With the continuous development of communication technology, the integration of space-based, aerial-based, and ground-based networks has become an important trend in the development of future communication networks. However, this integration is characterized by high complexity and dynamic changes, facing security challenges that traditional ground mobile networks do not possess. This paper first introduces the architecture and characteristics of space-air-ground integrated networks, analyzes the security threats they face, including intra-domain risks and cross-domain risks. In response to these security challenges, this paper proposes a multi-domain network security architecture based on three fundamental security capabilities: trust, defense, and monitoring. This architecture achieves intelligent and autonomous security decision-making and control for multi-domain networks, as well as cross-domain collaborative security protection, thereby effectively ensuring the communication security of space-air-ground integrated networks.
With the widespread application of 5G networks, next-generation mobile communication systems are actively being studied. In order to solve the problem of difficult coverage of high-frequency signals, researchers have proposed a network architecture called Proximity Network with Radio Access Network (PRAN). Multiple wireless devices are connected to each other through wireless channels, forming a self-organizing network topology. However, the PRAN system currently only judges the security of devices through authorization, which has the drawback of clear risk classification. This article proposes a security level classification method for PRAN, which uses logarithmic functions and network parameters of devices in the PRAN system for security calculation. Then, the security score is calculated based on the coefficients of different roles in the PRAN system. The experimental results show that the method proposed in this paper can achieve a relatively unified security level classification method, effectively distinguishing between normal and abnormal devices, and preventing differences in security levels between different roles.
Anomal flow detection is an important cornerstone in the field of network security, and has been widely used in various fields. Traditional anomal flow detection schemes are usually based on statistical methods for flow detection. However, with the rapid development of artificial intelligence technology, more and more anomal flow detection schemes are mainly based on machine learning and deep learning, and their application scope is also becoming more and more extensive. Due to the shortcomings of a single model, research on flow detection using multiple models is increasing. Researchers hope to use multiple model schemes to improve the performance of flow detection, but in the use of multiple models, there are many problems such as the number of models and the difficulty of selecting multiple combinations. Based on the F2HDM (Filtering 2-stage Hybrid Detection Method) in multiple model schemes, this paper conducts a mathematical analysis of it, studies model selection issues in different scenarios, proposes a method to calculate the performance of multiple models based on the parameters of a single model, and selects the appropriate combination of anomal flow detection multiple models according to the desired scenario. Finally, we demonstrate through experiments that the selection method proposed in this article has high accuracy.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.