共查询到20条相似文献,搜索用时 15 毫秒
1.
针对检测复杂网络攻击的难度,剖析复杂网络攻击的本质特征,提出一种基于HMM的入侵检测模型,通过关联分析不同网络监视器产生的报警事件序列,挖掘这些报警事件的内在联系,进而检测复杂网络攻击。实验结果表明,该模型能有效地识别复杂网络攻击的类别。 相似文献
2.
This paper studies event-triggered containment control problem of multi-agent systems (MASs) under deception attacks and denial-of-service (DoS) attacks. First, to save limited network resources, an event-triggered mechanism is proposed for MASs under hybrid cyber attacks. Different from the existing event-triggered mechanisms, the negative influences of deception attacks and DoS attacks are considered in the proposed triggering function. The communication frequencies between agents are reduced. Then, based on the proposed event-triggered mechanism, a corresponding control protocol is proposed to ensure that the followers will converge to the convex hull formed by the leaders under deception attacks and DoS attacks. Compared with the previous researches about containment control, in addition to hybrid cyber attacks being considered, the nonlinear functions related to the states of the agents are applied to describe the deception attack signals in the MAS. By orthogonal transformation of deception attack signals, the containment control problem under deception attacks and DoS attacks is reformulated as a stability problem. Then, the sufficient conditions on containment control can be obtained. Finally, a set of simulation example is used to verify the effectiveness of the proposed method. 相似文献
3.
针对移动Ad Hoc网络的动态拓扑容易遭受各种网络攻击的特点,研究和比较现有的多种攻击模型,在动态源路由(DSR)协议下提出将黑洞节点按主动攻击和被动攻击进行分类的方法。在NS2网络仿真平台上实现包括RREQ洪泛攻击、被动型黑洞攻击和主动型黑洞攻击在内的3种攻击模式。通过仿真实验评估和比较这3种攻击对网络性能的影响,得出结论,就破坏性而言,RREQ洪泛攻击强于黑洞攻击,而主动型黑洞攻击强于被动型黑洞攻击。 相似文献
4.
5.
6.
7.
The smart grid faces a variety of physical and cyber attacks. Coordinated cyber‐physical attacks can cause severer consequences than the single cyber or physical attacks, which can be divided into two categories according to whether the physical attack is stealthy or not. Coordinated cyber‐physical attacks considering DoS attacks are investigated due to the lower cost of DoS attacks. In each category of coordinated cyber‐physical attacks, the mathematical models are derived and suitable methods are adopted to solve the corresponding issue. The experimental simulation demonstrates the potentially damaging effects and threats of this newly proposed attack. It is also presented that this newly proposed attack can use lower attack resources to introduce more catastrophic effects on the power system. 相似文献
8.
Schnorr签名方案是一个基于离散对数的数字签名方案。最近,一些文献提出了新的攻击该签名方案的方法,并声称这些新的攻击成功率很高。分析了这些攻击方法,认为这些新的攻击本质上是平凡的穷搜索攻击。在系统给定的安全参数下,这些攻击成功的概率是可以忽略的。还指出了这些攻击成功率分析中的错误。 相似文献
9.
缓冲区溢出攻击是目前网络攻击的主要方式之一,而堆溢出攻击是目前缓冲区溢出攻击研究的重点。该文深入地分析了堆的结构、堆操作的原理,指出堆溢出攻击的关键结构,最后提出堆溢出防御的策略。 相似文献
10.
基于UML的攻击模式研究 总被引:5,自引:1,他引:5
黑客攻击持续增加的频率和复杂性使预防的难度越来越大。同时,多阶段攻击和协同攻击也越来越普遍。目前,关于攻击的大多数研究都集中于攻击的分类和攻击细节的分析上,仅靠这些还很难掌握攻击的本质。该文提出了攻击模式的概念,使用基于UML的攻击模式,描述了攻击的静态结构和动态行为。对一般攻击过程和具体攻击技术都做了较深入的分析,揭示了各个攻击步骤、攻击对象及各步骤相互间的本质联系。攻击模式对于多阶段攻击和协同攻击尤其适用。利用攻击模式,可以迅速地理解新型攻击,把握攻击的本质,从而提高入侵检测的准确性。 相似文献
11.
