期刊文献+
共找到103篇文章
< 1 2 6 >
每页显示 20 50 100
分布式拒绝服务攻击及防范研究 被引量:11
1
作者 林梅琴 李志蜀 +3 位作者 袁小铃 周密 王雪松 童铭 《计算机应用研究》 CSCD 北大核心 2006年第8期136-138,151,共4页
拒绝服务攻击(Denial of Service,DoS)是网络上最常见的一种攻击方式,其攻击类型繁多、影响广泛,其中的分布式拒绝服务攻击(D istributed Denial of Service,DDoS)更是严重威胁网络安全,受到这种攻击的损失是无法计量的。系统地分析了... 拒绝服务攻击(Denial of Service,DoS)是网络上最常见的一种攻击方式,其攻击类型繁多、影响广泛,其中的分布式拒绝服务攻击(D istributed Denial of Service,DDoS)更是严重威胁网络安全,受到这种攻击的损失是无法计量的。系统地分析了分布式拒绝服务攻击的攻击原理和攻击类型,通过研究各个DDoS攻击程序提出相应的防御方法。 展开更多
关键词 拒绝服务攻击 分布式拒绝服务攻击 扫描 入侵检测
下载PDF
DoS攻击效果评估系统的设计 被引量:9
2
作者 胡影 鲜明 肖顺平 《计算机工程与科学》 CSCD 2005年第2期15-16,22,共3页
本文针对DoS攻击分析了能反映其攻击效果的指标,提出了一种DoS攻击效果评估系统的设计方案,并对该 方案可能存在的问题进行了讨论。此设计方案采用了基于代理的分布式体系结构,具有较好的扩展性和伸缩性,在此基础 上,可以对其他攻击进... 本文针对DoS攻击分析了能反映其攻击效果的指标,提出了一种DoS攻击效果评估系统的设计方案,并对该 方案可能存在的问题进行了讨论。此设计方案采用了基于代理的分布式体系结构,具有较好的扩展性和伸缩性,在此基础 上,可以对其他攻击进行扩展,建立更加通用的攻击效果评估系统。 展开更多
关键词 网络安全 入侵检测系统 计算机网络 网络攻击效果评估系统 设计 dos
下载PDF
Cyberattack Ramifications, The Hidden Cost of a Security Breach
3
作者 Meysam Tahmasebi 《Journal of Information Security》 2024年第2期87-105,共19页
In this in-depth exploration, I delve into the complex implications and costs of cybersecurity breaches. Venturing beyond just the immediate repercussions, the research unearths both the overt and concealed long-term ... In this in-depth exploration, I delve into the complex implications and costs of cybersecurity breaches. Venturing beyond just the immediate repercussions, the research unearths both the overt and concealed long-term consequences that businesses encounter. This study integrates findings from various research, including quantitative reports, drawing upon real-world incidents faced by both small and large enterprises. This investigation emphasizes the profound intangible costs, such as trade name devaluation and potential damage to brand reputation, which can persist long after the breach. By collating insights from industry experts and a myriad of research, the study provides a comprehensive perspective on the profound, multi-dimensional impacts of cybersecurity incidents. The overarching aim is to underscore the often-underestimated scope and depth of these breaches, emphasizing the entire timeline post-incident and the urgent need for fortified preventative and reactive measures in the digital domain. 展开更多
关键词 Artificial Intelligence (AI) Business Continuity Case Studies Copyright Cost-Benefit Analysis Credit Rating Cyberwarfare Cybersecurity Breaches Data Breaches denial Of service (dos) Devaluation Of Trade Name Disaster Recovery Distributed denial of service (Ddos) Identity Theft Increased Cost to Raise Debt Insurance Premium Intellectual Property Operational Disruption Patent Post-Breach Customer Protection Recovery Point Objective (RPO) Recovery Time Objective (RTO) Regulatory Compliance Risk Assessment service Level Agreement Stuxnet Trade Secret
下载PDF
基于增量支持向量机的DoS入侵检测 被引量:7
