共查询到20条相似文献,搜索用时 0 毫秒
1.
2.
基于攻击意图的复合攻击预测方法研究 总被引:1,自引:0,他引:1
入侵检测系统仅能检测到攻击,但不能预测攻击者下一步的攻击.分析了基于攻击行为预测方法的不足,提出了一种基于攻击意图的复合攻击预测方法.该方法使用抽象的攻击意图表示复合攻击,采用扩展的有向图表达攻击意图间的逻辑关系,建立了攻击匹配的攻击意图框架,在复合攻击预测算法中引入了攻击检测度和攻击匹配度两个概念.最后,通过实验验证了该方法的有效性. 相似文献
3.
4.
提出了一种新的分组密码通用的基于碰撞模型的分组密码代数旁路分析方法—代数功耗碰撞攻击,将代数攻击与功耗碰撞攻击结合,首先利用代数分析方法建立密码算法等效布尔代数方程组;然后通过功耗攻击手段获取密码加密过程运行时泄露的功耗信息,经分析转化为加密过程碰撞信息,并表示为关于加密中间状态变元的代数方程组;最后使用CryptoMiniSAT解析器求解方程组恢复密钥。应用该方法对在8位微控制器上实现的PRESENT密码进行了实际攻击,实验结果表明,代数攻击基础上引入额外的代数方程组,可有效降低方程组求解的复杂度;PRESENT易遭受此类代数功耗攻击的威胁,明密文已知,以4个样本全轮碰撞或8个样本部分轮碰撞信息成功获取PRESENT 80bit完整密钥。此外,文中分析方法也可为其它分组密码功耗碰撞分析提供一定思路。 相似文献
5.
6.
Fault attack represents one of the serious threats against Java Card security. It consists of physical perturbation of chip components to introduce faults in the code execution. A fault may be induced using a laser beam to impact opcodes and operands of instructions. This could lead to a mutation of the application code in such a way that it becomes hostile. Any successful attack may reveal a secret information stored in the card or grant an undesired authorisation. We propose a methodology to recognise, during the development step, the sensitive patterns to the fault attack in the Java Card applications. It is based on the concepts from text categorisation and machine learning. In fact, in this method, we represented the patterns using opcodes n-grams as features, and we evaluated different machine learning classifiers. The results show that the classifiers performed poorly when classifying dangerous sensitive patterns, due to the imbalance of our data-set. The number of dangerous sensitive patterns is much lower than the number of not dangerous patterns. We used resampling techniques to balance the class distribution in our data-set. The experimental results indicated that the resampling techniques improved the accuracy of the classifiers. In addition, our proposed method reduces the execution time of sensitive patterns classification in comparison to the SmartCM tool. This tool is used in our study to evaluate the effect of faults on Java Card applications. 相似文献
7.
许多网络攻击都基于ICMP协议。本文首先介绍ICMP协议,接着探究了常见的基于ICMP的网络攻击的原理,最后提出防火墙应对方案以防止和减轻这种攻击所造成的危害。 相似文献
8.
针对常规的对芯片和系统的物理攻击,尤其是侵入式解剖攻击,提出了一种多种检测机制耦合的物理安全防护系统,该系统包括功能模块、检测模块和响应模块.关键的检测模块包括由分布电阻网络、压力感应模块、光照感应模块构成的物理安全边界以及由温度感应模块构成的异常检测模块.基于现有的系统构成条件,利用印制电路板实现了便于展示和测试的安全防护系统原型.对原型感应模块进行了功能测试,对分布电阻网络检测方案进行了测试评估,分析了检测机制的耦合作用.原型系统能够对多种常见攻击手段做出有效的防护,并保证一定的有效性. 相似文献
9.
10.
一种基于模糊关联规则挖掘的攻击识别系统 总被引:1,自引:0,他引:1
降低攻击识别中的漏报率和误报率是现在一个急需解决的问题。论文分析了攻击识别的需求与模糊关联规则挖掘的有关概念,并且以此为基础构建了一个攻击识别系统。该系统不但能够很好地满足攻击识别的要求,而且还能同时对异常攻击和滥用攻击进行识别,并且在很大程度上降低了攻击识别中的漏报率和误报率,极大地增强了信息系统的生存力。 相似文献
11.
