A New Threat Evaluation Method Based on Cloud Model Wang Bailing 1*, Guo Shi 1, Qu Yun 1, Wang Xiaopeng 1, Liu Yang 1 1 Harbin Institute of Technology,

Slides:



Advertisements
Similar presentations
Incorporating Site-Level Knowledge to Extract Structured Data from Web Forums Jiang-Ming Yang, Rui Cai, Yida Wang, Jun Zhu, Lei Zhang, and Wei-Ying Ma.
Advertisements

The Logic of Intelligence Pei Wang Department of Computer and Information Sciences Temple University.
Fuzzy immune PID neural network control method based on boiler steam pressure system Third pacific-asia conference on circuits,communications and system,
Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1
Uncertainty Measure and Reduction in Intuitionistic Fuzzy Covering Approximation Space Feng Tao Mi Ju-Sheng.
Project Tracking and Scheduling Infsy 570 Dr. R. Ocker.
Research on Integrated Obstacle Avoidance of Robot Soccer Game 班 級 : 碩研電機一甲 指導 教授 : 謝銘原 學生 : 洪家信 學號 :MA
Traffic modeling and Prediction ----Linear Models
1 PSO-based Motion Fuzzy Controller Design for Mobile Robots Master : Juing-Shian Chiou Student : Yu-Chia Hu( 胡育嘉 ) PPT : 100% 製作 International Journal.
A FUZZY LOGIC BASED MULTIPLE REFERENCE MODEL ADAPTIVE CONTROL (MRMAC) By Sukumar Kamalasadan, Adel A Ghandakly Khalid S Al-Olimat Dept. of Electrical Eng.
Decision-Making on Robots Using POMDPs and Answer Set Programming Introduction Robots are an integral part of many sectors such as medicine, disaster rescue.
A Simple Method to Extract Fuzzy Rules by Measure of Fuzziness Jieh-Ren Chang Nai-Jian Wang.
Chapter 8 Architecture Analysis. 8 – Architecture Analysis 8.1 Analysis Techniques 8.2 Quantitative Analysis  Performance Views  Performance.
1 CS 456 Software Engineering. 2 Contents 3 Chapter 1: Introduction.
Linear System Theory Instructor: Zhenhua Li Associate Professor Mobile : School of Control Science and Engineering, Shandong.
Load Balancing in Distributed Computing Systems Using Fuzzy Expert Systems Author Dept. Comput. Eng., Alexandria Inst. of Technol. Content Type Conferences.
POWER CONTROL IN COGNITIVE RADIO SYSTEMS BASED ON SPECTRUM SENSING SIDE INFORMATION Karama Hamdi, Wei Zhang, and Khaled Ben Letaief The Hong Kong University.
Dr. Asawer A. Alwasiti.  Chapter one: Introduction  Chapter two: Frequency Distribution  Chapter Three: Measures of Central Tendency  Chapter Four:
Can Cloud Computing be Used for Planning? An Initial Study Authors: Qiang Lu*, You Xu†, Ruoyun Huang†, Yixin Chen† and Guoliang Chen* from *University.
1 A Maximizing Set and Minimizing Set Based Fuzzy MCDM Approach for the Evaluation and Selection of the Distribution Centers Advisor:Prof. Chu, Ta-Chung.
INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY, P.P , MARCH An ANFIS-based Dispatching Rule For Complex Fuzzy Job Shop Scheduling.
Reasoning in Uncertain Situations
Mobile Robot Navigation Using Fuzzy logic Controller
A Collaborative and Semantic Data Management Framework for Ubiquitous Computing Environment International Conference of Embedded and Ubiquitous Computing.
Course presentation: FLA Fuzzy Logic and Applications 4 CTI, 2 nd semester Doru Todinca in Courses presentation.
Wireless communications and mobile computing conference, p.p , July 2011.
K. Kolomvatsos 1, C. Anagnostopoulos 2, and S. Hadjiefthymiades 1 An Efficient Environmental Monitoring System adopting Data Fusion, Prediction & Fuzzy.
Date : 2013/03/18 Author : Jeffrey Pound, Alexander K. Hudek, Ihab F. Ilyas, Grant Weddell Source : CIKM’12 Speaker : Er-Gang Liu Advisor : Prof. Jia-Ling.
Interval Type-2 Fuzzy T-S Modeling For A Heat Exchange Process On CE117 Process Trainer Proceedings of 2011 International Conference on Modelling, Identification.
An Intelligent and Energy-Efficient Fault Detection Algorithm for Wireless Sensor Networks † Song Jia 1,2*, Wang Bailing 1, Peng Xiyuan 2 1 School of Information.
Software Engineering Education Framework Sun-Myung Hwang Computer Engineering Dept, Daejeon University, Republic of Korea Abstract. Software.
