Cyber Security 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers

This open access book constitutes the refereed proceedings of the 16th International Annual Conference on Cyber Security, CNCERT 2020, held in Beijing, China, in August 2020. The 17 papers presented were carefully reviewed and selected from 58 submissions. The papers are organized according to the f...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Lu, Wei, Wen, Qiaoyan, Zhang, Yuqing, Lang, Bo, Wen, Weiping, Yan, Hanbing, Li, Chao, Ding, Li, Li, Ruiguang, Zhou, Yu
Format: E-Book
Sprache:Englisch
Veröffentlicht: Netherlands Springer Nature 2021
Springer
author-funded
Ausgabe:1
Schriftenreihe:Communications in Computer and Information Science
Schlagworte:
ISBN:9789813349223, 9813349220, 9813349212, 9789813349216
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Abstract This open access book constitutes the refereed proceedings of the 16th International Annual Conference on Cyber Security, CNCERT 2020, held in Beijing, China, in August 2020. The 17 papers presented were carefully reviewed and selected from 58 submissions. The papers are organized according to the following topical sections: access control; cryptography; denial-of-service attacks; hardware security implementation; intrusion/anomaly detection and malware mitigation; social network security and privacy; systems security.
AbstractList This open access book constitutes the refereed proceedings of the 16th International Annual Conference on Cyber Security, CNCERT 2020, held in Beijing, China, in August 2020.  The 17 papers presented were carefully reviewed and selected from 58 submissions.
This open access book constitutes the refereed proceedings of the 16th International Annual Conference on Cyber Security, CNCERT 2020, held in Beijing, China, in August 2020. The 17 papers presented were carefully reviewed and selected from 58 submissions. The papers are organized according to the following topical sections: access control; cryptography; denial-of-service attacks; hardware security implementation; intrusion/anomaly detection and malware mitigation; social network security and privacy; systems security.
This open access book constitutes the refereed proceedings of the 16th International Annual Conference on Cyber Security, CNCERT 2020, held in Beijing, China, in August 2020. The 17 papers presented were carefully reviewed and selected from 58 submissions. The papers are organized according to the following topical sections: access control; cryptography; denial-of-service attacks; hardware security implementation; intrusion/anomaly detection and malware mitigation; social network security and privacy; systems security.
Author Lu, Wei
Lang, Bo
Zhou, Yu
Zhang, Yuqing
Li, Ruiguang
Li, Chao
Ding, Li
Wen, Qiaoyan
Wen, Weiping
Yan, Hanbing
Author_xml – sequence: 1
  fullname: Lu, Wei
– sequence: 2
  fullname: Wen, Qiaoyan
– sequence: 3
  fullname: Zhang, Yuqing
– sequence: 4
  fullname: Lang, Bo
– sequence: 5
  fullname: Wen, Weiping
– sequence: 6
  fullname: Yan, Hanbing
– sequence: 7
  fullname: Li, Chao
– sequence: 8
  fullname: Ding, Li
– sequence: 9
  fullname: Li, Ruiguang
– sequence: 10
  fullname: Zhou, Yu
