Loading...

Table of Content

    10 June 2025, Volume 25 Issue 6 Previous Issue    Next Issue

    For Selected: Toggle Thumbnails
    Network Security Situation Assessment Method Based on Threat Propagation
    ZHAO Bo, PENG Junru, WANG Yixuan
    2025, 25 (6):  843-858.  doi: 10.3969/j.issn.1671-1122.2025.06.001
    Abstract ( 404 )   HTML ( 91 )   PDF (24982KB) ( 194 )  

    Network security situation awareness assessment remains a critical research focus in cybersecurity. Previous methods suffered from limited transferability and excessive reliance on expert experience, leading to rigid processes and subjective evaluations. We analyzed malicious traffic graphs and observed that attackers exhibited higher centrality characteristics, structurally resembling interaction patterns in social networks. Centrality analysis, widely used in social networks to identify key nodes and propagation paths, was adapted to detect attack sources and propagation nodes in malicious traffic graphs. This structural similarity enabled transferring social network analysis methods to cybersecurity domains, improving assessment transferability. To address these limitations, this paper proposed ThreatSA, a novel network security situation assessment method. Unlike static approaches, ThreatSA converted malicious traffic into graph structures and quantified node importance through centrality analysis to identify attackers and propagation nodes. It then employed intimacy analysis to measure node relationship strength, dynamically reflecting host security status. The method required only malicious traffic data and functioned effectively in information-incomplete environments. Experimental evaluations on three public datasets demonstrate ThreatSA’s real-time assessment capability with 99.32%, 99.65%, 99.74% similarity scores. Comparative tests show ThreatSA outperforms two representative methods, proving its effectiveness in network security situation assessment.

    Figures and Tables | References | Related Articles | Metrics
    Lightweight Malicious Traffic Detection Method Based on Knowledge Distillation
    SUN Jianwen, ZHANG Bin, SI Nianwen, FAN Ying
    2025, 25 (6):  859-871.  doi: 10.3969/j.issn.1671-1122.2025.06.002
    Abstract ( 222 )   HTML ( 62 )   PDF (14952KB) ( 102 )  

    To address the model lightweight requirements for multi-class malicious traffic detection in resource-constrained scenarios, this paper proposed a lightweight malicious traffic detection method based on knowledge distillation. The methodology transferred knowledge from a 12-layer transformer teacher model to a 1-layer transformer student model through a dual supervision mechanism that combined Kullback-Leibler divergence distillation loss with Focal supervisory loss. This approach achieved model compression from 286 MB to 26 MB with approximately 10 times faster inference speed, while limiting the decline in classification precision to less than 1.4 percentage points. Experimental results on three public datasets including USTC-TFC2016, ISCX-VPN2016-Service and CSE-CIC-IDS2018 demonstrate that the compressed model attains over 99.38% recognition accuracy for long-tailed category traffic and stealthy attack patterns, significantly outperforming traditional CNN/RNN- architecture-based lightweight methods. The framework establishes balance between resource efficiency and detection performance compared to existing solutions.

    Figures and Tables | References | Related Articles | Metrics
    Intrusion Detection System for the Controller Area Network Bus of Intelligent Vehicles Based on Federated Learning
    XUN Yijie, CUI Jiarong, MAO Bomin, QIN Junman
    2025, 25 (6):  872-888.  doi: 10.3969/j.issn.1671-1122.2025.06.003
    Abstract ( 235 )   HTML ( 40 )   PDF (20787KB) ( 87 )  

    Intelligent vehicles have become an essential transportation tool for human daily travel. The Controller Area Network (CAN), a core communication protocol inside intelligent vehicles, faces significant security concerns. The CAN bus is vulnerable to malicious attacks due to factors such as weak communication interface access control, lack of authentication in data exchange, and the absence of source/destination addresses in messages. In-vehicle gateways and firewalls are limited by bandwidth and computational resources. It makes difficult to implement powerful encryption and authentication algorithms, which restricts their protective capabilities. Current Intrusion Detection Systems (IDS) that rely on single-class side-channel features, like voltage, clock, or data flow, have limited ability to detect various types of attacks. For example, the IDS based on clock skew cannot detect attacks that are not periodic. This study proposed a federated learning-based CAN bus intrusion detection system for intelligent vehicles. The vehicle collected multidimensional feature data for lightweight training and transmitted parameters to the cloud. The cloud gathered parameters from different vehicles using an asynchronous horizontal federated learning structure, conducted deep training with the eXtreme Gradient Boosting (XGBoost) algorithm, and sent trained model parameters back to the vehicle. The vehicle then performed detection and attack source tracing. Experiments on three real vehicles from different brands demonstrated that the system achieves high-precision detection of six typical attack types, including Bus-off, Spoofing, Same Origin MethodExecution (SOME), Fuzzing, Masquerade, and Replay attacks. The average detection latency was 0.0987 ms.

