首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
邹学韬 《电视技术》2014,38(3):117-119,126
随着移动互联网的迅猛发展,智能手机越来越普及,其安全问题也随之而来。入侵检测技术能收集信息并进行分析,通过与规则库比较,发现是否含有入侵攻击。由于目前移动互联网监测能力不足,大量木马入侵手机,严重影响了手机用户的生活。提出了一套应用于移动互联网的入侵检测系统,能有效检测到入侵攻击,并及时响应,保证手机安全。  相似文献   

2.
2021年6月底我国手机网民规模超10亿,手机APP数量约300万款,APP已经成为各类业务发展的重要入口,直接或间接接触海量用户个人敏感信息。同时,近年来APP违法违规采集、使用、储存个人信息的问题愈发严峻,已对个人用户和社会公共利益造成威胁,引发公众广泛关注。本文通过梳理APP个人信息保护现状、结合监管要求,创新构建了一种企业自有APP用户个人信息安全保护体系,体系包括多维安全检测内容、多端智能检测模式、多级能力输出、主动威胁预警四个模块,为企业APP健康发展注智赋能,为用户个人信息安全保驾护航。  相似文献   

3.
基于移动用户上下文相似度的协同过滤推荐算法   总被引:1,自引:0,他引:1  
该文面向移动通信网络领域的个性化服务推荐问题,通过将移动用户上下文信息引入协同过滤推荐过程,提出一种基于移动用户上下文相似度的改进协同过滤推荐算法。该算法首先计算基于移动用户的上下文相似度,以构造目标用户当前上下文的相似上下文集合,然后采用上下文预过滤推荐方法对移动用户-移动服务-上下文3维模型进行降维得到移动用户-移动服务2维模型,最后结合传统2维协同过滤算法进行偏好预测和推荐。仿真数据集和公开数据集实验表明,该算法能够用于移动网络服务环境下的用户偏好预测,并且与传统协同过滤相比具有更高的推荐精确度。  相似文献   

4.
智能终端应用软件安全技术研究   总被引:1,自引:0,他引:1  
主要阐述通过动态监控及静态分析等手段对Android系统智能终端软件进行行为分析,以判断软件是否有恶意吸取话费、恶意订购业务、窃取用户手机隐私、控制手机发送垃圾短信、传播不良信息等恶意行为,并结合实例剖析静态反汇编分析、动态行为监控原理及方法。最后初步设计了智能终端应用软件安全防护体系模型,以促进移动互联网安全发展。  相似文献   

5.
伴随着智能手机的普遍使用,用户通过随身携带的手机来完成支付业务的需求更加普及.但是,随着移动支付规模的大幅增长,移动支付业务各个环节中所面临的安全问题更加不容忽视.文中对移动支付所面临的安全问题进行了详尽的分析,同时针对这些问题,提出了基于当前主流安全技术的解决方案,为移动支付业务的安全保障提供参考.  相似文献   

6.
面向移动云计算的多要素代理重加密方案   总被引:2,自引:0,他引:2  
云与移动计算的融合使用户能够更方便快捷地获取数据和服务,但是由于云平台和移动通信网络的开放性,如何在移动云计算环境下实现数据安全的访问和使用成为了亟待解决的问题。设计了一种基于多要素访问控制条件的代理重加密方案,包含系统模型、重加密算法及重加密密钥描述方法。基于该方案,云计算数据中心通过移动用户的访问请求,获取用户的客观访问控制条件,为用户生成相应的重加密密文,用户使用自身私钥即可对授权数据解密。在不增加用户密钥管理量的前提下,实现了移动云计算的多要素代理重加密。  相似文献   

7.
刘飞扬  李坤  宋飞  周华春 《电信科学》2021,37(11):17-32
针对分布式拒绝服务(distributed denial of service,DDoS)网络攻击知识库研究不足的问题,提出了DDoS攻击恶意行为知识库的构建方法。该知识库基于知识图谱构建,包含恶意流量检测库和网络安全知识库两部分:恶意流量检测库对 DDoS 攻击引发的恶意流量进行检测并分类;网络安全知识库从流量特征和攻击框架对DDoS 攻击恶意行为建模,并对恶意行为进行推理、溯源和反馈。在此基础上基于DDoS 开放威胁信号(DDoS open threat signaling,DOTS)协议搭建分布式知识库,实现分布式节点间的数据传输、DDoS攻击防御与恶意流量缓解功能。实验结果表明,DDoS攻击恶意行为知识库能在多个网关处有效检测和缓解DDoS攻击引发的恶意流量,并具备分布式知识库间的知识更新和推理功能,表现出良好的可扩展性。  相似文献   

