首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 203 毫秒
1.

Cyberspace is an integration of cyber physical system components that integrates computation, networking, physical processes, embedded computers and network monitors which uses feedback loops for controlling the processes where the computations are affected by processes and vice versa. More general, cyber physical systems include all equipments operated on preprogrammed instructions ranging from simple electronic devices to the ultra-modern warfare equipments along with life saving devices. Active cyber-attacks can cause cyber warfare situations by disrupting an entire community of people, which in turn raises an emergency situation to the nation. Thus, cyber warfare is a major threat to the nation at large. In this paper, we analyze the various aspects of cyber warfare situations and a survey on ongoing attacks, defense and cyber forensics strategies in that field. Internet of Things (IoT) is an emerging computing area which enables Machine to Machine communication in cyber physical systems. An attack on IoT causes major issues to the security on the devices and thus, the various threats and attacks on IoT are analyzed here. Overall monitoring and data acquisition in cyber physical systems is done by Supervisory Control and Data Acquisition systems and are mainly targeted by the attackers in order to leave the cyberspace applications not functioning. Therefore, the various threats, attacks and research issues pertaining to the cyberspace are surveyed in this paper along with a few research issues and challenges that are to be solved in the area of cyber warfare.

  相似文献   

2.

A standout amongst the most dangers to the cyber security is known as Botnet since it offers a conveyed stage for many undesirable activities. From the network traffic flow, the identification of Botnet is a fundamental test. Artificial Neural Network–Particle Swarm Optimization (ANN–PSO) based botnet discovery is proposed in this paper. In this paper, ISCX dataset is utilized for botnet location. The features are classified as botnet flow and normal flow by giving the features separated from the dataset as a contribution to the grouping. For grouping, we have displayed ANN–PSO which lessens the false classification ratio and time multifaceted nature to 3.3% and 14 s. We contrast our proposed work with other existing work and demonstrate that our work is superior to anything that of alternate works in the simulation results.

  相似文献   

3.

The smart grid is the next-generation electrical power system that combines operations technology (OT) and information technology (IT) for the efficient generation, delivery, and consumption of electrical energy. We aim to provide a brief overview of machine to machine (M2M) communication and its history, its application in the smart grid, security issues affecting M2M data on the smart grid, and some available solutions to detect and prevent cyber threats. With the emergence of 5G networks, we also provide an introduction to this evolving technology, how the smart grid will benefit from its deployment, and some security concerns.

  相似文献   

4.

Advances in both telecommunications and Information technology have improved the way users do business online. Android, an open-source mobile operating system, is becoming an attractive target for cyber criminals to exploit due to its predefined permission model. Without classification, the mobile operating system permits installation of mobile applications of all kinds, including Trojans, thus making its trustworthiness into question. In this paper, we present a security system called collaborative policy-based security scheme (CSS) that permits users to customize the access permissions of Android applications during runtime. The proposed CSS security scheme validates the trustworthiness of each application before being installed. The experimental results show that the proposed CSS successfully detects all malicious applications with a run-time overhead of 2.7%.

  相似文献   

5.

A design methodology for level shifters voltage translators, where the output voltage ranges from 0 to 18 V, and the input voltage ranges from 2 to 5.5 V in a 0.6 µm CMOS-HV technology, is presented. This family of circuits have a special interest in the case of implantable medical devices where is common to handle previously unknown voltages either positive or negative, above or below the control logic supply VDD. Two application examples are presented: a composite switch to control negative stimuli voltage pulses, and a multi-channel programmable charge-pump voltage multiplier, aimed at charging the output capacitors of an IMD.

  相似文献   

6.

Wireless communication networks have much data to sense, process, and transmit. It tends to develop a security mechanism to care for these needs for such modern-day systems. An intrusion detection system (IDS) is a solution that has recently gained the researcher’s attention with the application of deep learning techniques in IDS. In this paper, we propose an IDS model that uses a deep learning algorithm, conditional generative adversarial network (CGAN), enabling unsupervised learning in the model and adding an eXtreme gradient boosting (XGBoost) classifier for faster comparison and visualization of results. The proposed method can reduce the need to deploy extra sensors to generate fake data to fool the intruder 1.2–2.6%, as the proposed system generates this fake data. The parameters were selected to give optimal results to our model without significant alterations and complications. The model learns from its dataset samples with the multiple-layer network for a refined training process. We aimed that the proposed model could improve the accuracy and thus, decrease the false detection rate and obtain good precision in the cases of both the datasets, NSL-KDD and the CICIDS2017, which can be used as a detector for cyber intrusions. The false alarm rate of the proposed model decreases by about 1.827%.