BookMark eNpdj7tPwzAQxo14CCiFGbFULIghYPv8SJAYICoPqaIDiNVyHLcNTeNgp6D-96SEAZju7vt-9-luH21VrrIIHRN8QTCWl4mMoyQmEUDEEkoj2ED9VmslgLUAm__mHXQ0Tp-uBoRCTNuEBO-ifghvGGPKSJIwsocO01Vm_eDZmqUvmtUB2p7oMtj-T-2h17vhS_oQjcb3j-nNKNJABcjIWCq0ZGIiibSZ0TkxnCVEU5xgqw2VksU6IwLbfEJNnhEQRhjGwQrLc5tDD513wTrM7WeYubIJ6qO0mXPzoP680bJnHVt79760oVHfmLFV43WphrepYDwGviavO9Lp2laq9sVC-5VyulBlkfmuXzvOTxXFimOsCBVcKiZkLNv9k9_7udPdPQIEZa172rlGB10WVaEWrnJTr-tZUJxzaL-ELzYZedY
ContentType eBook
DBID I4C
V1H
A7I
DEWEY 005
DOI 10.1007/978-981-33-4922-3
DatabaseName Casalini Torrossa eBooks Institutional Catalogue
DOAB: Directory of Open Access Books
OAPEN
DatabaseTitleList



Database_xml – sequence: 1
  dbid: V1H
  name: DOAB: Directory of Open Access Books
  url: https://directory.doabooks.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISBN 9789813349223
9813349220
Edition 1
1st Edition 2020
Editor Lu, Wei
Lang, Bo
Zhou, Yu
Zhang, Yuqing
Li, Ruiguang
Li, Chao
Ding, Li
Wen, Qiaoyan
Wen, Weiping
Yan, Hanbing
Editor_xml – sequence: 1
  fullname: Lu, Wei
– sequence: 2
  fullname: Wen, Qiaoyan
– sequence: 3
  fullname: Zhang, Yuqing
– sequence: 4
  fullname: Lang, Bo
– sequence: 5
  fullname: Wen, Weiping
– sequence: 6
  fullname: Yan, Hanbing
– sequence: 7
  fullname: Li, Chao
– sequence: 8
  fullname: Ding, Li
– sequence: 9
  fullname: Li, Ruiguang
– sequence: 10
  fullname: Zhou, Yu
ExternalDocumentID 9789813349223
EBC6458353
oai_library_oapen_org_20_500_12657_46787
63624
5553136
GroupedDBID 38.
9-X
A7I
AABBV
AAKKN
AALJR
AAQKC
ABEEZ
ACGCR
ADOGT
AEJLV
AEJNW
AEKFX
AGWHU
AIQUZ
ALMA_UNASSIGNED_HOLDINGS
ALNDD
AVCSZ
AZTDL
BBABE
CYNQG
CZZ
DACMV
EIXGO
ESBCR
I4C
IEZ
OAOFD
OPOMJ
SBO
SNUHX
TPJZQ
V1H
Z7R
Z7S
Z7U
Z7X
Z7Y
Z7Z
Z81
Z83
Z84
Z85
Z88
AEHEY
AAYZJ
AKAAH
Z87
ID FETCH-LOGICAL-a32637-ce26a746f717ebcad1c5491a2090eac27748ab160edf2cdb136c6c453e6e5ded3
IEDL.DBID V1H
ISBN 9789813349223
9813349220
9813349212
9789813349216
IngestDate Fri Nov 08 03:59:50 EST 2024
Wed Nov 19 01:02:48 EST 2025
Mon Dec 01 21:31:57 EST 2025
Tue Oct 07 23:46:36 EDT 2025
Wed Apr 23 04:19:10 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed false
IsScholarly false
LCCallNum_Ident Q
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-a32637-ce26a746f717ebcad1c5491a2090eac27748ab160edf2cdb136c6c453e6e5ded3
OCLC OCN: 1238200790
1232278670
OpenAccessLink https://directory.doabooks.org/handle/20.500.12854/63624
PQID EBC6458353
PageCount 235
ParticipantIDs askewsholts_vlebooks_9789813349223
proquest_ebookcentral_EBC6458353
oapen_primary_oai_library_oapen_org_20_500_12657_46787
oapen_doabooks_63624
casalini_monographs_5553136
PublicationCentury 2000
PublicationDate 2021
2020
2021-01-18
PublicationDateYYYYMMDD 2021-01-01
2020-01-01
2021-01-18
PublicationDate_xml – year: 2021
  text: 2021
PublicationDecade 2020
PublicationPlace Netherlands
PublicationPlace_xml – name: Netherlands
– name: Singapore
PublicationSeriesTitle Communications in Computer and Information Science
PublicationYear 2021
2020
Publisher Springer Nature
Springer
author-funded
Publisher_xml – name: Springer Nature
– name: Springer
– name: author-funded
SSID ssj0002419941
Score 2.2139363
Snippet This open access book constitutes the refereed proceedings of the 16th International Annual Conference on Cyber Security, CNCERT 2020, held in Beijing, China,...