8.
For the dramatic increase in the number and variety of mobile malware had created enormous challenge for information security of mobile network users,a value-derivative GRU-based mobile malware traffic detection approach was proposed in order to solve the problem that it was difficult for a RNN-based mobile malware traffic detection approach to capture the dynamic changes and critical information of abnormal network traffic.The low-order and high-order dynamic change information of the malicious network traffic could be described by the value-derivative GRU approach at the same time by introducing the concept of “accumulated state change”.In addition,a pooling layer could ensure that the algorithm can capture key information of malicious traffic.Finally,simulation were performed to verify the effect of accumulated state changes,hidden layers,and pooling layers on the performance of the value-derivative GRU algorithm.Experiments show that the mobile malware traffic detection approach based on value-derivative GRU has high detection accuracy.  相似文献   

9.
In modern mobile communications, personal privacy and security are of top concern to mobile phone subscribers. Yet, owing to the limit of their processing capability, mainstream mobile manufacturers are still unable to apply advanced security protocol to mobile devices. It should be noted that many security protocols are based on RSA algorithm. To implement RSA algorithm and thus apply many advanced security protocols to mobile networks, this paper proposes an efficient and practical method based on the Texas Instruments TMS320C55x family. When the proposed method is employed, it takes only 7.9 milliseconds to perform a 1024-bit RSA encryption operation at the clock frequency of 200 MHz. Our decryption operation is at least 3.5 times faster than the time taken to perform the same operation without employing the proposed method. In addition, the proposed method can stop any power-analysis attack on RSA-based security protocols, thereby enhancing the security of mobile environments.  相似文献   

10.
针对网络攻击出现的大规模、协同、多阶段的特点,提出一种基于攻击图模型的网络安全态势评估方法.首先,结合攻击事件的时空特征融合多源告警数据构建网络攻击行为特征;其次,基于告警信息映射攻击节点,关联多步攻击的路径;再次,在构建攻击图的基础上,结合转移序列构建攻击节点转移概率表,将转移概率引入攻击图中,推断攻击者的攻击意图;...  相似文献   

11.
The booming development of the mobile internet and cloud computing leads to the emerging of many mobile cloud platforms based services.However,since mobile users store lots of data and privacy information in the cloud when they are using the mobile cloud services,they are facing multiple increasingly serious security threats such as data leaks and privacy exposures.The data security and privacy protection was investigated in mobile cloud computing,aiming at the internal bad mouthing attacks and mobile attacks.A dynamic game and reliable recommendation based transferring reputation mechanism was proposed.First,a dynamic game based recommendation incentive mechanism was proposed.Secondly,a reliable recommendation reputation evaluation model was established based on the incentive mechanism.Last,a novel transferring reputation mechanism was proposed that combined the above mentioned incentive mechanism and reputation evaluation model.Simulation results demonstrate the proposed transferring reputation mechanism can defend against the internal bad mouthing attacks and mobile attacks effectively,enhance the credibility of mobile terminals and improve the data security and privacy protection of mobile cloud services.  相似文献   

12.
Information security and privacy on the internet are critical issues in our society. In this research, we examine factors that influence internet users' private-information-sharing behavior. Based on a survey of 285 preteens and early teens, who are among the most vulnerable groups on the web, this study provides a research framework that explains an internet user's information privacy protection behavior. According to our study results, internet users' information privacy behaviors are affected by two significant factors: (1) users' perceived importance of information privacy and (2) information privacy self-efficacy. The study also found that users believe in the value of online information privacy and that information privacy protection behavior varies by gender. Our findings indicate that educational opportunities regarding internet privacy and computer security as well as concerns from other reference groups (e.g., peer, teacher, and parents) play an important role in positively affecting the internet users' protective behavior regarding online privacy.   相似文献   

13.
涂哲  周华春  李坤  王玮琳 《电信科学》2020,36(10):37-45
“内生安全”赋予信息网络自学习、自成长的能力,是构建可信智能通信网络不可或缺的重要组成部分。面向信息网络“内生安全”,提出了一种内生恶意行为检测框架,变被动防御为主动拦截。同时,对内生恶意行为检测框架中五大关键组件进行了建模分析,并对自学习、自成长的恶意行为检测机制进行了阐述。最后,搭建原型系统并进行了实验,实验结果表明了检测框架的可行性和有效性。  相似文献   

