共查询到20条相似文献,搜索用时 78 毫秒
1.
2.
3.
僵尸网络检测方法研究 总被引:2,自引:0,他引:2
僵尸网络是指由黑客通过多种传播手段入侵并控制的主机组成的网络.僵尸网络是各种恶意软件传播和控制的主要来源,检测僵尸网络对于网络安全非常重要.本文首先介绍了僵尸网络的结构,着重对僵尸网络的命令与控制信道进行了讨论,接着详细介绍了基于主机信息的、基于流量监测的和基于对等网络的僵尸网络检测方法,并进行了比较和讨论. 相似文献
4.
5.
在网络故障的诊断中,利用系统自带的ping命令和ARP协议可以发挥出诊断的快速性和准确性.本文首先对ping命令和ARP协议的定义及关系进行了说明,然后对基于ping命令和ARP协议的网络故障诊断方法的原理、流程以及实际判断结合实例作出分析. 相似文献
6.
7.
伴随着诸多新兴业务的发展,对移动通信的数据速率的要求也越来越高,网络运营商需要在确保用户隐私安全的情况下进行流量分类,分配所需的网络资源来服务用户,更好地优化移动通信的体系结构。传统的基于协议特征、关键字信息的流量分类方法会带来精度下降、实时性不足等问题。文章采集4G LTE网络中的下行控制信息(Downlink Control Information,DCI),训练了三类基准机器学习分类模型和长短期记忆网络(Long Short-Term Memory,LSTM)模型,识别了5种主流应用流量。实验结果表明,LSTM模型的F1-Score达到了98.92%,在不侵犯用户隐私的前提下,实现了移动通信流量的高精度分类。 相似文献
8.
论文介绍了文本信息隐藏技术、Div CSS结构文档重构技术。研究并分析了在基于Web标准的Div CSS文档中嵌入和提取隐藏信息的方法,并针对存在的问题,提出了进一步改进的方法和意见。 相似文献
9.
为了提高信息隐藏容量,而又保证安全性和不可感知性,对传统基于LSB(Least Significant Bit)的信息隐藏方法进行了以下两方面改进:增加载体空间容量以提高信息隐藏量;引入混沌序列对秘密信息进行加密以提高信息隐藏的安全性.在经典Lena图像上对改进方法进行验证,结果表明该方法在保持载体图像视觉特性和纹理特性的同时,信息隐藏量由原来的12.5%提高到21%,混沌序列的引入不仅使得信息隐藏安全性得到保证,而且也消除了信息提取过程中对原载体的依赖. 相似文献
10.
铁路行车调度员担负着组织和保障客货运输安全、有序、正点,为铁路创造高水平经济效益的重要任务.为了保障铁路运输有序可控,行车调度员发布的有关行车调度命令安全直接决定了为广大顾客服务的质量.如何优质、高效、及时地发布指挥列车运行的调度命令并且在执行命令过程中准确把握好运输节奏,确保行车安全防范调度风险成为在日常运输生产工作中的重点. 相似文献
11.
在漫长的历史长河中,与人类社会物质、能量、信息三大主导要素的更替相暗合,人类战争中介系统经历了手足中介、平台中介、信息中介三次革命.如果从13世纪中叶的火药由古代中国经阿拉伯传入欧洲并引发火药化军事革命算起,平台中介战争至今已持续了800年,即使是典型的机械化战争也有100多年的历史.目前的作战指挥控制系统是工业时代的产物,是典型的平台中心战的产物.目前已进入信息时代,如何改造目前的指挥控制系统以适应信息化时代的需要,即如何在由机械化时代转向信息化时代的转型期研制出新一代作战指挥控制系统是本文讨论的重点. 相似文献
12.
S.A. Parah J.A. Sheikh A.M. Hafiz G.M. Bhat 《International Journal of Electronics》2013,100(8):1253-1266
The unprecedented advancement of multimedia and growth of the internet has made it possible to reproduce and distribute digital media easier and faster. This has given birth to information security issues, especially when the information pertains to national security, e-banking transactions, etc. The disguised form of encrypted data makes an adversary suspicious and increases the chance of attack. Information hiding overcomes this inherent problem of cryptographic systems and is emerging as an effective means of securing sensitive data being transmitted over insecure channels. In this paper, a secure and robust information hiding technique referred to as Intermediate Significant Bit Plane Embedding (ISBPE) is presented. The data to be embedded is scrambled and embedding is carried out using the concept of Pseudorandom Address Vector (PAV) and Complementary Address Vector (CAV) to enhance the security of the embedded data. The proposed ISBPE technique is fully immune to Least Significant Bit (LSB) removal/replacement attack. Experimental investigations reveal that the proposed technique is more robust to various image processing attacks like JPEG compression, Additive White Gaussian Noise (AWGN), low pass filtering, etc. compared to conventional LSB techniques. The various advantages offered by ISBPE technique make it a good candidate for covert communication. 相似文献
13.
《Vehicular Technology, IEEE Transactions on》1969,18(1):58-58
There are two basic types of car location schemes. One uses time measurement and computes location by generalized triangulation; the other identifies location by proximity to one of a multitude of receivers or transmitters which have been permanently installed. The principal problem with the latter system is installation. By taking advantage of existing grids or networks of units, in this case police telephone call boxes, much of this installation expense may be reduced. How such a system could be installed in Washington, D.C., is described in detail. Features of the system are: 1) relatively low installation cost 2) low power units creating minimum spectrum waste 3) accuracy of ±¼ mile 4) usability by a multitude of services 5) simple inexpensive equipment requirements. 相似文献
14.
分析了TCP端到端传输确认机制在挑战环境下存在的一些问题,提出一种点到点的传输排队和确认机制,通过理论分析和实验证明,该机制能够明显降低端到端传输确认机制中存在的大量无法被捎带的ACK数据包,同时,对端到端的延时抖动有更强的容忍能力。 相似文献
15.
16.
17.
The design of effective communication and information networks (CIN) is important to the supported command and control (C2) structure. The Command, Control, Communication and Information Network Analysis Tool (C3INAT) allows experts in different fields to develop sub-models independently, thus allowing analysts to compare various communication networks under the same C2 structure. Statistical tools have been applied to C3INAT to reduce the simulation effort and to direct the study toward a near optimal solution through the application of Taguchi's method (experimental design), outlier tests, and stopping conditions. This paper outlines the applications of statistics to the evaluation of CIN. The application of Taguchi's method has reduced the necessary simulation time immensely while the structure of the method has aided in finding near-optimal conditions faster than a full-factorial analysis. Structuring the experiments before simulation allows future versions of C3INAT to incorporate automatically many of these tasks. The variance reduction technique and stopping condition place a lot of importance on the quantity ϵ. The algorithm requires minimal computer time and memory, and it can be used in conjunction with other variance reduction techniques. The algorithm, separate from the variance limit, can be applied when the variance limit is substituted with another. The technique can also be applied to post simulation analysis where the data are intact 相似文献
18.
19.