期刊文献+
共找到865篇文章
< 1 2 44 >
每页显示 20 50 100
对拒绝服务网络攻击路由的反向追踪算法 被引量:8
1
作者 薛东 赵国庆 胡建伟 《电子对抗技术》 2002年第2期26-30,共5页
针对拒绝服务攻击 ,介绍几种常用的发现拒绝服务攻击路径的反向追踪算法 ,提出两种基于IP选项的数据包标记算法 ,并给出了相应的算法实现。最后对这些算法的有关性能进行了比较。
关键词 拒绝服务攻击 网络 路由器 反向追踪 ICMP IP DOS 节点采样 边采样
下载PDF
SGuard:A Lightweight SDN Safe-Guard Architecture for DoS Attacks 被引量:10
2
作者 Tao Wang Hongchang Chen 《China Communications》 SCIE CSCD 2017年第6期113-125,共13页
Software Defined Networking(SDN) is a revolutionary networking paradigm towards the future network,experiencing rapid development nowadays.However,its main characteristic,the separation of control plane and data plane... Software Defined Networking(SDN) is a revolutionary networking paradigm towards the future network,experiencing rapid development nowadays.However,its main characteristic,the separation of control plane and data plane,also brings about new security challenges,i.e.,Denial-of-Service(DoS) attacks specific to Open Flow SDN networks to exhaust the control plane bandwidth and overload the buffer memory of Open Flow switch.To mitigate the DoS attacks in the Open Flow networks,we design and implement SGuard,a security application on top of the NOX controller that mainly contains two modules:Access control module and Classification module.We employ novel six-tuple as feature vector to classify traffic flows,meanwhile optimizing classification by feature ranking and selecting algorithms.All the modules will cooperate with each other to complete a series of tasks such as authorization,classification and so on.At the end of this paper,we experimentally use Mininet to evaluate SGuard in a software environment.The results show that SGuard works efficiently and accurately without adding more overhead to the SDN networks. 展开更多
关键词 sguard software defined networking denial-of-service attack security application
下载PDF
基于状态预测器和事件触发的多无人系统周期性DoS攻击韧性一致性控制 被引量:1
3
作者 杨海川 余自权 张友民 《Security and Safety》 2023年第3期62-82,共21页
This paper develops an event-triggered resilient consensus control method for the nonlinear multiple unmanned systems with a data-based autoregressive integrated moving average(ARIMA)agent state prediction mechanism a... This paper develops an event-triggered resilient consensus control method for the nonlinear multiple unmanned systems with a data-based autoregressive integrated moving average(ARIMA)agent state prediction mechanism against periodic denial-of-service(Do S)attacks.The state predictor is used to predict the state of neighbor agents during periodic Do S attacks and maintain consistent control of multiple unmanned systems under Do S attacks.Considering the existing prediction error between the actual state and the predicted state,the estimated error is regarded as the uncertainty system disturbance,which is dealt with by the designed disturbance observer.The estimated result is used in the design of the consistent controller to compensate for the system uncertainty error term.Furthermore,this paper investigates dynamic event-triggered consensus controllers to improve resilience and consensus under periodic Do S attacks and reduce the frequency of actuator output changes.It is proved that the Zeno behavior can be excluded.Finally,the resilience and consensus capability of the proposed controller and the superiority of introducing a state predictor are demonstrated through numerical simulations. 展开更多
关键词 Multiple unmanned systems denial-OF-service event-triggered consensus con-trol state predictor
原文传递
Periodic event-triggered secure consensus for networked mechanical systems under Denial-of-Service attacks
4
作者 Shiqi Zheng Zhipeng Li +1 位作者 Chao Zhai Peng Shi 《Control Theory and Technology》 EI CSCD 2024年第1期1-13,共13页
