首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 312 毫秒
1.
对网络攻击信号进行盲分离,实现对攻击信号的准确有效检测。传统的网络攻击信号检测算法使用时频分析方法,提取非平稳群攻击信号的时频特征,实现信号检测,但算法把网络入侵检测正确率作为约束目标函数进行同步最优特征子集求解,复杂度较高,提出一种引入合同变换矩阵的网络攻击信号盲分离算法。采用时频分析Viterbi算法,得到信号谱的平均频率等于瞬时频率的时间平均,根据合同变换矩阵,对攻击信号进行离散数据解析化处理,构建网络攻击信号的解析模型,得到网络统计信号在多复变边界条件下的时频特征,实现盲分离算法改进。仿真实验表明,该算法能有效实现对网络攻击信号的盲分离,盲分离结果能准确反映网络攻击信号的内部特征,提高了对网络攻击信号的检测能力,对攻击信号的检测性能有所提高,保证了网络安全。  相似文献   

2.
尚建贞  张咪 《科技通报》2015,(4):118-120
对网络攻击信号的线性调频建模和虚警门限预估计,是实现网络攻击信号检测的基础。传统方法采用路由数据交换的阵列信号聚类方法进行信号建模和虚警门限估计,由于攻击信号具有多波束自相似特征,导致虚警门限的预测精度不高。提出一种基于污点数据双模聚类的攻击调频信号虚警预估计算法,采用频率调制规律设计网络攻击信号模型,对攻击信号进行双线性核相位加权,得到脉冲压缩后的攻击信号二次调频信号输出。在双模聚类的时频平面内实现对信号检测能量的聚集,以改善信号分量聚集的尖峰,实现了对攻击调频信号的时间点与频率点的重组排列和特征分布估计,达到对虚警门限准确估计的目的。实验结果表明,该算法能有效估计攻击调频信号的虚警门限,对网络攻击信号的虚警门限的预估计精度达到98.5%,提高了对攻击信号的参数估计和信号检测能力,提高检测概率,优越性明显。  相似文献   

3.
提出采用Lorenz混沌系统异步跟踪优化期望最大化高斯混合模型算法实现对低信噪比下深度伪装的网络攻击信号最优检测。通过提取待检测网络数据流参数向量和正常数据流参数向量的差值为特征,使用高斯混合模型并与期望最大化算法相结合,设计Lorenz混沌异步跟踪检测算法,对网络数据流进行建模和检测。仿真结果表明改进的检测算法能有效去除不是攻击信号的伪峰,相比Hough变化检测算法,能更加正确地检测非法攻击信号,信噪比为-15dB下,不同异步攻击中的检测概率就能达到100%,实现检测性能最优,尤其适用于信噪比极低的深度伪装网络攻击环境中对攻击信号的检测。研究成果为网络安全防御及应用具有巨大的理论参考价值。  相似文献   

4.
郑晓霞  聂阳  戈华 《科技通报》2015,(2):188-190
在网络切换和数据通信中,会产生一种伪随机时频跳变网络谐振信号,需要对这种谐振信号进行信号抑制,提高网络的安全性和稳定性,对网络谐振信号的信息容量估计是实现谐振信号抑制的基础。提出一种基于人工免疫的伪随机时频跳变网络谐振信号的信息容量估计算法,首先进行伪随机时频跳变网络系统的总体设计,计算网络跳变信号在人工免疫进化过程中免疫节点的位置和尺度参数,引入自适应转发控制策略,构建数据信息链优先链路选择准则,预测信号的下一个跳变点,得到多路复用波束域约束指向形成信号容量的输出结果,通过对信号容量的准确估计,可以避免网络出现启动滞后、服务器负载、消息消耗以及颤抖等现象。实验结果表明,该算法对伪随机时频跳变网络谐振信号的信息容量估计精度高,抑制性能和检测性能较好,确保了网络系统的稳定。  相似文献   

5.
提出一种基于随机近场混叠谱分析的网络攻击数据散布特征挖掘算法,实现对衰落噪声干扰下的网络攻击信号的准确检测。采用自适应陷波器对衰落干扰噪声进行滤波降噪预处理,提高了待检测信号的纯度,进行随机近场混叠谱分析,采用时频分析方法进行攻击信号的时延估计,提取随机近场混叠谱特征,实现网络攻击数据散布特征挖掘优化。仿真实验表明,采用该算法能有效提取在强衰落噪声干扰下的网络攻击数据时频散布特征点,特征聚焦性能明显,提高了对网络攻击数据的检测性能。  相似文献   

