Loading...

Table of Content

    15 October 2016, Volume 2 Issue 10
    “Internet +”Power: Overview of Westone Secruity’s Cyber Secruity
    2016, 2(10):  862-875. 
    Asbtract ( )   PDF (2788KB) ( )  
    Related Articles | Metrics
    Development of Authenticated Encryption
    2016, 2(10):  876-882. 
    Asbtract ( )   PDF (5382KB) ( )  
    Related Articles | Metrics
    Authenticated encryption scheme achieves both confidentiality and integrity, which brings a wide range of research and application scenarios. Its design involves block ciphers, hash functions, stream ciphers and other research. It covers all aspects of symmetric cryptography and has good theoretical study and practical value. The design and analysis methods of authenticated encryption are becoming maturer. In recent years, CAESAR competition set off a new round of research upsurge of authenticated encryption scheme. A large number of new design are springing up, providing some good study models to related fields. While there are still some unresolved issues and challenges for future research, worthy of further analysis and discussion. This paper discusses advances in authenticated encryption schemes, design patterns, related problems and challenges and future study trends and makes the corresponding overview and summary.
    The Definition, Understandings and Responses of Cyberterrorism
    2016, 2(10):  882-887. 
    Asbtract ( )   PDF (5506KB) ( )  
    Related Articles | Metrics
    Cyberterrorism is a major issue of cyber security. However, due to the combination of cyberspace and terrorism, cyberterrorism is also a controversial term. It covers not only terrorism targeting cyberspace but also usage of cyberspace for terrorist activities; currently, the former is still not a real threat while the latter is quite common, and most of the terrorist activities now in the digital age can be grouped into the second category. To counter cyberterrorism, IT and cyberspace can also be used to spy on and gain advantage over terrorist activities, while the real data of terrorist activities can be employed to make adaptive responses.
    Research on Stegnanlytic Techniques Under the Condition of Limited Prior Knowledge
    2016, 2(10):  888-895. 
    Asbtract ( )   PDF (7081KB) ( )  
    Related Articles | Metrics
    Steganalysis, as the countermeasure of steganography, mainly concentrates on the detection, prevention and destruction of the possible steganography based on covert communication behaviors on the Internet. Research in practical steganographic analysis technology plays an important role in fighting against the steganography abuse by terrorist groups and criminals and maintaining national security and social stability. This paper firstly introduces the research significance and related works in the past, and then proposes the new steganalysis framework to address urgently needed image steganalysis with limited prior knowledge. Taking plentiful, multiple and typical data as study objects, this paper focuses on studying the methods to construct over?completed steganographic analysis feature bases, using these feature bases to represent testing samples and predicting the steganography method of testing samples according to the representing coefficients, which provides theoretical and technical support for developing steganalysis schemes with higher accuracy and better practicality.
    Research on Privacy Protection Reference Architecture for Personal Data Under Information Propagation
    2016, 2(10):  896-902. 
    Asbtract ( )   PDF (6698KB) ( )  
    Related Articles | Metrics
    With the explosive expansion of big data, personal data has become important resource of data industry. The indiscriminate collection of personal data, data abuse, and widespread black market transactions make the protection of personal data privacy become a very pressing issue. In this context, we make a close study of privacy protection of personal data. For the particular characteristics of privacy leakage, we investigate the sources and the pathways of personal data, to obtain the model of data collection, data transmission, data diffusion and data derivatives. Then we present privacy protection reference architecture for personal data under information propagation, composed of technology, management, and legal regulations. Furthermore, we present the future study issue, namely privacy protection reference architecture for personal data under data mining.
    The Detecting Algorithm of Pornographic Image Based on Deep Learning and Model Cascade
    2016, 2(10):  903-908. 
    Asbtract ( )   PDF (5764KB) ( )  
    Related Articles | Metrics
    In the Internet era, as people communicating and data exchanging frequently, the spread of malicious information is becoming more and more serious. Therefore, it is particularly important to identify and filter pornographic images on the Internet. In recent years, the appearance of deep learning has greatly pushed forward the frontier of computer vision research, and computer vision tasks like image classification and recognition have greatly benefited from it. Compared with traditional methods, the features automatically extracted by deep model have better representing power. In this paper, we propose a pornographic image detection method based on the deep learning and model cascade. For the sake of getting better features, the strategy of fine?to?coarse classification is adopted to deal with the diversification of data distribution. Specifically, faced with the problem of pornographic cover detection, we combine traditional image processing methods and deep learning model. As a result, it improves the performance of cover detection effectively.
