The subversive nature of information war lies not only in the information itself, but also in the circulation and application of information. It has always been a challenge to quantitatively analyze the function and e...The subversive nature of information war lies not only in the information itself, but also in the circulation and application of information. It has always been a challenge to quantitatively analyze the function and effect of information flow through command, control, communications, computer, kill, intelligence,surveillance, reconnaissance (C4KISR) system. In this work, we propose a framework of force of information influence and the methods for calculating the force of information influence between C4KISR nodes of sensing, intelligence processing,decision making and fire attack. Specifically, the basic concept of force of information influence between nodes in C4KISR system is formally proposed and its mathematical definition is provided. Then, based on the information entropy theory, the model of force of information influence between C4KISR system nodes is constructed. Finally, the simulation experiments have been performed under an air defense and attack scenario. The experimental results show that, with the proposed force of information influence framework, we can effectively evaluate the contribution of information circulation through different C4KISR system nodes to the corresponding tasks. Our framework of force of information influence can also serve as an effective tool for the design and dynamic reconfiguration of C4KISR system architecture.展开更多
僵尸网络(Botnet)是一种从传统恶意代码形态进化而来的新型攻击方式,为攻击者提供了隐匿、灵活且高效的一对多命令与控制信道(Command and Control channel,C&C)机制,可以控制大量僵尸主机实现信息窃取、分布式拒绝服务攻击和垃圾...僵尸网络(Botnet)是一种从传统恶意代码形态进化而来的新型攻击方式,为攻击者提供了隐匿、灵活且高效的一对多命令与控制信道(Command and Control channel,C&C)机制,可以控制大量僵尸主机实现信息窃取、分布式拒绝服务攻击和垃圾邮件发送等攻击目的。该文提出一种与僵尸网络结构和C&C协议无关,不需要分析数据包的特征负载的僵尸网络检测方法。该方法首先使用预过滤规则对捕获的流量进行过滤,去掉与僵尸网络无关的流量;其次对过滤后的流量属性进行统计;接着使用基于X-means聚类的两步聚类算法对C&C信道的流量属性进行分析与聚类,从而达到对僵尸网络检测的目的。实验证明,该方法高效准确地把僵尸网络流量与其他正常网络流量区分,达到从实际网络中检测僵尸网络的要求,并且具有较低的误判率。展开更多
移动僵尸网络进行恶意扣费、泄露隐私信息等恶意行为,给移动用户构成了巨大隐患.通过构建实用的移动僵尸网络,可以更好地了解其工作机制,从而提出直接有效的防御策略.提出结合短信(SMS)和HTTP协议作为移动僵尸网络的命令与控制(Command ...移动僵尸网络进行恶意扣费、泄露隐私信息等恶意行为,给移动用户构成了巨大隐患.通过构建实用的移动僵尸网络,可以更好地了解其工作机制,从而提出直接有效的防御策略.提出结合短信(SMS)和HTTP协议作为移动僵尸网络的命令与控制(Command and Control,C&C)的通信信道的设计方法,设计了一种移动僵尸程序HybirdBot.在减少消耗的同时确保命令信息能准确接收和高效执行,又能将僵尸网络流量隐藏在其他良性的HTTP流量中.实验结果表明,HybirdBot命令执行时间基本控制在1s以内,运行时CPU占用率只达1-2%,平均每条命令所产的流量也只有0.62kb.证明该移动僵尸网络具有高效性,隐匿性好而且消耗少,最后本文还提出了几种防御策略.展开更多
The tracking, telemetry and command (TT&C) mission is extremely reliable for its characters of small time horizon and high redundancy. The combined forcing and failure biasing (CFFB) method that is usually used f...The tracking, telemetry and command (TT&C) mission is extremely reliable for its characters of small time horizon and high redundancy. The combined forcing and failure biasing (CFFB) method that is usually used for simulating the unreliability of the highly dependable mission system seems not so efficient for the TT&C mission. The concept about the importance of failure transition is proposed based on the logical relationship between TT&C mission and its involved resources. Then, the importance is used for readjusting the transition rate of the failure transition when using the forcing and failure biasing during the simulation. Examples show that the improved CFFB method can evidently increase the occurrence of the TT&C mission failure event and decrease the sample variance. More redundancy of the TT&C mission leads to the improved CFFB method more efficient.展开更多
AIM To investigate the role of bloodtransfusion in TT viral infection(TTV).METHODS We retrospectively studied serumsamples from 192 transfusion recipients whounderwent cardiovascular surgery and bloodtransfusion betwe...AIM To investigate the role of bloodtransfusion in TT viral infection(TTV).METHODS We retrospectively studied serumsamples from 192 transfusion recipients whounderwent cardiovascular surgery and bloodtransfusion between July 1991 and June 1992.Allpatients had a follow-up every other week for atleast 6 months after transfusion.Eightyrecipients received blood before screeningdonors for hepatitis C antibody(anti-HCV),and112 recipients received