JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM ›› 2019, Vol. 42 ›› Issue (3): 64-71.doi: 10.13190/j.jbupt.2018-268
• Papers • Previous Articles Next Articles
Research on Adaptive Strategy of End Hopping System Based on Deep Belief Nets
SHI Le-yi1,2, LI Jian-lan1, GUO Hong-bin1, MA Meng-fei1, CHEN Hong-long3
- 1. College of Computer and Communication Engineering, China University of Petroleum(East China), Qingdao 266580, China;
2. Guangxi Key Laboratory of Cryptography and Information Security, Guangxi 53000, China;
3. College of Information and Control Engineering, China University of Petroleum(East China), Qingdao 266580, China
-
Received:
2018-10-31Online:
2019-06-28Published:
2019-06-20
CLC Number:
Cite this article
SHI Le-yi, LI Jian-lan, GUO Hong-bin, MA Meng-fei, CHEN Hong-long. Research on Adaptive Strategy of End Hopping System Based on Deep Belief Nets[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2019, 42(3): 64-71.
share this article
Add to citation manager EndNote|Ris|BibTeX
URL: https://journal.bupt.edu.cn/EN/10.13190/j.jbupt.2018-268
[1] 石乐义, 贾春福, 吕述望.基于端信息跳变的主动网络防护研究[J].通信学报, 2008, 29(2):106-110.Shi L Y, Jia C F, Lv S W.Research on end hopping for active network confrontation[J].Journal on Communications, 2008, 29(2):106-110. [2] Jajodia S, Ghosh A K, Swarup V, et al.Moving target defense:creating asymmetric uncertainty for cyber threats[M].[s.l.]:Springer Science & Business Media, 2011:99-107. [3] Venkatesan S, Albanese M, Amin K, et al.A moving target defense approach to mitigate DDoS attacks against proxy-based architectures[C]//IEEE Conference on Communications and Network Security (CNS).[S.l.]:IEEE, 2016:198-206. [4] Wang S, Zhang L, Tang C.A new dynamic address solution for moving target defense[C]//Information Technology, Networking, Electronic and Automation Control Conference, IEEE, 2016:1149-1152. [5] 邬江兴.网络空间拟态防御研究[J].信息安全学报, 2016, 1(4):1-10.Wu J.Research on cyber mimic defense[J].Journal of Cyber Security, 2016, 1(4):1-10. [6] Hu H, Wu J, Wang Z, et al.Mimic defense:a designed-in cyber security defense framework[J].IET Information Security, 2018, 12(3):226-237. [7] 仝青, 张铮, 张为华, 等.拟态防御Web服务器设计与实现[J].软件学报, 2017, 28(4):883-897.Tong Q, Zhang Z, Zhang W H, et al.Design and implementation of mimic defense Web server[J].Journal of Software, 2017, 28(4):883-897. [8] 王禛鹏, 扈红超, 程国振.一种基于拟态安全防御的DNS框架设计[J].电子学报, 2017(11):2705-2714.Wang Z P, Hu H C, Cheng G Z.A DNS architecture based on mimic security defense[J].Acta Electronica Sinica, 2017(11):2705-2714. [9] 雷程, 马多贺, 张红旗, 等.基于网络攻击面自适应转换的移动目标防御技术[J].计算机学报, 2018(5):1110-1131.Lei C, Ma D H, Zhang H Q, et al.Moving target defense technique based on network attack surface self-adaptive mutation[J].Chinese Journal of Computers, 2018(5):1110-1131. [10] Ma D, Lei C, Wang L, et al.A self-adaptive hopping approach of moving target defense to thwart scanning attacks[C]//International Conference on Information and Communications Security.Springer, Cham, 2016:39-53. [11] 赵春蕾.端信息跳变系统自适应策略研究[D].南开大学, 2012. [12] 刘江, 张红旗, 代向东, 等.基于端信息自适应跳变的主动网络防御模型[J].电子信息技术学报, 2015, 37(11):2642-2649.Liu J, Zhang H Q, Dai X D, et al.A proactive network defense model based on self adaptive end hopping[J].Journal of Electronics & Information Technology, 2015, 37(11):2642-2649. [13] Hinton G E, Osindero S, Teh Y W.A fast learning algorithm for deep belief nets[J].Neural Computation, 2006, 18(7):1527-1554. [14] 邹国锋, 傅桂霞, 王科俊, 等.自适应深度卷积神经网络模型构建方法[J].北京邮电大学学报, 2017, 40(4):98-103.Zou Guofeng, Fu Guixia, Wang Kejun, et al.Construction method of adaptive deep convolutional neural network model[J].Journal of Beijing University of Posts and Telecommunications, 2017, 40(4):98-103. [15] Lu N, Li T, Ren X, et al.A deep learning scheme for motor imagery classification based on restricted boltzmann machines[J].IEEE Transactions on Neural Systems and Rehabilitation Engineering, 2017, 25(6):566-576. [16] Salah K, Kahtani A.Performance evaluation comparison of snort NIDS under Linux and Windows server[J].Journal of Network & Computer Applications, 2010, 33(1):6-15. [17] 温晓.基于端信息跳扩混合的主动网络防御研究[D].中国石油大学(华东), 2017. |