    Figures and Tables | References | Related Articles | Metrics
    Layered Personalized Federated Learning Guided by Model Feature Orientation
    DENG Dongshang, WANG Weiye, ZHANG Weidong, WU Xuangou
    2025, 25 (6):  889-897.  doi: 10.3969/j.issn.1671-1122.2025.06.004
    Abstract ( 194 )   HTML ( 28 )   PDF (9935KB) ( 55 )  

    With the rapid advancement of artificial intelligence and the industrial Internet of Things (IIoT), industrial intelligence accelerates. Federated learning (FL) has emerged as a promising solution due to growing privacy concerns. However, FL in IIoT faces challenges like data heterogeneity, resource constraints, and adversarial threats. Existing personalized FL methods customized models for individual clients but ignored aggregation biases during training. To address this issue, this paper proposed a layered personalized FL framework guided by model feature orientations. The framework introduced an efficient aggregation mechanism that captured client-specific information without extra communication costs. It combined an adaptive model quantization mechanism for aggregation weights and a layered dynamic strategy to tailor global models for each client. Experiments on Fashion-MNIST and CWRU datasets show that our approach outperforms baselines in both performance and efficiency.

    Figures and Tables | References | Related Articles | Metrics
    A Decentralized Regulatory Architecture Based on Smart Contracts and Prophecy Machines with Active Sensor Networks
    LIU Feng, HUANG Hao
    2025, 25 (6):  898-909.  doi: 10.3969/j.issn.1671-1122.2025.06.005
    Abstract ( 147 )   HTML ( 18 )   PDF (14481KB) ( 36 )  

    The blockchain has shortcomings in active external data acquisition. Therefore, a decentralized regulatory architecture based on smart contracts and prophecy machines with active sensor networks(DR-ASNet) was proposed. Furthermore, the influence of opinion leaders in the blockchain token economy and their impact on asset prices were explored. The study employed an empirical analysis to examine how opinion leaders could influence token asset prices through ICO using an event study approach, using Musk’s social media influence on Dogecoin as an example. The results demonstrated that opinion leaders are able to leverage financial resources and data traffic in social networks to influence token prices and gain excess returns. In light of these findings, a regulatory framework was devised, integrating smart contracts and ChainLink prophecy machines to facilitate risk assessment and the provision of early warnings regarding token offerings. The research provides regulators and enterprises with essential references for developing and governing blockchain financial products.

    Figures and Tables | References | Related Articles | Metrics
    Supervised Restart-Based Cybersecurity Defense Strategy for Power Systems
    SHI Kaibo, DING Jia, WANG Jun, CAI Xiao
    2025, 25 (6):  910-919.  doi: 10.3969/j.issn.1671-1122.2025.06.006
    Abstract ( 151 )   HTML ( 24 )   PDF (10624KB) ( 30 )  

    With the digital development of power systems, the monitoring and data acquisition networks in power systems bring network security risks. This paper study focused on the construction of an active defense strategy under denial-of-service (DoS) attacks in vehicle-to-grid power systems. Firstly, a load-frequency control strategy was constructed for the power system, and a dynamic event triggering scheme design was introduced to optimize the communication efficiency in order to reduce the network bandwidth consumption. Besieds, a supervised restart controller algorithm was proposed, which monitored the controller response in real time, and triggered the controller to restart dynamically when an abnormality was detected. Further, by constructing appropriate Lyapunov-Krasovskii functionals, the exponential stability criterion of the system under DoS attacks was derived, which provided a quantitative basis for the parameter design of the defense strategy. Finally, the effectiveness of the proposed scheme is verified by simulation experiment.

