Search results for: Shaohua Li
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3

Search results for: Shaohua Li

3 Improvement on the Specific Activities of Immobilized Enzymes by Poly(Ethylene Oxide) Surface Modification

Authors: Shaohua Li, Aihua Zhang, Kelly Zatopek, Saba Parvez, Andrew F. Gardner, Ivan R. CorrĂȘa Jr., Christopher J. Noren, Ming-Qun Xu

Abstract:

Covalent immobilization of enzymes on solid supports is an alternative approach to biocatalysis with the added benefits of simple enzyme removal, improved stability, and adaptability to automation and high-throughput applications. Nevertheless, immobilized enzymes generally suffer from reduced activities compared to their soluble counterparts. One major factor leading to activity loss is the intrinsic hydrophobic property of the supporting material surface, which could result in the conformational change/confinement of enzymes. We report a strategy of utilizing flexible poly (ethylene oxide) (PEO) moieties as to improve the surface hydrophilicity of solid supports used for enzyme immobilization. DNA modifying enzymes were covalently conjugated to PEO-coated magnetic-beads. Kinetics studies proved that the activities of the covalently-immobilized DNA modifying enzymes were greatly enhanced by the PEO modification on the bead surface.

Keywords: immobilized enzymes, biocatalysis, poly(ethylene oxide), surface modification

Procedia PDF Downloads 276
2 Hierarchical Filtering Method of Threat Alerts Based on Correlation Analysis

Authors: Xudong He, Jian Wang, Jiqiang Liu, Lei Han, Yang Yu, Shaohua Lv

Abstract:

Nowadays, the threats of the internet are enormous and increasing; however, the classification of huge alert messages generated in this environment is relatively monotonous. It affects the accuracy of the network situation assessment, and also brings inconvenience to the security managers to deal with the emergency. In order to deal with potential network threats effectively and provide more effective data to improve the network situation awareness. It is essential to build a hierarchical filtering method to prevent the threats. In this paper, it establishes a model for data monitoring, which can filter systematically from the original data to get the grade of threats and be stored for using again. Firstly, it filters the vulnerable resources, open ports of host devices and services. Then use the entropy theory to calculate the performance changes of the host devices at the time of the threat occurring and filter again. At last, sort the changes of the performance value at the time of threat occurring. Use the alerts and performance data collected in the real network environment to evaluate and analyze. The comparative experimental analysis shows that the threat filtering method can effectively filter the threat alerts effectively.

Keywords: correlation analysis, hierarchical filtering, multisource data, network security

Procedia PDF Downloads 172
1 Multi-Dimension Threat Situation Assessment Based on Network Security Attributes

Authors: Yang Yu, Jian Wang, Jiqiang Liu, Lei Han, Xudong He, Shaohua Lv

Abstract:

As the increasing network attacks become more and more complex, network situation assessment based on log analysis cannot meet the requirements to ensure network security because of the low quality of logs and alerts. This paper addresses the lack of consideration of security attributes of hosts and attacks in the network. Identity and effectiveness of Distributed Denial of Service (DDoS) are hard to be proved in risk assessment based on alerts and flow matching. This paper proposes a multi-dimension threat situation assessment method based on network security attributes. First, the paper offers an improved Common Vulnerability Scoring System (CVSS) calculation, which includes confident risk, integrity risk, availability risk and a weighted risk. Second, the paper introduces deterioration rate of properties collected by sensors in hosts and network, which aimed at assessing the time and level of DDoS attacks. Third, the paper introduces distribution of asset value in security attributes considering features of attacks and network, which aimed at assessing and show the whole situation. Experiments demonstrate that the approach reflects effectiveness and level of DDoS attacks, and the result can show the primary threat in network and security requirement of network. Through comparison and analysis, the method reflects more in security requirement and security risk situation than traditional methods based on alert and flow analyzing.

Keywords: DDoS evaluation, improved CVSS, network security attribute, threat situation assessment

Procedia PDF Downloads 181