This paper concentrates on the secure consensus problem of networked mechanical/Euler–Lagrange systems.First,a new periodic event-triggered(PET)secure distributed observer is proposed to estimate the leader informati... This paper concentrates on the secure consensus problem of networked mechanical/Euler–Lagrange systems.First,a new periodic event-triggered(PET)secure distributed observer is proposed to estimate the leader information.The proposed distributed observer only relies on the PET data from its neighbors,which can significantly reduce the communication and computational burden.More importantly,it is secure in the sense that it can work normally regardless of the Denial-of-Service(DoS)attacks.Second,based on the proposed distributed observer,an adaptive fuzzy control law is proposed for each Euler–Lagrange system.A PET mechanism is integrated into the controller,which can reduce the control update.This is helpful for both energy saving and fault tolerance of actuators.Moreover,the PET mechanism naturally makes the controller easy to be implemented in digital platform.The property of fuzzy logic systems and Gronwall inequality are skillfully utilized to show the stability of the closed-loop system.Finally,the proposed control scheme is verified on real Euler–Lagrange systems,which contain a robot manipulator and several servo motors. 展开更多
关键词 Output regulation Mechanical/Euler-Lagrange systems Periodic event-triggered mechanism denial-of-service attacks
原文传递
H_(∞)/Passive Synchronization of Semi-Markov Jump Neural Networks Subject to Hybrid Attacks via an Activation Function Division Approach
5
作者 ZHANG Ziwei SHEN Hao SU Lei 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2024年第3期1023-1036,共14页
In this work,an H_(∞)/passive-based secure synchronization control problem is investigated for continuous-time semi-Markov neural networks subject to hybrid attacks,in which hybrid attacks are the combinations of den... In this work,an H_(∞)/passive-based secure synchronization control problem is investigated for continuous-time semi-Markov neural networks subject to hybrid attacks,in which hybrid attacks are the combinations of denial-of-service attacks and deception attacks,and they are described by two groups of independent Bernoulli distributions.On this foundation,via the Lyapunov stability theory and linear matrix inequality technology,the H_(∞)/passive-based performance criteria for semi-Markov jump neural networks are obtained.Additionally,an activation function division approach for neural networks is adopted to further reduce the conservatism of the criteria.Finally,a simulation example is provided to verify the validity and feasibility of the proposed method. 展开更多
关键词 Activation function division approach deception attacks denial-of-service attacks H_(∞)/passive synchronization semi-Markov jump neural networks
原文传递
Variance-Constrained Filtering Fusion for Nonlinear Cyber-Physical Systems With the Denial-of-Service Attacks and Stochastic Communication Protocol 被引量:4
6
作者 Hang Geng Zidong Wang +2 位作者 Yun Chen Xiaojian Yi Yuhua Cheng 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2022年第6期978-989,共12页
In this paper,a new filtering fusion problem is studied for nonlinear cyber-physical systems under errorvariance constraints and denial-of-service attacks.To prevent data collision and reduce communication cost,the st... In this paper,a new filtering fusion problem is studied for nonlinear cyber-physical systems under errorvariance constraints and denial-of-service attacks.To prevent data collision and reduce communication cost,the stochastic communication protocol is adopted in the sensor-to-filter channels to regulate the transmission order of sensors.Each sensor is allowed to enter the network according to the transmission priority decided by a set of independent and identicallydistributed random variables.From the defenders’view,the occurrence of