  相似文献   

7.

Presently employed underwater communication systems suffer from issues such as low data rates and short communication ranges. In this paper, a novel hybrid underwater intelligent communication system is proposed and modeled to address both issues. The proposed system provides higher data rate, longer communication range and secure data transmission by employing optical fiber, underwater free space optics (UFSO) and free space optics (FSO). An intelligent routing mechanism governed by Tabu search (TS) algorithm is used for optical path selection based on data traffic, data rate and communication length to maintain a desired quality of service (QoS) while ensuring security of data transmission. For, modeling, optical fiber channel, priority aware (PA) scheduling algorithm for packet-switched optical network (PSON) for data transmission is used whereas for the FSO channel modeling, orthogonal frequency division multiplexing (OFDM) and On–Off Keying (OOK) are used.To simulate underwater turbulent conditions for UFSO channel, scintillation model with gamma-gamma distribution (GGD) is applied. A data rate of 10 Gbps with BER of 10–9 has been achieved for communication ranges of 140 and 200 m for the cases of turbulent and non-turbulent water conditions. In each of the cases, QoS meeting IEEE standards is ensured.

  相似文献   

8.
In view of the characteristic that attacker depended on the detected information to decide the next actions,the non-cooperative signal game theory was applied to analyze cyber attack and defense.The signal deception mechanism in the process of cyber attack and defense was considered deeply by constructing a multi-stage cyber deception game model,and the dynamic analysis and deduction of the multi-stage cyber attack and defense was realized by considering the attenuation of cyber deception signals.A solution for multi-stage cyber deception game equilibrium was improved based on analysis of cyber attack and defense,and an optimal algorithm for selecting cyber deception defense strategies was designed.The effectiveness of the model is verified by simulations.The rules of multi-stage cyber deception games are summarized based on the results,which can provide effective guidance for the research on cyber active defense.  相似文献   

9.
The paper describes the design and construction of a new type of frequency meter. In the present instrument the important characteristic of a monostable circuit changing its state by an input impulse signal has been utilized for measuring the frequency of the input signal

The instrument covers a frequency span from 10 Hz to 10 kHz in three separate ranges, with a linear scale of indication. A permanent magnet moving coil type sensitive motor has been used as the indicating element. A consistency of better than 1 % has been obtained between the calibrations of the three ranges using the same scale. The authors fuel that they have been able to offer a novel frequency meter of good resolution, wide frequency coverage and rugged construction. The instrument requires no special maintenance skill.  相似文献   

10.
Lin  Jian  Weitnauer  Mary Ann 《Wireless Networks》2019,25(6):3047-3062

Communication in Terahertz (THz) band is envisioned as a promising technology to meet the ever-growing data rate demand, and to enable new applications in both nano-scale and macro-scale wireless paradigms. In this study, we propose the first system-level design that is suitable for THz communication in macro-scale range with 100+ Gbps data rate. The design is based on the proposed terahertz pulse-level beam-switching with energy control (TRPLE), and motivated by the rise in Graphene-based electronics, which include not only compact generator and detector for pulse communication, but also the capability of beam scanning aided with nano-antenna-arrays. The very high path loss seen in THz wireless channel requires the use of narrow beam to reach longer transmission ranges. On the other hand, impulse radio that emits femtosecond-long pulses allows the beam direction to steer at pulse-level, rather than at packet-level. For TRPLE, we mathematically analyze the data rate for an arbitrary wireless link under the THz channel characteristics and the energy modulation scheme. Then, a novel optimization model is formulated to solve the parameters of the inter-pulse separation and the inter-symbol separation, in order to maximize the data rate while meeting the interference requirement. With the optimization, the data rate of 167 Gbps is shown achievable for most users in 20-m range. A MAC protocol framework is then presented to harness the benefits of the pulse separation optimization.

  相似文献   

11.

