{"title":"Research on Up and Down Channels of Satellite Communication Based on Spread Spectrum Principle","authors":"Gao Xinyu, Wei Feng, Yang Hao, Zhou Xingyu","doi":"10.1109/CCNS53852.2021.00012","DOIUrl":"https://doi.org/10.1109/CCNS53852.2021.00012","url":null,"abstract":"Satellite communication mode is based on spread spectrum technology, and CDMA mode is adopted as a whole. In satellite communication system, all base stations, base station controllers, mobile switching centers, etc. adopt a common CDMA reference time, namely CDMA system time. The uplink channel is differentiated by PN sequence with orthogonal Walsh code, and is transmitted by the same radio-frequency carrier. The downlink code division physical channel is composed of PN long codes with a length of 242-1, and different phase offsets of the long codes are used to distinguish users. Long codes PNA and PNT are code division channels provided by access channel and downlink traffic channel respectively. The uplink and downlink work in X-band, which meets the speed requirements of 8Kb/s for uplink and 32Kb/s for downlink, and realizes the functions of resisting human interference, narrowband interference, multipath interference, rain attenuation and ranging.","PeriodicalId":142980,"journal":{"name":"2021 2nd International Conference on Computer Communication and Network Security (CCNS)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126182320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shao Yuwen, Zhang Zheng, Liu Bingzheng, Jiang Xinsheng
{"title":"A Multi-Variant Voting Algorithm Based on Dynamic Feedback","authors":"Shao Yuwen, Zhang Zheng, Liu Bingzheng, Jiang Xinsheng","doi":"10.1109/CCNS53852.2021.00033","DOIUrl":"https://doi.org/10.1109/CCNS53852.2021.00033","url":null,"abstract":"Multi-variant execution framework can protect software security. For the problem of performance loss caused by too many voting times in the existing multi-variant execution framework, this paper proposes a multi-variant voting algorithm based on dynamic feedback, which can make the multi-variant continuously improve its corresponding voting strategy at runtime. Using this algorithm, the multi-variant can get a stable voting range, reduce the number of voting, and effectively improve the performance of multi-variant.","PeriodicalId":142980,"journal":{"name":"2021 2nd International Conference on Computer Communication and Network Security (CCNS)","volume":"IM-25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126607550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development in Consensus Protocols: From PoW to PoS to DPoS","authors":"Jingwen Pan, Zhaoyi Song, Wangze Hao","doi":"10.1109/CCNS53852.2021.00020","DOIUrl":"https://doi.org/10.1109/CCNS53852.2021.00020","url":null,"abstract":"Consensus protocols are the essential algorithms to achieve overall network reliability in the distributed system. As the representative of the distributed system, the blockchain applies its specific consensus algorithm to ensure security and consistency in the system. The three main consensus algorithms in the blockchain system now are Proof of Work (PoW), Proof of Stake (PoS), and Delegated Proof of Stake (DPoS). The development process of consensus algorithms illustrates the trend of consensus protocols in the blockchain. This paper analyzes the development of three representative consensus protocols: PoW, PoS, and DPoS. Then we compare the advantages and disadvantages of them and discusses the future direction of consensus protocols.","PeriodicalId":142980,"journal":{"name":"2021 2nd International Conference on Computer Communication and Network Security (CCNS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129938812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PPHR: Blockchain-based Privacy Protection House Rental System","authors":"Mingchong Li, Xiaolei Dong, Zhenfu Cao, Jiachen Shen","doi":"10.1109/CCNS53852.2021.00035","DOIUrl":"https://doi.org/10.1109/CCNS53852.2021.00035","url":null,"abstract":"In recent years, the sharing economy is developing rapidly and has become a popular economic model. For example, sharing platforms such as Airbnb have gradually entered people ’s field of vision and obtained high economic benefits. However, the information managed by such a centralized platform may be used by criminals and people’s privacy may be violated. In order to achieve the goal of decentralization, we propose a blockchain-based house sharing platform. Users can directly conduct transactions on the blockchain by running smart contracts. Our scheme guarantees the anonymity of users through commitment scheme and zero-knowledge technology. In order to deal with the problems that may be encountered in reality, we propose a trusted authority to trace malicious users. In addition, our platform has reputation mechanism to restrict the behavior of users. We analyze its security and performance, and the result shows that it is feasible in reality.","PeriodicalId":142980,"journal":{"name":"2021 2nd International Conference on Computer Communication and Network Security (CCNS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129178970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Key Points of Research and Construction Based on Network Security Big Data Target System","authors":"Yunguo Hong","doi":"10.1109/CCNS53852.2021.00041","DOIUrl":"https://doi.org/10.1109/CCNS53852.2021.00041","url":null,"abstract":"Up to now, the popularization and application of computers have caused great changes in people’s lives. However, as computer technology needs to store various information during application, such as public information, confidential information, etc., relevant staff need to pay more attention to its cyber security issues. This article summarizes the design content of the target system based on previous work experience. The author discusses the realization of a big data target system based on network security from five aspects: network security data collection, vulnerability data cleaning, realization of standard vulnerability database construction, extraction of elements of construction target environment, and construction of target environment given Docker virtual technology.","PeriodicalId":142980,"journal":{"name":"2021 2nd International Conference on Computer Communication and Network Security (CCNS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125502261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Construction of Network Security Perception System Using Elman Neural Network","authors":"Yu Kai, H. Qiang, Ma Yixuan","doi":"10.1109/CCNS53852.2021.00042","DOIUrl":"https://doi.org/10.1109/CCNS53852.2021.00042","url":null,"abstract":"the purpose of the study is to improve the security of the network, and make the state of network security predicted in advance. First, the theory of neural networks is studied, and