首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
代码注入攻击是应用程序面临的一种主要安全威胁,尤其是Web应用程序,该种攻击源于攻击者能够利用应用程序存在的漏洞/后门,向服务器端注入恶意程序并执行,或者利用应用程序对用户输入的参数缺乏验证和过滤,造成输入作为恶意程序执行,从而达到攻击目的。源程序分析和输入规则匹配等现有防御方法在面对代码注入攻击时都存在着固有缺陷,为了提高Web应用程序对于代码注入攻击的防御性,提出一种基于指令集随机化的抗代码注入方法,该防御方法不依赖于攻击者采用何种攻击方式,能够抵御未知的代码注入攻击。基于该技术及动态、冗余构造方法,设计一套原型系统,采用广义随机Petri网(Generalized Stochastic Petri Net,GSPN)建模计算,攻击者即使在获得随机化方法先验知识的情况下也极难突破系统的防御机制。尽管该方法需要对应用程序源代码进行随机化变换,但处理过程是完全自动化和具有普适性的,通过实验和现网测试表明该方法能够有效抵御大部分代码注入攻击,实现了对攻击的主动防御。  相似文献   

2.
Recently, steganalytic methods based on deep learning have achieved much better performance than traditional methods based on handcrafted features. However, most existing methods based on deep learning are specially designed for one image domain (i.e., spatial or JPEG), and they often take long time to train. To make a balance between the detection performance and the training time, in this paper, we propose an effective and relatively fast steganalytic network called US-CovNet (Universal Steganalytic Covariance Network) for both {the} spatial and JPEG domains. To this end, we carefully design several important components of {US-CovNet} that will significantly affect the detection performance, including the high-pass filter set, the shortcut connection and the pooling {layer}. Extensive experimental results show that compared with the current best steganalytic networks (i.e., SRNet and J-YeNet), {US-CovNet} can achieve the state-of-the-art results for detecting spatial steganography and have competitive performance for detecting JPEG steganography. For example, the detection accuracy of US-CovNet is at least 0.56% higher than that of SRNet in the spatial domain. In the JPEG domain, US-CovNet performs slightly worse than J-YeNet in some cases with the degradation of less than 0.78%. However, the training time of US-CovNet is significantly reduced, which is less than 1/4 and 1/2 of SRNet and J-YeNet respectively.  相似文献   

3.
赵艳丽  王兴 《计算机应用》2013,33(4):1074-1076
针对当前基于JPEG图像的典型隐写算法,基于离散余弦变换(DCT)域分块内及分块间相邻系数之间的相关性进行分析,通过将相邻三个系数的中间位置的系数作为条件,统计两边系数的条件分布概率矩阵,将提取的所得矩阵作为隐写检测敏感特征,提出了一种基于DCT系数双边转移概率分布的JPEG图像隐写检测算法。实验结果表明,在不同嵌入率下,该算法的检测性能均优于已有检测算法。  相似文献   

4.
为了提高传统基于奇异值变换(SVD)的数字水印抗几何攻击能力,提出一种在小波变换域将Radon变换和奇异值变换相结合的抗旋转攻击鲁棒性水印算法。将宿主图像进行小波变换,对变换后的低频子带进行奇异值分解,将经过仿射变换置乱后的二值水印图像嵌入到奇异值中。在水印嵌入操作上采用了奇偶量化嵌入算法从而实现了二值水印图像在水印检测时的盲提取;同时在水印检测之前,利用Radon变换检测算法对待检测图像进行几何校正,然后提取水印信息。实验结果表明,该算法对于噪声感染、滤波、JPEG压缩等常规信号处理的鲁棒性优于传统的基于SVD的数字水印算法,同时对于旋转几何变换具有很好的鲁棒性。  相似文献   

5.
In this paper, we present a simple and robust watermarking scheme for color images. The scheme is based on the square-root-modulus technique employed in the integer wavelet domain, which allows a large number of data bits to be embedded in a host image. Simulations confirmed that marked images generated by the proposed scheme are tolerant to various attacks such as blurring, brightness, contrast, cropping, edge sharpening, inversion, JPEG/JPEG2000 compressions, noise-additions, and truncation. Additionally, the payload of the proposed method is significantly larger than that of existing watermarking techniques and the resulting perceived quality is not bad. Because the code is quite simple, it is suitable for the proposed method implemented in the mobile equipments or smart devices.  相似文献   

