共查询到20条相似文献,搜索用时 0 毫秒
1.
Network security situation awareness is an important foundation for network security management, which presents the target system security status by analyzing existing or potential cyber threats in the target system. In network offense and defense, the network security state of the target system will be affected by both offensive and defensive strategies. According to this feature, this paper proposes a network security situation awareness method using stochastic game in cloud computing environment, uses the utility of both sides of the game to quantify the network security situation value. This method analyzes the nodes based on the network security state of the target virtual machine and uses the virtual machine introspection mechanism to obtain the impact of network attacks on the target virtual machine, then dynamically evaluates the network security situation of the cloud environment based on the game process of both attack and defense. In attack prediction, cyber threat intelligence is used as an important basis for potential threat analysis. Cyber threat intelligence that is applicable to the current security state is screened through the system hierarchy fuzzy optimization method, and the potential threat of the target system is analyzed using the cyber threat intelligence obtained through screening. If there is no applicable cyber threat intelligence, using the Nash equilibrium to make predictions for the attack behavior. The experimental results show that the network security situation awareness method proposed in this paper can accurately reflect the changes in the network security situation and make predictions on the attack behavior. 相似文献
2.
3.
To address the problem of network security situation assessment in the Industrial Internet, this paper adopts the evidential reasoning (ER)algorithm and belief rule base (BRB) method to establish an assessment model. First, this paper analyzes the influencing factors of the Industrial Internet and selects evaluation indicators that contain not only quantitative data but also qualitative knowledge. Second, the evaluation indicators are fused with expert knowledge and the ER algorithm. According to the fusion results, a network security situation assessment model of the Industrial Internet based on the ER and BRB method is established, and the projection covariance matrix adaptive evolution strategy (P-CMA-ES) is used to optimize the model parameters. This method can not only utilize semiquantitative information effectively but also use more uncertain information and prevent the problem of combinatorial explosion. Moreover, it solves the problem of the uncertainty of expert knowledge and overcomes the problem of low modeling accuracy caused by insufficient data. Finally, a network security situation assessment case of the Industrial Internet is analyzed to verify the effectiveness and superiority of the method. The research results show that this method has strong applicability to the network security situation assessment of complex Industrial Internet systems. It can accurately reflect the actual network security situation of Industrial Internet systems and provide safe and reliable suggestions for network administrators to take timely countermeasures, thereby improving the risk monitoring and emergency response capabilities of the Industrial Internet. 相似文献
5.
目的 针对列车驾驶自动化和智能化的发展带来驾驶界面信息量大增,司机工作转变为信息监控和决策后,带来的心理负荷明显上升且情境意识下降等问题,梳理情境意识理论在智能驾驶界面设计中的研究现状,并对下一步研究进行展望。方法 进行文献分析,整理情境意识理论的研究现状和进展,从情境意识与自动化驾驶界面设计、显控界面图文信息、工作负荷、自动化下的人机交互四个具有智能化驾驶界面显著特征的相关设计应用的研究入手,对相关研究成果进行了综述。结论 分析了目前的研究现状和发展方向,提出了应加强对智能化背景下司机的驾驶人机交互认知特征、驾驶情境意识的表现特征及视觉策略、基于情境意识增强的智能列车驾驶界面可视化设计方法等方面的研究。 相似文献
6.
7.
8.
为考察飞机空中交会信息显示格式对情境意识和认知绩效的影响。实验采用模拟飞行相撞判断任务,以情境意识和相撞判断准确率为指标,对整合式显示与分离式显示这两种显示格式的视觉工效进行比较。结果表明:(1)整合式显示条件下情境意识与相撞判断的准确率均高于分离式显示;(2)信息显示格式以情境意识为中介对认知绩效产生显著影响。结论:整合式显示格式的相对优势可归因于该显示格式对情境意识的促进作用。 相似文献
9.
10.
