provide a separate space for storing the important data as well as secure accessing interfaces.By using virtual machine even under the situation that the host is compromised,the important data can still be kept safe.Thus,the safe and separate space provided by virtual machine can protect the keys of OpenSSH securely.

    Self-healing key distribution scheme of MANET based on sliding window
    Chun-lai DU,Ming-zeng HU,Hong-li ZHANG,Wei-zhe ZHANG
    2009, 30(2):  6-11.  doi:1000-436X(2009)02-0006-06
    Asbtract ( 0 )   HTML ( 0)   PDF (1127KB) ( 86 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A new self-healing key distribution scheme of MANET based on sliding window was proposed in order to re-duce the burden of manager supervising self-healing MANET and to deal with the scene of some users' lifetime bestrid-ing two session windows.A dual hash directional key chain model was set up.The model achieves t-revocation capability by using control parameter.Through the security analysis,the model has settled users' bestriding problem yet still achieved security property.Because manager once distributes initial private information to bestriding user and so avoids distributing it again in rebuilding phase,the model reduces the communication cost.

    Clustering algorithm and analysis based on objective trust modeling in MANET
    Qiang ZHANG,Guang-ming HU,Hai-tao CHEN,Zheng-hu GONG
    2009, 30(2):  12-22.  doi:1000-436X(2009)02-0012-10
    Asbtract ( 0 )   HTML ( 0)   PDF (2845KB) ( 12 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In mobile-adhoc networks (MANET),an objective trust estimation model was presented,and then a maxi-mum-objective-trust-based clustering solution (MOTBCS) was raised,which aimed at the opinion of maximum stable links and energy viewpoints and gave nodes their objective trust estimation.This solution only extended the original HELLO message for the benefit of small costs and it could be better suitable for the realistic working environments in MANETs.Simulation results show that MOTBCS generate more stable clustering groups.It also has less communication costs and better efficiency than other clustering algorithms.

    Dynamic scheduling algorithm for streaming media based on CDN
    Ge YANG,Xiu-mei FAN
    2009, 30(2):  13-47.  doi:1000-436X(2009)02-0042-05
    Asbtract ( 0 )   HTML ( 0)   PDF (768KB) ( 410 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The scheme that the patch bytes were segmented and cached was employed.The cache window size was up-dated periodically according to the popularity of streaming media object.The principle was obeyed that the data cached for each streaming media object were in proportion to their popularity at the proxy server.Simulation results show that the strategy is more adaptive than MBP(multicast batched patching) algorithm and OBP(optimized batch patch-ing)+prefix &patch caching algorithm.It can significantly reduce patching data through patching channel under the cir-cumstance of the same maximum cache space.It can effectively reduce the server load and network bandwidth usage on backbone link.It can also save the transmission cost.

    Research on an optimal QoS DBA implement mechanism of EPON multicast
    Jin-yu ZHANG,Wei YANG,Li LIU
    2009, 30(2):  23-28.  doi:1000-436X(2009)02-0022-06
    Asbtract ( 0 )   HTML ( 0)   PDF (719KB) ( 8 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    By referring to economic mode,a QoS priority algorithm for EPON multicast was introduced based on its network attribute,user attribute and market attribute.Based on the multicast QoS priority,the network bandwidth was dynamically allocated among multicast services.It could overcome the disadvantages of lower benefit and higher loss rate of package in the network-priority-based QoS mechanism.It effectively reduced delay jitter of package by reshaping the variable-length and disorderly Ethernet downstream frame into the constant-length and orderly one.The simulation result verifies its merits well.

    Design and implementation of a cluster virtualization based fine snapshot system
    Xiao-jia XIANG,Ji-wu SHU,Hong-liang YU
    2009, 30(2):  29-34.  doi:1000-436X(2009)02-0028-06
    Asbtract ( 0 )   HTML ( 0)   PDF (842KB) ( 127 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A fine snapshot technology in volume level was presented which could be used to keep old data flexibly and frequently,to recovery from deletion,to limit exposure to data lose for logic volumes.First,two kinds of logic volumes namely,checkpoint and finesnap were designed and used as containers of snapshot data.Linking checkpoint volumes and finesnap volumes together by the order of time could make up of a hybrid snapshot chain,with which both good per-formance and high efficiency on storage usage were available.Second,a bitmap in each finesnap volume to accelerate data searching and reduce the memory exhausted was incorporated.Evaluation results from representative experiments demonstrate that the prototype system,named LV-Fine,has the ability to provide good performance,and to introduce less storage overhead than LVM2,the famous cluster virtualization system.