screened blood.Recipients with alanine aminotransferase level】2.5 times the upper normal limit were testedfor serological markers for viral hepatitis A,B,C,G,Epstein-Barr virus and cytomegalovirus.TTV infection was defined by the positivity forserum TTV DNA using the polymerase chainreaction method.RESULTS Eleven and three patients,whoreceived anti-HCV unscreened and screened'blood,respectively,had serum ALT levels】90 IU/L.Five patients(HCV and TTV:1;HCV,HGV,and TTV:1;TTV:2;and CMV and TTV:1)were positive for TTV DNA,and four of them hadsero-conversion of TTV DNA.CONCLUSION TTV can be transmitted viablood transfusion.Two recipients infected byTTV alone may be associated with the hepatitis.However,whether TTV was the causal agentremains unsettled,and further studies arenecessary to define the role of TTV infection inchronic hepatitis.展开更多
The whole airspace phased array telemetry,track and command(TT&C)system is regarded as the development tendency of next generation TT&C system,and the distribution of the antenna units and the beamforming tech...The whole airspace phased array telemetry,track and command(TT&C)system is regarded as the development tendency of next generation TT&C system,and the distribution of the antenna units and the beamforming technology have sparked wide interest in this field.A method for antenna distribution is proposed based on the linear subarrays technology.A symmetrical truncated cone conformal array is composed of the linear subarrays placed on the generatrix.The impact of truncated cone bottom radius and elevation angle on beamforming are studied and simulated.Simulation results verify the system design.展开更多
An interference mitigation for acquisition method,based on both energy center and spectrum symmetry detection,has been proposed as a possible solution to the problem of signal acquisition susceptibility to continuous-...An interference mitigation for acquisition method,based on both energy center and spectrum symmetry detection,has been proposed as a possible solution to the problem of signal acquisition susceptibility to continuous-wave interference(CWI)in unified carrier telemetry,tracking,and command(TT&C)systems.With subcarrier modulation index as a priori condition,the existence of CWI is determined by comparing the energy center with the symmetric center.In the presence of interference,the interference frequency point is assumed and culled;sequentially,the spectral symmetry is used to verify whether the signal acquisition is realized.Theoretical analysis,simulations,and experimental results demonstrate that the method can realize the acquisition of the main carrier target signal with an interference-to-signal ratio of 31 dB,which represents an improvement over the existing continuous-wave interference mitigation for acquisition methods.展开更多
基金supported by the Natural Science Foundation Research Plan of Shanxi Province (2023JCQN0728)。
文摘The subversive nature of information war lies not only in the information itself, but also in the circulation and application of information. It has always been a challenge to quantitatively analyze the function and effect of information flow through command, control, communications, computer, kill, intelligence,surveillance, reconnaissance (C4KISR) system. In this work, we propose a framework of force of information influence and the methods for calculating the force of information influence between C4KISR nodes of sensing, intelligence processing,decision making and fire attack. Specifically, the basic concept of force of information influence between nodes in C4KISR system is formally proposed and its mathematical definition is provided. Then, based on the information entropy theory, the model of force of information influence between C4KISR system nodes is constructed. Finally, the simulation experiments have been performed under an air defense and attack scenario. The experimental results show that, with the proposed force of information influence framework, we can effectively evaluate the contribution of information circulation through different C4KISR system nodes to the corresponding tasks. Our framework of force of information influence can also serve as an effective tool for the design and dynamic reconfiguration of C4KISR system architecture.
