共查询到20条相似文献,搜索用时 15 毫秒
1.
一种基于无状态连接请求验证的SYN湮没攻击防御方法 总被引:1,自引:0,他引:1
已有SYN湮没攻击检测防御技术存在一个共性缺陷,就是在验证连接请求有效前分配一定的系统资源保存连接状态,基于无状态连接请求验证的方法可以有效地解决这一问题,但已有的方法存在验证有效后无法完整建立TCP连接、通讯双方状态不一致等问题.本文提出一种新的基于无状态连接请求验证的网关级SYN湮没攻击防御方法,该方法在解决已有问题并兼容现有TCP/IP协议栈实现的基础上,可实现对不同操作系统SYN湮没攻击的有效防御. 相似文献
2.
物联网体系结构研究与探讨 总被引:3,自引:0,他引:3
物联网是一个十分复杂而又庞大的系统,其体系结构是影响未来发展应用的关键所在。通过对现有物联网技术文献和体系结构实例的分析,提出了一种具有感知层、接入层、网络层和应用层的4层次物联网体系结构参考模型,并对各层所实现的主要功能进行了讨论阐述。这样一个通用的参考模型呈现出了泛在化、智能化的物联网基本特征。 相似文献
3.
4.
5.
作为信息产业的第三次浪潮,物联网技术的发展与应用为人与物、物与物之间的信息交换创造了一个全新的平台。国内物联网技术研究与应用的不断深入,将对图书馆事业的发展产生深远影响。文中探讨了物联网对图书馆事业的双重影响,分析了物联网技术带来的优势和挑战,最后强调了以技术为依托,回归服务本质的理念。 相似文献
6.
随着城市规模越来越复杂,全国各级政府都在进行城市物联网和信息化建设,目前虽然搭建了互联骨干网和部署了大量的传感器,收集了众多的城市行为数据,但落后的信息管理模式难以体现信息价值,将信息体现在服务提升之中,造成信息资源的极大浪费。因此,将情境感知技术引入到智慧城市服务的应用之中,构建了一个基于情境感知的城市服务系统,并通过情境信息采集、情境信息推理和服务配置模型等关键技术,实时感知城市内的情境需求,从而提供智能化的业务服务组合。最后通过一社区智慧街道管理系统来验证本文所设计的系统效果。 相似文献
7.
8.
This paper presents an adaptive neural network approach to the trajectory tracking control of micro aerial vehicles especially when they are flying in a limited indoor area. Differing from conventional controllers, the proposed controller employs the outer position loop to directly generate angular velocity commands in the presence of unknown aerodynamics and disturbances and then the fast inner loop to handle the angular rate control. Adaptive neural networks are deployed to estimate all the uncertain factors with the adaptation law derived from the Lyapunov function. To achieve a real-time performance, a norm estimation approach of ideal weights is designed to achieve a high bandwidth and lighten the burden of computation burden. Meanwhile, a barrier Lyapunov function is introduced to guarantee the constraint of vehicle positions as well as the validity of the neural network estimation. Simulations and practical flight tests are conducted to verify the feasibility and effectiveness of the proposed control strategy. 相似文献
9.
物联网将成为今后五年IT行业发展的热点,迅速掌握物联网技术已经成为高校教学改革的一个关键点。文章提出了在计算机网络技术这门课程中的改革的创新思路,以求增加物联网相关知识,推动高校物联网课程的改革,跟上时代发展步伐。 相似文献
10.
物联网应用已成为新兴产业之一,业务平台是实现其应用的关键。在研究和实现物联网泛在业务平台USPIOT过程中,网络通信层是其必不可少的核心部分,也是开发的重点部分。文中介绍了为物联网泛在业务平台USPIOT设计和实现的网络通信层,在实现过程中,为解决多终端用户访问量大、业务差异性强等特点,又提出和实现了一种业务服务缓冲机制。该机制在平台业务管理中采用了多级缓冲技术,用两级缓冲池机制来验证系统。通过两级缓冲池系统多业务运行结果显示,在多终端大业务量环境下,特别在2000任务数以上,相比于单级缓冲池,系统效率可提高20%以上。 相似文献
11.
随着智能物联网应用场景的不断拓展,网络攻击的频率与规模在不断增加,基于数据流量的异常行为检测是应对物联网安全风险的重要手段。传统检测工具存在隐私泄露、准确率低、稳定性差等薄弱点,为改善这一状况,提出一种基于分布式框架的神经网络异常行为检测模型。首先,该模型引入群体防御的思想,利用分布式结构安全地共享边缘网关的流量知识,有助于提高检测性能,提升安全性和鲁棒性。其次,创新性地将网络流量转化为深度矩阵,融合多种神经网络结构进行特征挖掘,能够有效处理大规模时序序列数据,同时选择两个层次的数据进行拟合,确保模型充分接收信息。最后,基于真实数据集的仿真实验表明,所提出的模型具有优异的拟合能力,其异常流量检测准确率达到90%以上,相比基线模型具有显著优势,能够为智能物联网提供轻量、安全、精准的攻击行为检测。 相似文献
12.