SourceID askewsholts
proquest
oapen
casalini
SourceType Aggregation Database
Publisher
SubjectTerms Coding theory & cryptology
Coding theory and cryptology
communication channels (information theory)
communication systems
Computer and Information Systems Applications
Computer Communication Networks
computer crime
Computer hardware
Computer networking and communications
computer networks
Computer programming, programs, data
Computer science
Computer security
Computer System Implementation
computer systems
Computing and Information Technology
cryptography
Cryptology
Data and Information Security
data communication systems
Data encryption
data security
Information retrieval
Information Systems Applications (incl. Internet)
Internet searching
Mobile and Network Security
Network hardware
network protocols
Network security
Reference, Information and Interdisciplinary subjects
Research and information: general
sensors
signal processing
Systems analysis & design
Systems analysis and design
Systems and Data Security
telecommunication networks
telecommunication systems
telecommunication traffic
wireless telecommunication systems
Subtitle 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers
TableOfContents A Survey on Cyberspace Search Engines -- 1 Introduction -- 2 Supporting Internet Protocols -- 3 Total Amounts of Detected Devices -- 4 Device Information -- 5 Scanning Frequency -- 6 System Architecture -- 7 Third Party Databases -- 8 Probes Distribution -- 9 Conclusion -- References -- Brief Introduction of Network Security Asset Management for Banks -- 1 Introduction -- 2 Detection of Network Security Assets -- 3 Management of Network Security Assets -- 4 Applications of Network Security Assets -- 5 Design of Network Security Assets Management System -- 6 Conclusions -- References -- Embedded Security-Critical Device Resource Isolation -- 1 Introduction -- 2 Related Work -- 2.1 Resource Software Isolation -- 2.2 Resource Hardware Isolation -- 2.3 Current Status of Research on Resource Isolation of Vehicle System -- 2.4 Current Status of Anti-virus Software Running on Vehicle Systems -- 3 Modeling of Vehicle Resource Isolation System -- 3.1 Isolation Model Design -- 3.2 Implementation and Verification of on-Board System -- 3.3 Test and Analysis -- 4 Conclusion -- References -- Author Index
3 Current Situation of Agricultural Supply Chain -- 3.1 Upstream Link -- 3.2 Mid-Stream Link -- 3.3 Downstream Link -- 3.4 Trading Link -- 4 Current Status of Agricultural Products Traceability -- 4.1 Solves the Problem of Accountability for Agricultural Products -- 4.2 Solves the Problem of Traceability Trust for Agricultural Products -- 5 Summary and Prospect -- References -- Denial-of-Service Attacks -- Practical DDoS Attack Group Discovery and Tracking with Complex Graph-Based Network -- 1 Introduction -- 2 Methodology and Background -- 3 DDoSAGD - DDoS Attack Group Discovery Framework -- 3.1 Basic Concepts and Fundamental Graph Initialization -- 3.2 Meta Path-Based Similarity Framework -- 3.3 Hierarchical Community Discovery -- 4 Evaluation -- 4.1 Statistics of Input Data and Graphs -- 4.2 Situation Awareness of DDoS Attack Groups -- 5 Conclusion -- References -- Hardware Security Implementation -- Research on the Remote Deployment Design of OTN Electrical Racks -- 1 Background -- 1.1 Current Situation -- 1.2 Inevitability of Remote Electrical Rack Deployment -- 2 Implementation Mode and Impact -- 2.1 Implementation Modes -- 2.2 Impact on System OSNR -- 2.3 Impact on the Receive Optical Power of the OM/OD or OTU Boards -- 2.4 Other Impacts -- 3 Applicability Analysis -- 3.1 Advantages and Disadvantages -- 3.2 Scenario Analysis -- 4 Test Models and Simulation -- 4.1 Scenario-Based Modeling -- 4.2 Solution-Based Simulation for Different Scenarios -- 4.3 Conclusion -- 5 Application on Live Networks -- 5.1 Live Network Description -- 5.2 Solution Selection -- 6 Conclusions and Suggestions -- Intrusion/Anomaly Detection and Malware Mitigation -- An Effective Intrusion Detection Model Based on Pls-Logistic Regression with Feature Augmentation -- 1 Introduction -- 2 Methodology -- 2.1 Feature Augmentation