Advanced Science and Technology Letters Vol.31 (ACN 2013), pp The Design of Internal Curing Winding Machine.
Development of a Software Renderer for utilizing 3D Contents on a 2D-based Mobile System Sungkwan Kang 1, Joonseub Cha 2, Jimin Lee 1 and Jongan Park 1,
Advanced Science and Technology Letters Vol.31 (ACN 2013), pp Application Research of Wavelet Fusion Algorithm.
Longitudinal Motion Characteristics between a Non- Matched Piezoelectric Sensor and Actuator Pair Young-Sup Lee Department of Embedded Systems Engineering,
Surround-Adaptive Local Contrast Enhancement for Preserved Detail Perception in HDR Images Geun-Young Lee 1, Sung-Hak Lee 1, Hyuk-Ju Kwon 1, Tae-Wuk Bae.
Advanced Science and Technology Letters Vol.47 (Architecture and Civil Engineering 2014), pp Electromagnetic.
Time-Space Trust in Networks Shunan Ma, Jingsha He and Yuqiang Zhang 1 College of Computer Science and Technology 2 School of Software Engineering.
Advanced Science and Technology Letters Vol.28 (EEC 2013), pp Histogram Equalization- Based Color Image.
Commonsense Reasoning in and over Natural Language Hugo Liu, Push Singh Media Laboratory of MIT The 8 th International Conference on Knowledge- Based Intelligent.
Applicability Analysis of Software Testing for Actual Operating Railway Software Jong-Gyu Hwang 1, Hyun-Jeong Jo 1, Baek-Hyun Kim 1, Jong-Hyun Baek 1 1.
Efficient Load Balancing Algorithm for Cloud Computing Network Che-Lun Hung 1, Hsiao-hsi Wang 2 and Yu-Chen Hu 2 1 Dept. of Computer Science & Communication.
Advanced Science and Technology Letters Vol.28 (AIA 2013), pp Local Contour Features for Writer Identification.
Robot Velocity Based Path Planning Along Bezier Curve Path Gil Jin Yang, Byoung Wook Choi * Dept. of Electrical and Information Engineering Seoul National.
Name Of The College & Dept
Advanced Science and Technology Letters Vol.28 (EEC 2013), pp Fuzzy Technique for Color Quality Transformation.
REU 2009-Traffic Analysis of IP Networks Daniel S. Allen, Mentor: Dr. Rahul Tripathi Department of Computer Science & Engineering Data Streams Data streams.
Cairo University Institute of Statistical Studies and Research Department of Computer and Information Sciences Fuzzy Time Series Model for Egypt Gold Reserves.
Advanced Science and Technology Letters Vol.53 (AITS 2014), pp An Improved Algorithm for Ad hoc Network.
T EXT D IGITAL W ATERMARKING O F A M ALAYALAM T EXT D OCUMENT B ASED O N F RAGMENTS R EGROUPING S TRATEGY. Guide:Presented by: Mrs.Sreeja Sasinas Alias.
VIDYA PRATISHTHAN’S COLLEGE OF ENGINEERING, BARAMATI.
Advanced Science and Technology Letters Vol.53 (AITS 2014), pp A Network Intrusion Detection Method.
Dealing with Uncertainty: A Survey of Theories and Practice Yiping Li, Jianwen Chen and Ling Feng IEEE Transactions on Knowledge and Data Engineering,
Automatic Evaluation of Ship Maneuvering on Marine simulator based on Fuzzy Structured Element Method CHEN Jinbiao Merchant Marine College, Shanghai Maritime.
Mohsen Riahi Manesh and Dr. Naima Kaabouch
Authors: Jiang Xie, Ian F. Akyildiz
Fuzzy type Image Fusion using hybrid DCT-FFT based Laplacian Pyramid Transform Authors: Rajesh Kumar Kakerda, Mahendra Kumar, Garima Mathur, R P Yadav,
Institute for Cyber Security
Hacker Detection in Wireless sensor network
P. Janik, Z. Leonowicz, T. Lobos, Z. Waclawek
Efficient Load Balancing Algorithm for Cloud
Mengmeng Cui 1,2, Yun Liu 3, Shengjun Xue1, Jin Wang1
Il-Kyoung Kwon1, Sang-Yong Lee2
Young Hoon Ko1, Yoon Sang Kim2
Luís Filipe Martinsª, Fernando Netoª,b. 
Research on profit distribution mechanism of industrial innovation platform based on Grey System Theory Wang lei,Tan qingmei Nanjing University of Aeronautics.
YuankaiGao,XiaogangLi
K. Kolomvatsos1, C. Anagnostopoulos2, and S. Hadjiefthymiades1
Intelligent Contextual Data Stream Monitoring
The Thinking of Grey Information Coverage
Presentation transcript:

