Loading...

Table of Content

    01 January 2023, Volume 9 Issue 1
    An Attack Feedback Dynamic Scheduling Strategy Based on Endogenous Security
    2023, 9(1):  2. 
    Asbtract ( )   PDF (3347KB) ( )  
    References | Related Articles | Metrics
    In order to improve the efficiency and robustness of the endogenous security scheduling strategy, a scheduling timing and quantity elastic adjustment method is designed. This method first proposes a scheduling trigger, which uses the two attributes of working time and abnormal feedback to control the switching of scheduling process, and designs the overall flow of scheduling work considering system heterogeneity and redundancy. Then it constructs problem model using historical attack feedback, and designs formulas to dynamically calculate the values for different attack scenarios. Finally, a simulator is designed to simulate different attack scenarios and compare the operation results of each algorithm. Results show that this method can cope with complex internal and external environment through adaptive adjustment, and provide better security for DHR structure. At the same time, it improves the utilization rate of the executor, reduces redundant resource waste, achieves higher security gain with lower system overhead, and outperforms other single strategies, which has strong practicality.
    Research on Encrypted Traffic Classification of Graph Neural Network  Based on Attention Mechanism
    2023, 9(1):  13. 
    Asbtract ( )   PDF (1994KB) ( )  
    References | Related Articles | Metrics
    For precise identification of encrypted traffic, existing machine learningbased and graphbased solutions require manual feature selection or have low accuracy. Using a graph neural networkbased encrypted traffic identification method, the network traffic classification problem is transformed into a graph classification problem by converting the network traffic data into graph data, preserving the rich representation of the network data flow. And this paper designs a graph classification model based on selfattention mechanism to classify encrypted traffic. The experimental results show that the method has a good classification effect on the encrypted traffic of Virtual Private Network (VPN) based on Secure Socket Layer (SSL), and the classification accuracy is greatly improved.Key words
    Online Detection Method of Malicious Login Behavior Based on  Hidden Variable Model
    2023, 9(1):  22. 
    Asbtract ( )   PDF (1055KB) ( )  
    References | Related Articles | Metrics
    The classification and detection of malicious login behavior is of great significance for operators to supervise network security. However, the detection technology of malicious login behavior has many problems, such as huge model operation process, lack of realtime performance, and inability to deal with highdimensional data efficiently. Therefore, it is proposed that an online detection method of malicious login behavior based on hidden variables in this paper. By analyzing the bruteforce cracking principle, the features with high matching degree of traffic features are extracted, and the feature vectors are constructed to achieve feature enhancement. The lightweight expectation maximization (EM) algorithm is used to replace the conventionally complex machine learning and deep learning algorithms to realize the traffic detection of malicious login behavior. On this basis, the EM algorithm based on hidden variable mechanism is introduced to strengthen the extraction ability of key features of the model, so as to improve the traffic detection accuracy of malicious login behavior. Experimental results on the public data set CICIDS2017 show that the accuracy of the proposed method is 98.7%, and the false alarm rate is as low as 2.38%. Compared with the multilayer perceptron algorithm, the accuracy of the detection method is improved by 23.7%, the recall rate is increased by 12.8% and the false alarm rate is reduced by 4.19% compared with the CDFbased threshold segmentation algorithm.
    Multi-objective Fuzzy Optimization Network Slice Algorithm for 5G Evolution
    2023, 9(1):  29. 
    Asbtract ( )   PDF (2434KB) ( )  
    References | Related Articles | Metrics
    Aiming at the problem of multiobjective and multifactor resource allocation under the condition of incomplete and insufficient network slicereconstructionproject in complex network environment, the paper proposes an algorithm based on multiobjective fuzzy optimization to adjust network slice adapting the network evolution and providing a high degree of robustness. Firstly, measuring network indicators and sharing among distributed nodes, algorithm forms constraints according to the indicators, and generates computing models according to the resource allocation objective function. Secondly, the optimal solution is obtained through the weighted fuzzy optimal decision function. Finally, network slices are established for different customers of the application, and the resource occupation of each slice is allocated according to the optimal solution, so as to realize a network slice communication guarantee system that is accurate to the user and their various network conditions. Simulation experiments show that this algorithm and related optimization methods effectively reduce the resource occupation of network slice and improve the performance of the network.
    Research on 5G Edge Computing Security Based on the Trusted  Execution Environment
    2023, 9(1):  38. 
    Asbtract ( )   PDF (2348KB) ( )  
    References | Related Articles | Metrics
    MEC has built a bridge between the equipment edge and the data center, so that the original data can be processed efficiently at the mobile edge. Aiming at the security problems of MEC, by analyzing the security risks faced by MEC, this paper expounds on a MEC security scheme based on a trusted execution environment (TEE). Through the combination of tee security modules under different architectures (ARMx86), this scheme realizes the integrity detection and trusted measurement of each component of MEC, and ensures the security of each component of MEC from Startup to operation, At the same time, a remote proof method between MEC node and MEO is introduced, and a set of overall scheme to ensure the security of MEC infrastructure, platform, application and choreography management is realized.
    Research on Data Transfer Security Model of Digital Twin City  Big Data Platform
    2023, 9(1):  48. 