4
作者 刘晔 王泽兵 +1 位作者 冯雁 古红英 《计算机工程》 EI CAS CSCD 北大核心 2006年第4期179-180,186,共3页
提出了一个基于增量学习支持向量机的DoS入侵检测方法,其基本思想是将训练样本库分割成几个互不相交的训练子库,按批次对各个训练子库样本进行训练,每次训练中只保留支持向量,去除非支持向量。与传统的基于支持向量机的入侵检测方法对... 提出了一个基于增量学习支持向量机的DoS入侵检测方法,其基本思想是将训练样本库分割成几个互不相交的训练子库,按批次对各个训练子库样本进行训练,每次训练中只保留支持向量,去除非支持向量。与传统的基于支持向量机的入侵检测方法对比的试验表明,该方法在不影响检测性能的同时明显减少了训练时间。 展开更多
关键词 入侵检测 拒绝服务 增量学习 支持向量机
下载PDF
一种改进的概率包标记方案 被引量:6
5
作者 张立莉 曹天杰 汤丽娟 《计算机工程》 CAS CSCD 北大核心 2008年第7期148-150,共3页
如何防御分布式拒绝服务攻击是当今最重要的网络安全问题之一。该文基于Savage等人提出的概率包标记方案,提出了改进方案,其只需4个有效分片就可以重构攻击路径,减少了IP的有效性验证次数,提高了重构攻击路径的速度。理论分析与实验结... 如何防御分布式拒绝服务攻击是当今最重要的网络安全问题之一。该文基于Savage等人提出的概率包标记方案,提出了改进方案,其只需4个有效分片就可以重构攻击路径,减少了IP的有效性验证次数,提高了重构攻击路径的速度。理论分析与实验结果证明了该方案的有效性。 展开更多
关键词 IP追踪 拒绝服务 分布式拒绝服务 概率包标记
下载PDF
服务跳变抗DoS机制的博弈理论分析 被引量:7
6
作者 石乐义 贾春福 吕述望 《电子与信息学报》 EI CSCD 北大核心 2009年第1期228-232,共5页
该文对DoS攻防进行不完全信息博弈分析,讨论了DoS防范的困境,指出信息的不对称性和未能形成服务方-用户联盟是防范困境的根本原因。通过引入服务跳变策略,增加服务类型并建立服务方-用户联盟,即可构造新的DoS攻防博弈均衡,理论上证明了... 该文对DoS攻防进行不完全信息博弈分析,讨论了DoS防范的困境,指出信息的不对称性和未能形成服务方-用户联盟是防范困境的根本原因。通过引入服务跳变策略,增加服务类型并建立服务方-用户联盟,即可构造新的DoS攻防博弈均衡,理论上证明了服务跳变策略具有主动的抗DoS特性,对于服务跳变与DoS主动防范策略研究具有理论意义。 展开更多
关键词 拒绝服务 博弈论 纳什均衡 服务跳变 联盟
下载PDF
IEEE802.11i中四次握手过程的安全分析和改进 被引量:5
7
作者 梁峰 史杏荣 曲阜平 《计算机工程》 CAS CSCD 北大核心 2007年第3期149-150,179,共3页
对IEEE802.11i协议中四次握手过程的临时会话密钥的协商和建立过程中的安全性进行了分析,发现在四次握手过程中存在安全隐患,并因此可能受到DoS(拒绝服务)攻击。在此基础上提出了一种改进方法,使四次握手过程的安全性得到进一步增强。
关键词 无线局域网 IEEE802.11i协议 四次握手 拒绝服务 密钥管理
下载PDF
IPSec中基于IKE的安全防范机制 被引量:5
8
作者 李平均 杨光 +1 位作者 刘环宇 党聪维 《微电子学与计算机》 CSCD 北大核心 2003年第4期76-80,共5页
文章从IPSec中密钥管理协议(InternetKeyExchange,IKE)的安全机制入手,针对IKE可能遭受到的攻击和协商模式讨论其安全性能,指出了存在的安全缺陷,并给出了修改建议。
关键词 IPSEC协议 密钥管理协议 IKE协议 安全防范机制 通信协议 Internet
下载PDF
电力系统防御DoS网络攻击的机制研究
9
作者 刘治开 张原 刘享秀 《信息与电脑》 2024年第2期209-211,共3页
传统电力系统容易受到网络干扰和攻击,系统中某一部分受到攻击可能会导致整个电力系统瘫痪。由于现代电力系统的广域性和灵活性会导致出现更多的网络攻击点,因此针对新领域研究更多的防御策略变得至关重要。基于此,利用连续时域模型对... 传统电力系统容易受到网络干扰和攻击,系统中某一部分受到攻击可能会导致整个电力系统瘫痪。由于现代电力系统的广域性和灵活性会导致出现更多的网络攻击点,因此针对新领域研究更多的防御策略变得至关重要。基于此,利用连续时域模型对各种攻击策略进行建模,并分析电力系统防御拒绝服务(Denial of Service,DoS)攻击的机制。 展开更多
关键词 电力系统 网络攻击 拒绝服务(dos)
下载PDF
Detecting and Preventing of Attacks in Cloud Computing Using Hybrid Algorithm
10
作者 R.S.Aashmi T.Jaya 《Intelligent Automation & Soft Computing》 SCIE 2023年第1期79-95,共17页
Cloud computing is the technology that is currently used to provide users with infrastructure,platform,and software services effectively.Under this system,Platform as a Service(PaaS)offers a medium headed for a web de... Cloud computing is the technology that is currently used to provide users with infrastructure,platform,and software services effectively.Under this system,Platform as a Service(PaaS)offers a medium headed for a web development platform that uniformly distributes the requests and resources.Hackers using Denial of service(DoS)and Distributed Denial of Service(DDoS)attacks abruptly interrupt these requests.Even though several existing methods like