{"title":"Synchronization of Uncertain Lorenz Chaotic Systems Based on a Novel Active Pining Control","authors":"Qu Shao-cheng, Gong Mei-jing","doi":"10.1109/CIS.WORKSHOPS.2007.183","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.183","url":null,"abstract":"This paper discusses the synchronization of two Lorenz chaotic systems with parameters perturbation. Based on active control strategy, a novel active pining control synchronization approach is presented. The design of the whole controller only uses a system state. According to Lyapunov stability theory, the synchronization conditions of active pining control method for the two uncertain chaotic systems are given. And robust stability of uncertain chaotic systems synchronization is guaranteed. Numerical simulations are used to show the robustness and effectiveness of the proposed control strategy.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129013544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study on Revising Configure Parameter in Embedded System and Its Application","authors":"T. Hai, Zhou Xin-qin","doi":"10.1109/CIS.WORKSHOPS.2007.222","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.222","url":null,"abstract":"The article expounds the technology that UPD protocol is applied when revising configured the parameter remotely in embedded system. It also introduces the process in realizing the system with the corresponding codes in detail and related communication protocols. Finally gives a example how the research being applied for the \"home-school-communication \" system.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123850376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wang Jinsong, Lou Jia, Wu Shaoying, Wang Zhengxu, Wu Gong-yi
{"title":"AAA Architecture for Unified Configuration Management in Large-Scale Network","authors":"Wang Jinsong, Lou Jia, Wu Shaoying, Wang Zhengxu, Wu Gong-yi","doi":"10.1109/CIS.WORKSHOPS.2007.159","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.159","url":null,"abstract":"Unified configuration management of network devices in large-scale environment is an important issue. As a traditional method, password authentication by router can not verify the administrators' identities. In other words, someone who actually is not an administrator, can also access the router if he knows password. In this paper, we present a new policy-based AAA architecture that uses VPN and certificate-based authentication. By implementing the architecture, administrators can access authorized routers only and execute authorized commands. Single Sign-On mechanism is used to simplify authentication process. Moreover, the actions of administrators can be logged for accounting. Finally, we implement the architecture in Tianjin Education Metropolitan Area Network.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123951143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Simple Matrix Representation Method of the BM Algorithm Using in Flowing Cipher Field","authors":"Qian Yin, Ping Guo, Zukuan Wei, Zhiyong He","doi":"10.1109/CIS.WORKSHOPS.2007.79","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.79","url":null,"abstract":"In this paper, a new simple representation of the Berlekamp-Massey algorithm was proposed, which resolves the problem of the length of the shortest linear recurrence in the flowing cipher study. In the process of investigating the Berlekamp-Massey algorithm, using matrix-method can help to simplify the representation of the Berlekamp-Massey algorithm and easily calculate the distributing regulation of the shortest linear recurrence length compared to the traditional method.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123353573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Steganalysis Based on Lifting Wavelet Transform for Palette Images","authors":"Jiaohua Qin, Xingming Sun, Xuyu Xiang","doi":"10.1109/CIS.WORKSHOPS.2007.202","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.202","url":null,"abstract":"Based on the statistical analysis of the correlation between the low frequency sub-band coefficients and the high frequency sub-band coefficients in wavelet domain, a novel steganalytic algorithm with the ability of reliable detecting modifications in palette images is proposed in this paper. First, we divide the image into non-overlapping 8times8 blocks and perform integer wavelet transform based on lifting scheme to each block. Then, the average correlation, which is used to determine whether the secret message exists or not in palette images, is calculated according to the correlation between low frequency coefficients and high frequency coefficients. Experimental results show that the new algorithm can achieve better performance than the pairs analysis. Moreover, it is easy to be implemented and well-suited for real-time detection.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114357040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Efficient Evolutionary Algorithm for a Kind of Nondifferentiable Nonlinear Bilevel Programming","authors":"Dalian Liu, Dong Chen","doi":"10.1109/CIS.WORKSHOPS.2007.144","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.144","url":null,"abstract":"A special kind of nonlinear bilevel programming problems (nonlinear BLPP in short) is transformed into an equivalent single objective nonlinear programming problem. To solve the equivalent problem effectively, we first design a fitness function based on entropy function. By using this fitness function, we not only can decrease the leader's objective value, but also can force the infeasible solutions moving towards the feasible region, and improve the feasible solutions gradually. Then an effective crossover operator is used to generate high quality offspring. Based on these, a new evolutionary algorithm for nonlinear BLPP is proposed. Finally, simulations on several benchmark problems are made and the results demonstrate the effectiveness of the proposed algorithm.