Intro -- Preface -- Organization -- Contents -- Access Control -- PassEye: Sniffing Your Password from HTTP Sessions by Deep Neural Network -- 1 Introduction -- 2 Background -- 2.1 Password Attack -- 2.2 Password Sniffing Attack -- 2.3 Neural Network in Network Traffic Classification -- 3 Attack Model -- 4 PassEye Design -- 4.1 Overview -- 4.2 Feature Extraction and Selection -- 4.3 Neural Network Model -- 5 Evaluation -- 5.1 Environment Setup -- 5.2 Dataset -- 5.3 Effectiveness of PassEye -- 5.4 Discussion -- 6 Conclusion and Future Work -- References -- Research on the Development Route of International Communication Accesses -- 1 Background -- 2 Current Situation of International Communication Networks -- 2.1 International Communication Access -- 2.2 International Submarine Cable Construction -- 2.3 Cross-Border Terrestrial Cable Construction -- 3 Factors Affecting International Access Establishment -- 3.1 Policy Environment -- 3.2 Geographical Environment -- 3.3 Necessity of International Access Construction -- 3.4 Feasibility of International Access Construction -- 3.5 Security Assurance Measures -- 4 International Access Establishment Case -- 4.1 Environment Factor -- 4.2 Necessity Analysis -- 4.3 Construction Feasibility Analysis -- 5 International Access Development Recommendations -- 6 Conclusion -- References -- Cryptography -- A Secure Ranked Search Model Over Encrypted Data in Hybrid Cloud Computing -- 1 Introduction -- 2 Related Work -- 2.1 The Okapi BM25 Model Over Plain Text -- 2.2 Fully Homomorphic Encryption -- 2.3 The Applicability of Hybrid Cloud Computing -- 3 Secure Ranked Search Model Over Hybrid Cloud -- 3.1 The Architecture of the Secure Ranked Search Model Over Hybrid Cloud -- 3.2 The Implementation of Fully Homomorphic Encryption Based Secure Ranking Scheme -- 4 Experiment Result and Future Work
4.1 Preliminary Experimental Result -- 4.2 Future Work -- 5 Conclusion -- References -- Based on GAN Generating Chaotic Sequence -- 1 Introduction -- 2 Basic Adversarial Encryption Algorithm and Chaotic Map -- 2.1 Basic Adversarial Encryption Communication Model -- 2.2 Logistic Chaotic Map -- 3 Adversarial Encryption Algorithm Based on Logistic Mapping -- 3.1 Key Generator Based on GAN -- 3.2 The Overall Encryption Algorithm Design -- 4 Experimental Procedure -- 4.1 Experimental Environment -- 4.2 Key Security Analysis -- 4.3 Analysis of Encryption Model Performance -- 5 Conclusion -- References -- MinerGate: A Novel Generic and Accurate Defense Solution Against Web Based Cryptocurrency Mining Attacks -- 1 Introduction -- 2 Background -- 2.1 Cryptocurrency Mining and Cryptojacking Attacks -- 2.2 Related Web Techniques -- 3 System Overview -- 3.1 Challenges and Our Solutions -- 3.2 JavaScript Instrumentation -- 3.3 Machine Learning Based Detection -- 3.4 Data-Driven Feature Selection -- 3.5 Security Enforcement -- 4 Evaluation -- 4.1 Dataset -- 4.2 Accuracy -- 4.3 Overhead -- 5 Related Work -- 6 Conclusions and Future Work -- References -- Research on Industrial Internet Security Emergency Management Framework Based on Blockchain: Take China as an Example -- 1 Introduction -- 2 Situation and Challenge -- 2.1 Organizational Structure -- 2.2 Technical Status -- 2.3 Challenge -- 3 Overview of Blockchain -- 3.1 Principle -- 3.2 Research Status -- 4 Consortium-Blockchain-Based ISEMS -- 4.1 Base Model -- 4.2 Architecture -- 4.3 Organization Structure -- 4.4 Critical Process -- 5 Summary and Prospect -- References -- Research Status and Prospect of Blockchain Technology in Agriculture Field -- 1 Introduction -- 2 Overview of Blockchain -- 2.1 Core of Blockchain Technology in Agriculture -- 2.2 Application of Blockchain in Agriculture