signature-based,statistical anomaly-based,and stateful protocol analysis are available,they are not sufficient enough to get rid of Denial of service(DoS)and Distributed Denial of Service(DDoS)attacks and hence there is a great need for a definite algorithm.Concerning this issue,we propose an improved hybrid algorithm which is a combination of Multivariate correlation analysis,Spearman coefficient,and mitigation technique.It can easily differentiate common traffic and attack traffic.Not only that,it greatly helps the network to distribute the resources only for authenticated requests.The effects of comparing with the normalized information have shown an extra encouraging detection accuracy of 99%for the numerous DoS attack as well as DDoS attacks. 展开更多
关键词 Hybrid algorithm(HA) distributed denial of service(Ddos) denial of service(dos) platform as a service(PaaS) infrastructure as a service(IaaS) software as a service(SaaS)
下载PDF
A Hybrid DNN-RBFNN Model for Intrusion Detection System
11
作者 Wafula Maurice Oboya Anthony Waititu Gichuhi Anthony Wanjoya 《Journal of Data Analysis and Information Processing》 2023年第4期371-387,共17页
Intrusion Detection Systems (IDS) are pivotal in safeguarding computer networks from malicious activities. This study presents a novel approach by proposing a Hybrid Dense Neural Network-Radial Basis Function Neural N... Intrusion Detection Systems (IDS) are pivotal in safeguarding computer networks from malicious activities. This study presents a novel approach by proposing a Hybrid Dense Neural Network-Radial Basis Function Neural Network (DNN-RBFNN) architecture to enhance the accuracy and efficiency of IDS. The hybrid model synergizes the strengths of both dense learning and radial basis function networks, aiming to address the limitations of traditional IDS techniques in classifying packets that could result in Remote-to-local (R2L), Denial of Service (Dos), and User-to-root (U2R) intrusions. 展开更多
关键词 Dense Neural Network (DNN) Radial Basis Function Neural Network (RBFNN) Intrusion Detection System (IDS) denial of service (dos) Remote to Local (R2L) User-to-Root (U2R)
下载PDF
基于非重复包标记的IP追踪研究 被引量:3
12
作者 朱晓建 刘渊 李秀珍 《计算机应用》 CSCD 北大核心 2007年第11期2694-2695,2698,共3页
防御分布式拒绝服务攻击是当前网络安全中最难解决的问题之一。在基本包标记的基础上,提出了非重复包标记的方法,并运用自适应策略分析标记概率,有效地减少了路径重构所需的数据包数和路由器的标记工作量,提高了路径重构的效率。
关键词 包标记 IP追踪 拒绝服务攻击 分布式拒绝服务攻击
下载PDF
低速率TCP拒绝服务攻击的检测响应机制 被引量:5
13
作者 魏蔚 董亚波 +1 位作者 鲁东明 金光 《浙江大学学报(工学版)》 EI CAS CSCD 北大核心 2008年第5期757-762,814,共7页
低速率TCP拒绝服务攻击利用传输控制协议(TCP)重传超时机制,爆发时会严重降低合法TCP流吞吐量的流量特性.分析发现,合法流量和包含攻击包流量采样在功率谱密度上存在显著差异.通过分析大量历史数据中这种差异的统计特性,提出了以低频功... 低速率TCP拒绝服务攻击利用传输控制协议(TCP)重传超时机制,爆发时会严重降低合法TCP流吞吐量的流量特性.分析发现,合法流量和包含攻击包流量采样在功率谱密度上存在显著差异.通过分析大量历史数据中这种差异的统计特性,提出了以低频功率和为指标的检测方法.同时基于现有的漏桶限流和增加路由器接收缓存的响应方法,提出了结合包队列和漏桶的响应方法,主要原理是在漏桶周期性平滑流量的同时,将多余流量暂存在一个包队列中以在下一个周期发送.数学分析证明了该响应方法具有合理的资源要求.仿真实验表明,提出的检测方法具有极低的漏报率和误报率,与已有的典型方法相比,提出的响应方法能够在具有一般性的攻击场景下更加有效地抑制攻击流量,并且在已有方法失效的情况下仍能保证吞吐量维持在接近正常的水平. 展开更多
