logo
    A network attack detection system of OpenStack cloud platform based on Elastic Stack
    0
    Citation
    0
    Reference
    10
    Related Paper
    Abstract:
    As an important platform to support cyberspace security technology verification, cyberspace attack and defense equipment performance testing, and cyberspace attack and defense rehearsal confrontation; the network security test platform plays an increasingly important role in the field of network security research. With the rapid development of cloud computing and big data, the network security test cloud platform shows the characteristics of explosive growth of data volume, among which the value of massive log data is particularly important. Through log analysis, abnormal events and behaviors can be found in a timely manner, but the traditional log detection technology appears to be incompetent for the analysis of massive log data, and the log detection and analysis technology based on Elastic Stack can realize real-time collection and retrieval of massive log data, and then realize effective detection and analysis of abnormal events in the network security test cloud platform.
    Keywords:
    Security Analysis
    Cyberspace has been defined as an infinite artificial world where humans navigate in information-based space and as ultimate computer-human interface. These original contributions take up the philosophical basis for cyberspace in virtual realities, basic communications principles, ramifications of cyberspace for future workplaces, and more.
    Virtual world
    Citations (1,011)
    Cyberspace and Cyberspace Operations are important to nation security.The thesis analyses the driving state and the cause of American Cyberspace development;discusses the cognition about Cyberspace and Cyberspace Operations;brings forward the countermeasure to remove the menace of Cyberspace.
    Countermeasure
    Citations (0)
    This paper briefly introduces the development of 3G network origin and characteristic, then focuses on the analysis of 3G network security risks and puts forward 3G network security principle and target, according to 3G network data security and identity authentication,the paper put forward the improvement suggestions .
    Security Analysis
    Citations (0)
    The authors consider contemporary definitions of cyberspace and explore the nature of crimes in an online environment. Through consideration of “meatspace” criminal activity and its history, they explore the similarities and differences between real world activity and cyberspace. Crime in cyberspace is discussed along with exploration of motivating factors and possible evidential properties of cyberspace entities. Issues affecting investigation, the ability to investigate, and which entities to investigate are considered.
    Cybercrime
    The research of security analysis needed a systemic security analysis model that was from the system resource and security factor of computer network.For the classification,rate and the main threaten of the security requirement,system devices,access privilege,host connection relation and vulnerability were analyzed,and the computer network attack from the point of view that the attacker's objective was to get privilege escalation was described.The computer system security analysis by fault tree and the network system security analysis by attack graph use the security analysis model.
    Security Analysis
    Vulnerability
    Security through obscurity
    Citations (10)
    This paper is a short reflection on the evolution of the meaning of the term cyberspace for geographers. We argue that the concept of cyberspace has become a rhizomatic one as spatial thinkers have unveiled its complex inner and outer networkings. While cyberspace was initially understood as a new open space ripe for exploration, its intricate connections with real space through the technological infrastructures that make cyberspace possible have led geographers to consider the multiple points of access and types of cyberspace. More recently, there has been renewed attention to the inner geographies of cyberspace and its cyberdivides have been exposed. We briefly retrace this evolution to argue that the way forward is to shift from an idea of cyberspace as a predefined space to a notion of cyberspatialities as ongoing spatial digital formations.
    Citations (9)
    The current status and trend of the concepts,evolution,organization and building on U.S.Cyberspace operations was summarized and analysed;discusses cyberspace components and meaning,cyberspace superiority framework,and cyberspace operation model and challenges;finally,brings forward the basic suggestions to developing our military cyberspace operations.The purpose of this paper is to offer references for the cyberspace strategy makers,technology researchers and software tool developers.
    Citations (0)
    In terms of recurring problems of in teachers ' cyberspace curriculum construction process,the paper studied the cyberspace curriculum construction. It introduced basic theory and basic principles in the process of building a cyberspace program based on the World University City cyberspace platforms,elaborated cyberspace program content and the building process,and gave a case of ASP. NET Technology cyberspace curriculum.
    Citations (0)