2022 Vol. 48, No. 2

Display Method:
Volume 48 Issue22022
iconDownload (125939) 618 iconPreview
Industry classification technology based on fastText algorithm
WU Zhen, RAN Xiaoyan, MIAO Quan, LIU Chunyan, ZHANG Dong, WEI Na
2022, 48(2): 193-198. doi: 10.13700/j.bh.1001-5965.2020.0402
Abstract:

With the rapid development of China's economy and the continuous improvement of technological innovation ability, efficient organization and classification information is the basis of providing personalized industry management and tracking analysis. According to the characteristics of industry infor...

Adaptive short text keyword generation model
WANG Yongjian, SUN Yaru, YANG Ying
2022, 48(2): 199-208. doi: 10.13700/j.bh.1001-5965.2020.0601
Abstract:

Keyword extraction has a great impact on text processing, and the accuracy and fluency of keyword recognition are the keys to the task. In order to effectively solve the problems such as inaccurate word division, mismatch between keywords and text topics, and multi-language mixing in the process of ...

Classification of network public opinion propagation pattern based on variational reasoning
TANG Hongmei, TANG Wenzhong, LI Ruichen, WANG Yanyang, WANG Lihong
2022, 48(2): 209-216. doi: 10.13700/j.bh.1001-5965.2020.0538
Abstract:

With the rapid development of online social media, the analysis of the dissemination mode of public opinion information has become a research hotspot.Aiming at the problem of low classification accuracy of small sample data multi-path generation in the classification task of the network public opini...

Fuzzing testing sample set optimization scheme based on heuristic genetic algorithm
WANG Zhihua, WANG Haofan, CHENG Manman
2022, 48(2): 217-224. doi: 10.13700/j.bh.1001-5965.2020.0422
Abstract:

As the most effective method of vulnerability mining at present, fuzzy testing not only is more capable of dealing with complex programs than other vulnerability mining techniques, but also has strong scalability. In the fuzzy testing with a large number of data, the input sample set has the problem...

Low redundancy feature selection method for Android malware detection
HAO Jingwei, PAN Limin, LI Rui, YANG Peng, LUO Senlin
2022, 48(2): 225-232. doi: 10.13700/j.bh.1001-5965.2020.0567
Abstract:

A low redundancy feature selection method for Android malware detection is proposed to solve the problem of feature redundancy caused by excessive attention to features with the same frequency distribution between classes. First, the method selects features with frequency distribution bias by Mann-W...

Traffic classification algorithm of Internet of things devices based on random forest
LI Ruiguang, DUAN Pengyu, SHEN Meng, ZHU Liehuang
2022, 48(2): 233-239. doi: 10.13700/j.bh.1001-5965.2020.0383
Abstract:

The traffic classification of Internet of things (IoT) devices is very important to the management of cyberspace assets. The classification technology based on statistical identification is a hot spot in current academic research. The previous algorithms were mainly based on the flow information to ...

Large-scale IoT malware analysis and classification method
HE Qinglin, WANG Lihong, LUO Bing, YANG Libin
2022, 48(2): 240-248. doi: 10.13700/j.bh.1001-5965.2020.0401
Abstract:

Recently, Internet of things (IoT) malware emerges in large numbers and attacks IoT devices in cyberspace. However, the family characteristics of IoT malwares are not obvious due to the open-source problem, a more fine-grained malware classification method is needed to solve the problems of advanced...

Data masking model for heterogeneous big data environment
TONG Lingling, LI Pengxiao, DUAN Dongsheng, REN Boya, LI Yangxi
2022, 48(2): 249-257. doi: 10.13700/j.bh.1001-5965.2020.0403
Abstract:

Due to the variety of data types and desensitization demand in different scenarios, traditional data masking methods cannot meet the user privacy protection requirements in the environment of big data. How to realize the accurate pointing and efficient desensitization of heterogeneous big data for d...

Malicious code detection based on heterogeneous information network
LIU Yashu, HOU Yueran, YAN Hanbing
2022, 48(2): 258-265. doi: 10.13700/j.bh.1001-5965.2020.0539
Abstract:

Malicious codes poses serious threats to network and information security. How to detect malware rapidly and how to eliminate and reduce the hazard caused by malware are important research topics. The paper presents a method to get dynamic features of malware using dynamic information and heterogene...

Optimal choice of order preserving encryption scheme in encrypted document ranking
ZHANG Jiuling, HUANG Daochao, SHEN Shijun
2022, 48(2): 266-272. doi: 10.13700/j.bh.1001-5965.2020.0414
Abstract:

Encrypting the documents before uploading them to the untrusted removable server is one of the ultimate solutions to protect the user privacy. As different encryption schemes give different ranking results, finding the order preserving encryption scheme that gives the best ranking result is the key ...

