{"title":"基于主动防御的自适应安全端系统模型","authors":"Hanping Hu, Xing Liang, Baojia Zhang, Wenbin Guo","doi":"10.1109/ICCS.2004.1359393","DOIUrl":null,"url":null,"abstract":"In order to enhance the security of Web service as well as to support the differentiated service, the paper puts forward an adaptive model, which is based on active defense strategy. It uses a network prediction model on base of self-similar sequence theory to estimate current slates of transfer servers in end-system, then classifies them with fuzzy-C-means clustering method. Finally, we bring forward a load balancing algorithm that is founded on the classification results and grading users' requests. In that way, it optimizes the allocation of system resources and ensures data security and reliability. Moreover, this model is not dependent on the original operating system and is transplantable and extensible","PeriodicalId":333629,"journal":{"name":"The Ninth International Conference onCommunications Systems, 2004. ICCS 2004.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2004-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"An adaptive security end-system model based on active defense\",\"authors\":\"Hanping Hu, Xing Liang, Baojia Zhang, Wenbin Guo\",\"doi\":\"10.1109/ICCS.2004.1359393\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In order to enhance the security of Web service as well as to support the differentiated service, the paper puts forward an adaptive model, which is based on active defense strategy. It uses a network prediction model on base of self-similar sequence theory to estimate current slates of transfer servers in end-system, then classifies them with fuzzy-C-means clustering method. Finally, we bring forward a load balancing algorithm that is founded on the classification results and grading users' requests. In that way, it optimizes the allocation of system resources and ensures data security and reliability. Moreover, this model is not dependent on the original operating system and is transplantable and extensible\",\"PeriodicalId\":333629,\"journal\":{\"name\":\"The Ninth International Conference onCommunications Systems, 2004. ICCS 2004.\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2004-11-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"The Ninth International Conference onCommunications Systems, 2004. ICCS 2004.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCS.2004.1359393\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"The Ninth International Conference onCommunications Systems, 2004. ICCS 2004.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCS.2004.1359393","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An adaptive security end-system model based on active defense
In order to enhance the security of Web service as well as to support the differentiated service, the paper puts forward an adaptive model, which is based on active defense strategy. It uses a network prediction model on base of self-similar sequence theory to estimate current slates of transfer servers in end-system, then classifies them with fuzzy-C-means clustering method. Finally, we bring forward a load balancing algorithm that is founded on the classification results and grading users' requests. In that way, it optimizes the allocation of system resources and ensures data security and reliability. Moreover, this model is not dependent on the original operating system and is transplantable and extensible