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"648 1-2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116177565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Routing Algorithm of Network Coding on Multicast","authors":"Shaoguo Tao, Wenbo Qiao, Zongkai Yang, W. Cheng","doi":"10.1109/CIS.WORKSHOPS.2007.152","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.152","url":null,"abstract":"As a novel transmission mechanism to enhance the performance of multicast network, network coding (NC) has received much researcher concern recently. Due to its inherent characteristic, the process of constructing the routing paths in network coding is different from the traditional IP multicast based on replicating and forwarding. In this paper, we analyze the algebraic model of network coding and conclude that the goal of the routing problem in network coding is to build edge-disjoin paths from the source to each receiver. Using the idea of tree packing, we present a detailed routing algorithm for network coding based multicast. Simulations based on the algorithm show that, for network coding based multicast, performance in terms of achievable throughput and bandwidth consumption has been improved significantly with respect to the traditional IP multicast.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"456 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124326301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Improvement on Precision in DDoS Source-End Detection with Multi-stream Combined HMM","authors":"Jian Kang, Qiang Li, Yuan Zhang, Zhuo Li","doi":"10.1109/CIS.WORKSHOPS.2007.86","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.86","url":null,"abstract":"DDoS (distributed denial-of-service) attacks detection system deployed in source-end network is superior in perceiving and throttling attacks before dataflows enter Internet, comparing with that in victim network. However, the current existed works in source- end network are so fragile, lead to a high false-positive rate and false-negative rate. This paper proposes a novel approach using multi-stream combined hidden Markov model (MC-HMM) on source-end DDoS detection for integrating multi-features simultaneously. The multi-features include the S-D-P three-tuple, TCP header Flags, and IP header ID field. Through experiments, we compared our original approach based on multiple detection features with other algorithms (such as CUSUM and HMM). The results present that our approach effectively reduces false-positive rate and false-negative rate, and improves the precision of detection.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128098290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-agents Artificial Immune System (MAAIS) Inspired by Danger Theory for Anomaly Detection","authors":"Haidong Fu, Xiguo Yuan, Na Wang","doi":"10.1109/CIS.WORKSHOPS.2007.62","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.62","url":null,"abstract":"Inspired by the potential interesting ideas of the danger theory (DT), the research into artificial immune system (AIS) has been developing faster then ever. The basic role of DT embedded in AIS is to provide what T-cells should respond through the professional antigen-presenting cells when there are some cells undergoing injury, or stress or 'bad cell death'. However, in the context of AlS-based network security systems, how to minimize damage by mitigating virus infection is a key step to solve real-world problems. In this paper we present the blueprint of a DT inspired multi-agents AIS for anomaly detection, it is called MAAIS, which can dynamically adapt to various types of immune responses by configuring parameters during the course of evaluating the degree of danger signals received. Additionally, a suitable mechanism of communication between agents is employed to stipulate the better performance of the novel system.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132045986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Variable Universe Multiple-Fuzzifications Control","authors":"Tianli Li, Hong Hu, Liang Zheng","doi":"10.1109/CIS.WORKSHOPS.2007.166","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.166","url":null,"abstract":"A novel method is being proposed for the design of the fuzzy logic controller (FLC) in order to improve the controlling precision. This paper describes the design and implementation of some FLCs based on the variable universe and the multiple-fuzzifications methods. They are different from conventional FLC's design method. No complex algorithm is required to implement the controllers. The actual performance of the novel FLCs at controlling the water tank temperature were evaluated against the performance of an intelligent temperature controller. The experiment results show that the design of fuzzy controllers can not only be carried out simply and easily, but also can improve the control performance. The effective methods proposed are easily implementable on commonly used equipment such as PLC. Generally, the novel fuzzy controllers can both improve the performance of control system and cut down the cost of hardware.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134105556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}