the denial-of-service attack is governed by the randomly Bernoulli-distributed sequence.At the local filtering stage,a set of variance-constrained local filters are designed where the upper bounds(on the filtering error covariances)are first acquired and later minimized by appropriately designing filter parameters.At the fusion stage,all local estimates and error covariances are combined to develop a variance-constrained fusion estimator under the federated fusion rule.Furthermore,the performance of the fusion estimator is examined by studying the boundedness of the fused error covariance.A simulation example is finally presented to demonstrate the effectiveness of the proposed fusion estimator. 展开更多
关键词 Cyber-physical system(CPS) denial-of-service attack stochastic communication protocol(SCP) variance-constrained filtering fusion
下载PDF
基于支持向量机的P2P网络DoS攻击检测 被引量:5
7
作者 吴敏 王汝传 王治平 《计算机技术与发展》 2009年第11期151-154,共4页
对等网络技术近年来发展迅速,但其安全性问题一直是P2P网络进一步发展和应用急待解决的重要问题之一。由于对等网络的松散性,基于洪泛式请求的拒绝服务(DoS)攻击已经成为主要威胁之一。文章首先介绍和分析了DoS攻击在对等网络下的特点,... 对等网络技术近年来发展迅速,但其安全性问题一直是P2P网络进一步发展和应用急待解决的重要问题之一。由于对等网络的松散性,基于洪泛式请求的拒绝服务(DoS)攻击已经成为主要威胁之一。文章首先介绍和分析了DoS攻击在对等网络下的特点,然后提出了一种基于支持向量机的P2P环境下DoS攻击的检测模型,该模型能够通过以离线的方式对发生DoS攻击时流的统计特性进行特征提取,并能实时识别攻击的发生。实验证明,这种模型具有较高的检测率和较低的误检率。 展开更多
关键词 对等网络 拒绝服务 支持向量机
下载PDF
IKE协议的分析及其对DoS攻击抵御 被引量:2
8
作者 谢立峰 叶澄清 顾伟康 《计算机工程与设计》 CSCD 北大核心 2005年第2期420-422,428,共4页
互联网密钥交换(Internet key exchange)协议的复杂性使得其存在一些安全漏洞。在分析IKE协议工作原理的 基础上探讨了其可能遭受的DoS攻击,提出了对IKE协议的改进。通过改进,协议的安全性和健壮性有很大的提高。
关键词 DOS攻击 IKE协议 健壮性 安全漏洞 密钥交换 互联网 复杂性 安全性
下载PDF
An IoT-Based Intrusion Detection System Approach for TCP SYN Attacks 被引量:3
9
作者 Abdelwahed Berguiga Ahlem Harchay 《Computers, Materials & Continua》 SCIE EI 2022年第5期3839-3851,共13页
The success of Internet of Things(IoT)deployment has emerged important smart applications.These applications are running independently on different platforms,almost everywhere in the world.Internet of Medical Things(I... The success of Internet of Things(IoT)deployment has emerged important smart applications.These applications are running independently on different platforms,almost everywhere in the world.Internet of Medical Things(IoMT),also referred as the healthcare Internet of Things,is the most widely deployed application against COVID-19 and offering extensive healthcare services that are connected to the healthcare information technologies systems.Indeed,with the impact of the COVID-19 pandemic,a large number of interconnected devices designed to create smart networks.These networks monitor patients from remote locations as well as tracking medication orders.However,IoT may be jeopardized by attacks such as TCP SYN flooding and sinkhole attacks.In this paper,we address the issue of detecting Denial of Service attacks performed by TCP SYN flooding attacker nodes.For this purpose,we develop a new algorithm for Intrusion Detection System(IDS)to detect malicious activities in the Internet of Medical Things.The proposed scheme minimizes as possible the number of attacks to ensure data security,and preserve confidentiality of gathered data.In order to check the viability of our approach,we evaluate analytically and via simulations the performance of our proposed solution under different probability of attacks. 展开更多
关键词 IOT intrusion detection system denial-OF-service TCP SYN flooding ATTACKS
下载PDF
A broad learning-based comprehensive defence against SSDP reflection attacks in IoTs
10
作者 Xin Liu Liang Zheng +3 位作者 Sumi Helal Weishan Zhang Chunfu Jia Jiehan Zhou 《Digital Communications and Networks》 SCIE CSCD 2023年第5期1180-1189,共10页
