Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Hierarchical representation model of APT attack
TAN Ren, YIN Xiaochuan, LIAN Zhe, CHEN Yuxin
Journal of Computer Applications    2017, 37 (9): 2551-2556.   DOI: 10.11772/j.issn.1001-9081.2017.09.2551
Abstract512)      PDF (1009KB)(522)       Save
Aiming at the problem that the attack chain model for the attack phase is too small to indicate the means of attack, an Advanced Persistent Threat (APT) Hierarchical Attack Representation Model (APT-HARM) was proposed. By summarizing the analysis of a large number of published APT event reports and reference APT attack chain model and HARM, the APT attack was divided into into two layers, the upper layer attack chain and the lower layer attack tree, which were formally defined. Firstly, the APT attack was divided into four stages:reconnaissance, infiltration, operation and exfiltration and the characteristics of each stage were studied. Then, the attack methods in each stage were studied, and the attack tree was composed according to its logical relationship. APT attacks were carried out in stages according to the attack chain, and the attack of each stage was performed in accordance with the attack tree. The case study shows that the model has the advantages of reasonable granularity classification and better attack description compared to the attack chain model. APT-HARM formally defines the APT attack, which provides an idea for the prediction and prevention of APT attacks.
Reference | Related Articles | Metrics
Metadata processing optimization in distributed file systems
LIU Lian ZHENG Biao GONG Yi-li
Journal of Computer Applications    2012, 32 (12): 3271-3273.   DOI: 10.3724/SP.J.1087.2012.03271
Abstract714)      PDF (435KB)(789)       Save
This paper analyzed the metadata processing in PVFS2, and took the remove operation as an example. To find out the bottlenecks in the remove operation, the time of each step was tested. And an optimization method to reduce the communication number by placing judgmental process on the server side was proposed, which is also suitable for other metadata operations. The optimization method was implemented in PVFS2. Compared with the original remove operation, this proposed method shows about 10% improvement in performance.
Related Articles | Metrics
Feature selection method based on Fisher criterion and feature clustering
Sa Wang Lian Zheng
Journal of Computer Applications   
Abstract2262)            Save
Feature selection is one of the important issues in the machine learning and pattern recognition. For highdimensional data, the new feature selection method based on Fisher criterion and feature clustering was proposed. Firstly, the features that have more discrimination information based on Fisher criterion were selected. Then hierarchical clustering in the preselected subset was adopted. Finally the irrelevant and redundant features were removed. The experimental results show that the proposed algorithm is an effective method for feature selection.
Related Articles | Metrics