    Figures and Tables | References | Related Articles | Metrics
    A Masking-Based Selective Federated Distillation Scheme
    ZHU Shuaishuai, LIU Keqian
    2025, 25 (6):  920-932.  doi: 10.3969/j.issn.1671-1122.2025.06.007
    Abstract ( 126 )   HTML ( 24 )   PDF (15467KB) ( 88 )  

    With the continuous advancement of machine learning technology, privacy protection issues are becoming increasingly important. Federated learning, as a distributed machine learning framework, has been widely applied. However, it still faces challenges in terms of privacy leakage and efficiency in practical applications. In order to address the above challenges, the article proposed masking-based selective federated distillation (MSFD), which utilizes the characteristic of knowledge transfer rather than model parameters in federated distillation to effectively resist white box attacks and reduce communication overhead. By introducing AES encrypted masking mechanism into the shared soft tags, the problem of selective federated distillation plaintext shared soft tags being vulnerable to black box attacks was effectively solved, significantly improving the resistance to black box attacks and thus significantly enhancing the security of selective federated distillation schemes. By embedding dynamic encryption masked in client soft tags to achieve privacy obfuscation, and combining secret channel negotiation and round key update mechanisms, the risk of black box attacks was significantly reduced while maintaining model performance, balancing the security and communication efficiency of federated learning. Through security analysis and experimental results, it has been shown that MSFD can significantly reduce the success rate of black box attacks on multiple datasets, while maintaining classification accuracy and effectively improving privacy protection capabilities.

    Figures and Tables | References | Related Articles | Metrics
    Deep Semantic Parsing Based Active Defense against API Overstep Vulnerabilities
    FENG Jingyu, PAN Meng, WANG Jialin, ZHAO Xiang
    2025, 25 (6):  933-942.  doi: 10.3969/j.issn.1671-1122.2025.06.008
    Abstract ( 155 )   HTML ( 22 )   PDF (12681KB) ( 47 )  

    Static defense mechanisms face difficulties addressing dynamic hidden API transgression threats due to limited feature and semantic understanding. Active defense has emerged as an effective approach to enhance network security. This paper proposed an active defense method integrating dynamic semantic sensing and adversarial verification to block API overstepping vulnerability attacks. A dynamic web crawling strategy efficiently obtained page data. This data was combined with a MiniLM model to analyze correlations between response payloads and URLs, enabling payload construction. BERT models were fine-tuned to classify URLs into custom categories. Based on these classifications, a Trans-LVD model performed page similarity analysis to quantify URL similarity levels, identify potential overstepping vulnerabilities, and automate security patching and configuration adjustments. This approach enhanced system adaptability and protection against unknown threats. Experiments were conducted using industry-standard benchmarks to demonstrate the method’s effectiveness in detection accuracy, adaptability, and active defense capabilities.

    Figures and Tables | References | Related Articles | Metrics
    Optimization of Data Conf lict and DDoS Attack Defense Mechanisms in Industrial Control Systems Based on Greedy Algorithm
    CHEN Da, CAI Xiao, SUN Yanbin, DONG Chongwu
    2025, 25 (6):  943-954.  doi: 10.3969/j.issn.1671-1122.2025.06.009
    Abstract ( 137 )   HTML ( 9 )   PDF (12068KB) ( 32 )  

    In modern digital networked industrial control systems, data conflicts and DDoS attacks pose significant threats to system security and stability. Optimization of data conflict and DDoS attack defense mechanisms in industrial control systems based on greedy algorithm was proposed to address these issues synergistically. Firstly, an adaptive resource allocation model was designed based on the greedy algorithm, dynamically adjusting priority allocation strategies by monitoring network traffic and system states in real time, preventing data conflicts and mitigating DDoS attacks effectively. Secondly, controller and observer were developed using the Lyapunov theorem to enhance the system’s ability to handle data conflicts and DDoS attacks. Experimental results show that the proposed method significantly reduces the frequency of data conflicts and improve the system’s resilience to DDoS attacks. Additionally, the effectiveness of the method is validated through simulations of inverted pendulum drones. This research provides a novel solution for the security protection of digital networked industrial control systems.

    Figures and Tables | References | Related Articles | Metrics
    Research on Active Defense Security System Based on Four-Honey Coordination for Energy Systems
    ZHU Zhicheng, CAO Hui, WANG Yinsheng
    2025, 25 (6):  955-966.  doi: 10.3969/j.issn.1671-1122.2025.06.010
    Abstract ( 171 )   HTML ( 22 )   PDF (14845KB) ( 55 )  

    The energy system, as a critical national infrastructure, faces severe challenges from advanced persistent threats (APTs) and zero day vulnerability attacks. This paper focused on the current energy system security defense solutions that mainly rely on feature detection and boundary protection, making it difficult to cope with the security challenges of high concealment and long latency APT attacks. A new type of four honey collaborative active defense system based on trapping was introduced. By deploying honey points, honeypots, honeyholes, and honey arrays in the energy system to construct a threat perception network, combined with deception defense and dynamic collaboration mechanisms, a “protective” active defense system for the energy system was formed, achieving early perception, accurate discrimination, and traceability deterrence of attackers. The experimental results show that this system can effectively capture attack behaviors and provide timely warnings of potential threats when dealing with complex network attacks in energy systems, providing a new approach to security protection for energy systems against APT attacks.

