Cyber Security : 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers.

Bibliographic Details
Main Author: Lu, Wei.
Other Authors: Wen, Qiaoyan., Zhang, Yuqing., Lang, Bo., Wen, Weiping., Yan, Hanbing., Li, Chao., Ding, Li., Li, Ruiguang., Zhou, Yu.
Format: eBook
Language:English
Published: Singapore : Springer Singapore Pte. Limited, 2021.
Edition:1st ed.
Series:Communications in Computer and Information Science Series
Subjects:
Online Access:Click to View
LEADER 10620nam a22005533i 4500
001 EBC6458353
003 MiAaPQ
005 20231204023215.0
006 m o d |
007 cr cnu||||||||
008 231204s2021 xx o ||||0 eng d
020 |a 9789813349223  |q (electronic bk.) 
020 |z 9789813349216 
035 |a (MiAaPQ)EBC6458353 
035 |a (Au-PeEL)EBL6458353 
035 |a (OCoLC)1232278670 
040 |a MiAaPQ  |b eng  |e rda  |e pn  |c MiAaPQ  |d MiAaPQ 
050 4 |a QA76.9.A25 
100 1 |a Lu, Wei. 
245 1 0 |a Cyber Security :  |b 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers. 
250 |a 1st ed. 
264 1 |a Singapore :  |b Springer Singapore Pte. Limited,  |c 2021. 
264 4 |c ©2020. 
300 |a 1 online resource (235 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Communications in Computer and Information Science Series ;  |v v.1299 
505 0 |a Intro -- Preface -- Organization -- Contents -- Access Control -- PassEye: Sniffing Your Password from HTTP Sessions by Deep Neural Network -- 1 Introduction -- 2 Background -- 2.1 Password Attack -- 2.2 Password Sniffing Attack -- 2.3 Neural Network in Network Traffic Classification -- 3 Attack Model -- 4 PassEye Design -- 4.1 Overview -- 4.2 Feature Extraction and Selection -- 4.3 Neural Network Model -- 5 Evaluation -- 5.1 Environment Setup -- 5.2 Dataset -- 5.3 Effectiveness of PassEye -- 5.4 Discussion -- 6 Conclusion and Future Work -- References -- Research on the Development Route of International Communication Accesses -- 1 Background -- 2 Current Situation of International Communication Networks -- 2.1 International Communication Access -- 2.2 International Submarine Cable Construction -- 2.3 Cross-Border Terrestrial Cable Construction -- 3 Factors Affecting International Access Establishment -- 3.1 Policy Environment -- 3.2 Geographical Environment -- 3.3 Necessity of International Access Construction -- 3.4 Feasibility of International Access Construction -- 3.5 Security Assurance Measures -- 4 International Access Establishment Case -- 4.1 Environment Factor -- 4.2 Necessity Analysis -- 4.3 Construction Feasibility Analysis -- 5 International Access Development Recommendations -- 6 Conclusion -- References -- Cryptography -- A Secure Ranked Search Model Over Encrypted Data in Hybrid Cloud Computing -- 1 Introduction -- 2 Related Work -- 2.1 The Okapi BM25 Model Over Plain Text -- 2.2 Fully Homomorphic Encryption -- 2.3 The Applicability of Hybrid Cloud Computing -- 3 Secure Ranked Search Model Over Hybrid Cloud -- 3.1 The Architecture of the Secure Ranked Search Model Over Hybrid Cloud -- 3.2 The Implementation of Fully Homomorphic Encryption Based Secure Ranking Scheme -- 4 Experiment Result and Future Work. 