its shortcomings are analyzed by the standard Elman neural network. Second, the layers of the feedback nodes of the Elman neural network are improved according to the problems that need to be solved. Then, a network security perception system based on GA-Elman (Genetic Algorithm-Elman) neural network is proposed to train the network by global search method. Finally, the perception ability is compared and analyzed through the model. The results show that the model can accurately predict network security based on the experimental charts and corresponding evaluation indexes. The comparative experiments show that the GA-Elman neural network security perception system has a better prediction ability. Therefore, the model proposed can be used to predict the state of network security and provide early warnings for network security administrators.","PeriodicalId":142980,"journal":{"name":"2021 2nd International Conference on Computer Communication and Network Security (CCNS)","volume":"5 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120928723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wenhui Wang, Longxi Han, Guangkai Ge, Zhenghao Yang
{"title":"An Algorithm of Optimal Penetration Path Generation under Unknown Attacks of Electric Power WEB System Based on Knowledge Graph","authors":"Wenhui Wang, Longxi Han, Guangkai Ge, Zhenghao Yang","doi":"10.1109/CCNS53852.2021.00034","DOIUrl":"https://doi.org/10.1109/CCNS53852.2021.00034","url":null,"abstract":"Aiming at the disadvantages of traditional methods such as low penetration path generation efficiency and low attack type recognition accuracy, an optimal penetration path generation algorithm based on the knowledge map power WEB system unknown attack is proposed. First, establish a minimum penetration path test model. And use the model to test the unknown attack of the penetration path under the power WEB system. Then, the ontology of the knowledge graph is designed. Finally, the design of the optimal penetration path generation algorithm based on the knowledge graph is completed. Experimental results show that the algorithm improves the efficiency of optimal penetration path generation, overcomes the shortcomings of traditional methods that can only describe known attacks, and can effectively guarantee the security of power WEB systems.","PeriodicalId":142980,"journal":{"name":"2021 2nd International Conference on Computer Communication and Network Security (CCNS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121125875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Massive MIMO joint precoding algorithm based on SORMI and Chebyshev iteration","authors":"Xiao Haotian, Wu Junqin, Shen Jianhao","doi":"10.1109/CCNS53852.2021.00031","DOIUrl":"https://doi.org/10.1109/CCNS53852.2021.00031","url":null,"abstract":"In the massive MIMO system, due to the huge orders of magnitude of users and base station antennas, the complexity of large-scale matrix inversion is relatively high. How to solve the matrix inversion problem has always been a hot spot in precoding research. In order to solve the problem that the Successive-over relaxation (SOR) iteration cannot directly obtain the inverse of the matrix in the massive MIMO system, and the iteration speed is slow, based on SORMI and Chebyshev iteration, we propose a joint precoding algorithm to speed up iteration and obtain better bit error rate performance. It can be seen from the simulation results that, compared with the RZF-SOR and SORMI algorithms, the joint algorithm has a faster convergence rate, and can obtain better bit error rate performance and matrix inversion accuracy with fewer iterations.","PeriodicalId":142980,"journal":{"name":"2021 2nd International Conference on Computer Communication and Network Security (CCNS)","volume":"113 17","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120825780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deep SSAE-BiLSTM Model for DDoS Detection In SDN","authors":"Lei Wan, Quanmin Wang, Shuang Zheng","doi":"10.1109/CCNS53852.2021.00015","DOIUrl":"https://doi.org/10.1109/CCNS53852.2021.00015","url":null,"abstract":"As a new network paradigm, Software-defined networking (SDN) realizes centralized management of the network by separating the control plane and the data plane. While SDN greatly improves network management capabilities, it also brings some security risks such as Distributed Denial of Service (DDoS) attack. How to effectively detect abnormal traffic has always been a hot issue in the field of network security. This paper proposes an improved attack detection model SSAE-BiLSTM based on deep learning. The stacked sparse autoencoder (SSAE) is used to extract high-dimensional features of data, and bidirectional long short-term memory (BiLSTM) is used to classify network traffic. This model can effectively detect network attacks with higher accuracy and lower false alarm rate on the benchmark dataset UNSW-NB15.","PeriodicalId":142980,"journal":{"name":"2021 2nd International Conference on Computer Communication and Network Security (CCNS)","volume":"26 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132988009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Differentially Private Context-Aware Edge-Cloud-Enabled Nursing System in Smart Home","authors":"Gang-Ting Liu, Qiwen Li, Dan‐Hong Wang, Ruo-Bing Ren, Hai-Tao Chou, Pan Zhou","doi":"10.1109/CCNS53852.2021.00019","DOIUrl":"https://doi.org/10.1109/CCNS53852.2021.00019","url":null,"abstract":"Developing rapidly in recent years, smart home could integrate health care with ambient assisted living (AAL) technologies and provide activities of daily life (ADLs) to the people who need care. In this paper, we propose a smart home and cross-cloud-and-edge computing based nursing system (NS). In general, a good NS requires low latency, high stability, and the real-time analysis and response, where the conventional centralized cloud computing based approaches cannot meet those requirements very well. To this end, we introduce a novel distributed joint edge-cloud structure to better satisfy these requirements. Moreover, to deal with the privacy issue, we introduce the differential-privacy (DP) in the NS to protect the healthcare takers’ data privacy. In a word, we propose a privacy-preserving context-aware multi-armed bandit based online learning approach for edge-cloud-enabled NS in smart home. Additionally, our system with a novel top-down expanding tree based structure can support dynamically increasing health care datasets. Extensive simulation results demonstrate that the proposed solution can achieve accurate recommendation results.","PeriodicalId":142980,"journal":{"name":"2021 2nd International Conference on Computer Communication and Network Security (CCNS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128533749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}