active defense
Recently Published Documents


TOTAL DOCUMENTS

245
(FIVE YEARS 100)

H-INDEX

20
(FIVE YEARS 3)

2022 ◽  
Vol 67 (1) ◽  
pp. 407-436
Author(s):  
Patrick Abbot

All social insects defend their colony from predators, parasites, and pathogens. In Oster and Wilson's classic work, they posed one of the key paradoxes about defense in social insects: Given the universal necessity of defense, why then is there so much diversity in mechanisms? Ecological factors undoubtedly are important: Predation and usurpation have imposed strong selection on eusocial insects, and active defense by colonies is a ubiquitous feature of all social insects. The description of diverse insect groups with castes of sterile workers whose main duty is defense has broadened the purview of social evolution in insects, in particular with respect to caste and behavior. Defense is one of the central axes along which we can begin to organize and understand sociality in insects. With the establishment of social insect models such as the honey bee, new discoveries are emerging regarding the endocrine, neural, and gene regulatory mechanisms underlying defense in social insects. The mechanisms underlying morphological and behavioral defense traits may be shared across diverse groups, providing opportunities for identifying both conserved and novel mechanisms at work. Emerging themes highlight the context dependency of and interaction between factors that regulate defense in social insects.


2022 ◽  
Vol 2022 ◽  
pp. 1-15
Author(s):  
Yinghai Zhou ◽  
Yi Tang ◽  
Ming Yi ◽  
Chuanyu Xi ◽  
Hai Lu

With the development of advanced persistent threat (APT) and the increasingly severe situation of network security, the strategic defense idea with the concept of “active defense, traceability, and countermeasures” arises at the historic moment, thus cyberspace threat intelligence (CTI) has become increasingly valuable in enhancing the ability to resist cyber threats. Based on the actual demand of defending against the APT threat, we apply natural language processing to process the cyberspace threat intelligence (CTI) and design a new automation system CTI View, which is oriented to text extraction and analysis for the massive unstructured cyberspace threat intelligence (CTI) released by various security vendors. The main work of CTI View is as follows: (1) to deal with heterogeneous CTI, a text extraction framework for threat intelligence is designed based on automated test framework, text recognition technology, and text denoising technology. It effectively solves the problem of poor adaptability when crawlers are used to crawl heterogeneous CTI; (2) using regular expressions combined with blacklist and whitelist mechanism to extract the IOC and TTP information described in CTI effectively; (3) according to the actual requirements, a model based on bidirectional encoder representations from transformers (BERT) is designed to complete the entity extraction algorithm for heterogeneous threat intelligence. In this paper, the GRU layer is added to the existing BERT-BiLSTM-CRF model, and we evaluate the proposed model on the marked dataset and get better performance than the current mainstream entity extraction mode.


Author(s):  
Vladimir Zolotovskiy ◽  

Introduction. The purpose of the article is to determine the specifics of the Byzantine war strategy in Asia Minor. A qualitative military and political characteristics of the main military expeditions to the eastern borders are crucial for the disclosure of this problem. From this aspect, the study addresses the following issues: defining of the role of the eastern military campaigns in the complex of military-strategic measures on the state scale; characteristics of the features the armed forces used, as well as the tasks solved during military expeditions to Asia Minor; disclosure of the features of military-technical measures to ensure the security of Byzantium eastern borders. Methods. Critical use of elements of civilizational, formational and systemic approaches is the methodological basis of this study. It should be noted that the use of a systematic approach in the analysis of the Byzantine troops combat practice in east direction, allows to determine the strategic objectives of military expeditions in Asia Minor, to reveal the logic of warfare in the eastern theater, to determine the functional purpose of military-technical measures. Analysis and Results. The study reveals the strategic concept of Byzantium armed forces military operations during the reign of the first Palaeologus on the Asia Minor territory. Analysis of combat practice allows us to conclude that the strategic priority of the western and northwestern directions, which required the use of the most combat-ready troops consisting of mercenaries during the reign of Michael VIII, determined the need to use the Byzantine troops at the eastern borders of the empire. TheByzantine army was episodically involved in major defensive expeditions to the borders of the empire. We determined that the purpose of these campaigns is to stop the advance of enemy armies and their subsequent expulsion from the empire. This logic of military operations does not mean the loss of strategic initiative at the eastern direction. The strategy of passive defense which determined the nature of the military confrontation in the Asia Minor region was ensured by the creation of a garrison system, or a line of fortresses, on the eastern borders of the empire. Fortification activities of Michael VIII and Andronikos II in 1280–1282 temporarily stopped the advance of the Turkish troops. However, natural factors and the intensification of the economic crisis at the end of the 13th century made it impossible to preserve the defensive line located along the banks of the rivers that served as the borders of the Byzantine state. In addition, the strengthening of the military-political power of the emirates of Menteşe, Aydinoglu and Osman led to the loss of the initiative by the Byzantine troops and, as a result, the reduction of the Asia Minor territories of the empire. In an effort to change the situation, Andronicus II proceeded to implement an active defense strategy.


