Loading...

Table of Content

    10 September 2017, Volume 17 Issue 9 Previous Issue    Next Issue

    Orginal Article
    For Selected: Toggle Thumbnails
    Orginal Article
    Application of SSL VPN Technology in Mobile Police Video Access Link
    Xinming YIN, Zhiwei CAO, Haiye HUANG, Zhijie FAN
    2017, 17 (9):  1-4.  doi: 10.3969/j.issn.1671-1122.2017.09.001
    Abstract ( 570 )   HTML ( 3 )   PDF (3853KB) ( 187 )  

    The mobile police video secure access link is an important boundary channel that the mobile video resources in private network safely and efficiently access to web-of-trust. This paper proposes a SSL VPN implementation mode and security encryption mechanism based on network client, and designs an identity authentication way for the login user of police terminal. This paper put forward an integrated scheme of mobile police video secure access link, and introduce a load balance technology to improve system performance.

    Figures and Tables | References | Related Articles | Metrics
    Research on a Vulnerability Location Technology Based on Patch Matching and Static Taint Analysis
    Xiaowen DA, Limin MAO, Mingjie WU, Min GUO
    2017, 17 (9):  5-5.  doi: 10.3969/j.issn.1671-1122.2017.09.002
    Abstract ( 893 )   HTML ( 7 )   PDF (4651KB) ( 318 )  

    At present, there is a lack of the analysis for vulnerabilities location in open source software and a lack of an automatic method for fast locating the vulnerabilities. To address these issues, this paper proposes a vulnerabilities location method based on patch matching and the static taints analysis. By analyzing a large number of buffer errors instances of open source software, six vulnerabilities location models of buffer errors are extracted. By combining patch matching with taint propagation, a taint propagation path graph is generated. Match the taint propagation graph of patched source with the location models to locate a small block of code, which then locates vulnerabilities code rows accurately by searching for taints.

    Figures and Tables | References | Related Articles | Metrics
    Research and Implementation of Routing Performance Optimization for IaaS Cloud Platform
    Jianfeng LI, Yuan LIU, Hao ZHANG, Xiaofeng WANG
    2017, 17 (9):  10-15.  doi: 10.3969/j.issn.1671-1122.2017.09.003
    Abstract ( 570 )   HTML ( 3 )   PDF (5087KB) ( 180 )  

    In order to improve the fidelity and efficiency of virtual network in Openstack, this paper studies a dynamic routing protocol simulation technology based on computing resource virtualization and improve the virtual network performance based on SDN technology. The experiments shows that the method can improve the network throughput and reduce the link delay under the premise of ensuring the fidelity of virtual network topology.

    Figures and Tables | References | Related Articles | Metrics
    Design of Trust Architecture and Lightweight Authentication Scheme for IoT Devices
    Chuankun WU, Lei ZHANG, Jiangli LI
    2017, 17 (9):  16-20.  doi: 10.3969/j.issn.1671-1122.2017.09.004
    Abstract ( 742 )   HTML ( 18 )   PDF (4461KB) ( 377 )  

    The identification and authentication of IoT devices are two fundamental problems in secure communications of those devices.Noticing the characteristics of IoT devices, this paper designs an architecture of trust, proposes how to establish a trust based on public key certificates and on symmetric key settings respectively.Based on the above, this paper designs two authentication schemes for IoT devices based on the public certificate setup and the shared secret key setup respectively.

    References | Related Articles | Metrics
    Research on Cross-architecture Vulnerabilities Searching in Binary Executables
    Weiyang XU, Yao LI, Yong TANG, Baosheng WANG
    2017, 17 (9):  21-25.  doi: 10.3969/j.issn.1671-1122.2017.09.005
    Abstract ( 511 )   HTML ( 4 )   PDF (4636KB) ( 143 )  

    During the development of computer software, the emergence of vulnerabilities can not be avoided. Thus, rapid identification of vulnerabilities is the key to protect the computer system. Most of the existing methods are based on source code, and the methods based on binary are only done on single instruction architecture. Because of the above problems, this paper proposes an efficient way to search vulnerabilities on binary level, which standardizes the assembly code of different instruction architecture, extracts features of vulnerabilities and binary executables, and finds the vulnerabilities of binary executables by using features matching algorithm. Experiments show that the method can accurately find the known vulnerabilities in the samples, such as the Heartbleed vulnerability in the OpenSSL library, the Rootkit vulnerabilities in the BusyBox and the back doors that exist in the router firmware.

