首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
马彦图  王联国 《计算机科学》2013,40(9):156-158,193
针对当前攻击图在大范围网络应用中具有时间复杂度以及图形化描述不准确等缺陷,提出了一种基于智能化状态转移以及权限改进的攻击图构建方法:采用智能化状态转移途径构建攻击模型,依据该模型规划相应的攻击图,并在攻击图生成中引入了权限改进体制,该方法以主机间的连接分析为依据,根据网络攻击状态图中不同主机的原始权限,获取攻击权限的改进路径,能够针对网络变换情况调整主机的权限,进而确保相应网络的安全性,针对大规模复杂化网络攻击问题构建有效的攻击图,以确保整体网络的安全性和高效性.通过最终的仿真实验可得,该方法构建网络攻击图的时间较短,具备较低的时间复杂度和较高的扩展性,是一种高效的攻击图构建方法.  相似文献   

2.
快速查找攻击中的最弱节点能够更好的保证网络安全.传统的最弱节点定位方法在应用到随机攻击的状况下时,由于受攻击节点随机性增大,节点间的空间关联性迅速下降,攻击节点位置不定,因此很难对特定节点建立准确的约束模型,导致节点定位存在盲点,定位准确性较差.提出了一种改进粒子群节点特征寻优算法的不定网络攻击中最弱节点定位方法.计算网络节点之间的特征差值,在不定攻击中网络节点特征提取残差参数,进行极小化处理,通过设置粒子群中的每个粒子代表一个差异化节点定位的解,最大程度减小随机性带来的关联特征弱化问题.实验结果表明,利用改进后的算法进行不定攻击中网络最弱节点定位,能够有效提高节点定位的准确性,从而保证了网络的安全性.  相似文献   

3.
张小梅 《计算机仿真》2012,29(5):163-166
研究网络不良攻击的过滤问题,提高网络抗攻击能力,可保证网络安全。针对当前网络中攻击识别过滤问题,当过滤网络攻击时,只能够明确归属的攻击类型,当网络攻击不能明确归属特定类型,会产生攻击分类效果下降,产生野攻击,导致不能有效过滤的问题。为了解决上述问题,提出了一种反馈学习的网络攻击过滤方法,通过反馈训练对野攻击进行检测,利用错误驱动进行训练,完成对野攻击的准确分类。随着反馈的进行,反馈学习能捕捉到网络中攻击种类的变化,分类性能逐步提高。实验证明,改进方法能快速准确的完成网络不良攻击的过滤,取得了明显的效果。  相似文献   

4.
针对传统攻击检测方法检测稳定性低以及检测精准度差的问题,提出一种基于动态无线传感网的抗合谋Sybil攻击检测方法。根据动态无线传感网络组成结构得出对应检测原理,同时计算获取出攻击检测目标函数;在空间约束条件基础上引入无线网络攻击检测法,分类处理Sybil攻击,获取出网络被攻击节点位置;根据角度-衰减度检测法计算得出网络攻击两点基本原则,通过锚节点定位攻击节点,完成抗合谋Sybil攻击检测。仿真结果表明,所提方法能够有效解决传统方法带来的问题,且在计算过程中具有较高实用性以及广泛适用性。  相似文献   

5.
在内部网络带给企业办公便利的同时, 内部网络所带来的威胁也日渐突出, 由于企业中内部威胁具有危害性大、难以检测等特点, 内部威胁亟需解决。因此, 提出了基于贝叶斯网络攻击图的内部威胁预测模型。以内部用户实际操作过程中的行为为研究对象, 以内部用户攻击过程中所占有的资源状态和所进行的操作序列攻击证据为节点, 构建贝叶斯网络攻击图; 以网络攻击图来描述攻击者在攻击过程中的不同攻击路径和攻击状态, 并且利用贝叶斯网络推理算法计算内部威胁的危险概率。在贝叶斯网络攻击图中定义了元操作、原子攻击、攻击证据等概念, 量化了节点变量、节点变量取值和条件概率分布。以改进的似然加权算法为基础, 使贝叶斯网络的参数计算更加简便, 内部威胁的预测更加精确。最后, 通过仿真实验证明了该方法建模速度快、计算过程简单、计算结果精确, 在预测内部威胁时的有效性和适用性。  相似文献   

6.
为准确评估计算机网络的脆弱性,结合贝叶斯网络与攻击图提出一种新的评估算法。构建攻击图模型RSAG,在消除攻击图中环路的基础上,将模型转换成贝叶斯网络攻击图模型BNAG,引入节点攻击难度和节点状态变迁度量指标计算节点可达概率。实例分析结果表明,该算法对网络脆弱性的评估结果真实有效,能够体现每个节点被攻击的差异性,并且对于混合结构攻击图的计算量较少,可准确凸显混乱关系下漏洞的危害程度。  相似文献   