Application of space time regional economy visualization based on telecom big data analysis
LI Na, LIU Wenmin, MENG Fanrui, LIU Yan
2022, 48(2): 273-281. doi: 10.13700/j.bh.1001-5965.2020.0388
Abstract:

Currently, the number of mobile phone users in China has reached 1.59 billion. Under the huge population base, the telecom big data characteristics reflect the characteristics of crowd activities to a certain extent, which can reflect the development status of specific regions. The application of sp...

Malicious code clone detection technology based on deep learning
SHEN Yuan, YAN Hanbing, XIA Chunhe, HAN Zhihui
2022, 48(2): 282-290. doi: 10.13700/j.bh.1001-5965.2020.0400
Abstract:

Malicious code clone detection has become an effective way to analyze malicious code homology and advanced persistent threat (APT) attacks. In this paper, we collect samples of different APT organizations from public threat intelligence, and propose a deep learning based malicious code clone detecti...

Randomness of traffic data in TLS cipher suite
GUO Shuai, CHENG Guang
2022, 48(2): 291-300. doi: 10.13700/j.bh.1001-5965.2020.0390
Abstract:

Cipher suite is the cornerstone of transport layer security (TLS) to realize secure communication, which includes asymmetric cipher algorithm, symmetric cipher algorithm and message digest algorithm, among which symmetric cipher algorithm is used for data encryption in actual communication. Through ...

Weibo tendency analysis based on sentimental object recognition and sentimental rules
WANG Zechen, WANG Shupeng, SUN Liyuan, ZHANG Lei, WANG Yong, HAO Bingchuan
2022, 48(2): 301-310. doi: 10.13700/j.bh.1001-5965.2020.0404
Abstract:

Weibo contains a large number of information reflecting users' likes and dislikes, which is important for popular trend judgment, precision marketing, public opinion monitoring, etc. However, the existing methods tend to focus on the classification of Weibo sentiment. In order to solve the problem o...

User electricity consumption behavior mode analysis based on energy decomposition
LU Ruirui, YU Haiyang, YANG Zhen, LAI Yingxu, YANG Shisong, ZHOU Ming
2022, 48(2): 311-323. doi: 10.13700/j.bh.1001-5965.2020.0557
Abstract:

With the popularization of smart grids and the development of big data technology, more and more attention has been paid to the analysis of users' electricity consumption behavior through electricity consumption data. The existing energy decomposition methods cannot meet the high requirements for re...

A dynamic network threat evaluation method for smart grid embedded devices
LYU Zhuo, GUO Zhimin, CHEN Cen, MO Jiansong, CHANG Chaowen
2022, 48(2): 324-330. doi: 10.13700/j.bh.1001-5965.2020.0398
Abstract:

Due to the limited computing and storage resources, the smart grid embedded devices cannot deal with the network attacks effectively and the security assessment method is weak. In order to solve these problems, a dynamic network attack behavior evaluation method for smart grid embedded devices is pr...

Adversarial sample generation technology of malicious code based on LIME
HUANG Tianbo, LI Chengyang, LIU Yongzhi, LI Denghui, WEN Weiping
2022, 48(2): 331-338. doi: 10.13700/j.bh.1001-5965.2020.0397
Abstract:

Based on the research and analysis of machine learning technology to detect malicious code, a local interpretable model-agnostic explanations (LIME)-based black-box adversarial examples generation method is proposed to generate adversarial samples for any black-box malicious code classifier and bypa...

A method for filtering the attack pairs of adversarial examples based on attack distance
LIU Hongyi, FANG Yutong, WEN Weiping
2022, 48(2): 339-347. doi: 10.13700/j.bh.1001-5965.2020.0529
Abstract:

During the generation of black-box adversarial examples, an attack pair is usually specified, including a source example and a target example. The purpose is to let the generated adversarial example only have little norm difference from the source example, but it is recognized by the classifier as t...

Malware family classification method based on abstract assembly instructions
LI Yu, LUO Senlin, HAO Jingwei, PAN Limin
2022, 48(2): 348-355. doi: 10.13700/j.bh.1001-5965.2020.0568
Abstract:

The emergence of malware variants poses a great threat to network security. In malware family classification methods based on assembly instructions, the semantics of operands are closely related to the operating environment and difficult to extract, which leads to the lack of instruction semantics a...

Automatic poster synthesis system based on keywords
GUAN Shuaipeng, YU Haiyang, YANG Zhen, ZHOU Ming, LAI Yingxu
2022, 48(2): 356-368. doi: 10.13700/j.bh.1001-5965.2020.0552
Abstract:

The popularization of intelligence puts forward new requirements for image editing. As a way of transmitting information in the form of images, posters play an important role in daily life and work management. But the production of posters requires multi-element image synthesis. However, there is a ...