    Figures and Tables | References | Related Articles | Metrics
    Generation Algorithm Crack Based on DGA Domain Name of Malicious Program
    Guotian XU
    2017, 17 (9):  26-29.  doi: 10.3969/j.issn.1671-1122.2017.09.006
    Abstract ( 513 )   HTML ( 4 )   PDF (3855KB) ( 136 )  

    This paper presents a DGA algorithm crack method based on network packet capture , First capture the DNS resolution request sent by the zombie program, By analyzing the structural features of malicious domain names, Forensic staff can form a preliminary understanding of the DGA algorithm, and then use the static analysis tool in the malicious program search top-level domain name string positioning DGA core algorithm assembly code, The assembler is then converted to a high-level language program, Run the program, calculate the future of all available domain name information. After testing, we found that the application of this method can quickly and accurately locate the malicious program in the DGA core code, improve the efficiency of forensic analysis.

    Figures and Tables | References | Related Articles | Metrics
    Safety Design and Applications for Spacecraft Equipment Interface Data Sheet System
    Wei YU, Ping WEI
    2017, 17 (9):  30-33.  doi: 10.3969/j.issn.1671-1122.2017.09.007
    Abstract ( 431 )   HTML ( 3 )   PDF (3597KB) ( 118 )  

    The safety of spacecraft equipment interface data is crucial as it’s the key data for spacecraft development. This paper analyses the business process and the insufficiency of the safety for spacecraft equipment interface data sheet system, and then brings forward the design principle and construction scheme for the safety modules. The safety design applications show that the safety modules perfect the access control of equipment interface data, optimize the storage of logs, and amplify the safety of the equipment interface data management.

    References | Related Articles | Metrics
    Research on the Industrial Control Systems Security Architecture of Chinese Tobacco Industry
    Xin GENG
    2017, 17 (9):  34-37.  doi: 10.3969/j.issn.1671-1122.2017.09.008
    Abstract ( 479 )   HTML ( 2 )   PDF (3822KB) ( 132 )  

    This paper analyzes the basic statistics and the face risks of the industrial control systems security architecture of Chinese tobacco industry, advance the construction idea of the industrial control systems security architecture based on the full life cycle of Chinese tobacco industry, discusses the key technology and its realization ways of building this architecture.

    Figures and Tables | References | Related Articles | Metrics
    Implementation and Application of Internet of Things Security Technology
    Hong FAN, Hua SHAO, Haitao LI
    2017, 17 (9):  38-41.  doi: 10.3969/j.issn.1671-1122.2017.09.009
    Abstract ( 558 )   HTML ( 3 )   PDF (3620KB) ( 148 )  

    China’s “Internet Security Law” stipulates legal requirements for the critical infrastructure protection, which will profoundly affect the Internet of things in the application of key infrastructure. By the Internet of things integration security detection perspective, this article discusses the Internet of things security protection technology, security testing practice and the future of Internet of things security market and development trends.

    Figures and Tables | References | Related Articles | Metrics
    Identity-based Dynamic Group Communication Signcryption Scheme
    Qingling DU
    2017, 17 (9):  42-44.  doi: 10.3969/j.issn.1671-1122.2017.09.010
    Abstract ( 458 )   HTML ( 2 )   PDF (2557KB) ( 141 )  

    This paper mainly discusses the dynamic security of group communication. The secrecy and authentication of group communication is realized with sign-cryption technology. The paper constructs an ID-based dynamic group communication sign-cryption scheme, using hyperelliptic curve cryptosystem and ID-based sign-cryption model. The security of the scheme is illustrated. The scheme has high security, low communication cost and simple key management.