7.
黄光球  王纯子  张斌 《计算机应用》2011,31(8):2146-2151
为了解决复杂网络中相似攻击手段和相似节点对象在攻击模型中造成冗余的问题,提出一种基于脆弱关联模型的粗糙网络攻击建模方法。在攻击变迁域和节点对象域上定义属性集,将相似的攻击方式和网络节点分类,形成论域Petri网上的类空间。通过定义路径相似度,利用蚁群算法找出所有可达攻击目标的特征路径,并在这些特征路径中找出给目标节点带来最大威胁的攻击路径。实验证明,该方法能够快速地定位实时监控信息中涉及的节点对象和攻击方式,在各种特征攻击路径中准确找到其所在位置。  相似文献   

8.
大规模网络节点数量多,连接关系复杂,现有攻击图生成方法存在节点爆炸问题,针对大规模网络的这种特点,提出了一种逆向深度优先攻击图生成算法。首先对攻击图的相关概念进行了简要介绍,并分析了逆向生成算法流程。然后,鉴于生成攻击图过程中要对网络可达性进行测试,因此,同时提出了基于区间树的规则匹配算法,最后,对攻击图生成算法进行了实际环境测试,并对测试结果进行了验证分析。实验结果表明,该攻击图生成算法能以O(lgn)的时间复杂度高效检测网络可达性,优化网络攻击图生成结果。  相似文献   

9.
贝叶斯推理在攻击图节点置信度计算中的应用   总被引:2,自引:0,他引:2  
网络攻击图是根据观测到的攻击证据推测网络安全状态的理想模板.现有的攻击图节点置信度计算方法或在模型通用性、计算复杂度方面存在一定不足,或又过多依靠经验公式进行推理而缺乏严密的数学理论支撑.为此,提出一种基于贝叶斯推理的攻击图节点置信度计算方法.方法对似然加权法进行了改进,以支持攻击证据之间的时间偏序关系.实验结果表明,该方法能够有效提高节点置信度的计算准确性,且具有线性计算复杂度,适合于处理大规模攻击图节点置信度的实时计算问题.  相似文献   

10.
大规模网络中攻击图自动构建算法研究   总被引:8,自引:0,他引:8  
随着计算机技术和网络通信技术的飞速发展,网络安全形势日趋严峻.攻击者往往采取多步骤网络攻击的方式对网内多个漏洞实施逐步击破,而攻击图正好刻画了目标网络内潜在威胁的传播路径.针对目前攻击图构建算法无法很好地适用于大规模目标网络的问题,通过深入分析传统攻击图构建算法的不足和目标环境的特点,提出了一种新的构建攻击图的方法.首先,采用攻击图建模语言(Attack Graphs Modeling Language,AGML)形式化描述漏洞知识库和目标环境;其次,提出了目标环境的预处理技术,为目标环境中的属性建立索引,然后利用攻击模式的实例化技术构建攻击图.通过对该算法的时间复杂度分析和模拟实验验证,表明该算法具有良好的可扩展性,能够为具有复杂网络拓扑结构的大规模目标网络自动构建攻击图.  相似文献   

11.
Abstract This paper describes an approach to the design of interactive multimedia materials being developed in a European Community project. The developmental process is seen as a dialogue between technologists and teachers. This dialogue is often problematic because of the differences in training, experience and culture between them. Conditions needed for fruitful dialogue are described and the generic model for learning design used in the project is explained.  相似文献   

12.
European Community policy and the market   总被引:1,自引:0,他引:1  
Abstract This paper starts with some reflections on the policy considerations and priorities which are shaping European Commission (EC) research programmes. Then it attempts to position the current projects which seek to capitalise on information and communications technologies for learning in relation to these priorities and the apparent realities of the marketplace. It concludes that while there are grounds to be optimistic about the contribution EC programmes can make to the efficiency and standard of education and training, they are still too technology driven.  相似文献   

13.
融合集成方法已经广泛应用在模式识别领域,然而一些基分类器实时性能稳定性较差,导致多分类器融合性能差,针对上述问题本文提出了一种新的基于多分类器的子融合集成分类器系统。该方法考虑在度量层融合层次之上通过对各类基多分类器进行动态选择,票数最多的类别作为融合系统中对特征向量识别的类别,构成一种新的自适应子融合集成分类器方法。实验表明,该方法比传统的分类器以及分类融合方法识别准确率明显更高,具有更好的鲁棒性。  相似文献   