[1] | ZHANG Chenyu, WEN Xiangming, CHEN Yawen. High-Precision and Low-Cost Timing Method of Mobile Cellular Network [J]. Journal of Beijing University of Posts and Telecommunications, 2023, 46(1): 103-108. |
[2] | . Intent-driven Demand-aware Resource Service in Autonomous Networks [J]. Journal of Beijing University of Posts and Telecommunications, 2022, 45(6): 85-91. |
[3] | CHU Xing-he, LU Zhao-ming, WANG Lu-han, WU Mu-qing, WEN Xiang-ming. Multi-Path Assisted Cooperative Radio-Based Localization for Connected Vehicles [J]. Journal of Beijing University of Posts and Telecommunications, 2021, 44(2): 116-123. |
[4] | ZHANG Tian-kui, WANG Xiao-fei, YANG Li-wei, YANG Ding-cheng. A SFC Deployment and Computation Resource Allocation Joint Algorithm in Mobile Networks [J]. Journal of Beijing University of Posts and Telecommunications, 2021, 44(1): 7-13. |
[5] | Lü Ting-jie, SONG Luo-na, TENG Ying-lei, FENG Ye-yuan. The Architecture Design and Evaluation Method for Eco-Sustainabability Oriented Next Generation Communication Networks [J]. Journal of Beijing University of Posts and Telecommunications, 2020, 43(6): 18-26,35. |
[6] | HE Jian-hua, ZHAO Hui, XU Xiao-bin, YAN Lei, WANG Shang-guang. Data Collection Method of Space-Based Internet of Things Based on Improved Double Level Distributed LT Code [J]. Journal of Beijing University of Posts and Telecommunications, 2020, 43(6): 118-125. |
[7] | MA Lu, LIU Ming, LI Chao, LU Zhao-ming, MA Huan. A Cloud-Edge Collaborative Computing Task Scheduling Algorithm for 6G Edge Networks [J]. Journal of Beijing University of Posts and Telecommunications, 2020, 43(6): 66-73. |
[8] | GUAN Wan-qing, ZHANG Hai-jun, LU Zhao-ming. Intelligent Resource Allocation Algorithm for 6G Multi-Tenant Network Slicing Based on Deep Reinforcement Learning [J]. Journal of Beijing University of Posts and Telecommunications, 2020, 43(6): 132-139. |
[9] | LUO Yi, WANG Yu-ting, SHI Rong-hua, YAN Meng-chun, ZENG Hao. Secrecy Outage Probability Analysis of Underlay Cognitive Cooperative Relay Network with Energy Harvesting [J]. Journal of Beijing University of Posts and Telecommunications, 2020, 43(3): 105-111,124. |
[10] | LI Jun-yao, CHANG Yong-yu, ZENG Tian-yi. Channel Correlation Based LOS/NLOS Identification for 3D Massive MIMO Systems [J]. Journal of Beijing University of Posts and Telecommunications, 2020, 43(1): 1-7. |
[11] | JIANG Fang, ZHANG Nan-fei, HU Yan-jun, WANG Yi. BP Neural Network Based CSI Device-Free Target Classification Method [J]. Journal of Beijing University of Posts and Telecommunications, 2020, 43(1): 40-45. |
[12] | REN Jia-zhi, TIAN Hui, NIE Gao-feng. Proactive Caching Scheme with Local Content Popularity Prediction [J]. Journal of Beijing University of Posts and Telecommunications, 2020, 43(1): 80-91. |
[13] | XU Jiu-yun, SUN Zhong-shun, ZHANG Ru-ru. Mobile Phone Energy Saving Based on Link Prediction [J]. Journal of Beijing University of Posts and Telecommunications, 2020, 43(1): 8-13,27. |
[14] | LI Xiao-hui, DU Yang-fan, SHI Xiao-zhu, YANG Xu. NLOS Ranging Error Compensation Algorithm Based on Fuzzy Association Channel Identification [J]. Journal of Beijing University of Posts and Telecommunications, 2020, 43(1): 21-27. |
[15] | LI Peng, WANG De-yong, SHI Wen-xi, JIANG Zhi-guo. Research on Person Re-Identification Based on Deep Learning under Big Data Environment [J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2019, 42(6): 29-34. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||