    References | Related Articles | Metrics
    A Classification Method of Web Page Using Machine Learning
    Jingchao SUN
    2017, 17 (9):  45-48.  doi: 10.3969/j.issn.1671-1122.2017.09.011
    Abstract ( 834 )   HTML ( 17 )   PDF (3176KB) ( 337 )  

    With the popularity of the network, the number of web pages is in rapid growth, and the proportion of the malicious web page growth rate also shows an upward trend. The detection of malicious web pages has been the focus and difficulty of network security research. The traditional malicious webpage detection model is more and more difficult to deal with the new situation. The application of machine learning algorithm in the field of malicious webpage is a way to break the limitation of traditional malicious webpage. In this paper, a malicious web page detection model based on machine learning has been developed. The model classifies the web pages by collecting the characteristic information like URL、HOST information and the content of various web pages using machine learning algorithm, and it has achieved more excellent classification effect comparing to the prior work.

    Figures and Tables | References | Related Articles | Metrics
    Technical Research on Mobile Internet Public Sentiment Monitoring System
    Yue QIU
    2017, 17 (9):  49-53.  doi: 10.3969/j.issn.1671-1122.2017.09.012
    Abstract ( 792 )   HTML ( 2 )   PDF (4667KB) ( 134 )  

    Internet public sentiment monitoring is one of the important responsibilities of the public security organ. With the development of 4G, WiFi, and devices such as smart-phones and Ipad , the mobile Internet is becoming the main conduit for spreading public opinion. To be compare with traditional Internet such as PC, mobile Internet stakeholders is of more wide range, information spread faster, public opinion control difficulty is greater, there is no doubt to Internet public opinion monitoring work has brought new challenges and problems. This paper discusses the relevant technical research of mobile Internet public opinion monitoring system. First, the characteristics of mobile Internet; And then compare the current level of technology at home and abroad; The paper discusses the design of system framework and key technical research. Finally, the technology of information APP and its comment collection is discussed in detail.

    Figures and Tables | References | Related Articles | Metrics
    A Method Using Information Gain and Naive Bayes to Extract Network Situation Information
    Ben QI, Mengdi WANG
    2017, 17 (9):  54-57.  doi: 10.3969/j.issn.1671-1122.2017.09.013
    Abstract ( 531 )   HTML ( 2 )   PDF (3477KB) ( 137 )  

    Network security situational factors of extraction exist some problems in reduction and classification. We collect network data to obtain the strong correlation between situational factors through setting up right value. Through the improvement of naive bayesian analysis, the detection of malicious attack was realized. This paper tries to experiment with the intrusion detection data set, and compares the traditional method to the better effect.

    Figures and Tables | References | Related Articles | Metrics
    Research on Identity Authentication Technology Based on Gravity Sensor
    Man ZHAN, Hequn XIAN, Shuguang ZHANG
    2017, 17 (9):  58-62.  doi: 10.3969/j.issn.1671-1122.2017.09.014
    Abstract ( 342 )   HTML ( 2 )   PDF (4269KB) ( 99 )  

    User authentication is an essential issue to smart terminal information security and privacy protection. Fingerprint authentication based on biometric features directly stores personal important features information on smart devices, which leads the risk of information leakage. Based on the characteristics of the gravity sensor in the smart terminal in the market, this paper uses the 3D accelerometer of the smart terminal to collect the user behavior data and identify the user. In order to improve the accuracy and efficiency of the recognition, the user can select any combination from the legal gesture library and use the combination as the authentication key (gesture key). Compared with the biometric-based authentication method, the authentication method based on user behaviors does not have the risk of revealing important personal characteristics, and avoids complicated knowledge passwords. Experimental results show that the proposed method has high recognition accuracy.