In wireless sensor networks, the overlapped sub-regions (faces) are generated due to the intersections among the sensing ranges of nodes. The faces play a significant role in solving the three problems k-coverage (i.e., all the points in the interested field should be covered by at least k active nodes while maintaining connectivity between all active nodes), coverage scheduling and cover sets. To find the faces and discover their coverage degrees, this article presents a distributed algorithm that runs in three steps. First, a colored graph called Intersection Points Colored Graph (IPCG) is proposed, in which the vertices are defined by the range-intersections of nodes-devices and are colored according to the position of these intersections in relation to the ranges of the nodes. The vertex that located on perimeter of the node’s range is colored by red, while the green vertex is an intersection of two ranges inside the range of a third node. The edge that joins two red vertices is colored by red and the edge that joins two green vertices is colored by green while the edge that joins two distinct colored vertices is colored by blue. Second, based on their properties and distinct features, the faces in IPCG are classified into five classes (simple, negative, red, green and positive). Third, based on faces classification, the Three Colored Trees algorithm is proposed to extract the faces in linear time in terms of the number of vertices and edges in IPCG.

  相似文献   

12.
Recently, population aging and declining birth rate have become very serious, and people who lack walking capability have truly increased in Japan. To address this issue, gait training has become a requirement for them. Although some training systems have been researched in the past, a training system that entails guidance of walking has not been researched well. This paper focuses on guidance of walking, and it is aimed to develop a training system that utilizes the activity and passivity of the trainee. In addition, rhythmic walking, which takes walking stability and trainee safety into account, is aimed for. In this paper, an improved electric wheelchair is used as gait-training equipment (GTE); then, the trainee is towed by the GTE, and walking is guided. In this paper, a targeted walking cycle is predefined, and the GTE must distinguish the cycle in order to guide walking. Therefore, this paper uses the center of gravity (COG) of the trainee as the index. Thus, the GTE tows the trainee when the swing leg moves more forward than the stance leg; then, rhythmic walking can be guided. In addition, this paper proposes a method to control the GTE by a proportional-differential controller based on virtual compliance that is composed of mass, spring, and damper. The gait training can be safely achieved by deciding the desired position and velocity of the GTE from the tow force through virtual compliance. In this paper, the validity of the proposed method is verified by numerical simulation and experiment. The validity of the proposed system is verified by using a four-link robot whose geometric expression is known as the trainee; then, the application of the proposed method will be extended to a human trainee by only adjusting the parameters.  相似文献   

13.

Coverage of the bounded region gets importance in Wireless Sensor Network (WSN). Area coverage is based on effective surface coverage with a minimum number of sensor nodes. Most of the researchers contemplate the coverage region of interest as a square and manifest the radio ranges as a circle. The area of a circle is much higher than the area of a square because of the perimeter. To utilize the advantage of the circle, the coverage region of interest is presumed as a circle for sensor node deployment. This paper proposes a novel coverage improved disc shape deployment strategy. Comparative analysis has been observed between circle and square regions of interest based on the cumulative number of sensor nodes required to cover the entire region. A new strategy named as disc shape deployment strategy is also proposed. Traditional hexagon and strip-based deployment strategies are compared with the disc shape deployment strategy. The simulation result shows that the circle shape coverage region of interest extremely reduces the required number of sensor nodes. The proposed deployment strategy provides desirable coverage, and it requires few more sensor nodes than hexagon shape deployment strategy.

  相似文献   

14.

In this work a novel inductive tuning technique for millimeter wave (mmw) applications is presented. Fine frequency tuning is performed using a transformer. For the LC tanks inductive element, transformer is used. To tune the VCO MOS switch is placed at center tapping of the secondary coil of the transformer. The simulation shows that by changing the operating condition of MOS switch frequency band from 59.1 GHz to 64.6 GHz is obtained. The proposed 60 GHz VCO is designed using UMC 65 nm CMOS single Poly eight Metal (1P8M) Technology. Obtained Frequency Tuning Range (FTR) is 8.89% and the corresponding phase noise variation is from ???112.4 dBc/Hz to ???115.9 dBc/Hz at 10 MHz offset from the carrier. The worst phase noise value is ???112.4 dBc/Hz which is obtained at 0.3 V tuning voltage. For 0.8 V supply voltage 7.44 mW of power is dissipated. And the calculated Figure of Merit (FOM) for whole FTR, ranges from ???179.89 dBc/Hz to ???182.62 dBc/Hz.

