首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 93 毫秒
1.
攻击容忍系统通过对病毒入侵路径和频率进行扫频实现对病毒的挖掘,传统的扫频方法采用相位和频率特征匹配方法进行,对网络病毒非规则方向入侵不能起到较好的掩盖作用,扫频效果不好。提出一种采用病毒传播方向聚类分析的攻击容忍系统扫频方法,构建病毒传播路径分析模型,建立病毒传播的方向性空间搜索属性序列,分析病毒传播方向聚类演化模型,实现对病毒传播和入侵传播方向聚类过程的建模,求解病毒传播方向的聚类属性的信息熵,实现攻击容忍扫频改进算法。实验结果表明,算法能有效实现对病毒传播和扩散的时间和频率等信息进行扫频分析,病毒时频特征得到有效挖掘,通过扫频检测准确率较传统该方法提高13.6%。  相似文献   

2.
基于模糊集和粗糙集理论的云安全评价模型   总被引:1,自引:0,他引:1  
研究对云安全的综合评价模型,提高云计算中的网格计算并行处理和防病毒攻击能力。传统的云安全评价模型采用多层模糊集自适应算法,评价系统单一,抗病毒攻击能力较差。提出一种基于模糊集和粗糙集理论的云安全评价模型,构建云安全数据信息网格计算系统,进行安全动态数据流分析,采用基于模糊集和粗糙集理论的评价模型,构建有格点链重叠检测和向量化运算算法,检测病毒入侵信号。仿真结果表明,该云安全综合评价模型执行效率较高,对病毒入侵的检测能力提高,安全检测的成功率比传统方法提高34%,该模型有较好的安全综合评价和攻击入侵检测性能。在云计算系统安全构架中具有较好的应用价值。  相似文献   

3.
李风芝 《科技通报》2014,(4):116-118
传统的入侵检测技术采用基于7层标准模型的检测方法,对普通入侵数据具有较好的检测性能,但随着入侵数据的日益模糊化,传统检测方法的检测性能严重下降。提出一种基于蚁群游走的多层网路安全访问,将系统分为系统层、主机层、服务层的多层模型,然后将网络系统中的节点等效为蚁群单元,采用蚁群游走算法的随机适应性对入侵系统的数据进行检测,采用6元入侵数据进行系统性能测试,结果显示,算法能很好地检测入侵系统的多种非法数据,算法稳定性好,鲁棒性强,具有很好的应用价值。  相似文献   

4.
在分布式社交网络中,产生Biclique攻击信号,需要对其进行攻击延迟容忍设计,提高对病毒攻击的检测和容忍性能。传统方法中采用基于攻击信号方向性聚类延迟容忍算法,当传播路径具有发散性时,检测性能不好。提出一种基于Biclique攻击信号方向性空间搜索属性特征分解的攻击延迟容忍算法。把数据主特征建模和特征提取分类与缺省副本创建处理同步进行,得到更小的响应时间,实现攻击延迟容忍,得到基于Biclique攻击信号方向性空间搜索属性特征分解结果,进行Biclique攻击信号检测,提高对攻击信号延迟容忍性能和检测性能,仿真结果表明,采用该算进行分布式社交网络中Bi-clique攻击检测,检测性能提高34.5%,算法能有效保证分布式社交网络的安全性和对病毒攻击信号的容忍性。  相似文献   

5.
新型的网络病毒的入侵和传播以正态谐振方式进行连续攻击,检测困难,需要对病毒攻击进行有效检测。传统的检测方法采用干扰攻击定位状态转移特征提取的层次性检测算法实现对病毒连续攻击的检测,算法没能自适应求解连续攻击下的特征选择参数,检测性能不好。提出一种基于窄带信号频谱偏移修正的正态谐振网络病毒连续攻击下的重叠检测算法。采用链重叠检测和向量化运算模拟正态谐振网络病毒的攻击特征和相关性质,实现对病毒的检测,通过Langevin方程描述,正态谐振网络的病毒连续攻击表现为一种双稳态非线性驱动多频共振模型,采用窄带信号频谱偏移修正方法,计算得到病毒节点连接概率以及个体的感染率,提高检测性能。仿真结果表明,该算法对病毒传播有较好的抑制性,提高了对网络病毒连续攻击下的检测性能和重叠检测能力。  相似文献   

6.
通过对网络病毒的动态交互约束抑制设计,实现对病毒入侵特征的有效识别。传统方法采用模糊网络入侵状态特征向量分解方法实现病毒约束抑制,当病毒入侵为一种非平稳随机信息矢量时,对其识别性能不好。提出一种基于互信息特征提取的网络病毒动态交互约束算法。构建网络病毒入侵的信号分析模型,并进行数据采集,采用数模转换方法进行病毒数据离散采样转换,采用重采样和机器学习结合方法,进行了链路漏洞检测,填补了Web防火墙的漏洞,采用三次B样条小波进行互信息特征提取的结果是渐近最优的,利用互信息特征作为检测系统的输入,进行病毒数据提纯处理,基于平均互信息特征提取算法实现特征建模和提取,实现病毒动态交互约束。仿真结果表明,该算法能使得病毒数据在时频空间上得到较明显的聚焦,频谱峰值突出,提高了病毒特征有效识别率。  相似文献   