505 8 |a 4.1 Preliminary Experimental Result -- 4.2 Future Work -- 5 Conclusion -- References -- Based on GAN Generating Chaotic Sequence -- 1 Introduction -- 2 Basic Adversarial Encryption Algorithm and Chaotic Map -- 2.1 Basic Adversarial Encryption Communication Model -- 2.2 Logistic Chaotic Map -- 3 Adversarial Encryption Algorithm Based on Logistic Mapping -- 3.1 Key Generator Based on GAN -- 3.2 The Overall Encryption Algorithm Design -- 4 Experimental Procedure -- 4.1 Experimental Environment -- 4.2 Key Security Analysis -- 4.3 Analysis of Encryption Model Performance -- 5 Conclusion -- References -- MinerGate: A Novel Generic and Accurate Defense Solution Against Web Based Cryptocurrency Mining Attacks -- 1 Introduction -- 2 Background -- 2.1 Cryptocurrency Mining and Cryptojacking Attacks -- 2.2 Related Web Techniques -- 3 System Overview -- 3.1 Challenges and Our Solutions -- 3.2 JavaScript Instrumentation -- 3.3 Machine Learning Based Detection -- 3.4 Data-Driven Feature Selection -- 3.5 Security Enforcement -- 4 Evaluation -- 4.1 Dataset -- 4.2 Accuracy -- 4.3 Overhead -- 5 Related Work -- 6 Conclusions and Future Work -- References -- Research on Industrial Internet Security Emergency Management Framework Based on Blockchain: Take China as an Example -- 1 Introduction -- 2 Situation and Challenge -- 2.1 Organizational Structure -- 2.2 Technical Status -- 2.3 Challenge -- 3 Overview of Blockchain -- 3.1 Principle -- 3.2 Research Status -- 4 Consortium-Blockchain-Based ISEMS -- 4.1 Base Model -- 4.2 Architecture -- 4.3 Organization Structure -- 4.4 Critical Process -- 5 Summary and Prospect -- References -- Research Status and Prospect of Blockchain Technology in Agriculture Field -- 1 Introduction -- 2 Overview of Blockchain -- 2.1 Core of Blockchain Technology in Agriculture -- 2.2 Application of Blockchain in Agriculture. 
505 8 |a 3 Current Situation of Agricultural Supply Chain -- 3.1 Upstream Link -- 3.2 Mid-Stream Link -- 3.3 Downstream Link -- 3.4 Trading Link -- 4 Current Status of Agricultural Products Traceability -- 4.1 Solves the Problem of Accountability for Agricultural Products -- 4.2 Solves the Problem of Traceability Trust for Agricultural Products -- 5 Summary and Prospect -- References -- Denial-of-Service Attacks -- Practical DDoS Attack Group Discovery and Tracking with Complex Graph-Based Network -- 1 Introduction -- 2 Methodology and Background -- 3 DDoSAGD - DDoS Attack Group Discovery Framework -- 3.1 Basic Concepts and Fundamental Graph Initialization -- 3.2 Meta Path-Based Similarity Framework -- 3.3 Hierarchical Community Discovery -- 4 Evaluation -- 4.1 Statistics of Input Data and Graphs -- 4.2 Situation Awareness of DDoS Attack Groups -- 5 Conclusion -- References -- Hardware Security Implementation -- Research on the Remote Deployment Design of OTN Electrical Racks -- 1 Background -- 1.1 Current Situation -- 1.2 Inevitability of Remote Electrical Rack Deployment -- 2 Implementation Mode and Impact -- 2.1 Implementation Modes -- 2.2 Impact on System OSNR -- 2.3 Impact on the Receive Optical Power of the OM/OD or OTU Boards -- 2.4 Other Impacts -- 3 Applicability Analysis -- 3.1 Advantages and Disadvantages -- 3.2 Scenario Analysis -- 4 Test Models and Simulation -- 4.1 Scenario-Based Modeling -- 4.2 Solution-Based Simulation for Different Scenarios -- 4.3 Conclusion -- 5 Application on Live Networks -- 5.1 Live Network Description -- 5.2 Solution Selection -- 6 Conclusions and Suggestions -- Intrusion/Anomaly Detection and Malware Mitigation -- An Effective Intrusion Detection Model Based on Pls-Logistic Regression with Feature Augmentation -- 1 Introduction -- 2 Methodology -- 2.1 Feature Augmentation. 