    Figures and Tables | References | Related Articles | Metrics
    Research on Virtual Machine Introspection Technology
    Jian ZHANG, Cheng GAO, Liangyi GONG, Zhaojun GU
    2017, 17 (9):  63-68.  doi: 10.3969/j.issn.1671-1122.2017.09.015
    Abstract ( 916 )   HTML ( 33 )   PDF (5715KB) ( 348 )  

    Virtual machine introspection is the technology that takes the internal information of the guest OS from the external of the virtual machine. It overcomes the bottleneck of traditional security technology and therefore is widely concerned by the security field. In recent years, it has been applied in the intrusion detection, malware analysis, digital forensics etc. Especially, it has excellent application prospects in the increasingly prominent cloud security issues. This paper analyzes the realization principle and development history of VMI technology. According the above researches, this paper proposes a new VMI technology classification method and study application of VMI technology. In the final part, this paper analyzes and put forward the existing problems and future development direction of VMI technology.

    Figures and Tables | References | Related Articles | Metrics
    Risk Analysis of Mutual Operation of 2G/3G/4G Mobile Communication Network and Protection Scheme
    Li SU, Jing SHAO, Haitao DU
    2017, 17 (9):  69-72.  doi: 10.3969/j.issn.1671-1122.2017.09.016
    Abstract ( 502 )   HTML ( 3 )   PDF (2890KB) ( 119 )  

    This paper described the mutual operation mechanism among 2G/3G/4G in mobile communication network, and analyzed the security risks of pseudo base station caused by mutual operation. Further analysis showed that the risk was caused by the one-way authentication mechanism. This paper proposed the GSM SR-AKA algorithm, which could prevent against the pseudo base station attack. This algorithm can achieve two-way authentication by the network side and smart card without changing the GSM authentication procedure or the parameter’s format. Furthermore, the old SIM card is compatible with the new algorithm, making the scheme easy to implement.

    Figures and Tables | References | Related Articles | Metrics
    Social Network Mining Based on Multi-source Information Fusion
    Jingjie MO, Chenyang TU, Jia PENG, Jun YUAN
    2017, 17 (9):  73-76.  doi: 10.3969/j.issn.1671-1122.2017.09.017
    Abstract ( 550 )   HTML ( 2 )   PDF (3758KB) ( 111 )  

    This paper proposes a creative method for network embedding based on multi-source information fusion, which use DNGR model to represent structure information, and proposes a new model called DLDA to represent semantic information instead of LDA model because LDA model can’t describe the semantic similarity between the nodes, and use SDAE model for information fusion in the end. This paper evaluate the method on real-world datasets by applying it to the task of link prediction, community detection and abnormal nodes detection, which are the classic task in social network mining, and prove the effectiveness of our method.

    Figures and Tables | References | Related Articles | Metrics
    Research on Online Transaction Risk Detection Based on IP Reputation
    Shuo HE, Zili HUANG, Yang YANG, Zhou CHEN
    2017, 17 (9):  77-80.  doi: 10.3969/j.issn.1671-1122.2017.09.018
    Abstract ( 440 )   HTML ( 1 )   PDF (3528KB) ( 91 )  

    With the rapid development of Internet payments, the continuously upgrading of online transaction risk, all kinds of malicious transaction behavior is of common occurrence. For coping with the severe challenges of business risk prevention and control, IP reputation should be taken as the breakthrough point to evaluate for transaction behaviors, which is one of important measures to find online transaction risks timely. By means of association analysis of IP reputation and online transaction risks, this paper propose a framework and model of online transaction risk detection based on IP reputation, to realize the real-time recognition of online transaction risk according to the actual business scenarios. The framework provides much more guarantee for safe operation of Internet business.

    Figures and Tables | References | Related Articles | Metrics
    The Application of Obfuscation in Cryptographic Protocols
    Weiwei GU, Guifang HUANG, Maodong LIAO
    2017, 17 (9):  81-84.  doi: 10.3969/j.issn.1671-1122.2017.09.019
    Abstract ( 501 )   HTML ( 2 )   PDF (3672KB) ( 187 )  

    Code obfuscation is a powerful tool of protecting the privacy of programs, and has many applications in cloud computing. For example, code obfuscation can be used for constructing efficient secure homomorphic encryption. Code obfuscation can also hide the information of re-encryption function while sharing data from cloud server to achieve privacy of the computation task. In this paper, the results of the application of obfuscation in cryptographic protocols are summarized. From the aspect of several forms of definition of obfuscation, we analyze the related progress and results, and point out some unsolved problems on obfuscation.