关键词 拒绝服务 功率谱密度 漏桶
下载PDF
A Quasi-Newton Neural Network Based Efficient Intrusion Detection System for Wireless Sensor Network
14
作者 A.Gautami J.Shanthini S.Karthik 《Computer Systems Science & Engineering》 SCIE EI 2023年第4期427-443,共17页
In Wireless Sensor Networks(WSN),attacks mostly aim in limiting or eliminating the capability of the network to do its normal function.Detecting this misbehaviour is a demanding issue.And so far the prevailing researc... In Wireless Sensor Networks(WSN),attacks mostly aim in limiting or eliminating the capability of the network to do its normal function.Detecting this misbehaviour is a demanding issue.And so far the prevailing research methods show poor performance.AQN3 centred efficient Intrusion Detection Systems(IDS)is proposed in WSN to ameliorate the performance.The proposed system encompasses Data Gathering(DG)in WSN as well as Intrusion Detection(ID)phases.In DG,the Sensor Nodes(SN)is formed as clusters in the WSN and the Distance-based Fruit Fly Fuzzy c-means(DFFF)algorithm chooses the Cluster Head(CH).Then,the data is amassed by the discovered path.Next,it is tested with the trained IDS.The IDS encompasses‘3’steps:pre-processing,matrix reduction,and classification.In pre-processing,the data is organized in a clear format.Then,attributes are presented on the matrix format and the ELDA(entropybased linear discriminant analysis)lessens the matrix values.Next,the output as of the matrix reduction is inputted to the QN3 classifier,which classifies the denial-of-services(DoS),Remotes to Local(R2L),Users to Root(U2R),and probes into attacked or Normal data.In an experimental estimation,the proposed algorithm’s performance is contrasted with the prevailing algorithms.The proposed work attains an enhanced outcome than the prevailing methods. 展开更多
关键词 Distance fruit fly fuzzy c-means(DFFF) entropy-based linear discriminant analysis(ELDA) Quasi-Newton neural network(QN3) remote to local(R2L) denial of service(dos) user to root(U2R)
下载PDF
Resilient distributed economic dispatch of a cyber-power system under DoS attack 被引量:4
15
作者 Feisheng YANG Xuhui LIANG Xiaohong GUAN 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2021年第1期40-50,共11页
The economic dispatch problem of a smart grid under vicious denial of service(DoS)is the main focus of this paper.Taking the actual situation of power generation as a starting point,a new distributed optimization mode... The economic dispatch problem of a smart grid under vicious denial of service(DoS)is the main focus of this paper.Taking the actual situation of power generation as a starting point,a new distributed optimization model is established which takes the environmentai pollution penalty into account.For saving the limited bandwidth,a