  相似文献   

15.
Since the publication of Satoshi Nakamoto's white paper on Bitcoin in 2008, blockchain has (slowly) become one of the most frequently discussed methods for securing data storage and transfer through decentralized, trustless, peer-to-peer systems. This research identifies peer-reviewed literature that seeks to utilize blockchain for cyber security purposes and presents a systematic analysis of the most frequently adopted blockchain security applications. Our findings show that the Internet of Things (IoT) lends itself well to novel blockchain applications, as do networks and machine visualization, public-key cryptography, web applications, certification schemes and the secure storage of Personally Identifiable Information (PII). This timely systematic review also sheds light on future directions of research, education and practices in the blockchain and cyber security space, such as security of blockchain in IoT, security of blockchain for AI data, and sidechain security.  相似文献   

16.
Cyber security training programs encourage users to report suspicious spear phishing emails, and most antiphishing software provide interfaces to assist in the reporting. Evidence, however, suggests that reporting is scarce. This research examined why this is the case. To this end, Social Cognitive Theory (SCT) was used to examine the influence of the triadic factors of perceived self-efficacy toward antiphishing behaviors, expected negative outcomes from reporting spear phishing emails, and cyber security self-monitoring, on individuals’ likelihood of reporting spear phishing emails. Based on recent research on phishing victims, the present study also incorporated cyber risk beliefs (CRBs) into the SCT framework. The model, tested using survey data (N = 386), revealed that the likelihood of reporting spear phishing emails is increased by perceived self-efficacy, expected negative outcomes, and cyber security self-monitoring. Furthermore, the CRBs directly influenced the three SCT factors and indirectly the individuals’ likelihood of reporting spear phishing emails. The findings add to our understanding of SCT and the science of cyber security.  相似文献   

17.
随着国家信息系统和基础设施对网络空间依赖程度越来越高,网络空间的安全已经成为国家安全的一部分。建立网络空间安全信任体系,是网络空间安全的基础,人员身份的实名管理是互联网环境下网络空间安全的重要环节:分析了互联网犯罪问题存在的难点,跟踪了国内外实名管控发展动态.设计了实名身份管理的管理体系和技术架构,最后提出了实名身份管理的发展建议。  相似文献   

18.

Internet of Things (IoT) and its applications are the most popular research areas at present. The characteristics of IoT on one side make it easily applicable to real-life applications, whereas on the other side expose it to cyber threats. Denial of Service (DoS) is one of the most catastrophic attacks against IoT. In this paper, we investigate the prospects of using machine learning classification algorithms for securing IoT against DoS attacks. A comprehensive study is carried on the classifiers which can advance the development of anomaly-based intrusion detection systems (IDSs). Performance assessment of classifiers is done in terms of prominent metrics and validation methods. Popular datasets CIDDS-001, UNSW-NB15, and NSL-KDD are used for benchmarking classifiers. Friedman and Nemenyi tests are employed to analyze the significant differences among classifiers statistically. In addition, Raspberry Pi is used to evaluate the response time of classifiers on IoT specific hardware. We also discuss a methodology for selecting the best classifier as per application requirements. The main goals of this study are to motivate IoT security researchers for developing IDSs using ensemble learning, and suggesting appropriate methods for statistical assessment of classifier’s performance.

  相似文献   

19.
马铭艳 《移动信息》2023,45(8):113-115
网络安全分析对互联网发展有着深远的影响。随着大数据技术的持续发展,如何将大数据技术融入实际分析过程中,是每位工作人员都需要思考的问题。大数据技术作为一种新型技术,可以切实提高网络安全分析的质量及效率。因此,工作人员需要加大分析力度,了解大数据技术的应用要点,将其与网络安全分析工作相结合,做好安全防护,使其分析得更加精准、可靠,切实提高网络安全分析效能。文中以大数据技术为例,对其在网络安全分析中的应用开展了深入分析。  相似文献   

20.
在全球局势愈发动荡的大背景下,网络空间的角逐和较量日益激烈.网络攻击已演变成为国家级对抗的重要手段之一,网络战已经成为世界各国关注的新热点.当前,网络战已经成为美伊斗争的重要手段,受2010年"震网"攻击事件影响,伊朗不断提升网络战能力,与美国等敌对国家在网络空间领域明争暗斗.从伊朗网络战能力建设整体情况入手,以美伊网...  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号