505 8 |a 2.2 Pls-Logistic Regression Classification Model -- 3 Proposed Intrusion Detection Model: Fa-Plslogistic -- 4 Experimental Setting -- 4.1 Dataset Description -- 4.2 Experimental Results and Discussion -- 5 Conclusion -- References -- DeepHTTP: Anomalous HTTP Traffic Detection and Malicious Pattern Mining Based on Deep Learning -- 1 Introduction -- 2 Related Work -- 2.1 Malicious Traffic Detection -- 2.2 Pattern Mining Method -- 3 Preliminaries -- 3.1 DeepHTTP Architecture and Overview -- 3.2 Data Preprocessing -- 4 Our Approach -- 4.1 Anomaly HTTP Traffic Detection -- 4.2 Mining Stage -- 5 Evaluation -- 5.1 Dataset -- 5.2 Validation of Structural Feature Extraction Method -- 5.3 Model Comparison -- 5.4 Malicious Pattern Mining -- 6 Conclusion -- References -- Social Network Security and Privacy -- A Label Propagation Based User Locations Prediction Algorithm in Social Network -- 1 Introduction -- 2 Related Work -- 3 Related Concept and Problem Definition -- 4 Label Propagation Based User Location Prediction Algorithm -- 5 Experiment Result and Analysis -- 5.1 Data Set Description -- 5.2 Experimental Results Analysis -- 6 Conclusion -- References -- Perosonalized Differentially Private Location Collection Method with Adaptive GPS Discretization -- 1 Introduction -- 2 Related Work -- 3 System Overview -- 4 Module Design -- 4.1 Location Division Module -- 4.2 Personalized Location Privacy -- 4.3 Location Density Collection Module -- 5 Experimental Validation -- 5.1 Experiment Setup -- 5.2 Experiment Results -- 6 Conclusion -- References -- Systems Security -- Analysis on the Security of Satellite Internet -- 1 Introduction -- 2 Related Work -- 3 Analysis of SI Security -- 3.1 Overview of Security Issues of SI -- 3.2 National Security Issues -- 3.3 Network Security Issues -- 3.4 Equipment Security Issues -- 4 Conclusion -- References. 
505 8 |a A Survey on Cyberspace Search Engines -- 1 Introduction -- 2 Supporting Internet Protocols -- 3 Total Amounts of Detected Devices -- 4 Device Information -- 5 Scanning Frequency -- 6 System Architecture -- 7 Third Party Databases -- 8 Probes Distribution -- 9 Conclusion -- References -- Brief Introduction of Network Security Asset Management for Banks -- 1 Introduction -- 2 Detection of Network Security Assets -- 3 Management of Network Security Assets -- 4 Applications of Network Security Assets -- 5 Design of Network Security Assets Management System -- 6 Conclusions -- References -- Embedded Security-Critical Device Resource Isolation -- 1 Introduction -- 2 Related Work -- 2.1 Resource Software Isolation -- 2.2 Resource Hardware Isolation -- 2.3 Current Status of Research on Resource Isolation of Vehicle System -- 2.4 Current Status of Anti-virus Software Running on Vehicle Systems -- 3 Modeling of Vehicle Resource Isolation System -- 3.1 Isolation Model Design -- 3.2 Implementation and Verification of on-Board System -- 3.3 Test and Analysis -- 4 Conclusion -- References -- Author Index. 
588 |a Description based on publisher supplied metadata and other sources. 
590 |a Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2023. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.  
655 4 |a Electronic books. 
700 1 |a Wen, Qiaoyan. 
700 1 |a Zhang, Yuqing. 
700 1 |a Lang, Bo. 
700 1 |a Wen, Weiping. 
700 1 |a Yan, Hanbing. 
700 1 |a Li, Chao. 
700 1 |a Ding, Li. 
700 1 |a Li, Ruiguang. 
700 1 |a Zhou, Yu. 
776 0 8 |i Print version:  |a Lu, Wei  |t Cyber Security  |d Singapore : Springer Singapore Pte. Limited,c2021  |z 9789813349216 
797 2 |a ProQuest (Firm) 
830 0 |a Communications in Computer and Information Science Series 
856 4 0 |u https://ebookcentral.proquest.com/lib/matrademy/detail.action?docID=6458353  |z Click to View