2021 ◽  
Vol 2021 ◽  
pp. 1-9
Author(s):  
Yanhong Shang ◽  
Jing Zhang

In response to the continuous development of computer science and multimedia technology, many problems related to computer multimedia security are gradually exposed in the development. Through the existence of hidden dangers of computer multimedia security, a computer is constructed based on the network security active defense model. For a multimedia security protection system, select four modules in the system for design and description. Finally, the experimental results show that the system designed in this study can realize the security protection of computer multimedia, and the system is simple to operate and has strong practicability and meets the expected design effect.


2021 ◽  
Vol 2021 ◽  
pp. 1-24
Author(s):  
Ya Gao ◽  
Zhenling Wang

Network attacks show a trend of increased attack intensity, enhanced diversity, and more concealed attack methods, which put forward higher requirements for the performance of network security equipment. Unlike the SDN (software defined network) switch with a fixed-function data plane, switches with programmable data planes can help users realize more network protocols. Programming Protocol-independent Packet Processors (P4) is proposed to define the operations of the data plane and to implement user’s applications, e.g., data center networks, security, or 5G. This paper provides a review of research papers on solving network security problems with P4-based programmable data plane. The work can be organized into two parts. In the first part, the programming language P4, P4 program, architectures, P4 compilers, P4 Runtime, and P4 target are introduced according to the workflow model. The advantages of P4-based programmable switching in solving network security are analyzed. In the second part, the existing network security research papers are divided into four parts according to the perspectives of passive defense, active defense, and combination of multiple technologies. The schemes in each category are compared, and the core ideas and limitations are clarified. In addition, a detailed comparison is made for the research on the performance of P4 targets. Finally, trends and challenges related to the P4-based programmable data plane are discussed.


2021 ◽  
Author(s):  
Enguo Wu ◽  
Long Liu ◽  
Mingqi Zhu ◽  
Huiqin Wu ◽  
Qinghua Yang ◽  
...  

Broomcorn millet smut caused by the fungus Anthracocystis destruens is one of the most destructive diseases in broomcorn millet production. The life cycle of A. destruens and host defense responses against A. destruens remain elusive. Here we investigated the disease symptom development and the parasitic process of A. destruens as well as the ultrastructure of the host-pathogen interface. The results showed that there are four typical symptoms of broomcorn millet smut, which are blackfly, cluster leaves, hedgehog head and incomplete fruiting. A. destruens colonizes all tissues of broomcorn millet but only produces teliospores in the inflorescence. After infection, A. destruens proliferates in the host likely in a systemic manner. Ultrastructural study of the infected inflorescence showed that the pathogen grows intercellularly and intracellular within the host. The host active defense response against pathogen invasion, includes host secrets callose analogs and highly electron-dense deposits to prevent pathogen infection.


2021 ◽  
Vol 2108 (1) ◽  
pp. 012065
Author(s):  
Liandong Chen ◽  
Tao Yang ◽  
Gang Li ◽  
Xin Liu ◽  
Ning Lu ◽  
...  

Abstract Nowadays, most security systems mainly use firewall, intrusion detection, virus killing and other technologies to defend against external attacks. This passive defense mode has low efficiency and high false positive rate, and active defense technology can solve these problems to the greatest extent. At present, the intelligent substation is in the development stage with weak security. After a large number of terminals are connected, although the operation efficiency of the whole station is improved, it also brings more risks. This paper takes the access security of terminal equipment in intelligent substation as the research object. By mining the security vulnerabilities of substation, an active defense method based on trusted computing is proposed, the applicability and efficiency of trusted computing technology in the field of substation active defense are proved and the effectiveness of the method is verified to realize the trust guarantee of the whole process of terminal access to intelligent substation.


Sign in / Sign up

Export Citation Format

Share Document