Entity

Time filter

Source Type


Yan J.,CAS Institute of Software | Ying L.-Y.,CAS Institute of Software | Liu H.-F.,Beijing Information Security Test and Evaluation Center | Su P.-R.,CAS Institute of Software | Feng D.-G.,CAS Institute of Software
Ruan Jian Xue Bao/Journal of Software | Year: 2014

Network measurement is the foundation for the in-depth research on P2P network. It's a prerequisite for the P2P protocol design, shared content searching, situational awareness as well as research on the security of P2P network. In structured P2P network with decentralized peer to peer relationship, high dynamics and unpredictable instantaneous disturbance, achieving highly accurate and near-complete information retrieval is much more difficult. This paper formalizes the search (or crawl) process of structured P2P network, studies the relationship between the node's route spreadness in the whole network and the query response rate in the midst of crawling, derives some improved search strategies from the knowledge of historic measurements and characteristics of specific P2P network, and proposes a improved search method with much lower bandwidth consumption, fast crawling speed as well as relatively high coverage of nodes in structured peer-to-peer network. KAD network is among the few of structured P2P networks that are extensively deployed. This research mainly concentrates on KAD network and develops a search tool called KadCrawler, upon which large amounts of measurements and analysis are conducted. The result shows that the proposed method is both feasible and effective. Lastly, an analysis on the topology and phenomenon of ID repetition reveals that KAD network has changed significantly over the years. © 2014 ISCAS.


Tang Y.,Henan Polytechnic University | Wang Z.,Henan Polytechnic University | Zhang W.,Henan Polytechnic University | Liu H.,Beijing Information Security Test and Evaluation Center | Guo Y.,Beijing University of Posts and Telecommunications
Shuju Caiji Yu Chuli/Journal of Data Acquisition and Processing | Year: 2014

Randomness tests of cryptographic algorithm is analyzed. In order to test and identify Zigbee protocol security of cryptographic algorithm in the internet of things (IOT), test modes are organized and divided combining with the characteristics of Zigbee networks and binary matrix rank theory test, and randomness tests method of Zigbee protocol are proposed based on matrix probability test. The method solves the one-sidedness of binary matrix rank test to simply judge random sequence by linear correlation. It can determine whether the Zigbee protocol encryption mechanism and encryption strength are implemented or not. Simulation results show that this algorithm has less errors, and higher reliability, which is much more convincing. The proposed method provides theoretical and practical guidance for information security evaluation of IOT. ©, 2014, Nanjing University of Aeronautics an Astronautics. All right reserved.


Liu H.,Beijing Information Security Test and Evaluation Center | Liang H.,Beijing University of Posts and Telecommunications | Zhang X.,Beijing Information Security Test and Evaluation Center | Zhao Q.,Beijing University of Posts and Telecommunications | Wang L.,Beijing University of Posts and Telecommunications
Electronics, Communications and Networks IV - Proceedings of the 4th International Conference on Electronics, Communications and Networks, CECNet2014 | Year: 2015

The security of the Operating System (OS) is the basis of a complex computer system. OS used in key institutions of government and economics must be tested and certified according to the national/international standards. Several security standards and criteria related to operating system security are analyzed. Following with the standards and criteria, a test and evaluation method that combines static and dynamic test techniques is proposed. By creating and managing target properties database, test samples database, knowledge database and task database, an evaluation system is designed and implemented, which can make the test and evaluation of operating system functions automatic and effective. Experiments show that our system can reduce the workload of test and evaluation and keep the objectivity and authority. © 2015 Taylor & Francis Group, London.


Tang Y.,Henan Polytechnic University | Zhao W.,Henan Polytechnic University | Liang B.,Beijing Information Security Test and Evaluation Center | Zhao Z.,Beijing Information Security Test and Evaluation Center
Nanjing Li Gong Daxue Xuebao/Journal of Nanjing University of Science and Technology | Year: 2015

In order to effectively identify and test the encryption measures of ZigBee protocol, this paper studies secure working mode with ZigBee protocol and proposes a new security testing method based on randomness detection. This method synthetically considers the randomness of test sequences and test effectiveness, and uses the typical randomness detection algorithm to construct a reasonable testing program. By analyzing the characteristics of data frame structure in ZigBee network layer and application layers and testing ZigBee protocol data of different encryption mechanisms, this paper can effectively identify whether the transmission data are encrypted or not. By analyzing the encryption positions of load byte data, this paper can determine the encryption level of the ZigBee protocol data. The experimental results show that this method can accurately identify whether the ZigBee protocol data are encrypted and use the encryption level and can effectively test the encryption strength. ©, 2015, Nanjing University of Science and Technology. All right reserved.


Liu G.,Beijing Information Security Test and Evaluation Center | Qian X.,Beijing Information Security Test and Evaluation Center | Yan T.,Beijing Information Security Test and Evaluation Center | Huang S.,Beijing Information Security Test and Evaluation Center
Advances in Intelligent Systems and Computing | Year: 2013

Problems of current method for measuring firewall throughput are analyzed, and a new method for measuring firewall throughput is given. Samples are measured by the two methods, the results are compared, and the advantages of the new method are reached. © 2013 Springer-Verlag.

Discover hidden collaborations