    Figures and Tables | References | Related Articles | Metrics
    A Decision-Making Method for Cloud-Native Moving Target Defense Based on Stochastic Games and DQN Algorithm
    GENG Zhiyuan, XU Zexuan, ZHANG Hengwei
    2025, 25 (6):  967-976.  doi: 10.3969/j.issn.1671-1122.2025.06.011
    Abstract ( 158 )   HTML ( 13 )   PDF (10896KB) ( 37 )  

    With the increasing complexity of application components in cloud-native systems, and the majority of them being open-source code, vulnerabilities exploitation in these components has become one of the primary threats to cloud-native security. Moving target defense as an advanced dynamic defense mechanism is widely recognized as an effective solution to this issue. However, the frequent and disorderly configuration transitions in the practical application of moving target defense could reduce system efficiency and service quality, potentially negatively impacting the security of resource-constrained systems. To address the strategy problem of moving target defense in cloud-native stochastic attack-defense environments, this paper combined the modeling advantages of game theory and the solution capabilities of deep reinforcement learning, and proposed a cloud-native moving target defense decision-making method based on stochastic games and the DQN algorithm. The aim was to quickly make optimal moving target defense decision in a large-scale strategy space. The effectiveness and practicality of the proposed model and algorithm are verified through simulation experiments.

    Figures and Tables | References | Related Articles | Metrics
    A Security Protection Scheme against Memory Side-Channel Attacks on NPU
    HU Wenao, YAN Fei, ZHANG Liqiang
    2025, 25 (6):  977-987.  doi: 10.3969/j.issn.1671-1122.2025.06.012
    Abstract ( 130 )   HTML ( 14 )   PDF (11979KB) ( 52 )  

    With rapid advancement of artificial intelligence technology, neural processing units(NPU) have been widely adopted in smartphones, autonomous vehicles, and edge computing. However, existing NPU architectures demonstrated vulnerabilities against memory side-channel attacks, where attackers could reverse-engineer deep neural networks(DNN) model structures and parameters by analyzing memory access patterns. To address this issue, this paper proposed NPUGuard, a security protection scheme featuring two core modules: feature map partitioning module and encrypted compression engine. The solution enhanced security through three approaches: layer boundary expansion, data address obfuscation, and data encryption protection. Experimental results show that NPUGuard effectively increases layer boundaries, expanding potential reverse-engineered network configurations from 24 to 7.86×105. The chaos mapping-based encryption algorithm achieves 60% storage reduction while encrypting sensitive data. Moreover, NPUGuard introduces only 5% performance overhead, demonstrating effective balance between security enhancement and computational efficiency.

    Figures and Tables | References | Related Articles | Metrics
    Mimetic Function: Mimetic Defense Research for Serverless
    FU Zefan, PAN Gaoning, REN Yizhi, HU Mingde
    2025, 25 (6):  988-1002.  doi: 10.3969/j.issn.1671-1122.2025.06.013
    Abstract ( 122 )   HTML ( 4 )   PDF (18999KB) ( 20 )  

    Serverless architecture reduces cloud computing development and operational costs through its event-driven and fully managed model. However, the inherent security threats arising from program fragmentation, multi-source inputs, and complex dependency chains pose significant challenges to traditional defense mechanisms. While mimic defense can effectively block vulnerability exploitation chains, its heterogeneity strategies exhibit limitations in serverless environments due to incompatibility with serverless function ap- plication mechanisms, resulting in deployment difficulties. To address the security challenges in serverless environments, this paper proposed a serverless-oriented mimic defense scheme—mimic function. By analyzing heterogeneity conditions under the mimic defense framework, we designed a tailored heterogeneity strategy for serverless architectures and con- structed a prototype system to intercept unknown vulnerability exploits targeting serverless platforms. Furthermore, to mitigate the amplification of Denial-of-Wallet (DoW) attacks in mimic defense scenarios, we proposed a heterogeneous executor scheduling algorithm that alleviated the impact of high-concurrency traffic on load imbalance among executors, achieving a balance between system heterogeneity and performance. Experimental results demonstrate that the mimic function prototype system effectively defends against unknown serverless-targeted attacks while maintaining controlled dispersion of heterogeneous executors.

    Figures and Tables | References | Related Articles | Metrics