7.
有效防御病毒对工控系统的入侵是目前工控安全研究的难点问题。为了提高工控系统入侵检测的准确率,本文设计提出了一种主成分分析(PCA)与PSO-SVM相结合的工控入侵检测方法。针对工业控制系统网络数据高维的特性,该方法利用PCA对采集的网络入侵数据进行数据降维与特征提取,支持向量机(SVM)入侵检测的性能主要取决于核函数参数取值的优劣,采用粒子群算法(PSO)对支持向量机参数进行优化,以获得最优的SVM工业控制系统入侵检测模型。采用密西西比州立大学关键基础设施保护中心最新提出的工控标准数据集进行仿真实验,结果表明该算法在攻击检测与攻击类型识别方面均有较高的查准率,提高了工业控制系统的安全性能。  相似文献   

8.
功率自激网络在攻击容忍系统设计中,由于最近邻链缓存污染,导致对功率自激网络的攻击成功率较高,难以实现有限的拦截。提出采用最近邻链缓存污染判决门限控制的方法,通过自适应门限控制,提高对攻击信号的拦截概率。建立功率自激网络及缓存污染攻击系统模型,假设功率自激网络路由的内容流行度服从Zipf分布,得到入侵最近邻链缓存污染拦截在攻击容忍系统中的功率谱密度特征。采用最大似然估计进行攻击容忍系统中的HMM参数的更新,设计最近邻链缓存污染判决门限控制的方法,改进自适应判决门限控制算法,提高对攻击信号的拦截概率,达到消除缓存污染攻击的效果,实现对内容耗散网络的安全控制。仿真结果表明,该算法能有效实现了对缓存污染的拦截和冗余数据去除,缓存污染攻击拦截率,保证了功率自激网络的安全。  相似文献   

9.
恶意干扰下的网络病毒信息具有较强的高斯随机性和带宽性,传统的时频分析方法及小波特征检测方法难以实现对该类病毒入侵的有效检测。提出一种基于盲频谱检测的恶意干扰下网络病毒检测算法。构建了恶意干扰下的网络病毒入侵的信号模型构建,采用高斯平滑滤波算法进行干扰抑制预处理,提取滤波后的恶意干扰下病毒数据的盲频谱特征,以此为数据基础实现对网络入侵的准确检测。仿真结果表明,采用该文算法进行网络病毒检测识别准确度较高,性能优越,保障了网络安全。  相似文献   

10.
研究基于广域特征关联的标准模型下伪装网络入侵容忍公钥高深度加密方案,提出一种基于特征关联的公钥加密方案,通过对入侵网络数据进行特征分析的方法,提取入侵数据的原始特征,在此基础上,通过特征关联的方法对公钥进行加密,大大提高了破解难度;采用一段随机的文本进行性能测试,结果显示,与传统加密方案相比较,所提加密方案具有更高的加密深度和解密正确率,且加密后文本容量较小,基本不影响系统处理和传输,具有很好的应用价值。  相似文献   

11.
CAS should stick to the principle of rendering service to, and giving impetus for, the development of China's science enterprise by making S&T innovations, said CAS President LU Yongxiang. The CAS president made the remarks in a recent talk to communicate the gist of the winter session of the Party's Leading-member Group at CAS, which was held from 7 to 11 January in Beijing.  相似文献   

12.
This study examined how students who had no prior experience with videoconferencing would react to the use of videoconferencing as an instructional medium. Students enrolled in seven different courses completed a questionnaire at the beginning of the semester and again at the end of the semester. Students at the origination and remote sites did not differ in their reactions toward videoconferencing but there was a significant difference for gender. Women reacted less favorably to videoconferencing. Compared to the beginning of the semester, students reported significantly less positive attitudes toward taking a course through videoconferencing at the end of the semester. There were no significant differences in students' attitudes toward videoconferencing across courses at the beginning of the semester but there were significant differences across the courses at the end of the semester. The results suggest the need for better preparation for both students and instructors.  相似文献   

13.
With great care, Dr. ZHOU Zhonghe takes out a package wrapped by cotton tissue from a drawer and says: "This is the gem of our collections: the fossil of a bird that lived 125 million years ago!" Then, pointing at a tiny mound, he explains: "Look, this is the claw and that is the head. It was in the egg shell and ready to hatch ... The species fell into a family of waterside inhabitants."  相似文献   