6.
传统的单谱脉冲响应信号畸变检测方法无法对DoS网络攻击信号实现有效检测,提出一种采用幅度和频率对应关系双线性变换的信号检测算法准确检测DoS网络攻击信号。利用格型陷波器线性预测特性,使DoS信号发出有效攻击前产生频谱混迭状态下的预畸变效应,及早发现攻击信号,达到有效准确检测的目的。仿真结果表明,采用该检测算法检测DoS网络攻击信号,检测性能很好,检测概率大幅提高,虚警概率为0,能有效应用到网络安全和信息对抗等领域。  相似文献   

7.
在嵌入式云信息网络平台中,物理层数据传输容易受到外界攻击变异成坏数据,威胁网络安全,传统方法采用最小延时数据聚集算法实现对该类算数据的检测,算法数据的不均匀性和时延性,检测性能不好。提出一种基于数据链距离估计和时间窗口重排的网络坏数据检测算法。进行嵌入式云信息平台构建和数据采集,采用统计信号分析方法对数据进行信息链构建,对数据链距离进行估计,采用时间窗口重排方法对坏数据的谱特征进行空间重组,提高坏数据检测性能。仿真结果表明,采用该算法进行嵌入式云信息网络平台通信传输的坏数据进行检测,准确检测概率提高34.56%,检测算法的收敛性和鲁棒性较好,保证了网络系统安全。  相似文献   

8.
对网络入侵信号的准确检测,提高检测概率是保证网络安全的基础,传统检测方法难以实现对较低信噪比下的攻击信号的高效定位和检测,无法有效预测入侵信号的局部特征点,导致重采样,虚警概率和漏检概率较高。提出一种基于局部特征压缩采样的网络入侵信号检测算法,构建低信噪比下网络入侵信号模型,采用多普勒频移模糊搜索对入侵信号进行平滑处理,得到入侵信号的局部特征预测量和测量值,为了使得入侵检测适合线性实时处理过程,提高在低信噪比下的检测性能,采用卡尔曼滤波对结果进行修正,采用局部特征压缩采样判断入侵信号的联合特征,实现了对网络入侵信号的局部特征压缩采样检测。仿真结果表明,该算法检测性能较好,检测概率优于传统算法,展示了较好的应用价值,确保了网络安全。  相似文献   

9.
对新型网络攻击信号进行准确有效检测的问题已有许多研究。网络攻击信号更新变化迅速,严重影响了网络环境的安全稳定,传统的网络攻击信号检测算法如ARMA模型算法检测性能不够理想。采用非线性信号处理的方法,基于期望最大化算法的高斯混合模型,结合Lorenz混沌系统进行同步控制,提出了一种改进的网络攻击检测算法。对网络数据流进行建模并检测,将差值这个特征作为混沌同步控制量,进行检测和判决。仿真结果表明改进的检测算法能有效检测网络攻击信号数据库中最新的5类攻击信号,与ARMA算法进行检测性能比较,检测概率同等条件下提升幅度明显,最高为15%以上,在网络攻击安全防御中展现优越的应用性能和前景。  相似文献   

10.
对多分簇网络攻击伪装数据时间延迟控制,延迟攻击时间,为实现攻击伪装数据的准确检测提供时间差。传统方法采用均匀分布控制方法实现对攻击数据的时间延迟,当攻击数据具有非均匀和非线性特性时控制效果较差。提出一种基于独立自相成分分析的多分簇网络攻击伪装数据时间延迟控制算法。首先构建一个基于多分簇框架的网络攻击模型,在时间-尺度二维平面上,采用一个酉正性特征分解模型表示出待检测信号的时频向量,使用不同的尺度观察信号攻击过程中分布的位置和尺度参数,得到检测问题的最佳检测器为副本相关积分检测器,最大限度对各独立变量进行自相成分表征,得到伪装数据的时间延迟控制系统。仿真结果表明,该算法能有效实现网络攻击伪装数据的时间延迟,提高检测性能,保证网络安全。  相似文献   

11.
Aresearch group led by Prof. ZHAI Qiwei from the Institute for Nutritional Sciences under the CAS Shanghai Institutes for Biological Sciences has discovered that even relatively low doses of resveratrol--a chemical found in the skins of red grapes and in red wine--can improve the sensitivity of mice to the hormone insulin, according to a report in the October,2007 issue of Cell Metabolism. As insulin resistance is often characterized as the most critical factor contributing to the development of Type 2 diabetes, the findings“provide a potential new therapeutic approach for preventing or treating” both conditions, the researchers said.  相似文献   

12.
CAS should stick to the principle of rendering service to, and giving impetus for, the development of China's science enterprise by making S&T innovations, said CAS President LU Yongxiang. The CAS president made the remarks in a recent talk to communicate the gist of the winter session of the Party's Leading-member Group at CAS, which was held from 7 to 11 January in Beijing.  相似文献   