14.
针对目前传统入侵检测系统难以得出网络攻击行为之间存在的关联关系问题,以攻击图表示模型为指引,提出一种基于贝叶斯网络的攻击事件智能发掘模型。本文以先验知识建立贝叶斯攻击行为关联图。基于属性相似度聚合网络攻击行为,针对网络攻击场景设计高效的ExApriori算法发掘攻击行为间的关联规则,并建立攻击行为组集。利用贝叶斯攻击行为关联图的参数对攻击行为组集进行计算,实现对攻击事件的发掘。实验表明,本模型能有效提取网络攻击事件及发现攻击路径,为网络攻击事件的发现与应对措施提供理论支持和技术支撑。  相似文献   

15.
通过分析当前云计算中基于口令与证书的模式身份认证,发现存在口令泄露、证书劫持、恶意攻击等导致信息泄密的安全隐患。结合安全卡携带方便、认证效率高、安全度强的特性,基于椭圆算法设计实现了用户与云计算服务器安全认证、密钥协商以及数据密文传输,有效地解决了终端用户身份认证存在的安全问题,并增强了云计算服务的安全性。  相似文献   

16.
移动通信网络病毒防治方案浅析   总被引:1,自引:0,他引:1  
面对移动通信网络层出不穷的安全问题和潜在的安全隐患,移动通信网络病毒防治工作已成为非常重要的课题.文章主要通过真实案例说明当前移动通信网络的安全危机,以引起移动通信用户对手机病毒的防范意识;同时,文章还描述了移动通信网络安全系统的解决方案,即同时从终端侧和网络侧采取预防应对措施.  相似文献   

17.
The User-level Security of Mobile Communication Systems   总被引:2,自引:0,他引:2  
1 IntroductionBoththefixedtelephonenetworkandthemo bilesystems (e .g .,GSM )arebeingusedincreas inglyfornotonlyspeechandfaxcommunicationbutalsoInternetservice .ThedemandforthefixedIn ternetservice ,namelytheWorldWideWeb(WWW ) ,hasbeenspectacular.Theserviceisnow…  相似文献   

18.
Differently from the general online social network(OSN),locationbased mobile social network(LMSN),which seamlessly integrates mobile computing and social computing technologies,has unique characteristics of temporal,spatial and social correlation.Recommending friends instantly based on current location of users in the real world has become increasingly popular in LMSN.However,the existing friend recommendation methods based on topological structures of a social network or non-topological information such as similar user profiles cannot well address the instant making friends in the real world.In this article,we analyze users' check-in behavior in a real LMSN site named Gowalla.According to this analysis,we present an approach of recommending friends instantly for LMSN users by considering the real-time physical location proximity,offline behavior similarity and friendship network information in the virtual community simultaneously.This approach effectively bridges the gap between the offline behavior of users in the real world and online friendship network information in the virtual community.Finally,we use the real user check-in dataset of Gowalla to verify the effectiveness of our approach.  相似文献   

19.
Mobile RFID的安全和隐私问题研究   总被引:1,自引:1,他引:1  
射频识别技术被广泛应用于物体的自动识别,广泛地部署射频识别的标签会给用户的隐私带来新的安全威胁。目前,射频识别出现一种融合的趋势,阅读器被集成到移动电话中。移动射频识别主要应用于普通终端用户,用户的安全和隐私是最优考虑的问题。论文描述了移动RFID的应用场景和安全及隐私威胁,重点描述了移动环境下特殊的安全和隐私危险及解决移动RFID安全和隐私问题的安全体系构架方案。  相似文献   

20.
徐亮 《电子设计工程》2012,20(15):34-37
针对当前Android手机用户通过手机访问网络的需求日益增加的情况。提出了增强基于Android手机网络通信的安全性的目标,研究并采用在Android系统上实现拦截和过滤骚扰电话及短信的关键技术。继而给出一种实现Android系统过滤电话和短信黑白名单的防骚扰的方法。通过测试Android系统手机的实时短信以及来电.达到拦截白名单以外所有电话以及短信,或者拦截黑名单内所有的电话以及短信的效果,从而验证Android通信安防系统的方法性和可实现性。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号