novel distributed event-triggered scheme is proposed to keep the resilience and economy of a class of cyber-power syst ems when the communication net work is subject to malicious DoS attack.Then an improved multi-agent consensus protocol based on the gradient descent idea is designed to solve the minimization problem,and the prerequisites to minimize the system power generation cost are analyzed from the aspects of optimality and stability.Finally,the theoretical results are verified through a single-area 10-generat or unit simulation. 展开更多
关键词 Economic dispatch denial of service(dos)attack Resilient event-triggered scheme Distributed optimization
原文传递
Resource Exhaustion Attack Detection Scheme for WLAN Using Artificial Neural Network
16
作者 Abdallah Elhigazi Abdallah Mosab Hamdan +6 位作者 Shukor Abd Razak Fuad A.Ghalib Muzaffar Hamzah Suleman Khan Siddiq Ahmed Babikir Ali Mutaz H.H.Khairi Sayeed Salih 《Computers, Materials & Continua》 SCIE EI 2023年第3期5607-5623,共17页
IEEE 802.11 Wi-Fi networks are prone to many denial of service(DoS)attacks due to vulnerabilities at the media access control(MAC)layer of the 802.11 protocol.Due to the data transmission nature of the wireless local ... IEEE 802.11 Wi-Fi networks are prone to many denial of service(DoS)attacks due to vulnerabilities at the media access control(MAC)layer of the 802.11 protocol.Due to the data transmission nature of the wireless local area network(WLAN)through radio waves,its communication is exposed to the possibility of being attacked by illegitimate users.Moreover,the security design of the wireless structure is vulnerable to versatile attacks.For example,the attacker can imitate genuine features,rendering classificationbased methods inaccurate in differentiating between real and false messages.Althoughmany security standards have been proposed over the last decades to overcome many wireless network attacks,effectively detecting such attacks is crucial in today’s real-world applications.This paper presents a novel resource exhaustion attack detection scheme(READS)to detect resource exhaustion attacks effectively.The proposed scheme can differentiate between the genuine and fake management frames in the early stages of the attack such that access points can effectively mitigate the consequences of the attack.The scheme is built through learning from clustered samples using artificial neural networks to identify the genuine and rogue resource exhaustion management frames effectively and efficiently in theWLAN.The proposed scheme consists of four modules whichmake it capable to alleviates the attack impact more effectively than the related work.The experimental results show the effectiveness of the proposed technique by gaining an 89.11%improvement compared to the existing works in terms of detection. 展开更多