This paper presents a novel image watermark scheme based on the characteristics of amplitude attacks. First of all, the analysis of amplitude attacks is performed. Then the amplitude attacks are categorized into three types: positive attack, negative attack and random attack. Finally, based on these attack types, we design three corresponding detectors. The detectors remove the unreliable discrete cosine transform (DCT) coefficients in the attacked image so that only reliable coefficients are used for the extraction of the watermark embedded. The experimental results indicate that the proposed technique improves robustness significantly without sacrificing the false alarm rate. 相似文献
12.
用于版权保护的图像数字水印方案 总被引:1,自引:0,他引:1
指出和论述了现有私有水印方案在版权保护方面存在的重要缺陷——不能防止伪造攻击;提出一个旨在防止伪造攻击的水印方案,并从理论上论证了其安全性。实验证明该方案具有可行性、鲁棒性和安全性。 相似文献
13.
DNS服务是一项基础网络服务,在Internet服务中占据着非常重要的地位,其安全性至关重要。本文从DNS的工作原理入手,介绍DNS的几种常见攻击方式,针对性地提出了域名服务器自身安全、事务签名、DNS安全扩展(DNSSEC)等检测和防御的方法。 相似文献
14.
A hybrid learning algorithm for multilayered perceptrons (MLPs) and pattern-by-pattern training, based on optimized instantaneous learning rates and the recursive least squares method, is proposed. This hybrid solution is developed for on-line identification of process models based on the use of MLPs, and can speed up the learning process of the MLPs substantially, while simultaneously preserving the stability of the learning process. For illustration and test purposes the proposed algorithm is applied to the identification of a non-linear dynamic system. 相似文献
15.
针对传统方法难以实时有效地检测分布式拒绝服务攻击(DDoS)的问题,通过DDoS攻击的基本特征分析,从理论上严格区分了DDoS攻击流和正常突发流,并且在此基础上提出了一种基于特征参数相关性的DDoS攻击检测算法.该算法能在早期检测出DDoS攻击流,而这时的DDoS攻击包特征并不明显,并且该算法能有效地区分DDoS攻击流和正常的突发流.实验结果表明了该算法的有效性和精确性. 相似文献
16.
17.
In this paper, a relevance vector machine based infinite decision agent ensemble learning (RVMIdeal) system is proposed for the robust credit risk analysis. In the first level of our model, we adopt soft margin boosting to overcome overfitting. In the second level, the RVM algorithm is revised for boosting so that different RVM agents can be generated from the updated instance space of the data. In the third level, the perceptron Kernel is employed in RVM to simulate infinite subagents. Our system RVMIdeal also shares some good properties, such as good generalization performance, immunity to overfitting and predicting the distance to default. According to the experimental results, our proposed system can achieve better performance in term of sensitivity, specificity and overall accuracy. 相似文献
18.
19.
基于攻击树的木马检测方法 总被引:1,自引:0,他引:1
木马是以获取主机控制权和窃取信息为主要目的恶意程序,对网络安全和信息安全造成极大危害.研究并总结了木马攻击行为的规律,提出了一种通过静态分析PE文件采发现木马的方法.对现有的攻击树模型进行改进,设计了扩展攻击树模型,以此对木马攻击中常见的危险系统调用序列进行建模,将分析PE文件得到的API调用集合与建模得到的攻击树作匹配,来预测程序中可能存在的攻击行为,并能有效地区分木马文件和正常文件. 相似文献
20.
唐林 《网络安全技术与应用》2014,(1):23-24
本文从概念、原理以及日常生活中的运用对Oracle web环境注射技术进行阐述,从一个web安全的角度来看如何入侵一台被防火墙防护的Oracle数据库,对一些入侵技术做了web入侵上的总结和延伸。尽量展现一些SQL注射入侵的思路以及如何利用数据库的一些特性,在web上做最大的入侵与防护。 相似文献