With the continuous use of cloud and distributed computing, the threats associated with data and information technology (IT) in such an environment have also increased. Thus, data security and data leakage prevention ...With the continuous use of cloud and distributed computing, the threats associated with data and information technology (IT) in such an environment have also increased. Thus, data security and data leakage prevention have become important in a distributed environment. In this aspect, mobile agent-based systems are one of the latest mechanisms to identify and prevent the intrusion and leakage of the data across the network. Thus, to tackle one or more of the several challenges on Mobile Agent-Based Information Leakage Prevention, this paper aim at providing a comprehensive, detailed, and systematic study of the Distribution Model for Mobile Agent-Based Information Leakage Prevention. This paper involves the review of papers selected from the journals which are published in 2009 and 2019. The critical review is presented for the distributed mobile agent-based intrusion detection systems in terms of their design analysis, techniques, and shortcomings. Initially, eighty-five papers were identified, but a paper selection process reduced the number of papers to thirteen important reviews.展开更多
Under the global circumstances where data leakage gets more and more severe, we present a trustworthiness-based distribution model that aims at data leakage prevention (DLP). In our model, first, the distributor cal...Under the global circumstances where data leakage gets more and more severe, we present a trustworthiness-based distribution model that aims at data leakage prevention (DLP). In our model, first, the distributor calculates the user's trustworthiness based on his historical behaviors; second, according to the user's trustworthiness and his obtained file set overlapping leaked file set, the distributor accesses the probability of the user's intentional leak behavior as the subjective risk assessment; third, the distributor evaluates the user's platform vulnerability as an objective element; last, the distributor makes decisions whether to distribute the file based on the integrated risk assessment. The experiments indicate that the model can distinguish users of different types and make the probability of malicious users' requirements being denied much higher than that of honest users' requirements being denied, so that the model is capable of preventing data leakage validly.展开更多
Air leakage in underground coal mines presents a serious hazard for coal production and the safety of miners.Coating technology is commonly used as an efficient means for preventing air leakage.To address existing pro...Air leakage in underground coal mines presents a serious hazard for coal production and the safety of miners.Coating technology is commonly used as an efficient means for preventing air leakage.To address existing problems with high dust concentrations in large operations involving complex processes and the high cost of traditional coating technology,a novel coating technology that ensures intrinsic safety by utilizing water pressure and wind pressure was developed.This new coating technology was designed to suction and spray,and the technical parameters of its spray performance was also studied.The experimental tests and evaluation indicated the optimum working range is 0.3–0.7 MPa of wind pressure,1.2–10.2 L/min of water quantity,and 1.0–3.5 m of spraying distance.Moreover,this novel coating technology was tested in the Dashuitou Coal Mine in Gansu Province of China.Compared with conventional counterparts,the proposed new technology is safe,efficient,and convenient to operate.During spraying,dust concentrations were kept at less than 10 mg/m3,and the average rebound ratio resilient rate of solid materials was below 13%.After spraying,the average leakage every 100 m was 4 m3/min,and the oxygen volume fraction in the adjacent goaf was approximately 4%,demonstrating excellent air leakage prevention.展开更多
文摘With the continuous use of cloud and distributed computing, the threats associated with data and information technology (IT) in such an environment have also increased. Thus, data security and data leakage prevention have become important in a distributed environment. In this aspect, mobile agent-based systems are one of the latest mechanisms to identify and prevent the intrusion and leakage of the data across the network. Thus, to tackle one or more of the several challenges on Mobile Agent-Based Information Leakage Prevention, this paper aim at providing a comprehensive, detailed, and systematic study of the Distribution Model for Mobile Agent-Based Information Leakage Prevention. This paper involves the review of papers selected from the journals which are published in 2009 and 2019. The critical review is presented for the distributed mobile agent-based intrusion detection systems in terms of their design analysis, techniques, and shortcomings. Initially, eighty-five papers were identified, but a paper selection process reduced the number of papers to thirteen important reviews.
基金Supported by the National High Technology Research and Development Program of China (863 Program) (2009AA01Z442, 2008AA01Z404)the National Natural Science Foundation of China (90718006, 60970114)
文摘Under the global circumstances where data leakage gets more and more severe, we present a trustworthiness-based distribution model that aims at data leakage prevention (DLP). In our model, first, the distributor calculates the user's trustworthiness based on his historical behaviors; second, according to the user's trustworthiness and his obtained file set overlapping leaked file set, the distributor accesses the probability of the user's intentional leak behavior as the subjective risk assessment; third, the distributor evaluates the user's platform vulnerability as an objective element; last, the distributor makes decisions whether to distribute the file based on the integrated risk assessment. The experiments indicate that the model can distinguish users of different types and make the probability of malicious users' requirements being denied much higher than that of honest users' requirements being denied, so that the model is capable of preventing data leakage validly.
基金supported by the National Natural Science Foundation of China(Grant No.51704283)Natural Science Foundation of Jiangsu Province(BK20170277)+1 种基金Program for Changjiang Scholars and Innovative Research Team in University(IRT_17R103)the Fundamental Research Funds for the Central Universities(2014XT02)。
文摘Air leakage in underground coal mines presents a serious hazard for coal production and the safety of miners.Coating technology is commonly used as an efficient means for preventing air leakage.To address existing problems with high dust concentrations in large operations involving complex processes and the high cost of traditional coating technology,a novel coating technology that ensures intrinsic safety by utilizing water pressure and wind pressure was developed.This new coating technology was designed to suction and spray,and the technical parameters of its spray performance was also studied.The experimental tests and evaluation indicated the optimum working range is 0.3–0.7 MPa of wind pressure,1.2–10.2 L/min of water quantity,and 1.0–3.5 m of spraying distance.Moreover,this novel coating technology was tested in the Dashuitou Coal Mine in Gansu Province of China.Compared with conventional counterparts,the proposed new technology is safe,efficient,and convenient to operate.During spraying,dust concentrations were kept at less than 10 mg/m3,and the average rebound ratio resilient rate of solid materials was below 13%.After spraying,the average leakage every 100 m was 4 m3/min,and the oxygen volume fraction in the adjacent goaf was approximately 4%,demonstrating excellent air leakage prevention.