    Temporal fair active queue management algorithm for multi-rate 802.11 WLAN
    Jia-wei HUANG,Jian-xin WANG
    2009, 30(2):  35-41.  doi:1000-436X(2009)02-0034-08
    Asbtract ( 0 )   HTML ( 0)   PDF (1922KB) ( 20 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A temporal fair AQM—TFRED (temporal fair RED) on AP (access point) in multi-rate 802.11 WLAN was proposed.Taking into account the transmission rate of each flow,TFRED set different drop probability for each flow go-ing through the AP to guarantee equal channel usage time for each wireless node.Analysis and simulation results show that,compared with throughput fair AQM algorithms,TFRED achieves temporal fairness,per-flow throughput protection,and increase in total throughput.

    Performance study on a novel VBLAST modulation scheme under SUC detection
    Zhan-jun JIANG,Wen PAN,Yan WANG,Xiao-hu YOU
    2009, 30(2):  48-52.  doi:1000-436X(2009)02-0047-05
    Asbtract ( 0 )   HTML ( 0)   PDF (989KB) ( 58 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A new modulation scheme was proposed to deal with the error propagation (EP) existing during the successive cancellation (SUC) detection in the VBLAST (vertical Bell labs layered space-time) system.In the scheme,the former demodulated signal was designed to use the modulation with better noise suppression performance (e.g.binary phase shift keying modulation),and the latter demodulated signal was suggested to employ the modulation with higher frequency ef-ficiency (e.g.multi-decimal modulations).Analysis and simulation results show that system reliability for SUC detection is improved without penalty to the system availability.

    Research of duality and multi-level security model based on intransitive noninterference theory
    Wei-peng LIU,Xing ZHANG
    2009, 30(2):  53-59.  doi:1000-436X(2009)02-0052-07
    Asbtract ( 0 )   HTML ( 0)   PDF (1805KB) ( 6 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A novel duality and multi-level security model (DMLSM) based on intransitive noninterference theory was proposed,which protects confidentiality of information based on BLP model and integrity based on Biba model.To en-hance the usability of model,it introduces confidentiality trusted domain and integrality trusted domain which check the operations that violate the security policy in confidentiality check-room or integrity check-room respectively,then allow or refuse the access.The strict formal description of the model based on intransitive noninterference theory of informa-tion flow is given;furthermore,it proves the security of the model.The implementation of the model in Linux operating system is discussed and the application of model in practice is also demonstrated.The research gives Some contributes on the protection for sensitive important information and national information content security infrastructure.

    Simulation analysis of probabilistic covert channels based on probabilistic interference
    Yun-chuan GUO,Yuan ZHOU,Li DING,Li GUO
    2009, 30(2):  60-65.  doi:1000-436X(2009)02-0059-06
    Asbtract ( 0 )   HTML ( 0)   PDF (712KB) ( 44 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Bandwidth and transmission error rate has received much attention in fields of covert channels.If a system does not satisfy BSPNI,PBNDC or SPBNDC property,then probabilistic covert channels will be formed.A simulation system was built to analyze their bandwidth and transmission error rate about covert channels.For every results of simulation,detail theoretical explanations were given.The results show the bandwidth is closely related to software/hardware configuration,probability pa-rameter and scheduling times,when configurations and probability parameter are fixed,the bandwidth is inversely propor-tional to scheduling times.For the same process,the greater is scheduling times,the smaller is transmission error rate.

    Investigations on the effects of scatterers on the MIMO channel characteristics in LOS environment
    Lei-lei LIU,Wei HONG
    2009, 30(2):  66-72.  doi:1000-436X(2009)02-0065-06
    Asbtract ( 0 )   HTML ( 0)   PDF (2384KB) ( 419 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The effects of scattering objects on MIMO (multiple input multiple output) channel characteristics in line-of-sight (LOS) environment were investigated.The study was focused on the outdoor LOS environment but with a scatterer.The analytical mathematical expressions were derived to describe the MIMO channel matrix,where the microstrip an-tennas and 2-D cylindrical scatterer were considered.The MIMO channel capacity and the condition number of the ma-trix were investigated.From the simulation results of the MIMO channel characteristics of the model,some suggestions for practical MIMO system design are proposed.