用户生成业务(简称UGS),意为普通用户不用编程仅通过简单操作便可自己创建个性化业务。目前该技术在互联网中得到了一定的应用。社交网络的风靡给人与人之间的联系提供了丰富的数据,基于这些数据可以分析用户间的相似度,从而为相似的用户推荐业务。本文研究了传统基于社交网络的用户生成业务框架和应用在物联网环境时传统框架的不足。提出了一个基于动态社交网络的动态社交网络用户生成业务系统框架,提升了用户生成业务系统在物联网业务环境中的性能。 相似文献
13.
14.
15.
Photographic supra-projection is a forensic process that aims to identify a missing person from a photograph and a skull found. One of the crucial tasks throughout all this process is the craniofacial superimposition which tries to find a good fit between a 3D model of the skull and the 2D photo of the face. This photographic supra-projection stage is usually carried out manually by forensic anthropologists. It is thus very time consuming and presents several difficulties. In this paper, we aim to demonstrate that real-coded evolutionary algorithms are suitable approaches to tackle craniofacial superimposition. To do so, we first formulate this complex task in forensic identification as a numerical optimization problem. Then, we adapt three different evolutionary algorithms to solve it: two variants of a real-coded genetic algorithm and the state of the art evolution strategy CMA-ES. We also consider an existing binary-coded genetic algorithm as a baseline. Results on several superimposition problems of real-world identification cases solved by the Physical Anthropology lab at the University of Granada (Spain) are considered to test our proposals. 相似文献
16.
食品安全已经成为世界性的话题,针对物联网在食品加工环节的应用展开研究,利用物联网的传感器对食品在加工环节的数据进行记录和监控,在服务器端把收集的数据存入数据库,并实现数据库的设计,为食品出厂的质量做出贡献。 相似文献
17.
随着互联网技术的不断发展,其相关技术也在逐渐完善,其中物联网作为新兴的事物开始走入人们的视线.物联网的核心就是通过物与物之间的交互来完成工作的自动化.目前,我国医药流通过程复杂,尤其经过了繁多的流通过程,大大的增加了药品的价格,且流通效率低.本文的研究内容主要针对物联网技术在医药流通领域的应用. 相似文献
18.
Ibrahim S. Alsukayti 《计算机科学技术学报》2022,37(2):344-368
The development of IP-based Internet of Things (IoT) networks would facilitate more effective end-to-end IP network architectures, but it remains a challenge. Network routing needs to be effectively addressed in the IoT environments of scarce computational and energy resources. Accordingly, the Internet Engineering Task Force (IETF) has specified the IPv6 Routing Protocol for Low Power and Lossy Network (RPL) to provide a bespoke IPv6-based routing framework for IoT networks. However, RPL comes with no Quality of Service (QoS) support which is an essential requirement for many IoT applications. The network research community has introduced a number of research proposals enhancing RPL with different QoS solutions. This paper presents a review of these proposed solutions and aims to establish a firm understanding of recent QoS developments for RPL and possible areas for future IoT routing research. The focus is on comprehending the protocol and networking properties that can affect QoS performance in RPL networks. Consideration is also given to different objective functions developed for addressing varying QoS aspects such as throughput, delay, and packet loss. RPL is also extended in a number of QoS solutions following different approaches at the MAC, network, and application layers. However, there is still a need for further developments to address effective QoS support, particularly for dynamic RPL networks. 相似文献
19.
Xingxing CHEN Qingfeng CHENG Weidong YANG Xiangyang LUO 《Frontiers of Computer Science》2024,18(3):183807
With the widespread use of network infrastructures such as 5G and low-power wide-area networks, a large number of the Internet of Things (IoT) device nodes are connected to the network, generating massive amounts of data. Therefore, it is a great challenge to achieve anonymous authentication of IoT nodes and secure data transmission. At present, blockchain technology is widely used in authentication and s data storage due to its decentralization and immutability. Recently, Fan et al. proposed a secure and efficient blockchain-based IoT authentication and data sharing scheme. We studied it as one of the state-of-the-art protocols and found that this scheme does not consider the resistance to ephemeral secret compromise attacks and the anonymity of IoT nodes. To overcome these security flaws, this paper proposes an enhanced authentication and data transmission scheme, which is verified by formal security proofs and informal security analysis. Furthermore, Scyther is applied to prove the security of the proposed scheme. Moreover, it is demonstrated that the proposed scheme achieves better performance in terms of communication and computational cost compared to other related schemes. 相似文献
20.
当前在物联网应用中,大量采集终端被用于感知环境、定位服务、状态监测等应用,并源源不断地上传数据,在提产助效的同时,给远程服务端数据收集及实时处理带来巨大挑战。利用Netty网络通信库构造高性能的收集端网络通信处理服务并设计出可供采集终端与收集端使用的通信协议,剥离出网络通信业务中耗时操作并将数据推送至流式消息处理系统Kafka中,再由Kafka消费者负责后续数据持久化、实时分析工作。由此实现一个支持高并发、低延迟的数据接入系统。实验结果表明,在万级别连接情况下,该系统能正常工作且保持较快的响应速度。 相似文献