A New Threat Evaluation Method Based on Cloud Model Wang Bailing 1*, Guo Shi 1, Qu Yun 1, Wang Xiaopeng 1, Liu Yang 1 1 Harbin Institute of Technology, Heilongjiang, * Abstract. Along with the prevalence of Internet, the threat for the network is increasing steadily. This paper proposed a new threat evaluation approach, which mapped the uncertain threat into quantitative expressions. By the model, the threat situation could be showed directly. Keywords: mobile network, threat evaluation, Cloud Model 1 Introduction Along with the development of the computer technology and the prevalence of Internet, computer has become more important in the people’s life. At the same time, the threat for the mobile network is increasing steadily. Mobile network is just like the sword with two blades. It benefits the scientific researcher, and even the common people, but it make the threat increase more quickly and more widely. The work to detect and control the Threat Situation of Mobile Network (TSMN) has outspreaded accordingly, and we have implemented a system which depicted how to watch and control the threat situation of computer network in detail [ 1 ]. At this junction, a new method to evaluate the TSMN based on cloud is proposed. The theory of cloud techniques is presented in section 2. Then, section 3 will expound the new mechanism on how to calculate the qualitative influence of the TSMN and how to assess the situation with cloud-based technology. Furthermore, section 4 gives the results of experiment and corresponding curve. Lastly, conclusion and discussion are presented in section 5. 2 The Actuality of Cloud Technology Cloud model is an uncertain transition model that bridges the gap between the qualitative analysis and the quantitative by language value, as in [3]. Cloud is made of a lot of cloud drops, and every drop is an instance that expresses the qualitative concept in quantity. And in the last ten years, the thinking of the cloud technology has been consummated and used in many evaluation systems and prediction systems † Supported by the National Science Nature Foundation of China under Grant No CCA2013, ASTL Vol. 17, pp , © SERSC

Proceedings, The 2nd International Conference on Computer and Applications successfully, e.g. reliability evaluation of electronic products in [2], reliability count evaluation of computers in [3], representation and prediction of K-line in [4], and so on as in [5,6]. A more successful appliance of cloud technology is the inverted- pendulum, which is a hard problem in fuzzy control, and the result of the application is surprised. A one-dimensional cloud to the range of the affected computer in a network is proposed in Fig. 1, and the parameters Ex, En, He of moderate range cloud are labeled. From the left to the right, the range and the parameters are described as the following: Small Range:A (0, 50, 0.5); Moderate Range: A (200, 50, 0.5); BigRange:A (500, 100, 2); Fig.1. The Cloud-based model of The Range of The Affected Computers The qualitative meaning is very obvious: along with the increase of the number of the affected computers, the membership degree of u in U to the term A (0, 50, 0.5) decreased and to A (200, 50, 0.5) increased accordingly; if the number of the affected computers is greater than 200, the membership degree of u in U to the term A (200, 50, 0.5) decreased and to A (500, 200, 2) increased along with the increase of the number. 3 Experiments in Network Threat Evaluation As the formulas in part 3, we give an example of the cloud-based evaluation model. According to formula 3 and formula 4, and let t max=500, the cloud is described as following: C t = t (500, 167, 2); (5) C 4 = 4 (9, 3, 0.03); (6) Then the final cloud of the TSMN is described as following: C ( t, 4 ) = C t ∩ C 4 = C((500,9),(167,3),(2,0.03)) (7) 16

A New Threat Evaluation Method Based on Cloud Model Fig. 2 is the cloud of the formula 7. But in our system, we are only concerned about the ascending half cloud, where  <  max and 4) < 4) max. Fig. 2. The Gravity Cloud of TSMN 5 Conclusion In brief, design a TSMN evaluation model and make a qualitative analysis of TSMN is important and necessary in TSMN prediction. The cloud methods not only bridge the gap between quantitative and qualitative knowledge, but also between different granularities of knowledge. Particularly, the soft inference based on cloud methods can not only maintain the uncertainty of the linguistic atoms, but also enhance the robustness of the predictive results. There is extensive real practical value to use the cloud technology introduced in this paper to assess TSMN. References 1.B.L. Wang, B.X. Fang, X.C. Yun, The distributed broadband network malcode precaution system, Journal of China Institute of Communications, vol.24, pp , Aug Xiang Xinjian. Research on reliability evaluation of electronic products under environmental conditions, Intelligent Control and Automation, vol. 4, , Qian FU, Zhihua CAI, Yiqi WU, Zhenhua LI, A Novel Reliability Evaluation Method for Series − Parallel Systems Based on Cloud Model. Journal of Computational Information Systems 6:10 (2010) F. Yang, R. Jiang, D.Y. Li, “Representation and Prediction of K-line with Cloud Method”, The fifteenth Graduate-Nanjing Conference on Communication, Nanjing,

Proceedings, The 2nd International Conference on Computer and Applications 5.D.D. Lie, X.H. Chen, Z.H. Lou, “Analysis on characteristics of spatial-temporal precipitation distribution based on cloud model”, Journal of Hydraulic Engineering, vol.40, pp , Jul H.B. Zhang, Q.Q. Pei, J.F. Ma, “An Algorithm for Sensing Insider Threat Based on Cloud Model”, Chinese Journal of Computers, vol. 32, pp , April