    References | Related Articles | Metrics
    Research on Electronic Data Forensics of Small Unmanned Aerial Vehicle
    Qingyi TIAN, Baoshun LI
    2017, 17 (9):  85-88.  doi: 10.3969/j.issn.1671-1122.2017.09.020
    Abstract ( 664 )   HTML ( 6 )   PDF (3335KB) ( 365 )  

    In recent years, unmanned aerial vehicles illegally invaded the airport, resulting in flights grounded, the impact of aviation safety news emerge in an endless stream. In addition, there have been incidents of cross-border drug trafficking, delivery of drugs and weapons to the prison and personal privacy violations in foreign countries. The evidence of unmanned aerial vehicles is imminent. Based on the analysis of the architecture of small consumer unmanned aerial vehicles, this paper studies and implements the Unmanned aerial vehicle forensics model and plays a major role in combating the use of fixed evidence for illegal and illegal use of unmannedaerial vehicles.

    Figures and Tables | References | Related Articles | Metrics
    Research on Semantic Analysis of Chats
    Yuanyuan WANG, Chaoqin FAN, Yuhai SU
    2017, 17 (9):  89-92.  doi: 10.3969/j.issn.1671-1122.2017.09.021
    Abstract ( 651 )   HTML ( 12 )   PDF (3598KB) ( 147 )  

    This paper’s research object is chats, and the paper is focusing on the semantic level, elaborated the domestic current research status and research significance in the beginning. Then this paper sums up the chat record is different from common text, the characteristics of the key technologies involved in the semantic analysis research and choose and design the most suitable algorithm for chat. Finally, this paper puts forward a semantic analysis model of chat.

    Figures and Tables | References | Related Articles | Metrics
    APT Logic-based Causality Analysis of Terrorist Incidents
    Yuhui WANG, Zehua ZENG, Jiahui SHEN, Tianshu FU
    2017, 17 (9):  93-97.  doi: 10.3969/j.issn.1671-1122.2017.09.022
    Abstract ( 501 )   HTML ( 3 )   PDF (4154KB) ( 127 )  

    In recent years, terrorist incidents have occurred frequently in the world, which seriously threatens the safety of the international community. The analysis of terrorist incidents has become a hot topic in the field of content security. APT logic proposes a reasoning model for causal relationships of temporal events by establishing rules, which has been widely used in many fields. On the basis of previous works, this paper propose a flexible and extensible causality analysis algorithm of terrorist incidents based on APT logic, and uses the data from the Global Terrorism Database to investigate the causal relationships between terrorist attacks conducted by the ISIS. The paper tests the results and gets some causal relationships between some of the terrorist attacks, which provide help for the study of terrorist incidents.

    Figures and Tables | References | Related Articles | Metrics
    Research on a Topic Evolution Analysis System of Emergency Based on Social Media
    Zihan WANG, Yuhui WANG, Lei WANG, Xin WANG
    2017, 17 (9):  98-102.  doi: 10.3969/j.issn.1671-1122.2017.09.023
    Abstract ( 607 )   HTML ( 5 )   PDF (4607KB) ( 241 )  

    With the development of social media, emergencies spread rapidly in the network, which then affects the situation and takes serious impacts on the public order and social situation. So the research on the evolution of emergency has become an important part of the content security field. By studying the basic properties of emergency, it is found that the evolution process of emergency can be reflected by potential topics with sequential evolutionary structure. Combining with the characteristics of social media content and using the dynamic topic model, this paper designs a topic evolution analysis system of emergency, which analyzes public view tendency and restores the event development process from the two aspects of topic content and topic heat. This system achieves the expected results in the topic analysis of "South Korea deploys the THAAD anti-missile system", and has practical value in the field of situation awareness.

