共查询到20条相似文献,搜索用时 62 毫秒
1.
In this paper, we propose a solution to the problem of capturing an intruder in a product network. This solution is derived based on the assumption of existing algorithms for basic member graphs of a graph product. In this problem, a team of cleaner agents are responsible for capturing a hostile intruder in the network. While the agents can move in the network one hop at a time, the intruder is assumed to be arbitrarily fast in a way that it can traverse any number of nodes contiguously as far as no agents reside in those nodes. Here, we consider a version of the problem where each agent can replicate new agents. Thus, the algorithm starts with a single agent and new agents are created on demand. We propose a novel method for deriving intrusion capturing algorithms based on the abstract idea of spanning search trees. Later, we utilize this method for deriving capturing algorithms for Cartesian product graphs. 相似文献
2.
Flaminia L. Luccio 《Theory of Computing Systems》2009,44(2):186-204
In this paper we consider the problem of capturing an intruder in a particular fractal graph, the Sierpiński graph SG
n
. The problem consists of having a team of mobile software agents that collaborate in order to capture the intruder. The intruder
is a mobile entity that escapes from the team of agents, moving arbitrarily fast inside the network, i.e., traversing any
number of contiguous nodes as long as no other agent resides on them. The agents move asynchronously and they know the network
topology they are in is a Sierpiński graph SG
n
.
We first derive lower bounds on the minimum number of agents, number of moves and time steps required to capture the intruder.
We then consider some variations of the model based on the capabilities of the agents: visibility, where the agents can “see” the state of their neighbors and thus can move autonomously; locality, where the agents can only access local information and thus their moves have to be coordinated by a leader. For each model,
we design a capturing strategy and we make some observations. One of our goals is to continue a previous study on what is
the impact of visibility on complexity: in this topology we are able to reach an optimal bound on the number of agents required
by both cleaning strategies. However, the strategy in the visibility model is fully distributed, whereas the other strategy
requires a leader. Moreover, the second strategy requires a higher number of moves and time steps.
A preliminary version of this paper has been presented at the 4th International Conference on Fun with Algorithms (FUN’07)
17. 相似文献
3.
Jonghoek Kim 《Annals of Mathematics and Artificial Intelligence》2014,70(3):203-220
We develop strategies that enable multiple robots to cooperatively explore an unknown workspace while building information networks. Every robot deploys information nodes with sensing and communication capabilities while constructing the Voronoi diagram as the topological map of the workspace. The resulting information networks constructed by individual robots will eventually meet, allowing for inter-robot information sharing. The constructed information network is then employed by the mobile robots to protect the workspace against intruders. We introduce the intruder capturing strategy on the Voronoi diagram assisted by information networks. 相似文献
4.
网络入侵中的检测逃避与计算机取证 总被引:1,自引:0,他引:1
本文分析了入侵者用来逃避审计、日志控制及入侵检测机制所采用的工具和技术,描述了入侵者所采用的操作系统和网络策略,及企图对抗计算机取证和逃避检测的隐藏技术。介绍了在安全事件发生之前管理员应当采取的一些准备工作与防范策略。 相似文献
5.
YI Ping HOU Yafei ZHONG Yiping ZHANG Shiyong 《通讯和计算机》2005,2(1):34-40,74
Mobile ad hoc network of lets convenient infrastructure less communication over the shared wireless channel. However, the nature of ad hoc networks makes them vulnerable to security attacks. Existing security technologies such as intrusion prevention and intrusion detection are passive in response to intrusions in that their countermeasures are only to protect the networks and there is no automated, network-wide counteraction against detected intrusions. While they all play an important role in counteracting intrusion, they do not, however, effectively address the root cause of the problem - intruders. In this paper, wc propose the architecture of automated intrusion response. When an intruder is found in our architecture, the block agents will get to the neighbor nodes of the intruder and formed a firewall to isolate the intruder. In the end, we illustrate our architecture by an example. 相似文献
6.
7.