6.
目的 针对奇异值分解算法存在的对角线失真、虚警错误等问题,引入一个寻找最抗攻击缩放比例的参数,提出基于增强奇异值分解的零水印算法。方法 首先将离散小波变换作用于原始图像,对分离出的低频逼近子图进行不重叠分块,对分块后的低频逼近子图作离散余弦变换得到低频系数矩阵,再分别对每个块矩阵进行增强奇异值分解,将得到的最大奇异值与最大奇异值均值作比较构成特征向量;然后对水印图像进行Arnold变换和Logistic映射得到置乱加密后的水印图像;最后将特征向量和置乱加密后的水印图像分别作为细胞神经网络的起始值和控制输入值,通过设定细胞神经网络的反馈模板、控制模板以及阈值来确定具体的可逆逻辑运算。经过可逆逻辑运算处理后的细胞神经网络输出图像即为零水印的注册图像。将注册图像保存到认证中心以证明对图像作品的版权。结果 在JPEG压缩、噪声、滤波、旋转以及剪切等各种攻击下,提取的水印和原始水印的归一化相关值都在96%以上,算法平均运行时间为2.389 s,性能较高。结论 通过利用参数对奇异值矩阵进行调整的方法,不仅增强了算法的鲁棒性,而且解决了奇异值分解(SVD)出现的对角线失真和虚警错误问题。同时通过结合零水印的思想,解决了传统水印算法需在载体图像中嵌入水印而导致的水印不可见性与鲁棒性之间的矛盾。  相似文献   

7.
孙子文  张炎棋 《控制与决策》2019,34(11):2323-2329
无线通信网络的脆弱性使得工业信息物理系统易遭受各类网络攻击.为了更深入地了解不同网络攻击的特征进而建立有效的防御措施,构建一种线性时不变离散系统的工业信息物理系统结构;深入研究信息物理系统攻击者攻击空间及攻击者攻击模型,采用控制理论方法研究攻击空间模型的模型知识、披露资源和破坏资源的数学表达;对拒绝服务攻击、重放攻击、虚假数据注入攻击3种典型网络攻击的基本特性,以及对应攻击下攻击模型的表现形式进行分析.通过Simulink/Truetime仿真工具对破坏性和隐蔽性性能进行仿真实验.结果表明,所研究的攻击空间模型及攻击者攻击模型能够有效地描述网络攻击的攻击特性.  相似文献   

8.
小波用于基于遥感影像特征的自适应二维盲水印算法   总被引:4,自引:0,他引:4  
文章提出了一个有效的基于遥感影像特征的自适应二维盲水印算法。该算法使用灰度图像作为水印,将水印灰度图像进行Arnold置乱加密和小波压缩后,利用相邻特征平均值和奇偶判决法嵌入遥感影像的二阶小波变换域中所选择的子带上,且水印检测不需要原始遥感影像。攻击测试和实验结果表明,该算法具有较好的透明性,强壮性,以及水印检测结果准确,算法复杂度低等优点,对如JPEG有损压缩、中值滤波、附加噪声、伸缩、裁剪、旋转、几何变换、Stirmark攻击等各种影像处理的攻击都具有较强的鲁棒性;且嵌入水印后基本不会影响遥感影像的边缘检测和分类等一些应用。  相似文献   

9.
文章提出了一个新的基于矢量量化的数字水印算法,与基于DCT(DiscreteCosineTransform)、DFT(DiscreteFourierTransform)及DWT(DiscreteWaveletTransform)等的传统水印算法不同,该算法利用码书分割方法和矢量量化索引的特点,在矢量量化的不同阶段分别嵌入水印来保护原始图像的版权,水印检测不需要原始图像。实验结果表明,该方法实现的水印具有良好的不可见性,并对JPEG压缩、矢量量化压缩、旋转以及剪切等空域操作也具有较好的稳健性。  相似文献   