    Figures and Tables | References | Related Articles | Metrics
    Mobile Device Management System Based on AOSP and SELinux
    Xinlong SONG, Dong ZHENG, Zhonghuang YANG
    2017, 17 (9):  103-106.  doi: 10.3969/j.issn.1671-1122.2017.09.024
    Abstract ( 568 )   HTML ( 5 )   PDF (3507KB) ( 174 )  

    In this paper, study designed and implemented an enterprise mobile device management (MDM) system by analyzing current situation of mobile device management,it is consisted of an android system app and a server software., which has achieved some functions controling the mobile device, including the server remotely changes the security policy (sepolicy) to realize the granting and revoking of the relevant permissions of the mobile device, remotely uninstall suspicious applications, push information to the client and so on. The client system app was developed using Google’s Android Open Source Project (AOSP) and was added to Android 7. The evaluation experiment results show all functions are running well.

    Figures and Tables | References | Related Articles | Metrics
    Implementation of Identity Authentication Scheme Based on Smart Mobile Cryptographic Module
    Kaili ZHAO, Danyi LI, Qiang LI, cunqing MA
    2017, 17 (9):  107-110.  doi: 10.3969/j.issn.1671-1122.2017.09.025
    Abstract ( 709 )   HTML ( 9 )   PDF (3487KB) ( 188 )  

    With the popularization of smart mobile terminals, it is very urgent to make authentication by using mobile phones. However, the traditional technology of Identity authentication based on hardware is difficult to be deployed on mobile terminals. In this paper, we designed and implemented an Identity authentication scheme for mobile terminals based on smart mobile cryptographic module, in which we combined QR Code and public key cryptosystem. This scheme provIDes convenient interaction to its users, and achieves high security.

    Figures and Tables | References | Related Articles | Metrics
    Phishing Detection System Based on Classification Confidence and Website Features
    Xu CHEN, Yukun LI, Huaping YUAN, Wenyin LIU
    2017, 17 (9):  111-114.  doi: 10.3969/j.issn.1671-1122.2017.09.026
    Abstract ( 471 )   HTML ( 4 )   PDF (3797KB) ( 80 )  

    This paper develops an anti-phishing system to combat the increasing amount and severity of phishing attacks. To this end, features based on URLs and Web links are constructed and used to train two Adaboost models, which can detect phishing URLs with a high accuracy. In particular, the confidence of the model on the detected URLs is exploited further to improve the detected results. Extensive experiments conducted on a real-world dataset show the effectiveness of the proposed approach, achieving an accuracy of 96.7% with a missing alarm rate and false alarm rate as low as 3.59% and 2.93%.

    Figures and Tables | References | Related Articles | Metrics
    A New Detection Technique of SQL Injection Based on Hidden Markov Mode
    Lianqun YANG, Kui MENG, Bin WANG, Yong HAN
    2017, 17 (9):  115-118.  doi: 10.3969/j.issn.1671-1122.2017.09.027
    Abstract ( 647 )   HTML ( 5 )   PDF (3511KB) ( 137 )  

    SQL injection attacks pose a common threat to the security of Web applications. This paper proposed a new technique based on hidden Markov mode for protecting existing Web application against SQL injection.Features of SQL statements can be obtained by word segmentation parsing.We take bothhidden Markov mode and similarity distance methods,and identify the true illegal SQL statements.Experimental results prove that this proposed approach is simple and effectivefor detecting illegal SQL statements.

    Figures and Tables | References | Related Articles | Metrics
    A Warning Method of Instant Messaging Internet Fraud Based on Behavior Analysis
    Yongheng XIE, Guowei WANG, Yimang HUO, Xiaoyun JIA
    2017, 17 (9):  119-121.  doi: 10.3969/j.issn.1671-1122.2017.09.028
    Abstract ( 502 )   HTML ( 2 )   PDF (2720KB) ( 143 )  

    In order to reduce the Internet fraud rate, defeat instant messaging Internet fraud crime, reduce people's property loss, the paper proposes a warning method of instant messaging Internet fraud based on behavior analysis, which can automatically give a warning when a user's behavior was involved in fraud. The method can identify any Internet fraud for the police department early. Simulation experiment results show that the accuracy of this method is 96.5%, the recall rate is 84.9%.