现有的Hash函数基本上都是根据Merkle-Damg?ard结构设计的。基于Merkle-Damg?ard结构易受到长度扩展攻击、多碰撞攻击、Herding攻击等这些缺陷,设计了一种链接变量循环的Hash结构,该结构是基于宽管道Hash结构的,具有大的内部状态,可以有效抵抗上述针对Merkle-Damg?ard结构的攻击。结构具有可分析的安全性,可以提高Hash函数的性能,尤其是基于数学困难问题的Hash算法,增加了消息块对Hash值的作用。 相似文献
12.
基于地址相关度的分布式拒绝服务攻击检测方法 总被引:1,自引:0,他引:1
分布式拒绝服务(DDoS)攻击检测是网络安全领域的研究热点.对DDoS攻击的研究进展及其特点进行了详细分析,针对DDoS攻击流的流量突发性、流非对称性、源IP地址分布性和目标IP地址集中性等本质特征提出了网络流的地址相关度(ACV)的概念.为了充分利用ACV,提高方法的检测质量,提出了基于ACV的DDoS攻击检测方法,通过自回归模型的参数拟合将ACV时间序列变换为多维空间内的AR模型参数向量序列来描述网络流状态特征,采用支持向量机分类器对当前网络流状态进行分类以识别DDoS攻击.实验结果表明,该检测方法能够有效地检测DDoS攻击,降低误报率. 相似文献
13.
14.
15.
16.
17.
18.
This paper focuses on the protection issues for supply systems involving random attacks, which are described as attacks whose targets cannot be predicted. We present the random-attack median fortification problem (RAMF) to identify the fortification strategy that minimizes the expected operation cost after random attacks. RAMF is formulated as an integer-linear program and solved directly using general-purpose MIP solver. Moreover, a more complex problem, the fortification median problem for disruptions caused by mixed types of attacks (FMMA), is introduced to find a balance between defending the worst-case attacks and random attacks. Solving FMMA can achieve good protection results, which are more practical in dealing with systems with mixed types of attacks, if the proportion between the types is properly estimated. We formulate FMMA as a non-linear bilevel program and extend a typical implicit enumeration (IE) algorithm to solve the problem. Finally, computational experiments demonstrate the effectiveness of both RAMF and FMMA in dealing with protective affairs involving random attacks. The efficiency of solving the formulations of RAMF and FMMA is also testified. 相似文献
19.
一种基于智能卡口令认证方案的研究 总被引:1,自引:0,他引:1
王亚飞 《计算机应用与软件》2011,(9)
基于口令的认证方案广泛应用于远程控制系统中,智能卡与静态口令结合使用的认证方式是目前应用最广泛的口令认证机制。提出一种基于智能卡的口令认证方案。通过对其安全性进行分析,发现此方案能够抵抗住离线字典攻击、假冒攻击、重放攻击和修改攻击等攻击。 相似文献
20.
分布式增速拒绝服务(DIDoS)攻击采用逐步提升发包速率的方式来造成受害者资源的慢消耗,较之传统的分布式拒绝服务(DDoS)攻击更具隐蔽性,如何尽可能早地将其捕获是一个亟待研究的问题。本文针对DIDoS攻击的特点,提出了一种基于改进AAR模型的DIDoS攻击早期检测方法。为此,首先提出了一组基于条件熵的检测特征:流特征条件熵(TFCE),用以反映DIDoS攻击流速的增长变化;然后根据改进的AAR模型对TFCE值进行多步预测;最后采用经过训练的SVM分类器对预测值进行分类,以识别攻击企图。实验结果表明,在保证检测精度相当的前提下,该方法比部分现有方法能够更快检测到攻击。 相似文献