    Research on quantitative assessment model on vulnerability risk for information system
    Liang ZHOU,Jun-e LI,Tian-bo LU,Kai-pei LIU
    2009, 30(2):  73-78.  doi:1000-436X(2009)02-0071-06
    Asbtract ( 0 )   HTML ( 0)   PDF (787KB) ( 136 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A quantitative method of vulnerability assessment was put forward on the foundation of research on current assessment methods home and abroad in order to evaluate vulnerability risk objectively.Vulnerability connection network (VCN) was discussed firstly for the purpose of taking connection of vulnerability into account,which divides vulnerabil-ity risk into entity risk and path risk;Secondly,advanced methods of quantifying entity importance in entity risk and network node connection effects in path risk were proposed;Lastly,an evaluation example of vulnerability risk on dis-patching management information system in power system was given out.Corresponding results show that quantitative assessment model brings out scientific and credible evaluation on vulnerability risk.

    Technical Report
    Wishart random matrix based Bayesian estimation for time-varying channel in the color noise
    Yuan JING,Fu-liang YIN
    2009, 30(2):  79-84.  doi:1000-436X(2009)02-0077-06
    Asbtract ( 0 )   HTML ( 0)   PDF (1451KB) ( 12 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A Bayesian estimation method for time-varying channel with the color noise was proposed.Based on random matrix theory and Gibbs sampling,the covariance matrix of the color noise and the channel parameters were firstly esti-mated.Then,the proposal distribution (or importance distribution) of the sequential monte carlo (SMC) sampler was modified to track the time-varying channel parameters blindly (with no pilot signals).Therefore,the proposed method may online semi-blindly estimate the time-varying channel parameters in the background of color noise.Compared with existing approaches,which are based on Kalman filtering and particle filtering,the proposed method is more robust and more accurate while the color noise is considered.The simulation results show the effectiveness of the proposed method.

    VDSC steganalysis algorithm of echo hiding
    Yu YANG,Min LEI,Xin-xin NIU,Yi-xian YANG
    2009, 30(2):  85-90.  doi:1000-436X(2009)02-0083-06
    Asbtract ( 0 )   HTML ( 0)   PDF (1331KB) ( 482 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Based on the idea that echo hiding changing the cepstrum distribution of natural audio,a new audio steganaly-sis method was presented.The VDSC(variants of difference of sum of cepstrum)was constructed to decet echo hiding audio files without estimating the size of hiding fragment.Experiment results show the accuracy of detecting echo hiding audio files is 88%.

    Structure and performance of noncoherent receivers for differential space-time modulation in correlated time-varying fading channels
    Bing-gang HUANG,Zhi-jie ZHOU
    2009, 30(2):  91-97.  doi:1000-436X(2009)02-0089-07
    Asbtract ( 0 )   HTML ( 0)   PDF (1781KB) ( 41 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Utilizing channel correlation and time-varying fading parameter,a novel optimal noncoherent receiver for dif-ferential space-time modulation in correlated time-varying fading channels was derived.Under several special channels,the optimal receiver was simplified.Based on the decision feedback data,a suboptimal noncoherent receiver named DF-NCR was presented for the application of the optimal receiver.Analysis and simulation results show that the error performance of differential space-time modulation system with the proposed DF-NCR is better than conventional differ-ential transmission method in correlated time-varying fading channels.

    Overview
    Survey of automatic attack signature generation
    Yong TANG,Xi-cheng LU,Yong-jun WANG
    2009, 30(2):  98-107.  doi:1000-436X(2009)02-0096-10
    Asbtract ( 0 )   HTML ( 0)   PDF (1066KB) ( 405 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Automatic signature generation,an emerging technique in network security,can be used to automatically de-tect new attacks (e.g.,new worms) and generate their signatures for detection.The research motivation and the evaluation criterions of automatic signature generation were presented.The proposed automatic signature generation approaches were classified into two types:NSG (network-based signature generation) and HSG (host-based signature generation):HSG systems were deployed in protecting hosts and made use of host information,NSG systems were deployed in net-work and solely analyzed the suspicious network traffic to generate signatures for new attacks.Typical HSG and NSG systems were respectively introduced and compared.Finally,the problems of current research and the future directions were discussed.