    Figures and Tables | References | Related Articles | Metrics
    High-performance Implementation of Curve25519 on GPU
    Juanjuan CHENG, Fangyu ZHENG, Jingqiang LIN, Jiankuo DONG
    2017, 17 (9):  122-127.  doi: 10.3969/j.issn.1671-1122.2017.09.029
    Abstract ( 2135 )   HTML ( 68 )   PDF (5223KB) ( 592 )  

    Widely used in a large range of Internet security protocols such as TLS/SSL, key exchange provides a method to establish a shared secret between two parties in unprotected channel. Among the key exchange algorithms Elliptic-Curve Diffie- Hellman (ECDH) is currently preferred and popularized by the industry. The prevailing ECDH employs NIST P Curve as the underlying elliptic curve, however, with the requirement of high performance and questioning of its security, in January, 2016, IETF officially applied Curve25519 to key exchange in RFC 7748, called X25519 key exchange protocol. And later, many mainstream open-source projects recommended X25519 as the default key exchange protocol. The bottleneck of X25519 lies in the scalar multiplication of Curve25519.This contribution proposed a GPU-accelerated Curve25519 implementation, having yielded a throughput of 1.38 million scalar multiplication per second in NVIDIA GeForce GTX 780Ti, 5.6 times faster than the previous fastest work.

    Figures and Tables | References | Related Articles | Metrics
    LWE-based Multi-authority Attribute-based Encryption Scheme in Cloud Environment
    Xixi YAN, Yuan LIU, Mingxing HU, Qinlong HUANG
    2017, 17 (9):  128-133.  doi: 10.3969/j.issn.1671-1122.2017.09.030
    Abstract ( 572 )   HTML ( 7 )   PDF (5545KB) ( 154 )  

    To solve the high overhead of storage and can’t resist quantum attack problem of the traditional attribute based encryption(ABE) which based on bilinear maps, a new ABE scheme based on learning with errors problem was proposed. Firstly, the scheme supported multi-authority to manage different attribute sets, and introduced SampleLeft algorithm to extract keys for its authenticated users, and thus reduce the size of user’s private key. Secondly, with the help of the Shamir secret sharing technique, the secret valueswere safely managed by multi-authority, which can resist the collusion attack of authorities. Finally, the security proof showed that the security of the scheme can reduces to the hardness of decisional learning with errors problem in the standard model. Compared with the similar schemes, the size of public parameters, master secret key, ciphertext and user’s private key all optimized in some degree, and the attributes are managed by multi-authority, and hence our scheme has higher practicability and security in cloud environment.

    Figures and Tables | References | Related Articles | Metrics
    A Rumor Detection Model Based on Neural Network
    Dagao DUAN, Yongheng XIE, Xinxin GAI, Zhanbin LIU
    2017, 17 (9):  134-137.  doi: 10.3969/j.issn.1671-1122.2017.09.031
    Abstract ( 555 )   HTML ( 4 )   PDF (3708KB) ( 132 )  

    This paper proposes a blogger and micro-blog fusion attribute message text feature neural network recognition model. First, according to characteristics of blogger information: blogger category, blogger activity, blogger friends, fans, bloggers original news.Then micro-blog text representation vectors based on word2vec, and extracted the text feature by parallel convolutional neural network, according to the semantic content of text feature representation.Finally building BP neural network rumor detection model, the integration of micro-blog text semantic and micro-blog blogger as the model’s multi-feature to identify micro-blog news.