10.
基于Hilbert-Huang变换的JPEG2000隐写分析   总被引:1,自引:0,他引:1  
实现了针对由Su等人提出的JPEG2000 Lazy—mode隐写术的可靠检测.在理论和实验分析的基础上,文章揭示了由Lazy—mode隐写术生成的掩密图像,其子带代码块噪声方差序列的振荡特征异于非掩密含噪图像的子带代码块噪声方差序列.因此,此文隐写检测算法的关键在于针对这两种子带代码块噪声方差序列进行序列分析,提取它们内在的振荡特征差异.在序列分析中,通过引入Hilbert—Huang变换,对噪声方差序列进行经验模式分解,构建了基于Hilbert谱的特征向量.实验表明,基于该特征向量的支持向量机(SVM)分类器能以平均90.6%的准确率识别掩密图像.根据检索,目前尚未有对JPEG2000Lazymode隐写术进行成功分析的报道,因此,该文具有重大意义.  相似文献   

11.
随机化方法作为保护程序免受攻击的一项技术,已经得到广泛的应用.但现有的随机化方法存在两个问题:其一,粒度较粗,不能阻止发生在函数、结构体、类内部的攻击;其二,绝大多数攻击是通过外部输入篡改关键对象,而现有随机化方法对这种攻击特点关注不够.基于此,一种增强的随机化安全结构被提出:通过对封装结构(函数、结构体以及类)内部的结构重新排列而达到随机化的细粒度;同时,分析抽取出与外部输入相关的数组,并在这些数组之间插入哨兵,防止其产生溢出.这种随机化方法不仅将随机化技术应用到函数、结构体、类内部,而且抓住了攻击的特点,对关键的与输入相关的数组对象进行保护,使程序免受控制流和非控制流攻击,从而增强了现有的随机化技术.  相似文献   

12.
With the increasingly connected nature of Cyber-Physical Systems (CPS), new attack vectors are emerging that were previously not considered in the design process. Specifically, autonomous vehicles are one of the most at risk CPS applications, including challenges such as a large amount of legacy software, non-trusted third party applications, and remote communication interfaces. With zero day vulnerabilities constantly being discovered, an attacker can exploit such vulnerabilities to inject malicious code or even leverage existing legitimate code to take over the cyber part of a CPS. Due to the tightly coupled nature of CPS, this can lead to altering physical behavior in an undesirable or devastating manner. Therefore, it is no longer effective to reactively harden systems, but a more proactive approach must be taken. Moving target defense (MTD) techniques such as instruction set randomization (ISR), and address space randomization (ASR) have been shown to be effective against code injection and code reuse attacks. However, these MTD techniques can result in control system crashing which is unacceptable in CPS applications since such crashing may cause catastrophic consequences. Therefore, it is crucial for MTD techniques to be complemented by control reconfiguration to maintain system availability in the event of a cyber-attack. This paper addresses the problem of maintaining system and security properties of a CPS under attack by integrating moving target defense techniques, as well as detection, and recovery mechanisms to ensure safe, reliable, and predictable system operation. Specifically, we consider the problem of detecting code injection as well as code reuse attacks, and reconfiguring fast enough to ensure the safety and stability of autonomous vehicle controllers are maintained. By using MTD such as ISR, and ASR, our approach provides the advantage of preventing attackers from obtaining the reconnaissance knowledge necessary to perform code injection and code reuse attacks, making sure attackers can’t find vulnerabilities in the first place. Our system implementation includes a combination of runtime MTD utilizing AES 256 ISR and fine grained ASR, as well as control management that utilizes attack detection, and reconfiguration capabilities. We evaluate the developed security architecture in an autonomous vehicle case study, utilizing a custom developed hardware-in-the-loop testbed.  相似文献   

13.

In 3D image compression, depth image based rendering (DIBR) is one of the latest techniques where the center image (say the main view, is used to synthesise the left and the right view image) and the depth image are communicated to the receiver side. It has been observed in the literature that most of the existing 3D image watermarking schemes are not resilient to the view synthesis process used in the DIBR technique. In this paper, a 3D image watermarking scheme is proposed which is invariant to the DIBR view synthesis process. In this proposed scheme, 2D-dual-tree complex wavelet transform (2D-DT-CWT) coefficients of centre view are used for watermark embedding such that shift invariance and directional property of the DT-CWT can be exploited to make the scheme robust against view synthesis process. A comprehensive set of experiments has been carried out to justify the robustness of the proposed scheme over the related existing schemes with respect to the JPEG compression and synthesis view attack.

