排序方式: 共有49条查询结果,搜索用时 0 毫秒
1.
局域网环境下利用DHCP欺骗技术实现DNS劫持攻击 总被引:1,自引:0,他引:1
利用DHCP协议的缺陷,实现对局域网计算机的DNS劫持攻击,并给出将此类攻击应用于网站钓鱼的实现方法,旨在引起人们对局域网安全问题的重视。 相似文献
2.
3.
4.
5.
2011年7月网络安全监测数据分析 总被引:1,自引:1,他引:0
根据CNCERT监测结果,2011年7月,中国境内僵尸网络受控主机数量和木马受控主机数量较6月稍有下降,网页篡改数量下降。恶意代码活动情况方面,中国大陆地区约有27万个IP地址对应的主机被木马或僵尸程序控制,较6月下降30%;网站安全方面,7月中国大陆地区被篡改网站数量为2613个,较6月下降17%,其中被篡改政府网站数量为182个,较6月的333个减少45%。 相似文献
6.
李文剑 《网络安全技术与应用》2006,(9):48-50
蜜网技术是由蜜网项目组(TheHoneynetProject)提出并倡导的一种对攻击行为进行捕获和分析的新技术。本文给出了蜜网的定义和分类,并通过对其技术特点的分析,探讨了蜜网在对抗蠕虫、反垃圾邮件、捕获和分析网络钓鱼及僵尸网络上应用的可行性。 相似文献
7.
Associative classification (AC) is a new, effective supervised learning approach that aims to predict unseen instances. AC effectively integrates association rule mining and classification, and produces more accurate results than other traditional data mining classification algorithms. In this paper, we propose a new AC algorithm called the Fast Associative Classification Algorithm (FACA). We investigate our proposed algorithm against four well-known AC algorithms (CBA, CMAR, MCAR, and ECAR) on real-world phishing datasets. The bases of the investigation in our experiments are classification accuracy and the F1 evaluation measures. The results indicate that FACA is very successful with regard to the F1 evaluation measure compared with the other four well-known algorithms (CBA, CMAR, MCAR, and ECAR). The FACA also outperformed the other four AC algorithms with regard to the accuracy evaluation measure. 相似文献
8.
随着网络应用的迅速普及,“网络钓鱼”形式的网络欺诈案件给不少企业和个人用户带来了巨大的经济损失.本文结合具体案例,较为全面地剖析了网络骗子们常用的手段和方法,详细介绍了在进行电子商务活动时,怎样防范“网络钓鱼”. 相似文献
9.
郝晓伟 《网络安全技术与应用》2005,(5):18-20
近年来,随着信息和网络技术的迅速发展,网络银行应运而生并呈异军突起之势。然而随着网络银行业务量的迅猛增加,"网页仿冒"等互联网犯罪行为也纷纷涌现,给网络金融带来了巨大的风险和挑战。本文从"网页仿冒"的特点入手,浅析了这种欺诈行为的发展趋势和严重后果,并结合国外打击"网页仿冒"的一些措施,提出了我国反击这一行为的对策及建议。 相似文献
10.
This paper proposes a novel phishing web image segmentation algorithm which based on improving spectral clustering. Firstly, we construct a set of points which are composed of spatial lo-cation pixels and gray levels from a given image. Secondly, the data is clustered in spectral space of the similar matrix of the set points, in order to avoid the drawbacks of K-means algorithm in the con-ventional spectral clustering method that is sensitive to initial clustering centroids and convergence to local optimal solution, we introduce the clone operator, Cauthy mutation to enlarge the scale of clustering centers, quantum-inspired evolutionary algorithm to find the global optimal clustering centroids. Compared with phishing web image segmentation based on K-means, experimental results show that the segmentation performance of our method gains much improvement. Moreover, our method can convergence to global optimal solution and is better in accuracy of phishing web seg-mentation. 相似文献