    Figures and Tables | References | Related Articles | Metrics
    Overlapping Community Detection Algorithm Based on Improved MCMC Method
    Shunshun FU, Yijun GU, Dahan ZHANG, Fanpeng MENG
    2017, 17 (9):  138-142.  doi: 10.3969/j.issn.1671-1122.2017.09.032
    Abstract ( 509 )   HTML ( 2 )   PDF (4270KB) ( 124 )  

    This paper analyzes the characteristics and mechanism of the overlapping community detection algorithm based on Community-Affiliation Graph Model AGM. The aim of this paper is to improve the partial optimization problem .In the original MCMC sampling method, the simulated annealing (ST) strategy and the supplementary search process were introduced to realize the fast updating of the parameters to be obtained and to approximate the global optimal solution. Experiments in four networks show that the results of the improved algorithm are improved compared with the original algorithm, and the experimental results in the DBLP scientific co-network with higher average clustering coefficient are improved by 14%. The improved algorithm can improve the efficiency of sampling and improve the accuracy and reliability of community detection.

    Figures and Tables | References | Related Articles | Metrics
    Human-machine Behavior Recognition for CAPTCHA Based on Gradient Boosting Model
    Zhiyou OUYANG, Xiaokui SUN
    2017, 17 (9):  143-146.  doi: 10.3969/j.issn.1671-1122.2017.09.033
    Abstract ( 868 )   HTML ( 20 )   PDF (3606KB) ( 174 )  

    By using the abnormal means to simulate human behavior operation and bypass the CAPTCHA system, hacking tools can then sent a large batch of requests to the background system to achieved the hacking goals, which may bring to big risk of delay response of system operation, or even produce huge economic losses. However, the traditional verification code method has shortcomings in both ease of use and man-machine recognition rate. In this paper, a new behavior trajectory of the CAPTCHA system based feature engineering, with utilizes the gradient boosting models, for human-machine behavior recognition is proposed. Performance in 100000 samples of real CAPTCHA system can obtain a more than 90% recognition accuracy.

    Figures and Tables | References | Related Articles | Metrics
    Research on the Consensus Mechanisms of Blockchain Technology
    Xuan HAN, Yamin LIU
    2017, 17 (9):  147-152.  doi: 10.3969/j.issn.1671-1122.2017.09.034
    Abstract ( 830 )   HTML ( 28 )   PDF (5330KB) ( 2106 )  

    As the underlying technology in Bitcoin, the blockchain technology has gained wide attention. Blockchain is a kind of feasible method to solve the consistency problem of distributed system. Consensus mechanism is the core of the blockchain technology. Delicate consensus mechanism can improve system performance and promote the application of blockchain in many fields. Based on the consensus mechanisms in existing design of blockchain, this paper summarizes the basic consensus mechanisms including proof of work, proof of stake and Byzantine consistency agreement, and evaluates them from various aspects such as security, scalability, performance, etc. The future research on the blockchain consensus mechanism will be based on the different characteristics of the consensus mechanisms, and design should be carried out around the combination of different consensus mechanisms.

    Figures and Tables | References | Related Articles | Metrics
    The Analysis of Software Behavior Security Based on Big Data Samples
    Min GUO, Yingming ZENG, Jinli YAO, Xiaowen DA
    2017, 17 (9):  153-156.  doi: 10.3969/j.issn.1671-1122.2017.09.035
    Abstract ( 675 )   HTML ( 3 )   PDF (3591KB) ( 248 )  

    Because information system attack events caused by software misconducts or malicious damages occur frequently-software security requirements of information system are higher and higher. How to achieve the security analysis of software behaviors effectively has become a popular topic. This paper focuses on the software behaviors analysis technology based on big data samples. Considering the characteristics of massive, multi-dimensional, high-speed change and complex internal relations of big data samples, combining the static analysis based on hierarchical clustering algorithm with dynamic behaviors analysis based on SVM algorithm, this paper constructs a software behaviors analysis model based on machine learning algorithm. The model uses cloud centralized processing method, which can effectively save the resource consumption of the terminal, and realize the efficient and rapid detection of malicious software.

    Figures and Tables | References | Related Articles | Metrics