Simulation Research on Network Intrusion Prevention and Fluctuation Control System Based on Cloud Computing Architecture

Author(s):  
Ming Wei ◽  
Hui Yuan
Author(s):  
Collin T Blakley ◽  
Letitia W Li ◽  
Greg Eakman ◽  
Brent C Baker

Design and tradespace analysis of increasingly complex systems often require proprietary models from multiple industrial sources. These multi-partner collaborations require assurances that each company’s intellectual property will remain protected from unauthorized access or disclosure to competitors. In this paper, we present the security risks and considerations for these collaborations, and propose a cloud-based framework to address these concerns. The Engineering Resilient Systems (ERS) Cloud Computing Architecture (ECCA) system enables secure collaboration in the Department of Defense community, providing an infrastructure restricting access to connectable containerized assets: models and simulations, each of which remain isolated and maintained on the owner’s own cloud. ECCA further prevents unauthorized access to sensitive assets and infection by malicious media with an access control system supported by secure gRPC messaging and access agreements. We demonstrate the capability to connect disparate models for a simplified combat simulation and then how the new multi-model scenario enables additional capabilities in tradespace analysis.


Author(s):  
Xiangbing Zhao ◽  
Jianhui Zhou

With the advent of the computer network era, people like to think in deeper ways and methods. In addition, the power information network is facing the problem of information leakage. The research of power information network intrusion detection is helpful to prevent the intrusion and attack of bad factors, ensure the safety of information, and protect state secrets and personal privacy. In this paper, through the NRIDS model and network data analysis method, based on deep learning and cloud computing, the demand analysis of the real-time intrusion detection system for the power information network is carried out. The advantages and disadvantages of this kind of message capture mechanism are compared, and then a high-speed article capture mechanism is designed based on the DPDK research. Since cloud computing and power information networks are the most commonly used tools and ways for us to obtain information in our daily lives, our lives will be difficult to carry out without cloud computing and power information networks, so we must do a good job to ensure the security of network information network intrusion detection and defense measures.


2013 ◽  
Vol 846-847 ◽  
pp. 1608-1611 ◽  
Author(s):  
Hui Jie Ding

As more and more cars are in service, the traffic jam becomes a serious problem in our society. At the same time, more and more sensors make the cars more and more intelligent, and this promotes the development of Internet of things. Real time monitoring the cars will produce massive sensing data, the Cloud computing gives us a good manner to solve this problem. In this paper, we propose a traffic flow data collection and traffic signal control system based on Internet of things and the Cloud computing. The proposed system contains two main parts, sensing data collection and traffic status control subsystem.


Sign in / Sign up

Export Citation Format

Share Document