In this paper,an improved scheme based on DiffServ network is proposed to provide a decentralized coopera-tive QoS management for real-time services'admission control and resources'monitoring.The proposed sche...In this paper,an improved scheme based on DiffServ network is proposed to provide a decentralized coopera-tive QoS management for real-time services'admission control and resources'monitoring.The proposed scheme consists of aQoS Control Server(QoSCS),a Service Management Server(SMS),a Network Management Server(NMS)and routersin the concerned management domain.When an application asks for a service with specific QoS requirements,a series ofcooperation are initiated among these components by means of a suit of signaling protocol.Once a service is admitted,itcan provide required QoS services more effectively than original DiffServ network.Monitoring per-flow states are movedfrom edge routers to the QoSCS server.The prototype implementation and experimental results show that this scheme canprovide enhanced manageability and scalability for providing per-flow management in such a distributed way.展开更多
Moving target defense(MTD) has emerged as one of the game-changing themes to alter the asymmetric situation between attacks and defenses in cyber-security. Numerous related works involving several facets of MTD have b...Moving target defense(MTD) has emerged as one of the game-changing themes to alter the asymmetric situation between attacks and defenses in cyber-security. Numerous related works involving several facets of MTD have been published. However, comprehensive analyses and research on MTD are still absent. In this paper, we present a survey on MTD technologies to scientifically and systematically introduce, categorize, and summarize the existing research works in this field. First, a new security model is introduced to describe the changes in the traditional defense paradigm and security model caused by the introduction of MTD. A function-and-movement model is provided to give a panoramic overview on different perspectives for understanding the existing MTD research works. Then a systematic interpretation of published literature is presented to describe the state of the art of the three main areas in the MTD field, namely, MTD theory, MTD strategy, and MTD evaluation. Specifically,in the area of MTD strategy, the common characteristics shared by the MTD strategies to improve system security and effectiveness are identified and extrapolated. Thereafter, the methods to implement these characteristics are concluded. Moreover, the MTD strategies are classified into three types according to their specific goals, and the necessary and sufficient conditions of each type to create effective MTD strategies are then summarized, which are typically one or more of the aforementioned characteristics. Finally, we provide a number of observations for the future direction in this field, which can be helpful for subsequent researchers.展开更多
The brittleness analysis and important nodes detection have been a hot spot in the complex networks.How to get the overall feature of the whole network and how to find out some important nodes are requisites to solve ...The brittleness analysis and important nodes detection have been a hot spot in the complex networks.How to get the overall feature of the whole network and how to find out some important nodes are requisites to solve these problems. In this paper, we adopt the trace of the adjacency matrix and the centrality of the complex networks to give a quantitative and qualitative analysis of networks being studied. Results show that the k-shell plays a more important role than the degree centrality and the betweenness in finding important nodes, and it can also be used to give direction on the immunization and maintenance of complex networks.展开更多
A cluster-based organization with two phases to separate priority calculation and network activity operations is developed. In the election-state phase, clusters are organized by those nodes with sufficient residual e...A cluster-based organization with two phases to separate priority calculation and network activity operations is developed. In the election-state phase, clusters are organized by those nodes with sufficient residual energy level(REL) that are distributed as evenly as possible in the network. For each network round, each node decides its role(such as, cluster header(CH) or a normal node) and its priority level for activity operation. The priority level also affects the active/sleep scheduling in the node. In the steady-state phase, the positive priority levels of active nodes determine their activity order to avoid transmission collision, and to reduce redundant data transmission and sensing coverage. Since the data reporting to the sink is usually performed by a CH delivery chain, subsidiary CHs are selected to assist with data delivery and to share the loading of CHs. The formulae for computing priority levels are analyzed and verified by the examples with valid parameters. The experimental results show that the two phases efficiently consume node energy and achieve energy savings.展开更多
文摘In this paper,an improved scheme based on DiffServ network is proposed to provide a decentralized coopera-tive QoS management for real-time services'admission control and resources'monitoring.The proposed scheme consists of aQoS Control Server(QoSCS),a Service Management Server(SMS),a Network Management Server(NMS)and routersin the concerned management domain.When an application asks for a service with specific QoS requirements,a series ofcooperation are initiated among these components by means of a suit of signaling protocol.Once a service is admitted,itcan provide required QoS services more effectively than original DiffServ network.Monitoring per-flow states are movedfrom edge routers to the QoSCS server.The prototype implementation and experimental results show that this scheme canprovide enhanced manageability and scalability for providing per-flow management in such a distributed way.
基金supported by the National Basic Research Program(973)of China(No.2012CB315906)
文摘Moving target defense(MTD) has emerged as one of the game-changing themes to alter the asymmetric situation between attacks and defenses in cyber-security. Numerous related works involving several facets of MTD have been published. However, comprehensive analyses and research on MTD are still absent. In this paper, we present a survey on MTD technologies to scientifically and systematically introduce, categorize, and summarize the existing research works in this field. First, a new security model is introduced to describe the changes in the traditional defense paradigm and security model caused by the introduction of MTD. A function-and-movement model is provided to give a panoramic overview on different perspectives for understanding the existing MTD research works. Then a systematic interpretation of published literature is presented to describe the state of the art of the three main areas in the MTD field, namely, MTD theory, MTD strategy, and MTD evaluation. Specifically,in the area of MTD strategy, the common characteristics shared by the MTD strategies to improve system security and effectiveness are identified and extrapolated. Thereafter, the methods to implement these characteristics are concluded. Moreover, the MTD strategies are classified into three types according to their specific goals, and the necessary and sufficient conditions of each type to create effective MTD strategies are then summarized, which are typically one or more of the aforementioned characteristics. Finally, we provide a number of observations for the future direction in this field, which can be helpful for subsequent researchers.
文摘The brittleness analysis and important nodes detection have been a hot spot in the complex networks.How to get the overall feature of the whole network and how to find out some important nodes are requisites to solve these problems. In this paper, we adopt the trace of the adjacency matrix and the centrality of the complex networks to give a quantitative and qualitative analysis of networks being studied. Results show that the k-shell plays a more important role than the degree centrality and the betweenness in finding important nodes, and it can also be used to give direction on the immunization and maintenance of complex networks.
基金the National Natural Science Foundation of China(No.71201172)
文摘A cluster-based organization with two phases to separate priority calculation and network activity operations is developed. In the election-state phase, clusters are organized by those nodes with sufficient residual energy level(REL) that are distributed as evenly as possible in the network. For each network round, each node decides its role(such as, cluster header(CH) or a normal node) and its priority level for activity operation. The priority level also affects the active/sleep scheduling in the node. In the steady-state phase, the positive priority levels of active nodes determine their activity order to avoid transmission collision, and to reduce redundant data transmission and sensing coverage. Since the data reporting to the sink is usually performed by a CH delivery chain, subsidiary CHs are selected to assist with data delivery and to share the loading of CHs. The formulae for computing priority levels are analyzed and verified by the examples with valid parameters. The experimental results show that the two phases efficiently consume node energy and achieve energy savings.