14.
Ajoint study by Prof. ZHANG Zhibin from the CAS Institute of Zoology and his co-workers from Norway, US and Swiss have indicated that historical outbreaks of migratory locusts in China were associated with cold spells, suggesting that China's projected climate warming could decrease the pest's numbers. The study was published in Proceedings of theNational Academy of Sciences on 17 September, 2007.  相似文献   

15.
A computer-mediated group is a complex entity whose members exchange many types of information via multiple means of communication in pursuit of goals specific to their environment. Over time, they coordinate technical features of media with locally enacted use to achieve a viable working arrangement. To explore this complex interaction, a case study is presented of the social networks of interactions and media use among members of a class of computer-supported distance learners. Results show how group structures associated with project teams dominated who communicated with whom, about what, and via which media over the term, and how media came to occupy their own communication niches: Webboard for diffuse class-wide communication; Internet Relay Chat more to named others but still for general communication across the class; and e-mail primarily for intrateam communication. Face-to-face interaction, occurring only during a short on-campus session, appears to have had a catalytic effect on social and emotional exchanges. Results suggest the need to structure exchanges to balance class-wide sharing of ideas with subgroup interactions that facilitate project completion, and to provide media that support these two modes of interaction.  相似文献   

16.
Electronic data interchange (EDI) provides means for interorganizational communication, creates network externalities, requires an advanced information technology (IT) infrastructure, and relies on standards. In the diffusion of such innovations, institutional involvement is imperative. Such institutions contain governmental agencies, national and global standardization organizations, local government, and nonprofit private organizations like industry associations. The last type of organizations we call intermediating institutions. They intermediate or coordinate ("inscribe") the activities of a group of would-be adopters. Unfortunately, little is known of how these organizations shape the EDI diffusion trajectory. In this article we examine one specific type of intermediating organizations?industry associations?and how they advanced the EDI diffusion process in the grocery sectors of Hong Kong, Denmark and Finland. We identify six institutional measures, placed into a matrix formed by the mode of involvement (influence vs. regulation) and the type of diffusion force (supply push vs. demand pull), that can be mobilized to further the EDI diffusion. Industry associations were found to be active users of all these measures to varying degrees. Their role was critical especially in knowledge building, knowledge deployment, and standard setting. Furthermore, institutional involvement varied due to policy and cultural contingencies and power dependencies.  相似文献   

17.
The increasing prospects of digital piracy has prompted the perceived need by electronic publishers to adopt technical systems of protection, and governments to reform their copyright laws. This article is a preliminary study of the management of intellectual property by electronic publishers, defined as those involved in the production of online databases, and CD-ROMs. It focuses on three main issues: (1) how electronic publishers view the increasing threat of piracy; (2) the methods of protection employed to protect intellectual property in digital format; and (3) the importance of technological protection of intellectual property in electronic publications. The analysis is based on a sample of 23 UK electronic publishers. The interviews revealed an interesting assortment of protection methods and did not show that technological protection was a preferred way. Instead, the means of protection, in addition to copyright law, comprised niche markets, pricing, trust, bad publicity, and nontechnical and technical means.  相似文献   

18.
Long-standing conflict between domain name registrants and trademark holders prompted the Internet Corporation for Assigned Names and Numbers (ICANN) to create a global, mandatory arbitration procedure known as the Uniform Dispute Resolution Policy (UDRP). The UDRP has been used in 2166 cases involving 3938 domain names as of 1 November 2000. The policy gives the initiator of a complaint, generally a trademark holder, the right to choose which ICANN-accredited dispute resolution service provider (RSP) will handle the case. During the preparation of the UDRP,some feared that complainant selection would lead to "forum shopping" that might bias the results. This article performs a statistical assessment of the forum-shopping thesis and finds support for it. There are statistically significant differences in the various RSPs' propensity to take away names from defendants; there are also major differences in the number of cases brought to each RSP. RSPs who take away names have the larger share of cases. The study examines other variables that might explain differences in market share, such as price, the plaintiff's nationality, or the time taken to decide a case. It finds that nationality and time also are correlated with market share. The study concludes that shopping for a favorable outcome is an important factor in the UDRP.  相似文献   

19.
Prof. Raymond C.K. Chen, a neuropsychologist with the CAS Institute of Psychology, has made novel progress in his studies of schizophrenia. His work has been reported by a recent issue of Behavioural Neurology.  相似文献   

20.
Prof. SUN Changpu from the CAS Institute of Theoretical Physics and coworkers from University of Basel in Switzerland have worked out a way --at least in theory --to split a beam of molecules according to their chirality. The technique involves passing the molecules through three different laser beams and is similar to the famous Stern-Gerlach effect, whereby a beam of atoms passing through a magnetic field is split in two according to the atoms' spin states (Phys. Rev. Lett. 99 130403).  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号