Aimed at modern high-density,high overlapped and powerful antipersonnel stealthy penetration environment,route planning techniques on active-attack strategy were thoroughly and further studied,in order to get good pro...Aimed at modern high-density,high overlapped and powerful antipersonnel stealthy penetration environment,route planning techniques on active-attack strategy were thoroughly and further studied,in order to get good probability of survival and perfect efficiency of task accomplishment.It provides a new thought for and a new solution to the application of route planning in new era.展开更多
The rate of passive and active attacks has been on the increase lately affecting both individuals and institutions. Even when internal control procedures are in place, malicious codes from intruders into the network h...The rate of passive and active attacks has been on the increase lately affecting both individuals and institutions. Even when internal control procedures are in place, malicious codes from intruders into the network have left so much to be desired. As a result, many Chief Information Security Officers have grown grey hair because of their inability to effectively handle attacks from various ends. Various attempts and technologies have been made in the time past with a measure of success. Intrusion Detection Software (IDS), Intrusion Prevention Software, firewall, honey pots and honey nets have been deployed and with great respite from losses arising from cyber-attacks. Cyber security is the duty of everyone and all must see it as such. As tiers of government and law enforcement agents are doing their best, everybody must be seen to play their parts. Fraudsters have also not seemed to be tired of seeking vulnerabilities to exploit. Then, cyber security experts should not let off their guards but make efforts to harden their security. A way of doing is to intelligently provide a solution that has the capability of detecting and proactively hardening security. This paper proposes a honey net model that is captcha-based and capable of extracting details from hackers with a view to building a robust defense against black hat attackers. This research was able to prevent the botnet with the use of captcha and also redirect suspected traffic to the honeynet which was then captured for the purpose of improving the security of the network. The result showed that any bandwidth greater than the set threshold was not allowed to go into the network but redirected to honeynet where details were logged. Also, with a threshold of 100 mbs, inbound traffic of higher bandwidth such as 110 mbs and 150 mbs was denied access thereby giving 100% detection rate.展开更多
水下无线光通信(Underwater Wireless Optical Communication,UWOC)作为水下无线网络的重要补充,因其高带宽、低延迟等特点,近年来引起了众多研究学者的关注,研究方向普遍侧重于提高UWOC系统的传输距离和通信速率,但目前关于UWOC安全方...水下无线光通信(Underwater Wireless Optical Communication,UWOC)作为水下无线网络的重要补充,因其高带宽、低延迟等特点,近年来引起了众多研究学者的关注,研究方向普遍侧重于提高UWOC系统的传输距离和通信速率,但目前关于UWOC安全方面的研究较少,无法为其提供全面和有效的安全保护。针对UWOC系统面临的安全威胁问题,从光斑扩散、非视距(Non Line of Sight,NLOS)散射和主动攻击3个方面进行了分析。为了推动UWOC的安全性研究,介绍了同样是以光为载波的光纤通信、自由空间通信(Free Space Communication,FSO)和室内可见光通信(Visible Light Communication,VLC)中常见的3个物理层安全技术,即身份认证、数据保密性以及密钥的生成和分发。基于UWOC和水下环境的特点,分析了上述方法在UWOC中应用的实际问题,为未来UWOC的安全性研究提供参考方向。展开更多
基金The National Natural Science Foundation of China(No.60475027)
文摘Aimed at modern high-density,high overlapped and powerful antipersonnel stealthy penetration environment,route planning techniques on active-attack strategy were thoroughly and further studied,in order to get good probability of survival and perfect efficiency of task accomplishment.It provides a new thought for and a new solution to the application of route planning in new era.
文摘The rate of passive and active attacks has been on the increase lately affecting both individuals and institutions. Even when internal control procedures are in place, malicious codes from intruders into the network have left so much to be desired. As a result, many Chief Information Security Officers have grown grey hair because of their inability to effectively handle attacks from various ends. Various attempts and technologies have been made in the time past with a measure of success. Intrusion Detection Software (IDS), Intrusion Prevention Software, firewall, honey pots and honey nets have been deployed and with great respite from losses arising from cyber-attacks. Cyber security is the duty of everyone and all must see it as such. As tiers of government and law enforcement agents are doing their best, everybody must be seen to play their parts. Fraudsters have also not seemed to be tired of seeking vulnerabilities to exploit. Then, cyber security experts should not let off their guards but make efforts to harden their security. A way of doing is to intelligently provide a solution that has the capability of detecting and proactively hardening security. This paper proposes a honey net model that is captcha-based and capable of extracting details from hackers with a view to building a robust defense against black hat attackers. This research was able to prevent the botnet with the use of captcha and also redirect suspected traffic to the honeynet which was then captured for the purpose of improving the security of the network. The result showed that any bandwidth greater than the set threshold was not allowed to go into the network but redirected to honeynet where details were logged. Also, with a threshold of 100 mbs, inbound traffic of higher bandwidth such as 110 mbs and 150 mbs was denied access thereby giving 100% detection rate.
文摘水下无线光通信(Underwater Wireless Optical Communication,UWOC)作为水下无线网络的重要补充,因其高带宽、低延迟等特点,近年来引起了众多研究学者的关注,研究方向普遍侧重于提高UWOC系统的传输距离和通信速率,但目前关于UWOC安全方面的研究较少,无法为其提供全面和有效的安全保护。针对UWOC系统面临的安全威胁问题,从光斑扩散、非视距(Non Line of Sight,NLOS)散射和主动攻击3个方面进行了分析。为了推动UWOC的安全性研究,介绍了同样是以光为载波的光纤通信、自由空间通信(Free Space Communication,FSO)和室内可见光通信(Visible Light Communication,VLC)中常见的3个物理层安全技术,即身份认证、数据保密性以及密钥的生成和分发。基于UWOC和水下环境的特点,分析了上述方法在UWOC中应用的实际问题,为未来UWOC的安全性研究提供参考方向。