    Survey of software assurance
    Bin-xing FANG,Tian-bo LU,Chao LI
    2009, 30(2):  108-119.  doi:1000-436X(2009)02-0106-12
    Asbtract ( 0 )   HTML ( 0)   PDF (1675KB) ( 297 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Firstly,various definitions of software assurance were discussed,the key properties of software assurance were summarized,and the software assurance model S3R (security,safety,reliability,survivability) was proposed to describe the discipline of software assurance.Then,the software assurance programs of DHS,DOD and NASA were highly in-troduced as well as S3R development.Finally,the software assurance standards-setting was specified and the develop-ment trends of software assurance research were pointed.

    Short essay
    Method of speakers segmentation based on pre-segmentation
    Tie-ran ZHENG,Hai-feng LI,Xian LIU,Ji-qing HAN
    2009, 30(2):  120-124.  doi:1000-436X(2009)02-0108-05
    Asbtract ( 0 )   HTML ( 0)   PDF (798KB) ( 22 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The traditional method of speakers segmentation based on Bayesian information criterion (BIC) was improved.New speakers segmentation method adopted a pre-segmentation process to decrease calculation spending.Theory analy-sis and experiments show that the method of speakers segmentation based on pre-segmentation makes the amount of cal-culation controlled,on the premise of realizing the basic segmentation performance.

    Approach to making strategies for network security enhancement based on attack graphs
    Jia-quan SI,Bing ZHANG,Da-peng MAN,Wu YANG
    2009, 30(2):  125-130.  doi:1000-436X(2009)02-0123-06
    Asbtract ( 0 )   HTML ( 0)   PDF (1015KB) ( 64 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to improve the overall security of networks,a method of making strategies for the network security enhancement based on global attack graphs was proposed.The method calculated the probability of the network states transition by using global attack graphs.On this basis,the security loss of network states and the criticality of security elements were gotten.Finally,security elements were deleted based on maximum criticality first.The analysis of the ex-ample indicates that the enhancement strategies made by the method can improve the overall security of networks,and the operability is better than traditional methods.

    Research of connectivity for wireless sensor networks
    Xiao HUANG,Hong-bing CHENG,Geng YANG
    2009, 30(2):  131-137.  doi:1000-436X(2009)02-0129-07
    Asbtract ( 0 )   HTML ( 2)   PDF (916KB) ( 9 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    It was crucial to acquire the knowledge of nodes connectivity before management,application and research of wireless sensor networks when they had been deployed in the interest randomly.Under real environment there can be some nodes called unreachable node in interest,which could not communicate with base station for some reason,for ex-ample there are some nodes lie out of the radio range of base station or the interest range.A scheme to make those un-reachable nodes be able to communicate with base station was proposed.At the same time,a judgment algorithm for nodes connectivity based on a normal wireless sensor networks model was proposed.In simulation two-experiment scheme to test the proposed scheme and judgment algorithm were set.From the results of simulation conclude that the proposed scheme can improve nodes' connectivity in the interest and the proposed algorithm can judge the connectivity efficiently and accurately.

    Video text extraction method based on clustering
    Yan SONG,An-an LIU,Yong-dong ZHANG,Shou-xun LIN
    2009, 30(2):  138-142.  doi:1000-436X(2009)02-0136-05
    Asbtract ( 0 )   HTML ( 0)   PDF (523KB) ( 154 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A new method for video text extraction in order to overcome the weakness of existing methods was proposed.First,multi-scale text location and text region refinement in text location step were adopted.Then an improved K-means clustering method was used to segment text regions to obtain a binarized image in text segmentation step.Finally,OCR software was used to recognize text.The results of experiment show that the method can effctively used in sensitive words detection in videos from the Internet.

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Editor-in-Chief: Zhang Ping
Associate Editor-in-Chief:
Zhang Yanchuan, Ma Jianfeng, Yang Zhen, Shen Lianfeng, Tao Xiaofeng, Liu Hualu
Editorial Director: Wu Nada, Zhao Li
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Post: 100079
Tel: 010-53933889、53878169、
53859522、010-53878236
Email: xuebao@ptpress.com.cn
Email: txxb@bjxintong.com.cn
ISSN 1000-436X
CN 11-2102/TN
Visited
Total visitors:
Visitors of today:
Now online: