Computer Science ›› 2021, Vol. 48 ›› Issue (11A): 565-569.doi: 10.11896/jsjkx.210100093
• Information Security • Previous Articles Next Articles
ZHU Rong-chen1, LI Xin1,2, WANG Han-xu1, YE Han1, CAO Zhi-wei3, FAN Zhi-jie3
CLC Number:
[1]LI X,DUAN Y C,HUANG S H,et al.Construction of network security situation index system for video private network[J].Journal of Beijing University of Aeronautics and Astronautics,2020,46(9):1625-1634. [2]DUAN Y C.Extraction and evaluation of network security situation elements for video private network[D].Beijing:People's Public Secu-rity University of China,2020. [3]YIN X M,HU Z L,CHEN G L,et al.Research on IP video private network access detection scheme based on device fingerprint decision tree classification[J].Information Network Secu-rity,2016(12):68-73. [4]LUO J Z,YANG M,LING Z,et al.Cyberspace Security System and key technologies[J].Chinese Science:Information Science,2016,46(8):939-968. [5]BUJLOW T,CARELA-ESPAÑOL V,SOLÉ-PARETA J,et al.A Survey on Web Tracking:Mechanisms,Implications,and Defenses[J].Proceedings of the IEEE,2017,105(8):1476-1510. [6]WANG M,DING Z J.A new method for fingerprint feature selection and model construction of equipment[J].Computer Scie-nce,2020,47(7):257-262. [7]DANEV B,ZANETTI D,CAPKUN S.On physical-layer identification of wireless devices[J].ACM Computing Surveys,2013,45(1):1-29. [8]GERDES R,DANIELS T,PHD M,et al.Device Identificationvia Analog Signal Fingerprinting:A Matched Filter Approach[C]//Proceedings of the Network and Distributed System Security Symposium.2006:1-11. [9]DEY S,ROY N,XU W,et al.AccelPrint:Imperfections of Accelerometers Make Smartphones Trackable[C]//Network and Distributed System Security Symposium.2014:1-16. [10]LI C T.Source Camera Identification Using Enhanced SensorPattern Noise[J].IEEE Transactions on Information Forensics and Security,2010,5(2):280-287. [11]LUKAS J,FRIDRICH J,GOLJAN M.Digital camera identification from sensor pattern noise[J].IEEE Transactions on Information Forensics and Security,2006,1(2):205-214. [12]ZHANG Y T,YAN C H.Research on RFID tag authentication technology based on bidirectional authentication protocol[J].Information Network Security,2016(1):64-69. [13]YANG W C,GUO Y B,LI T,et al.Identification method and security model of Internet of things based on traffic fingerprint[J].Computer Science,2020,47(7):299-306. [14]MEIDAN Y,BOHADANA M,SHABTAI A,et al.ProfilIoT:a machine learning approach for IoT device identification based on network traffic analysis[C]//Proceedings of the Symposium on Applied Computing.2017:506-509. [15]ZHANG L P,LEI D J,ZENG X H.System call intrusion detection method based on frequency eigenvector[J].Computer Scie-nce,2013,40(S1):330-333,339. [16]YAO D,LUO J Y,CHEN W P,et al.Double random forest real-time intrusion detection method based on improved non extensive entropy feature extraction[J].Computer Science,2013,40(12):192-196,218. [17]LIN G Y,HUANG H,ZHANG Y P.Research progress of intrusion detection system[J].Computer Science,2008(2):69-74. [18]LUO C K,CHEN Y X,HU X,et al.Evaluation method of equipment system contribution rate based on combat ring and self information[J].Journal of Shanghai Jiaotong University,2019,53(6):741-748. [19]PENG C G,DING H F,ZHU Y J,et al.Information entropymodel and measurement method of privacy protection[J].Acta Sinica Sinica,2016,27(8):1891-1903. [20]CHI Y,GAO Z W.Construction of hybrid P2P network based on self information algorithm[J].Computer Science,2012,39(S1):159-162. [21]SHANNON C E.A mathematical theory of communication[J].The Bell System Technical Journal,1948,27(3):379-423. [22]MIETTINEN M,MARCHAL S,HAFEEZ I,et al.IoT SENTINEL:Automated Device-Type Identification for Security Enforcement in IoT[C]//2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).2017. |
[1] | WANG Xin-tong, WANG Xuan, SUN Zhi-xin. Network Traffic Anomaly Detection Method Based on Multi-scale Memory Residual Network [J]. Computer Science, 2022, 49(8): 314-322. |
[2] | ZHOU Zhi-hao, CHEN Lei, WU Xiang, QIU Dong-liang, LIANG Guang-sheng, ZENG Fan-qiao. SMOTE-SDSAE-SVM Based Vehicle CAN Bus Intrusion Detection Algorithm [J]. Computer Science, 2022, 49(6A): 562-570. |
[3] | CAO Yang-chen, ZHU Guo-sheng, SUN Wen-he, WU Shan-chao. Study on Key Technologies of Unknown Network Attack Identification [J]. Computer Science, 2022, 49(6A): 581-587. |
[4] | WEI Hui, CHEN Ze-mao, ZHANG Li-qiang. Anomaly Detection Framework of System Call Trace Based on Sequence and Frequency Patterns [J]. Computer Science, 2022, 49(6): 350-355. |
[5] | TIAN Ye, CHEN Hong-wei, WANG Fa-sheng, CHEN Xing-wen. Overview of SLAM Algorithms for Mobile Robots [J]. Computer Science, 2021, 48(9): 223-234. |
[6] | ZHANG Shi-peng, LI Yong-zhong. Intrusion Detection Method Based on Denoising Autoencoder and Three-way Decisions [J]. Computer Science, 2021, 48(9): 345-351. |
[7] | LI Bei-bei, SONG Jia-rui, DU Qing-yun, HE Jun-jiang. DRL-IDS:Deep Reinforcement Learning Based Intrusion Detection System for Industrial Internet of Things [J]. Computer Science, 2021, 48(7): 47-54. |
[8] | CHENG Xi, CAO Xiao-mei. SQL Injection Attack Detection Method Based on Information Carrying [J]. Computer Science, 2021, 48(7): 70-76. |
[9] | HE Quan-qi, YU Fei-hong. Review of Low Power Architecture for Wireless Network Cameras [J]. Computer Science, 2021, 48(6A): 369-373. |
[10] | CAO Yang-chen, ZHU Guo-sheng, QI Xiao-yun, ZOU Jie. Research on Intrusion Detection Classification Based on Random Forest [J]. Computer Science, 2021, 48(6A): 459-463. |
[11] | YU Jian-ye, QI Yong, WANG Bao-zhuo. Distributed Combination Deep Learning Intrusion Detection Method for Internet of Vehicles Based on Spark [J]. Computer Science, 2021, 48(6A): 518-523. |
[12] | JIA Lin, YANG Chao, SONG Ling-ling, CHENG Zhenand LI Bei-jun. Improved Negative Selection Algorithm and Its Application in Intrusion Detection [J]. Computer Science, 2021, 48(6): 324-331. |
[13] | WANG Ying-ying, CHANG Jun, WU Hao, ZHOU Xiang, PENG Yu. Intrusion Detection Method Based on WiFi-CSI [J]. Computer Science, 2021, 48(6): 343-348. |
[14] | LIU Quan-ming, LI Yin-nan, GUO Ting, LI Yan-wei. Intrusion Detection Method Based on Borderline-SMOTE and Double Attention [J]. Computer Science, 2021, 48(3): 327-332. |
[15] | HUAN Wen-ming, LIN Hai-tao. Design of Intrusion Detection System Based on Sampling Ensemble Algorithm [J]. Computer Science, 2021, 48(11A): 705-712. |
|