基于多层子网的新一代信息网网络管理体系结构 总被引:1,自引:0,他引:1
分析了新一代信息网网络管理中存在的问题,提出了包括基于子网管理的网络管理接口,多层子网-单接口管理层次模型和最低层子网确定方法的网络管理体系结构,完成了基于上述方法的实验。 相似文献
11.
12.
SDH传送网网管体系结构的研究和实验 总被引:1,自引:0,他引:1
为了满足SDH网络管理系统在可持续建设和高适应性方面的要求,提出了采用软件总线和多粒度软件重用技术的SDH网管系统的体系结构,实现了一个基于该体系结构的SDH网管的实验系统。 相似文献
13.
14.
15.
16.
本文在阐明食物保障概念并区分食粮和饲料粮的基础上,对我国耕地和非耕地资源未来农产品供给能力做了估计,提出我国食物保障耕地是瓶颈,良地应优先保障食粮,饲料可统筹耕地、草原和海洋资源。必须研究耕地资源扩展、改良与替代的科学技术、现有耕地资源可持续高效利用的科学技术,以及非生物逆境应对的科学技术,并做相应研究计划的顶层设计。科技创新要落实在食物生产的可持续发展,因而强调重大农业科技创新与常规产业技术改进互动的科技发展战略。解答食物保障所需的科技难题需要高瞻远瞩的设计、组织、监管和推动,涉及国家科技发展的体制和机制必须改革。本文从支撑国家重大农业科技发展角度提出了农业科技体制机制改革的战略设想与重点政策建议,包括设立国家农业可持续发展研究与监管中心,国家农业和科技主管部门在农业科技创新领域中的职责和协调,农业科技创新的顶层设计,科技创新要落实到食物生产的发展等。 相似文献
17.
Dongjie Zhu Yundong Sun Xiaofang Li Haiwen Du Rongning Qu Pingping Yu Xuefeng Piao Russell Higgs Ning Cao 《计算机、材料和连续体(英文)》2020,63(3):1343-1357
Interactivity is the most significant feature of network data, especially in social
networks. Existing network embedding methods have achieved remarkable results in
learning network structure and node attributes, but do not pay attention to the multiinteraction between nodes, which limits the extraction and mining of potential deep
interactions between nodes. To tackle the problem, we propose a method called MultiInteraction heterogeneous information Network Embedding (MINE). Firstly, we introduced
the multi-interactions heterogeneous information network and extracted complex
heterogeneous relation sequences by the multi-interaction extraction algorithm. Secondly,
we use a well-designed multi-relationship network fusion model based on the attention
mechanism to fuse multiple interactional relationships. Finally, applying a multitasking
model makes the learned vector contain richer semantic relationships. A large number of
practical experiments prove that our proposed method outperforms existing methods on
multiple data sets. 相似文献
18.
我国电力系统正向着高比例可再生能源和高比例电力电子设备的“双高”方向发展,电源和电网结构均发生重大变化。发电机励磁系统控制技术对保证电力系统安全、稳定运行意义重大,其性能提升是应对上述挑战最经济有效的技术手段之一。回顾了励磁系统控制的发展历史,提出了“双高”系统带来的技术挑战,并进一步提出了挖掘并提升励磁系统涉网性能的关键技术,包括励磁控制装置实验室涉网性能检测、现场试验测试与评价、励磁系统控制精细化仿真建模、附加稳定控制、辅助控制策略优化等。最后,对未来励磁系统控制技术的研究热点与发展方向进行了展望。 相似文献
19.
The speech recognition technology has been increasingly common in our lives. Recently, a number of commercial smart speakers containing the personal assistant system using speech recognition came out. While the smart speaker vendors have been concerned about the intelligence and the convenience of their assistants, but there have been little mentions of the smart speakers in security aspects. As the smart speakers are becoming the hub for home automation, its security vulnerabilities can cause critical problems. In this paper, we categorize attack vectors and classify them into hardware-based, network-based, and software-based. With the attack vectors, we describe the detail attack scenarios and show the result of tests on several commercial smart speakers. In addition, we suggest guidelines to mitigate various attacks against smart speaker ecosystem. 相似文献