The proliferation of Internet of Things(IoT)rapidly increases the possiblities of Simple Service Discovery Protocol(SSDP)reflection attacks.Most DDoS attack defence strategies deploy only to a certain type of devices ... The proliferation of Internet of Things(IoT)rapidly increases the possiblities of Simple Service Discovery Protocol(SSDP)reflection attacks.Most DDoS attack defence strategies deploy only to a certain type of devices in the attack chain,and need to detect attacks in advance,and the detection of DDoS attacks often uses heavy algorithms consuming lots of computing resources.This paper proposes a comprehensive DDoS attack defence approach which combines broad learning and a set of defence strategies against SSDP attacks,called Broad Learning based Comprehensive Defence(BLCD).The defence strategies work along the attack chain,starting from attack sources to victims.It defends against attacks without detecting attacks or identifying the roles of IoT devices in SSDP reflection attacks.BLCD also detects suspicious traffic at bots,service providers and victims by using broad learning,and the detection results are used as the basis for automatically deploying defence strategies which can significantly reduce DDoS packets.For evaluations,we thoroughly analyze attack traffic when deploying BLCD to different defence locations.Experiments show that BLCD can reduce the number of packets received at the victim to 39 without affecting the standard SSDP service,and detect malicious packets with an accuracy of 99.99%. 展开更多
关键词 denial-of-service DRDoS SSDP reflection Attack Broad learning Traffic detection
下载PDF
DoS Attack Detection Based on Deep Factorization Machine in SDN
11
作者 Jing Wang Xiangyu Lei +3 位作者 Qisheng Jiang Osama Alfarraj Amr Tolba Gwang-jun Kim 《Computer Systems Science & Engineering》 SCIE EI 2023年第5期1727-1742,共16页
Software-Defined Network(SDN)decouples the control plane of network devices from the data plane.While alleviating the problems presented in traditional network architectures,it also brings potential security risks,par... Software-Defined Network(SDN)decouples the control plane of network devices from the data plane.While alleviating the problems presented in traditional network architectures,it also brings potential security risks,particularly network Denial-of-Service(DoS)attacks.While many research efforts have been devoted to identifying new features for DoS attack detection,detection methods are less accurate in detecting DoS attacks against client hosts due to the high stealth of such attacks.To solve this problem,a new method of DoS attack detection based on Deep Factorization Machine(DeepFM)is proposed in SDN.Firstly,we select the Growth Rate of Max Matched Packets(GRMMP)in SDN as detection feature.Then,the DeepFM algorithm is used to extract features from flow rules and classify them into dense and discrete features to detect DoS attacks.After training,the model can be used to infer whether SDN is under DoS attacks,and a DeepFM-based detection method for DoS attacks against client host is implemented.Simulation results show that our method can effectively detect DoS attacks in SDN.Compared with the K-Nearest Neighbor(K-NN),Artificial Neural Network(ANN)models,Support Vector Machine(SVM)and Random Forest models,our proposed method outperforms in accuracy,precision and F1 values. 展开更多
关键词 Software-defined network denial-of-service attacks deep factorization machine GRMMP
下载PDF
IP通信网络安全攻击与防范 被引量:4
12
作者 程艳丽 张友纯 《信息安全与通信保密》 2010年第4期39-41,共3页
随着移动通信和互联网络的融合、演进,IP通信网络发展日益迅速,网络安全问题日趋复杂。详细分析了IP通信网络存在的典型安全攻击方式及表现形式,如各种形式的拒绝服务攻击,并对RIP、OSPF、ISIS三大路由协议的攻击进行了分析,最后给出了... 随着移动通信和互联网络的融合、演进,IP通信网络发展日益迅速,网络安全问题日趋复杂。详细分析了IP通信网络存在的典型安全攻击方式及表现形式,如各种形式的拒绝服务攻击,并对RIP、OSPF、ISIS三大路由协议的攻击进行了分析,最后给出了网络安全管理的防范措施建议和组网安全保障措施。 展开更多
关键词 网络攻击 网络安全 拒绝服务 路由协议
原文传递
Vulnerabilities of LDAP As An Authentication Service 被引量:1
13
作者 Charlie Obimbo Benjamin Ferriman 《Journal of Information Security》 2011年第4期151-157,共7页