    Research on the Audio Information Hiding Algorithms Based on Mean Quantization
    2016, 2(10):  909-912. 
    Asbtract ( )   PDF (3215KB) ( )  
    Related Articles | Metrics
    We presented a new blind digital audio information hiding algorithms based on DWT and mean quantization. In order to achieve the high imperceptibility, the modification of wavelet coefficients was reduced by piecewise adjustment the quantized area. The ability of resisting attack was also improved by adjustment the boundary value with poor resistance to attack. Experimental results demonstrate that the proposed method has a better Signal Noise Ratio (SNR) than the current mean quantization algorithm, and the Normalized Cross?Correlation (NC) has also a certain amount of improvement.
    Research and Implementation of Access Control Method for Big Data Platform
    2016, 2(10):  913-919. 
    Asbtract ( )   PDF (7525KB) ( )  
    Related Articles | Metrics
    The emergence and development of big data technology, in the gradual impact of the development of the operator?s business at the same time, its security issues can not be ignored. Under this background, the study of unified access and centralized management of entrance account permissions for big data platform, big data platform interface to provide centralized, centralized management of user access to big data platform, big data platform to access the user?s identity authentication and access control, to enhance the data security access platform objective. In the process of access control method research of big data platform using agent technology, according using agent of Hadoop, HBase, Hive to the different components of big data platform, the agent is able to hide the real target and execute the safety strategy and operation risk blocking effect, improve the safety of big data platform.
    The Key Questions and Development of Studies on Cyber Deterrence
    2016, 2(10):  920-925. 
    Asbtract ( )   PDF (5617KB) ( )  
    Related Articles | Metrics
    As a strategy of defense, deterrence doctrine is usually used in traditional strategic spaces including the land, sea, air and outer space, and is deemed to be valid. But, in consideration that cyberspace is fundamentally different in all aspects from traditional strategic spaces, it is so controversial whether deterrence theory can be used to secure cyberspace. Based on these considerations above, this paper combed and summarized academic debates on cyber deterrence among American, European and Chinese scholars. The authors think: 1) cyber deterrence research is not only valuable on policy decision?making but also on security theory development; 2) if deterrence as a strategy to secure cyberspace can be enforced, two questions must be studied firstly: ① we must engage and understand the role of punishment in different kinds of cyber attacks; ② we must clarify the responsibility of the third parties, work and promote security cooperation with all stakeholders.
    Research and Implementation of Access Control Method for Big Data Platform
    2016, 2(10):  926-930. 
    Asbtract ( )   PDF (4271KB) ( )  
    Related Articles | Metrics
    The emergence and development of big data technology, in the gradual impact of the development of the operator?s business at the same time, its security issues can not be ignored. Under this background, the study of unified access and centralized management of entrance account permissions for big data platform, big data platform interface to provide centralized, centralized management of user access to big data platform, big data platform to access the user?s identity authentication and access control, to enhance the data security access platform objective. In the process of access control method research of big data platform using agent technology, according using agent of Hadoop, HBase, Hive to the different components of big data platform, the agent is able to hide the real target and execute the safety strategy and operation risk blocking effect, improve the safety of big data platform.
    Research on Network Trusted Identity Management System
    2016, 2(10):  931-935. 
    Asbtract ( )   PDF (3845KB) ( )  
    Related Articles | Metrics
    The General Theory of Security(16) — Bionomics of Hacker
    2016, 2(10):  936-945. 
    Asbtract ( )   PDF (1197KB) ( )  
    Related Articles | Metrics
    The Totlal Solution of Cyber Security in Critical Information Infrastructure
    2016, 2(10):  946-951. 
    Asbtract ( )   PDF (1455KB) ( )  
    Related Articles | Metrics
    The Approach and Strategy of Qingdao Municipal Government Big Data Security System Construction
    2016, 2(10):  952-956. 
    Asbtract ( )   PDF (940KB) ( )  
    Related Articles | Metrics