The characteristics of the confrontation between fighters and air-defense systems on ship are analyzed. The approach of simulating operations of both sides is presented based on the combination of random-factor effect...The characteristics of the confrontation between fighters and air-defense systems on ship are analyzed. The approach of simulating operations of both sides is presented based on the combination of random-factor effectiveness simulation models and deterministic models. Two basic indices are proposed to indicate task effectiveness (i. e. the survival probability of the fighter team and the specified effect of damage on the fleet) and relative algo- rithms. To verify the approach, the situation that a fighter team attacks a collective defense fleet is exemplified and the task effectiveness of this case is also calculated. The method for evaluating task effectiveness on anti-ship attack can be applied in aircraft design and tactical research.展开更多
This study pursues the objective of analyzing and verifying the knowledge of the agents of the Institut Supérieur Pédagogique/ISP-Bukavu (TTC = Teachers’ training College) in relation to the practical flaws...This study pursues the objective of analyzing and verifying the knowledge of the agents of the Institut Supérieur Pédagogique/ISP-Bukavu (TTC = Teachers’ training College) in relation to the practical flaws resulting from the lack of knowledge of the observable rules in information system security. In a clearer way, it aims to verify the level of knowledge of the vulnerabilities, to verify the level of use of the antivirus software, to analyze the frequency of use of Windows update, the use of an anti-spyware software as well as a firewall software on the computer. Through a survey conducted on a sample of 100 agents of the Institut Supérieur Pédagogique/ISP-Bukavu (TTC = Teachers’ training College), the results revealed that 48% of the sample has no knowledge on computer vulnerabilities;for the use of antivirus software: 47% do not use the antivirus;for Windows update: 29% never update the Windows operating system;for anti-spyware: 48% never use;for the firewall: 50% are not informed. In fine, our results proposed a protection model VMAUSP (Vulnerability Measurability Measures Antivirus, Update, Spyware and Firewall) to users based on the behavioral approach, learning how the model works.展开更多
With the increasing computing demand of train operation control systems,the application of cloud computing technology on safety computer platforms of train control system has become a research hotspot in recent years....With the increasing computing demand of train operation control systems,the application of cloud computing technology on safety computer platforms of train control system has become a research hotspot in recent years.How to improve the safety and availability of private cloud safety computers is the key problem when applying cloud computing to train operation control systems.Because the cloud computing platform is in an open network environment,it can face many security loopholes and malicious network at-tacks.Therefore,it is necessary to change the existing safety computer platform structure to improve the attack resistance of the private cloud safety computer platform,thereby enhancing its safety and reliability.Firstly,a private cloud safety computer platform architecture based on dynamic heterogeneous redundant(DHR)structure is proposed,and a dynamic migration mechanism for heterogeneous executives is designed.Then,a generalized stochastic Petri net(GSPN)model of a private cloud safety computer platform based on DHR is established,and its steady-state probability is solved by using its isomorphism with the continuous-time Markov model(CTMC)to analyse the impact of different system structures and executive migration mechanisms on the system's anti-attack performance.Finally,through experimental verifcation,the system structure proposed in this paper can improve the anti-attack capability of the private cloud safety computer platform,thereby improving its safety and reliability.展开更多
The lightweight encryption algorithm based on Add-Rotation-XOR(ARX)operation has attracted much attention due to its high software affinity and fast operation speed.However,lacking an effective defense scheme for phys...The lightweight encryption algorithm based on Add-Rotation-XOR(ARX)operation has attracted much attention due to its high software affinity and fast operation speed.However,lacking an effective defense scheme for physical attacks limits the applications of the ARX algorithm.The critical challenge is how to weaken the direct dependence between the physical information and the secret key of the algorithm at a low cost.This study attempts to explore how to improve its physical security in practical application scenarios by analyzing the masking countermeasures of ARX algorithms and the leakage causes.Firstly,we specify a hierarchical security framework by quantitatively evaluating the indicators based on side-channel attacks.Then,optimize the masking algorithm to achieve a trade-off balance by leveraging the software-based local masking strategies and non-full-round masking strategies.Finally,refactor the assembly instruction to improve the leaks by exploring the leakage cause at assembly instruction.To illustrate the feasibility of the proposed scheme,we further conducted a case study by designing a software-based masking method for Chaskey.The experimental results show that the proposed method can effectively weaken the impact of physical attacks.展开更多
文摘The characteristics of the confrontation between fighters and air-defense systems on ship are analyzed. The approach of simulating operations of both sides is presented based on the combination of random-factor effectiveness simulation models and deterministic models. Two basic indices are proposed to indicate task effectiveness (i. e. the survival probability of the fighter team and the specified effect of damage on the fleet) and relative algo- rithms. To verify the approach, the situation that a fighter team attacks a collective defense fleet is exemplified and the task effectiveness of this case is also calculated. The method for evaluating task effectiveness on anti-ship attack can be applied in aircraft design and tactical research.