Lightweight Directory Access Protocol (LDAP) servers are widely used to authenticate users in enterprise level networks. Organizations such as universities and small to medium-sized businesses use LDAP for a variety o... Lightweight Directory Access Protocol (LDAP) servers are widely used to authenticate users in enterprise level networks. Organizations such as universities and small to medium-sized businesses use LDAP for a variety of applications including e-mail clients, SSH, and workstation authentication. Since many organizations build dependencies on the LDAP service, a Denial-of-Service (DoS) attack to the service can cause a greater number of services disrupted. This paper examines the danger in the use of LDAP for user authentication by executing a DoS attack exploiting the TCP three-way handshake required when initializing a connection to an LDAP server. 展开更多
关键词 LDAP SYN Flooding denial-OF-service AUTHENTICATION service
下载PDF
System identification with binary-valued observations under both denial-of-service attacks and data tampering attacks:the optimality of attack strategy 被引量:2
14
作者 Jin Guo Xuebin Wang +2 位作者 Yanling Zhang Wenchao Xue Yanlong Zhao 《Control Theory and Technology》 EI CSCD 2022年第1期127-138,共12页
With the development of wireless communication technology,cyber physical systems are applied in various fields such as industrial production and infrastructure,where lots of information exchange brings cyber security ... With the development of wireless communication technology,cyber physical systems are applied in various fields such as industrial production and infrastructure,where lots of information exchange brings cyber security threats to the systems.From the perspective of system identification with binary-valued observations,we study the optimal attack problem when the system is subject to both denial of service attacks and data tampering attacks.The packet loss rate and the data tampering rate caused by the attack is given,and the estimation error is derived.Then the optimal attack strategy to maximize the identification error with the least energy is described as a min–max optimization problem with constraints.The explicit expression of the optimal attack strategy is obtained.Simulation examples are presented to verify the effectiveness of the main conclusions. 展开更多
关键词 System identification Binary-valued observations denial-of-service attacks Data tampering attacks
原文传递
专业过滤器防攻击策略研究及实现 被引量:1
15
作者 陆月明 钱德沛 徐斌 《计算机工程》 EI CAS CSCD 北大核心 1999年第10期33-35,共3页
分析了4种网上攻击(Attacks)的原理和特点,提出了采用专业过滤器(Professional Filter.PF)保护内部网站点的策略。PF具有自身的安全性和复杂的过滤策略,能很好地防止外部攻击。同时,PF具有网... 分析了4种网上攻击(Attacks)的原理和特点,提出了采用专业过滤器(Professional Filter.PF)保护内部网站点的策略。PF具有自身的安全性和复杂的过滤策略,能很好地防止外部攻击。同时,PF具有网络设备的特点,使网络的吞吐量得到了保证。 展开更多
关键词 专业过滤器 计算机安全 INTERNET网 防攻击
下载PDF
Enhanced Timestamp Discrepancy to Limit Impact of Replay Attacks in MANETs 被引量:1
16
作者 Aziz Baayer Nourddine Enneya Mohammed Elkoutbi 《Journal of Information Security》 2012年第3期224-230,共7页
Mobile Ad hoc NETworks (MANETs), characterized by the free move of mobile nodes are more vulnerable to the trivial Denial-of-Service (DoS) attacks such as replay attacks. A replay attacker performs this attack at anyt... Mobile Ad hoc NETworks (MANETs), characterized by the free move of mobile nodes are more vulnerable to the trivial Denial-of-Service (DoS) attacks such as replay attacks. A replay attacker performs this attack at anytime and anywhere in the network by interception and retransmission of the valid signed messages. Consequently, the MANET performance is severally degraded by the overhead produced by the redundant valid messages. In this paper, we propose an enhancement of timestamp discrepancy used to validate a signed message and consequently limiting the impact of a replay attack. Our proposed timestamp concept estimates approximately the time where the message is received and validated by the received node. This estimation is based on the existing parameters defined at the 802.11 MAC layer. 展开更多