为满足网络安全管理需要,从入侵者角度出发,提出一种面向渗透测试的攻击事件图模型AEGM,并设计实现了一个网络攻击渗透测试预案生成系统。该系统以原子攻击知识库的构建及应用为前提,综合分析了从被测试目标网络脆弱点间的关联衍生出的攻击事件间的逻辑关系。利用前向广度优先搜索策略构建AEGM模型,产生渗透测试方案集,并以成功概率进行最优方案度量。实验结果表明,该方法能够有效生成渗透测试方案集,为网络安全的测试和分析提供有益参考。 相似文献
8.
9.
《Computer Communications》2007,30(11-12):2353-2364
In a wireless sensor network, multiple nodes would send sensor readings to a base station for further processing. It is known that such a many-to-one communication is highly vulnerable to a sinkhole attack, where an intruder attracts surrounding nodes with unfaithful routing information, and then performs selective forwarding or alters the data passing through it. A sinkhole attack forms a serious threat to sensor networks, particularly considering that the sensor nodes are often deployed in open areas and of weak computation and battery power.In this paper, we present a novel algorithm for detecting the intruder in a sinkhole attack. The algorithm first finds a list of suspected nodes through checking data consistency, and then effectively identifies the intruder in the list through analyzing the network flow information. The algorithm is also robust to deal with multiple malicious nodes that cooperatively hide the real intruder. We have evaluated the performance of the proposed algorithm through both numerical analysis and simulations, which confirmed the effectiveness and accuracy of the algorithm. Our results also suggest that its communication and computation overheads are reasonably low for wireless sensor networks. 相似文献
10.
由于计算机网络和通信网络内在的复杂性,并且随着网络的不断发展,传统集中式网络管理已经越来越不能满足实际的需要,采用分布式管理策略已经成为网络管理研究和发展的重要方向。针对目前这种现状,提出基于移动代理的网络管理策略,使得网络管理具有分布式管理的功能,提高网络管理的灵活性和自主性,解决集中式网络管理中存在的缺陷和问题。通过建立移动代理工作运行模型,并在相同的网络条件下,与传统网络管理策略进行分析比较,确立基于移动代理网络管理策略的优势。 相似文献
11.
Thiago C Silva Liang Zhao Thiago H. Cupertino 《Journal of Mathematical Imaging and Vision》2013,45(3):264-276
In this paper, we study a new type of competitive learning scheme realized on large-scale networks. The model consists of several agents walking within the network and competing with each other to occupy as many nodes as possible, while attempting to reject intruder agents. In the end of the process, each agent dominates a community (a strongly connected subnetwork). Here, the model is described by a stochastic dynamical system. In this paper, a mathematical analysis for uncovering the system’s properties is presented. In addition, the model is applied to solve handwritten digits and letters clustering problems. An interesting feature is that the model is able to group the same digits or letters even with considerable distortions into the same cluster. Computer simulations reveal that the proposed technique presents high precision of cluster detections, as well as low computational complexity. 相似文献
12.
Xue Lei Changyin Sun Donald Wunsch Yingjiang Zhou Yu Fang 《IEEE/CAA Journal of Automatica Sinica》2018,5(1):301-310
The iterated prisoner's dilemma (IPD) is an ideal model for analyzing interactions between agents in complex networks. It has attracted wide interest in the development of novel strategies since the success of tit-for-tat in Axelrod's tournament. This paper studies a new adaptive strategy of IPD in different complex networks, where agents can learn and adapt their strategies through reinforcement learning method. A temporal difference learning method is applied for designing the adaptive strategy to optimize the decision making process of the agents. Previous studies indicated that mutual cooperation is hard to emerge in the IPD. Therefore, three examples which based on square lattice network and scale-free network are provided to show two features of the adaptive strategy. First, the mutual cooperation can be achieved by the group with adaptive agents under scale-free network, and once evolution has converged mutual cooperation, it is unlikely to shift. Secondly, the adaptive strategy can earn a better payoff compared with other strategies in the square network. The analytical properties are discussed for verifying evolutionary stability of the adaptive strategy. 相似文献
13.