文摘僵尸网络(Botnet)是一种从传统恶意代码形态进化而来的新型攻击方式,为攻击者提供了隐匿、灵活且高效的一对多命令与控制信道(Command and Control channel,C&C)机制,可以控制大量僵尸主机实现信息窃取、分布式拒绝服务攻击和垃圾邮件发送等攻击目的。该文提出一种与僵尸网络结构和C&C协议无关,不需要分析数据包的特征负载的僵尸网络检测方法。该方法首先使用预过滤规则对捕获的流量进行过滤,去掉与僵尸网络无关的流量;其次对过滤后的流量属性进行统计;接着使用基于X-means聚类的两步聚类算法对C&C信道的流量属性进行分析与聚类,从而达到对僵尸网络检测的目的。实验证明,该方法高效准确地把僵尸网络流量与其他正常网络流量区分,达到从实际网络中检测僵尸网络的要求,并且具有较低的误判率。
文摘移动僵尸网络进行恶意扣费、泄露隐私信息等恶意行为,给移动用户构成了巨大隐患.通过构建实用的移动僵尸网络,可以更好地了解其工作机制,从而提出直接有效的防御策略.提出结合短信(SMS)和HTTP协议作为移动僵尸网络的命令与控制(Command and Control,C&C)的通信信道的设计方法,设计了一种移动僵尸程序HybirdBot.在减少消耗的同时确保命令信息能准确接收和高效执行,又能将僵尸网络流量隐藏在其他良性的HTTP流量中.实验结果表明,HybirdBot命令执行时间基本控制在1s以内,运行时CPU占用率只达1-2%,平均每条命令所产的流量也只有0.62kb.证明该移动僵尸网络具有高效性,隐匿性好而且消耗少,最后本文还提出了几种防御策略.
基金supported by the National Natural Science Foundation of China (71071159)
文摘The tracking, telemetry and command (TT&C) mission is extremely reliable for its characters of small time horizon and high redundancy. The combined forcing and failure biasing (CFFB) method that is usually used for simulating the unreliability of the highly dependable mission system seems not so efficient for the TT&C mission. The concept about the importance of failure transition is proposed based on the logical relationship between TT&C mission and its involved resources. Then, the importance is used for readjusting the transition rate of the failure transition when using the forcing and failure biasing during the simulation. Examples show that the improved CFFB method can evidently increase the occurrence of the TT&C mission failure event and decrease the sample variance. More redundancy of the TT&C mission leads to the improved CFFB method more efficient.
文摘AIM To investigate the role of bloodtransfusion in TT viral infection(TTV).METHODS We retrospectively studied serumsamples from 192 transfusion recipients whounderwent cardiovascular surgery and bloodtransfusion between July 1991 and June 1992.Allpatients had a follow-up every other week for atleast 6 months after transfusion.Eightyrecipients received blood before screeningdonors for hepatitis C antibody(anti-HCV),and112 recipients received screened blood.Recipients with alanine aminotransferase level】2.5 times the upper normal limit were testedfor serological markers for viral hepatitis A,B,C,G,Epstein-Barr virus and cytomegalovirus.TTV infection was defined by the positivity forserum TTV DNA using the polymerase chainreaction method.RESULTS Eleven and three patients,whoreceived anti-HCV unscreened and screened'blood,respectively,had serum ALT levels】90 IU/L.Five patients(HCV and TTV:1;HCV,HGV,and TTV:1;TTV:2;and CMV and TTV:1)were positive for TTV DNA,and four of them hadsero-conversion of TTV DNA.CONCLUSION TTV can be transmitted viablood transfusion.Two recipients infected byTTV alone may be associated with the hepatitis.However,whether TTV was the causal agentremains unsettled,and further studies arenecessary to define the role of TTV infection inchronic hepatitis.
文摘The whole airspace phased array telemetry,track and command(TT&C)system is regarded as the development tendency of next generation TT&C system,and the distribution of the antenna units and the beamforming technology have sparked wide interest in this field.A method for antenna distribution is proposed based on the linear subarrays technology.A symmetrical truncated cone conformal array is composed of the linear subarrays placed on the generatrix.The impact of truncated cone bottom radius and elevation angle on beamforming are studied and simulated.Simulation results verify the system design.
基金Supported by the National Natural Science Foundation of China(61401026)
文摘An interference mitigation for acquisition method,based on both energy center and spectrum symmetry detection,has been proposed as a possible solution to the problem of signal acquisition susceptibility to continuous-wave interference(CWI)in unified carrier telemetry,tracking,and command(TT&C)systems.With subcarrier modulation index as a priori condition,the existence of CWI is determined by comparing the energy center with the symmetric center.In the presence of interference,the interference frequency point is assumed and culled;sequentially,the spectral symmetry is used to verify whether the signal acquisition is realized.Theoretical analysis,simulations,and experimental results demonstrate that the method can realize the acquisition of the main carrier target signal with an interference-to-signal ratio of 31 dB,which represents an improvement over the existing continuous-wave interference mitigation for acquisition methods.