13.
This study examined how students who had no prior experience with videoconferencing would react to the use of videoconferencing as an instructional medium. Students enrolled in seven different courses completed a questionnaire at the beginning of the semester and again at the end of the semester. Students at the origination and remote sites did not differ in their reactions toward videoconferencing but there was a significant difference for gender. Women reacted less favorably to videoconferencing. Compared to the beginning of the semester, students reported significantly less positive attitudes toward taking a course through videoconferencing at the end of the semester. There were no significant differences in students' attitudes toward videoconferencing across courses at the beginning of the semester but there were significant differences across the courses at the end of the semester. The results suggest the need for better preparation for both students and instructors.  相似文献   

14.
With great care, Dr. ZHOU Zhonghe takes out a package wrapped by cotton tissue from a drawer and says: "This is the gem of our collections: the fossil of a bird that lived 125 million years ago!" Then, pointing at a tiny mound, he explains: "Look, this is the claw and that is the head. It was in the egg shell and ready to hatch ... The species fell into a family of waterside inhabitants."  相似文献   

15.
Ajoint study by Prof. ZHANG Zhibin from the CAS Institute of Zoology and his co-workers from Norway, US and Swiss have indicated that historical outbreaks of migratory locusts in China were associated with cold spells, suggesting that China's projected climate warming could decrease the pest's numbers. The study was published in Proceedings of theNational Academy of Sciences on 17 September, 2007.  相似文献   

16.
A computer-mediated group is a complex entity whose members exchange many types of information via multiple means of communication in pursuit of goals specific to their environment. Over time, they coordinate technical features of media with locally enacted use to achieve a viable working arrangement. To explore this complex interaction, a case study is presented of the social networks of interactions and media use among members of a class of computer-supported distance learners. Results show how group structures associated with project teams dominated who communicated with whom, about what, and via which media over the term, and how media came to occupy their own communication niches: Webboard for diffuse class-wide communication; Internet Relay Chat more to named others but still for general communication across the class; and e-mail primarily for intrateam communication. Face-to-face interaction, occurring only during a short on-campus session, appears to have had a catalytic effect on social and emotional exchanges. Results suggest the need to structure exchanges to balance class-wide sharing of ideas with subgroup interactions that facilitate project completion, and to provide media that support these two modes of interaction.  相似文献   

17.
Active biological molecules and functional structures can be fabricated into a bio-mimetic system by using molecular assembly method. Such materials can be used for the drug delivery, disease diagnosis and therapy, and new nanodevice construction.  相似文献   

18.
Electronic data interchange (EDI) provides means for interorganizational communication, creates network externalities, requires an advanced information technology (IT) infrastructure, and relies on standards. In the diffusion of such innovations, institutional involvement is imperative. Such institutions contain governmental agencies, national and global standardization organizations, local government, and nonprofit private organizations like industry associations. The last type of organizations we call intermediating institutions. They intermediate or coordinate ("inscribe") the activities of a group of would-be adopters. Unfortunately, little is known of how these organizations shape the EDI diffusion trajectory. In this article we examine one specific type of intermediating organizations?industry associations?and how they advanced the EDI diffusion process in the grocery sectors of Hong Kong, Denmark and Finland. We identify six institutional measures, placed into a matrix formed by the mode of involvement (influence vs. regulation) and the type of diffusion force (supply push vs. demand pull), that can be mobilized to further the EDI diffusion. Industry associations were found to be active users of all these measures to varying degrees. Their role was critical especially in knowledge building, knowledge deployment, and standard setting. Furthermore, institutional involvement varied due to policy and cultural contingencies and power dependencies.  相似文献   

19.
This essay focuses on universal service and the Internet as means to support social and political participation. The emphasis on access to telecommunications systems in conventional approaches to universal service is contrasted with access to content. A model of the information environment is described that accounts for the roles of content and conduit, both of which are necessary conditions to achieve true access. A method is outlined for employing information indicators to observe or measure the information environment.  相似文献   

20.
The increasing prospects of digital piracy has prompted the perceived need by electronic publishers to adopt technical systems of protection, and governments to reform their copyright laws. This article is a preliminary study of the management of intellectual property by electronic publishers, defined as those involved in the production of online databases, and CD-ROMs. It focuses on three main issues: (1) how electronic publishers view the increasing threat of piracy; (2) the methods of protection employed to protect intellectual property in digital format; and (3) the importance of technological protection of intellectual property in electronic publications. The analysis is based on a sample of 23 UK electronic publishers. The interviews revealed an interesting assortment of protection methods and did not show that technological protection was a preferred way. Instead, the means of protection, in addition to copyright law, comprised niche markets, pricing, trust, bad publicity, and nontechnical and technical means.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号