14.
Development of software intensive systems (systems) in practice involves a series of self-contained phases for the lifecycle of a system. Semantic and temporal gaps, which occur among phases and among developer disciplines within and across phases, hinder the ongoing development of a system because of the interdependencies among phases and among disciplines. Such gaps are magnified among systems that are developed at different times by different development teams, which may limit reuse of artifacts of systems development and interoperability among the systems. This article discusses such gaps and a systems development process for avoiding them.  相似文献   

15.
This paper presents control charts models and the necessary simulation software for the location of economic values of the control parameters. The simulation program is written in FORTRAN, requires only 10K of main storage, and can run on most mini and micro computers. Two models are presented - one describes the process when it is operating at full capacity and the other when the process is operating under capacity. The models allow the product quality to deteriorate to a further level before an existing out-of-control state is detected, and they can also be used in situations where no prior knowledge exists of the out-of-control causes and the resulting proportion defectives.  相似文献   

16.
Going through a few examples of robot artists who are recognized worldwide, we try to analyze the deepest meaning of what is called “robot art” and the related art field definition. We also try to highlight its well-marked borders, such as kinetic sculptures, kinetic art, cyber art, and cyberpunk. A brief excursion into the importance of the context, the message, and its semiotics is also provided, case by case, together with a few hints on the history of this discipline in the light of an artistic perspective. Therefore, the aim of this article is to try to summarize the main characteristics that might classify robot art as a unique and innovative discipline, and to track down some of the principles by which a robotic artifact can or cannot be considered an art piece in terms of social, cultural, and strictly artistic interest. This work was presented in part at the 13th International Symposium on Artificial Life and Robotics, Oita, Japan, January 31–February 2, 2008  相似文献   

17.
为了设计一种具有低成本、低功耗、易操作、功能强且可靠性高的煤矿井下安全分站,针对煤矿安全生产实际,文章提出了采用MCS-51系列单片机为核心、具有CAN总线通信接口的煤矿井下安全监控分站的设计方案;首先给出煤矿井下安全监控分站的整体构架设计,然后着重阐述模拟量输入信号处理系统的设计过程,最后说明单片机最小系统及其键盘、显示、报警、通信等各个组成部分的设计;为验证设计方案的可行性与有效性,使用Proteus软件对设计内容进行仿真验证,设计的煤矿井下安全监控分站具有瓦斯、温度等模拟量参数超标报警功能和电机开停、风门开闭等开关量指示功能;仿真结果表明:设计的煤矿井下安全监控分站具有一定的实际应用价值.  相似文献   

18.
Although there are many arguments that logic is an appropriate tool for artificial intelligence, there has been a perceived problem with the monotonicity of classical logic. This paper elaborates on the idea that reasoning should be viewed as theory formation where logic tells us the consequences of our assumptions. The two activities of predicting what is expected to be true and explaining observations are considered in a simple theory formation framework. Properties of each activity are discussed, along with a number of proposals as to what should be predicted or accepted as reasonable explanations. An architecture is proposed to combine explanation and prediction into one coherent framework. Algorithms used to implement the system as well as examples from a running implementation are given.  相似文献   

19.
This paper provides the author's personal views and perspectives on software process improvement. Starting with his first work on technology assessment in IBM over 20 years ago, Watts Humphrey describes the process improvement work he has been directly involved in. This includes the development of the early process assessment methods, the original design of the CMM, and the introduction of the Personal Software Process (PSP)SM and Team Software Process (TSP){SM}. In addition to describing the original motivation for this work, the author also reviews many of the problems he and his associates encountered and why they solved them the way they did. He also comments on the outstanding issues and likely directions for future work. Finally, this work has built on the experiences and contributions of many people. Mr. Humphrey only describes work that he was personally involved in and he names many of the key contributors. However, so many people have been involved in this work that a full list of the important participants would be impractical.  相似文献   

20.
基于复小波噪声方差显著修正的SAR图像去噪   总被引:4,自引:1,他引:3  
提出了一种基于复小波域统计建模与噪声方差估计显著性修正相结合的合成孔径雷达(Synthetic Aperture Radar,SAR)图像斑点噪声滤波方法。该方法首先通过对数变换将乘性噪声模型转化为加性噪声模型,然后对变换后的图像进行双树复小波变换(Dualtree Complex Wavelet Transform,DCWT),并对复数小波系数的统计分布进行建模。在此先验分布的基础上,通过运用贝叶斯估计方法从含噪系数中恢复原始系数,达到滤除噪声的目的。实验结果表明该方法在去除噪声的同时保留了图像的细节信息,取得了很好的降噪效果。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号