After Beijing wins the bit to host the 29th Olympic Games, in order to manifest the technical support advantages and capabilities of the autonomously-developed RS and GIS based change detection techniques in 2008 Beij...After Beijing wins the bit to host the 29th Olympic Games, in order to manifest the technical support advantages and capabilities of the autonomously-developed RS and GIS based change detection techniques in 2008 Beijing Olympic Games, and from the standpoints of executing new city planning, relieving the traffic congestion as well as maintaining the historic features, an automatic satellite monitoring system has been studied and established to accomplish the mission of unauthorized construction inspection within the Sixth Ring Road of Beijing city quarterly, by adopting the CBERS-2 satellite images and combining technologies of GIS, GPS, etc. This article discusses the applicable procedures and key issues when utilizing such Chinese satellite images and relevant techniques to discover the illegal constructions, and introduces the monitoring system from both the design and implementation aspects; additionally, some typical application cases in the practice of the system are also illustrated. The monitoring system can timely supply abundant information to facilitate the policy-making of relevant planning departments, thus providing consolidate technical support to eliminate the illegal constructing behaviors in the blossom. During the five years' excellent performance, it has helped China save large amounts of expenditures for processing of unauthorized constructed buildings.展开更多
A scheme to construct signatures automatically for Snort from the data captured by honeypots is presented. With this scheme intrusion detection systems can be quickly updated to detect new intrusions soon when happen....A scheme to construct signatures automatically for Snort from the data captured by honeypots is presented. With this scheme intrusion detection systems can be quickly updated to detect new intrusions soon when happen. The idea is based on the observation that any traffic to and from honeypots represents abnormal activities, so data patterns extracted from these packets can be used by misuse detection system to identify new attacks. The algorithm of constructing rules is discussed. Experiment illustrates the effectiveness of the scheme.展开更多
基金Supported by the National Basic Research Program of China (Grant No. 2006CB701300)National Science and Technology Support Program of China (Grant No. 2006BAB10B01)National Natural Science Foundation of China (Grant No. 40201044)
文摘After Beijing wins the bit to host the 29th Olympic Games, in order to manifest the technical support advantages and capabilities of the autonomously-developed RS and GIS based change detection techniques in 2008 Beijing Olympic Games, and from the standpoints of executing new city planning, relieving the traffic congestion as well as maintaining the historic features, an automatic satellite monitoring system has been studied and established to accomplish the mission of unauthorized construction inspection within the Sixth Ring Road of Beijing city quarterly, by adopting the CBERS-2 satellite images and combining technologies of GIS, GPS, etc. This article discusses the applicable procedures and key issues when utilizing such Chinese satellite images and relevant techniques to discover the illegal constructions, and introduces the monitoring system from both the design and implementation aspects; additionally, some typical application cases in the practice of the system are also illustrated. The monitoring system can timely supply abundant information to facilitate the policy-making of relevant planning departments, thus providing consolidate technical support to eliminate the illegal constructing behaviors in the blossom. During the five years' excellent performance, it has helped China save large amounts of expenditures for processing of unauthorized constructed buildings.
文摘A scheme to construct signatures automatically for Snort from the data captured by honeypots is presented. With this scheme intrusion detection systems can be quickly updated to detect new intrusions soon when happen. The idea is based on the observation that any traffic to and from honeypots represents abnormal activities, so data patterns extracted from these packets can be used by misuse detection system to identify new attacks. The algorithm of constructing rules is discussed. Experiment illustrates the effectiveness of the scheme.