文摘This study pursues the objective of analyzing and verifying the knowledge of the agents of the Institut Supérieur Pédagogique/ISP-Bukavu (TTC = Teachers’ training College) in relation to the practical flaws resulting from the lack of knowledge of the observable rules in information system security. In a clearer way, it aims to verify the level of knowledge of the vulnerabilities, to verify the level of use of the antivirus software, to analyze the frequency of use of Windows update, the use of an anti-spyware software as well as a firewall software on the computer. Through a survey conducted on a sample of 100 agents of the Institut Supérieur Pédagogique/ISP-Bukavu (TTC = Teachers’ training College), the results revealed that 48% of the sample has no knowledge on computer vulnerabilities;for the use of antivirus software: 47% do not use the antivirus;for Windows update: 29% never update the Windows operating system;for anti-spyware: 48% never use;for the firewall: 50% are not informed. In fine, our results proposed a protection model VMAUSP (Vulnerability Measurability Measures Antivirus, Update, Spyware and Firewall) to users based on the behavioral approach, learning how the model works.
基金supported by the National Natural Science Foundation of China(Grant No.U1934219)the National Science Fund for Excellent Young Scholars(Grant No.52022010).
文摘With the increasing computing demand of train operation control systems,the application of cloud computing technology on safety computer platforms of train control system has become a research hotspot in recent years.How to improve the safety and availability of private cloud safety computers is the key problem when applying cloud computing to train operation control systems.Because the cloud computing platform is in an open network environment,it can face many security loopholes and malicious network at-tacks.Therefore,it is necessary to change the existing safety computer platform structure to improve the attack resistance of the private cloud safety computer platform,thereby enhancing its safety and reliability.Firstly,a private cloud safety computer platform architecture based on dynamic heterogeneous redundant(DHR)structure is proposed,and a dynamic migration mechanism for heterogeneous executives is designed.Then,a generalized stochastic Petri net(GSPN)model of a private cloud safety computer platform based on DHR is established,and its steady-state probability is solved by using its isomorphism with the continuous-time Markov model(CTMC)to analyse the impact of different system structures and executive migration mechanisms on the system's anti-attack performance.Finally,through experimental verifcation,the system structure proposed in this paper can improve the anti-attack capability of the private cloud safety computer platform,thereby improving its safety and reliability.
基金This work was partially supported by the Natural Science Foundation of Jiangsu Province under Grant No.BK20201462partially supported by the Scientific Research Support Project of Jiangsu Normal University under Grant No.21XSRX001.
文摘The lightweight encryption algorithm based on Add-Rotation-XOR(ARX)operation has attracted much attention due to its high software affinity and fast operation speed.However,lacking an effective defense scheme for physical attacks limits the applications of the ARX algorithm.The critical challenge is how to weaken the direct dependence between the physical information and the secret key of the algorithm at a low cost.This study attempts to explore how to improve its physical security in practical application scenarios by analyzing the masking countermeasures of ARX algorithms and the leakage causes.Firstly,we specify a hierarchical security framework by quantitatively evaluating the indicators based on side-channel attacks.Then,optimize the masking algorithm to achieve a trade-off balance by leveraging the software-based local masking strategies and non-full-round masking strategies.Finally,refactor the assembly instruction to improve the leaks by exploring the leakage cause at assembly instruction.To illustrate the feasibility of the proposed scheme,we further conducted a case study by designing a software-based masking method for Chaskey.The experimental results show that the proposed method can effectively weaken the impact of physical attacks.