    Asbtract ( )   PDF (3862KB) ( )  
    References | Related Articles | Metrics
    The digital twin city big data platform can promote the aggregation of smart city data resources, comprehensively promote the cross domain integration application of government data and social data, open up data circulation channels, avoid isolated islands, and innovate the open system of data management, sharing and data transaction service system. This paper proposes a big data flow security framework based on city big data platform, aiming at the security difficulties in the process of digital twin city data flow, such as various data formats involved in city big data platform data sources, diverse application data exchange requirements, complex system permission system, uncontrollable cross domain extension and so on, According to the time and space dimensions of data security flow cycle and data governance security domain, the data security flow system is constructed to solve the security problems of multisource heterogeneous, cross network and cross platform exchange and sharing of digital twin city data.
    Social Network Rumor Suppression Scheme Based on Opinion Leaders
    2023, 9(1):  57. 
    Asbtract ( )   PDF (3247KB) ( )  
    References | Related Articles | Metrics
    With the rise of social networks, the security of information content caused by information transmission in the network has become more and more significant, among which the spread of rumor information is an important potential threat to the security of information content in the network. Most of thecurrent rumor suppression schemes in social networks consider the structural attributes of the network and adopt the information propagation model of a single entity to simulate the real communication scene. This study considers not only the structural attributes of the network, but also the social attributes of nodes, and adopts the Multientity Competitive Independent Cascade Model proposes a rumor suppression scheme based on opinion leaders. First, according to the structural properties of the network, the key users in the network are selected as the candidate set of opinion leaders through the dominating set. Secondly, according to the social attributes of users, a user influence calculation formula is proposed to identify the opinion leader groups in the network. Finally, the Multientity Competitive Independent Cascade Model is used to conduct simulation experiments on several real social network datasets of different sizes. The experimental results show that the proposed scheme can suppress the amount of rumor information in social networks better than other rumor suppression schemes in a reasonable time cost, and the final rumor suppression effect can be improved by about 5% with the increase of the amount of rumor information in the network.
    Road Analysis of Platform Data Security Governance Optimization —From the Perspective of “DiDi Cyber Security Review Case”
    2023, 9(1):  66. 
    Asbtract ( )   PDF (983KB) ( )  
    References | Related Articles | Metrics
    With the highquality development of the digital economy,  people are increasingly closely connected with internet platforms. In the era of continuous emergence of various data, as the basic element and core driving force of digital economy, the flow of data not only affects personal data security, but also has a significant impact on national security. As an important carrier of data processing, the internet platform should undertake the obligation of data security. Since the DiDi Cyber security review case, the data security governance of the platform is still facing many practical difficulties, and the security risk caused by the crossborder flow of data is an important problem. Therefore, China continues to improve the legal system of data security, and to strengthen the governance of platform data security. Under the current governance situation, it is necessary to optimize the governance road of platform data security, resolve major national security risks, and then master more international right of speech in global data governance.
    Analysis on the Division of Data Security Management Responsibilities  and Accountability Mechanism
    2023, 9(1):  73. 
    Asbtract ( )   PDF (1038KB) ( )  
    References | Related Articles | Metrics
    Strengthening the awareness of security and responsibility is the primary condition for data security management. People are the most important factor in the construction of data security. All data security management specifications and technical measures are based on people. From the perspective of data security compliance, this article fully analyzes the corporate data security protection obligations in accordance with the Data Security Law, and innovatively designs the corporate data security responsibility matrix and data security incident accountability matrix to provide enterprises with the construction of data security compliance management. The design ideas for the key functions required by each stakeholder in the system process, and a practical accountability plan based on the key functions, can implement the Data Security Law for various industries and units, and build a data security organization. And the incident accountability mechanism to provide sufficient reference.
    Research on the Legal Structure of Digital Service Contract in EU Law
    2023, 9(1):  79. 
    Asbtract ( )   PDF (1057KB) ( )  
    References | Related Articles | Metrics
    With the popularity of digital service, the EU issued the Digital Content and Digital Service Directive to fill the legal loopholes in the field of regulating digital service contract in the EU law. This article investigates the main contents of digital service contract regulated by this Directive, including the subject matter, object, nature, consideration, performance norms and means of redress for consumer rights. This article concludes that the way of regulating digital service contract in the EU is characterized by moderation as a whole, and the view of personal data as consideration has impacted the GDPR rule system. Based on the above analysis, combining with the legal regulations in China, this article puts forward some suggestions on regulating and interpretating digital service contract in China.
    Methodological Exploration of Data Security Standard Construction in  Health Industry
    2023, 9(1):  87. 
    Asbtract ( )   PDF (2202KB) ( )  
    References | Related Articles | Metrics
    As a national strategic development direction, information security has always received social attention. The implementation has raised data security and personal privacy protection to the height of the rule of law, which is “Data Security Law of the People’s Republic of China” and “Personal Information Protection Law of the People’s Republic of China”. All industries are exploring data protection measures actively, and are trying to improve the data security standard system constantly. However, industry differences and data diversity have become the biggest problem in data security standardization. By summarizing the practical experience of the local standard system in health industry in Suzhou City, the methodology of data security standard construction is proposed. The standard system process is scientific and objective, which can provide reference experience to the construction of data security standard systems in other industries.
    Threats Faced by Crossborder Interbank Payment System and Construction of Security System
    2023, 9(1):  93. 
    Asbtract ( )   PDF (740KB) ( )  
    Related Articles | Metrics