2.2 Pls-Logistic Regression Classification Model -- 3 Proposed Intrusion Detection Model: Fa-Plslogistic -- 4 Experimental Setting -- 4.1 Dataset Description -- 4.2 Experimental Results and Discussion -- 5 Conclusion -- References -- DeepHTTP: Anomalous HTTP Traffic Detection and Malicious Pattern Mining Based on Deep Learning -- 1 Introduction -- 2 Related Work -- 2.1 Malicious Traffic Detection -- 2.2 Pattern Mining Method -- 3 Preliminaries -- 3.1 DeepHTTP Architecture and Overview -- 3.2 Data Preprocessing -- 4 Our Approach -- 4.1 Anomaly HTTP Traffic Detection -- 4.2 Mining Stage -- 5 Evaluation -- 5.1 Dataset -- 5.2 Validation of Structural Feature Extraction Method -- 5.3 Model Comparison -- 5.4 Malicious Pattern Mining -- 6 Conclusion -- References -- Social Network Security and Privacy -- A Label Propagation Based User Locations Prediction Algorithm in Social Network -- 1 Introduction -- 2 Related Work -- 3 Related Concept and Problem Definition -- 4 Label Propagation Based User Location Prediction Algorithm -- 5 Experiment Result and Analysis -- 5.1 Data Set Description -- 5.2 Experimental Results Analysis -- 6 Conclusion -- References -- Perosonalized Differentially Private Location Collection Method with Adaptive GPS Discretization -- 1 Introduction -- 2 Related Work -- 3 System Overview -- 4 Module Design -- 4.1 Location Division Module -- 4.2 Personalized Location Privacy -- 4.3 Location Density Collection Module -- 5 Experimental Validation -- 5.1 Experiment Setup -- 5.2 Experiment Results -- 6 Conclusion -- References -- Systems Security -- Analysis on the Security of Satellite Internet -- 1 Introduction -- 2 Related Work -- 3 Analysis of SI Security -- 3.1 Overview of Security Issues of SI -- 3.2 National Security Issues -- 3.3 Network Security Issues -- 3.4 Equipment Security Issues -- 4 Conclusion -- References
Title Cyber Security
URI http://digital.casalini.it/9789813349223
https://directory.doabooks.org/handle/20.500.12854/63624
https://library.oapen.org/handle/20.500.12657/46787
https://ebookcentral.proquest.com/lib/[SITE_ID]/detail.action?docID=6458353
https://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9789813349223
Volume 1299
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1NS8NAEB1q68GCVK1i_ChFvEaT_c7V0lIvxYOU3pZNsgFR0tLUgv_e2U0Cgp48Jjlk8zbzdmZn9g3AvchVyoRlobBchiwxtUmFTDETkYRlNCl8swm5WKjVKnnpgGrPwtREvnZVzWvj_MzKp_NryQGM1B945BQRFGePArmXHUAPIxzhirmW8bxNWzbKsYmKQ0pxBK5ivQ99U70jcyCr7Cq3DJnKuNOHrtWR2djyFxv7JWY2-P_gTqBn3ZGFU-jY8gwGbaOGcWO3QziefKXuuulVdw7L2fR1Mg-bRgihQe-KyjCzRBjJRIHBl6teyuMMvzo2JEoiZE6CPpwyaSwimxcky9OYikxkjFOLU5DbnF5At1yX9hLGFudEKS4zK1KW54WKrbXo02Dc5KS-eAB3P2DS-w-ftK004olwUidmSGgA1y16Gq2lFteuNOdo0VQEMPSA6hYl7dEIQNS3N7WOhnbK1s1ela6fIJqaRBph1DERXGqkcSUDGLcTo_1omrpVPX2aCJf35fTq71dewxFx8bHfMrmB7m77aW_hMNvv3qrtCP1o-TzyP843dkXDcg
linkProvider Open Access Publishing in European Networks
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.title=Cyber+Security%3A+17th+China+Annual+Conference%2C+CNCERT+2020%2C+Beijing%2C+China%2C+August+12%2C+2020%2C+Revised+Selected+Papers&rft.au=Lu%2C+Wei&rft.au=Wen%2C+Qiaoyan&rft.au=Zhang%2C+Yuqing&rft.au=Lang%2C+Bo&rft.series=Communications+in+Computer+and+Information+Science&rft.date=2021-01-18&rft.pub=author-funded&rft.isbn=9789813349216&rft.volume=1299&rft_id=info:doi/10.1007%2F978-981-33-4922-3&rft.externalDocID=9789813349223
thumbnail_m http://cvtisr.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fvle.dmmserver.com%2Fmedia%2F640%2F97898133%2F9789813349223.jpg