关键词 802.11 media access control(MAC) wireless local area network(WLAN) artificial neural network denial-of-service(dos)
下载PDF
一种基于移动Agent的分布式应用系统架构 被引量:4
17
作者 石太伟 郭陟 顾明 《计算机工程》 EI CAS CSCD 北大核心 2005年第24期61-63,共3页
拒绝服务(DoS)攻击对分布式应用系统的安全威胁日益严重。文章提出了一种基于移动Agent的分布式应用系统架构,用以保护系统中的应用服务器,提高其抗DoS攻击的能力。为进一步改善系统抗DoS攻击性能,提出了一种基于遗传算法的代理主机分... 拒绝服务(DoS)攻击对分布式应用系统的安全威胁日益严重。文章提出了一种基于移动Agent的分布式应用系统架构,用以保护系统中的应用服务器,提高其抗DoS攻击的能力。为进一步改善系统抗DoS攻击性能,提出了一种基于遗传算法的代理主机分组算法。最后定性评估了系统的抗DoS攻击能力。 展开更多
关键词 拒绝服务攻击 分布式系统 移动AGENT 遗传算法
下载PDF
一种基于IPv6 CGA的域内安全组播基础设施 被引量:2
18
作者 陈越 林予松 +1 位作者 费晓飞 兰巨龙 《计算机工程与应用》 CSCD 北大核心 2005年第13期121-124,共4页
针对任意源组播和特定源组播在抗DoS攻击方面的缺陷,论文提出了一种基于IPv6密码地址构建的域内安全组播基础设施结构。该结构通过规定域内可存在的组地址以及基于发送方和接收方证书的访问控制机制,在组播域内实现了抵抗来自恶意主机... 针对任意源组播和特定源组播在抗DoS攻击方面的缺陷,论文提出了一种基于IPv6密码地址构建的域内安全组播基础设施结构。该结构通过规定域内可存在的组地址以及基于发送方和接收方证书的访问控制机制,在组播域内实现了抵抗来自恶意主机的控制平面和数据平面攻击。 展开更多
关键词 任意源组播 特定源组播 拒绝服务攻击 访问控制
下载PDF
双主体认证协议抵御DoS攻击的安全方案 被引量:2
19
作者 陈建辉 徐涛 《计算机工程》 CAS CSCD 北大核心 2008年第6期140-142,共3页
认证协议存在的一定的拒绝服务(DoS)攻击隐患。该文在cookie机制和工作量证明方法思想的基础上,采用弱认证和强认证相结合的方法,提出了双主体认证协议抵御DoS攻击的安全方案,给出了方案的实现细节和部分实验数据,分析了该方案的安全性... 认证协议存在的一定的拒绝服务(DoS)攻击隐患。该文在cookie机制和工作量证明方法思想的基础上,采用弱认证和强认证相结合的方法,提出了双主体认证协议抵御DoS攻击的安全方案,给出了方案的实现细节和部分实验数据,分析了该方案的安全性。应用该方案对Lowe的NSPK协议进行改进,并分析了改进后协议的性能。 展开更多
关键词 认证协议 拒绝服务 安全协议
下载PDF
Secure Synchronization Control for a Class of Cyber-Physical Systems With Unknown Dynamics 被引量:3
20
作者 Ning Wang Xiaojian Li 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2020年第5期1215-1224,共10页
This paper investigates the secure synchronization control problem for a class of cyber-physical systems(CPSs)with unknown system matrices and intermittent denial-of-service(DoS)attacks.For the attack free case,an opt... This paper investigates the secure synchronization control problem for a class of cyber-physical systems(CPSs)with unknown system matrices and intermittent denial-of-service(DoS)attacks.For the attack free case,an optimal control law consisting of a feedback control and a compensated feedforward control is proposed to achieve the synchronization,and the feedback control gain matrix is learned by iteratively solving an algebraic Riccati equation(ARE).For considering the attack cases,it is difficult to perform the stability analysis of the synchronization errors by using the existing Lyapunov function method due to the presence of unknown system matrices.In order to overcome this difficulty,a matrix polynomial replacement method is given and it is shown that,the proposed optimal control law can still guarantee the asymptotical convergence of synchronization errors if two inequality conditions related with the DoS attacks hold.Finally,two examples are given to illustrate the effectiveness of the proposed approaches. 展开更多
关键词 Algebraic Riccati equation(ARE) complex dynamical networks(CDNs) denial-of-service(dos) secure control
下载PDF
上一页 1 2 6 下一页 到第
使用帮助 返回顶部