关键词 MANET REPLAY Attack denial-OF-service (DoS) 802.11 MAC Layer Network Allocation Vector (NAV) Security Countermeasure
下载PDF
Towards Risk Evaluation of Denial-of-Service Vulnerabilities in Security Protocols 被引量:1
17
作者 曹振 关志 +3 位作者 陈钟 Member, IEEE 胡建斌 唐礼勇 《Journal of Computer Science & Technology》 SCIE EI CSCD 2010年第2期375-386,F0003,共13页
Denial-of-Service (DOS) attacks are virulent to both computer and networked systems. Modeling and evaluating DoS attacks are very important issues to networked systems; they provide both mathematical foundations and... Denial-of-Service (DOS) attacks are virulent to both computer and networked systems. Modeling and evaluating DoS attacks are very important issues to networked systems; they provide both mathematical foundations and theoretic guidelines to security system design. As defense against DoS has been built more and more into security protocols, this paper studies how to evaluate the risk of DoS in security protocols. First, we build a formal framework to model protocol operations and attacker capabilities. Then we propose an economic model for the risk evaluation. By characterizing the intruder capability with a probability model, our risk evaluation model specifies the "Value-at-Risk" (VaR) for the security protocols. Tile "Value-at-Risk" represents how much computing resources are expected to lose with a given level of confidence. The proposed model can help users to have a better understanding of the protocols they are using, and in the meantime help designers to examine their designs and get clues of improvement. Finally we apply the proposed model to analyze a key agreement protocol used in sensor networks and identify a DoS flaw there, and we also validate the applicability and effectiveness of our risk evaluation model by applying it to analyze and compare two public key authentication protocols. 展开更多
关键词 risk evaluation denial-of-service (DOS) Value-at-Risk (VaR)
原文传递
用Puzzle方法积极防御DoS攻击 被引量:2
18
作者 崔筠 周大水 《通信技术》 2002年第9X期81-83,共3页
讨论了Puzzle方法的原理及其在认证协议中的应用。其它协议中采用的防御DoS攻击的方法,都是先进行开销小的弱认证,通过后再进行开销大的强认证。Puzzle方法与他们相比它更加灵活而有效。
关键词 认证 COOKIE PUZZLE 拒绝服务
原文传递
Enhanced arbitrated quantum signature scheme using Bell states
19
作者 王朝 刘建伟 尚涛 《Chinese Physics B》 SCIE EI CAS CSCD 2014年第6期66-73,共8页
We investigate the existing arbitrated quantum signature schemes as well as their cryptanalysis, including intercept- resend attack and denial-of-service attack. By exploring the loopholes of these schemes, a maliciou... We investigate the existing arbitrated quantum signature schemes as well as their cryptanalysis, including intercept- resend attack and denial-of-service attack. By exploring the loopholes of these schemes, a malicious signatory may success- fully disavow signed messages, or the receiver may actively negate the signature from the signatory without being detected. By modifying the existing schemes, we develop counter-measures to these attacks using Bell states. The newly proposed scheme puts forward the security of arbitrated quantum signature. Furthermore, several valuable topics are also presented for further research of the quantum signature scheme. 展开更多
关键词 arbitrated quantum signature intercept-resend attack denial-of-service attack
下载PDF
基于小波分析和连接信任域的DDoS防范模型
20
作者 裴大权 马进 陆松年 《计算机应用与软件》 CSCD 北大核心 2008年第11期14-15,19,共3页
分析了DoS攻击机理,基于网络流量的自相似性提出了一种DDoS防范模型。首先采用小波方法计算流量的Hurst参数,判断是否遭受DoS攻击。当认为受到攻击后,结合连接信任域来进行响应。实验表明,该模型可以检测到强、弱DoS攻击;在受到DDoS攻击... 分析了DoS攻击机理,基于网络流量的自相似性提出了一种DDoS防范模型。首先采用小波方法计算流量的Hurst参数,判断是否遭受DoS攻击。当认为受到攻击后,结合连接信任域来进行响应。实验表明,该模型可以检测到强、弱DoS攻击;在受到DDoS攻击后,仍可以在一定程度上为正常用户提供服务。 展开更多
关键词 denial—of-service 自相似 小波分析 连接信任域
下载PDF
上一页 1 2 44 下一页 到第
使用帮助 返回顶部