  相似文献   

14.
基于DWT的图像水印算法研究   总被引:9,自引:1,他引:8  
提出了一种基于离散小波变换的水印算法。水印采用文本图像水印,将原始图像和水印分别进行3级小波变换,为了保证水印的安全性,将水印变换域各子图分别进行置乱或加密处理。将水印经处理后的各级变换系数重复嵌入原始图像各级变换系数的不同位置。在检测时,提出采用多方案水印提取算法以适应不同的攻击。实验表明对缩放、剪切、JPEG或JPEG2000压缩等图像退化处理或攻击均具有较强的鲁棒性。  相似文献   

15.
本文提出一种全新的针对几何攻击的强水印模式方案。该方案利用视觉感知模型对水印模版进行基于原图像内容的视觉掩蔽处理,然后引入低通滤波提升水印模版的抗噪和抗压缩能力。实验显示该方案具有较高的抗几何攻击能力,在应对JPEG压缩也表现出了令人满意的鲁棒性。该方案适用图像的多比特信息的嵌入,也适用于二进制黑白图像的水印嵌入与检测。  相似文献   

16.
数字水印技术被认为是对数字图像进行版权保护的一种科学而有效的方法。提出了一种基于陷门单向函数的空域水印算法,目的是为图像的版权保护设计一个高度安全的水印系统。实验结果证明该算法对诸如位置攻击、不重要位攻击、多幅图像攻击等具有较强的鲁棒性。  相似文献   

17.
For the adversarial attacks on the communication links from the controller to the actuators, most of the existing attack‐resilient control results focus on denial‐of‐service attacks. Unlike the existing results, this paper studies the observer‐based attack‐resilient control problem for linear systems with false data injection attacks and process disturbances. Due to limited resources, the malicious attacker is assumed to only manipulate a certain number of communication links from the controller to the actuators. A novel control architecture is proposed, which consists of an attack‐resilient state observer, a controller gain scheme, and a supervisory switching strategy. The observer is developed based on the maximin strategy, and state estimation will be used to construct the controller. The switching strategy is designed to pick an appropriate controller gain and prevent the attack signals from entering the plant automatically. It is shown that the closed‐loop system is stable with an attack‐resilient performance. Finally, to verify the effectiveness of the proposed controller, simulation results on a linearized reduced‐order aircraft system and an IEEE six‐bus power system are provided.  相似文献   

18.
为了提高水印抗剪裁攻击的鲁棒性,提出了一种基于特征的方法,用来辅助决定水印的嵌入和提取的位置,并根据人类视觉的掩蔽特性,在较复杂的块增加嵌入量,而在DCT域的中低频带嵌入二值图像水印,并通过标志位的嵌入来辅助水印的提取,该算法除了对JPEG、模糊等图像操作具有很好的抵抗能力外,同时对裁剪也具有很好的鲁棒性。目前在许多水印嵌入算法中,当对剪切图像进行水印提取时,图像的大小和像素相对坐标均未发生改变;而本文对剪裁后的图像所进行的水印提取则是在图像的大小和像素的相对坐标均是未知的情况下进行的。实验结果证明,该算法是一种行之有效的盲水印算法。  相似文献   

19.
网络攻击之前通常有侦查阶段,攻击者通过流量分析和主动扫描等技术获取目标系统的关键信息,从而制定有针对性的网络攻击。基于网络特征混淆的欺骗防御是一种有效的侦查对抗策略,该策略干扰攻击者在侦查阶段获取的信息,从而使攻击者发动无效的攻击。对现有混淆欺骗防御方案的技术原理进行了分析,给出了网络混淆欺骗的形式化定义,并从3个层次对现有的研究成果进行了讨论,最后分析了混淆欺骗防御技术的发展趋势。  相似文献   

20.

Watermarking is a tool to embed information in the image to provide authentication, copyrights protection, copy control, etc. Some watermarking techniques are robust to intentional /unintentional attacks on the watermarked image. In this study, we propose a robust watermarking approach that can resist geometrical attacks. The proposed technique exploits both the robust image feature points and local Zernike moments for embedding the information. Delaunay tessellation is employed to divide image into distinct triangular segments based on robust features. These features are identified using Harris detector. Zernike moments are calculated for each selected triangular segment, and then the watermark is embedded in the magnitude of Zernike moments using dither modulation. It can be observed from the experimental results that by using proposed approach, the watermark can be detected even in the presence of geometrical distortion, i.e. rotation, cropping, and scaling, and JPEG compression attack.

  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号