Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Design and implementation of high-interaction programmable logic controller honeypot system based on industrial control business simulation
ZHAO Guoxin, DING Ruofan, YOU Jianzhou, LYU Shichao, PENG Feng, LI Fei, SUN Limin
Journal of Computer Applications    2020, 40 (9): 2650-2656.   DOI: 10.11772/j.issn.1001-9081.2019122214
Abstract545)      PDF (1350KB)(495)       Save
The capability of entrapment is significantly influenced by the degree of simulation in industrial control honeypots. In view of the lack of business logic simulation of existing industrial control honeypots, the high-interaction Programmable Logic Controller (PLC) honeypot design framework and implementation method based on industrial control business simulation were proposed. First, based on the interaction level of industrial control system, a new classification method of Industrial Control System (ICS) honeypots was proposed. Then, according to different simulation dimensions of ICS devices, the entrapment process in honeypot was divided into a process simulation cycle and a service simulation cycle. Finally, in order to realize the real-time response to business logic data, the process data was transferred to the service simulation cycle through a customized data transfer module. Combining typical ICS honeypot software Conpot and the modeling simulation tool Matlab/Simulink, the experiments were carried out with Siemens S7-300 PLC device as the reference, and so as to realize the collaborative work of information service simulation and control process simulation. The experimental results show that compared with Conpot, the proposed PLC honeypot system newly adds 11 private functions of Siemens S7 devices. Especially, the operating read (function code 04 Read) and write (function code 05 Write) in the new functions realize 7 channel monitoring for I area data and 1 channel control for Q area data in PLC. This new honeypot system breaks through the limitations of existing interaction levels and methods and finds new directions for ICS honeypot design.
Reference | Related Articles | Metrics
Vertical handover trigger mechanism between 3G and WLAN based on available data rate
ZHANG Jinfu YUAN Ling YOU Jianqiang
Journal of Computer Applications    2013, 33 (07): 1825-1827.   DOI: 10.11772/j.issn.1001-9081.2013.07.1825
Abstract832)      PDF (613KB)(460)       Save
For the issue that traditional vertical handover trigger mechanism cannot guarantee to provide the real-time highest data rate, a method which can make the best of network resources and can effectively avoid unnecessary handover was proposed. This paper introduced IEEE802.21 Media Independent Handover (MIH) standard,using Media Independent Information Service (MIIS) provided by MIH Function (MIHF) to get the parameters of candidate Wireless LAN (WLAN) which can cover the mobile terminal, calculate the maximum available data rate of the candidate WLAN using the acquired parameters, and compare the maximum available data rate of WLAN with 3G networks to make handover decision. And when higher data rate WLAN was detected, handover to it could be made timely. If the mobile terminal moved out of the WLAN coverage, handover back to 3G network was made. The simulation results show that the proposed algorithm can make more full use of network resources and avoid unnecessary handover effectively compared to traditional vertical handoff trigger mechanism.
Reference | Related Articles | Metrics
New approach to retinal image enhancement based on Hessian matrix
YOU Jia CHEN Bo
Journal of Computer Applications    2011, 31 (06): 1560-1562.   DOI: 10.3724/SP.J.1087.2011.01560
Abstract1266)      PDF (461KB)(755)       Save
The retina vessel enhancement of retina angiography image is considered as an essential factor to improve diagnosis. Therefore, this paper proposed a multi-scale vessel enhancement method for retinal image based on Hessian matrix. Besides, the strategy and process of applying this method were provided. This method was tested on DRIVE database and its results were compared with other methods using the same database. The result shows a considerable accuracy as other methods while obtaining better robustness.
Related Articles | Metrics