Alhaj Taqwa Ahmed Siraj Maheyzah Md Zainal Anazida Idris Inshirah Nazir Anjum Elhaj Fatin Darwish Tasneem 《International Journal of Information Security》2023,22(5):1481-1496
International Journal of Information Security - A Network Intrusion Detection System is a network security technology for detecting intruder attacks. However, it produces a great amount of... 相似文献
14.
网络数据采集技术研究 总被引:4,自引:0,他引:4
随着网络带宽的不断增长,网络安全系统(如网络入侵检测系统--NIDS)对网络数据包捕获能力要求越来越高,为了提高网络数据包的捕获能力以适应当今高速网络环境,本文在分析传统网络数据采集系统的基础上,采用地址映射、零拷贝捕包和零拷贝存储等技术,提出一种新的捕包系统,该系统的性能较传统的方法有了大幅的提高,在千兆网络环境下,能够满足网络安全对网络数据包捕获能力的需求. 相似文献
15.
Research in multi-robot pursuit-evasion demonstrates that three pursuers are sufficient to capture an intruder in a polygonal environment. However, this result requires the confined of the initial location of the intruder within the convex hull of the locations of the pursuers. In this study, we extend this result to alleviate this convexity through the application of a set of virtual goals that are independent of the locations of the pursuers. These virtual goals are solely calculated using the location information of the intruder such that whose locations confine the intruder within their convex hull at every execution cycle. We propose two strategies to coordinate the pursuers. They are the agents votes maximization and the profile matrix permutations strategies. We consider the time, the energy expended, and the distance traveled by the pursuers as metrics to analyze the performance of these strategies in contrast to three different allocation strategies. They are the probabilistic, the leader-follower, and the prioritization coordination strategies. 相似文献
16.
Jong Sun Kim Dong Hae Yeom Young Hoon Joo Jin Bae Park 《International Journal of Control, Automation and Systems》2010,8(5):967-974
In this paper, we propose the intelligent unmanned anti-theft system using network cameras. To do this, we use two Internet
Protocol (IP) cameras, which are installed at the inside and the outside of the restricted area. First of all, the external
camera is used to monitor a potential intruder entering the restricted area in real time. To detect the potential intruder
from sequential images obtained by external IP camera, we propose the robust algorithm combining the background modeling,
the hybrid silhouette, the convex summation, the morphology and the smoothing. Once the intruder is detected by the external
camera, the internal camera with pan-tilt mechanism is then activated and starts tracking the intruder and monitoring the
prescribed valuables registered with some feature points in the database. To track the intruder, we propose the tracking algorithm
using the background elimination and the histogram. And then, we completes the proposed anti-theft system by using the Scale
Invariant Feature Transform (SIFT) algorithm in order to monitor whether the intruder steals the prescribed valuables or not.
Finally, we have shown the effectiveness and the applicability of the proposed method through experiments. 相似文献
17.
莫宏伟 《计算机工程与应用》2008,44(12):9-11
研究免疫网络在一类路径选择和规划问题(羊群问题)中的应用。利用免疫网络动力学模型实现羊群问题中主动主体和被动主体之间相互作用,抗体和抗原分别对应选择的策略和动态变化的环境,建立基于免疫网络的主动主体行动策略选择模型。仿真结果表明,该方法中主动主体通过与被动主体之间相互作用,可以比传统方法自发形成概率的、较好的主动主体的行动策略,达到使羊归圈的目的。 相似文献
18.
王锋 《数字社区&智能家居》2009,(36)
随着网络应用的扩大,企业对于网络的应用过程中安全风险也变得更加严重和复杂,网络安全问题可以导致入侵者到企业内部网上进行攻击、窃取或其它破坏,这些不安全因素都对企业利用网络构成严重的安全威胁。以下主要介绍了企业网络安全影响因素及其对策。 相似文献
19.
对网络数据包进行分析是入侵检测技术通常采用的方法,Winpcap提供了Windows平台下捕获数据包的功能,使用vc6.0开发工具结合Winpcap开发包可以方便的在Windows平台下捕获网络数据包,包捕获模块采用线程实现,可以提高捕获效率。文中给出了包捕获的详细设计方案和捕获流程,对捕获原理进行了简单介绍和分析。 相似文献