针对攻击防御软件存在攻击拦截率较小的问题,笔者设计并开发一个基于大数据分析技术的远程网络攻击防御软件。首先,按照远程网络的运行模式建立抵御攻击干扰框架,构建一个漏洞攻击验证,利用大数据分析技术选择攻击特征;其次,使用NAPI(Ne...针对攻击防御软件存在攻击拦截率较小的问题,笔者设计并开发一个基于大数据分析技术的远程网络攻击防御软件。首先,按照远程网络的运行模式建立抵御攻击干扰框架,构建一个漏洞攻击验证,利用大数据分析技术选择攻击特征;其次,使用NAPI(New Application Program Interface)技术与DPDK轮询驱动模式结合的形式,传输攻击属性的数据至大页内存内,输出映射关系的防御激活码,完成对防御软件的开发;最后,搭建远程网络攻击拓扑结构后,准备基于带内遥测技术的防御软件、基于OpenFlow协议的防御软件以及设计的防御软件参与测试。测试结果表明:设计的防御软件产生的攻击拦截率最大,防御效果最佳。展开更多
The inter-bank market network models are constructed based on the inter-bank credit lending relationships, and the network efficiency characters of the Chinese inter-bank market are studied. Since it is impossible to ...The inter-bank market network models are constructed based on the inter-bank credit lending relationships, and the network efficiency characters of the Chinese inter-bank market are studied. Since it is impossible to obtain the specific credit data among banks, this paper estimates the inter-bank lending matrix based on the partial information of banks. Thus, directed network models of the Chinese inter-bank market are constructed by using the threshold method. The network efficiency measures and the effects of random attacks and selective attacks on the global efficiency of the inter-bank network are analyzed based on the network models of the inter-bank market. Empirical results suggest that the efficiency measures are sensitive to the threshold, and that the global efficiency is little affected by random attacks, while it is highly sensitive to selective attacks. Properties such as inter-bank market network efficiency would be useful for risk management and stability of the inter-bank market.展开更多
The combat survivability is an essential factor to be considered in the development of recent military aircraft. Radar stealth and onboard electronic attack are two major techniques for the reduction of aircraft susce...The combat survivability is an essential factor to be considered in the development of recent military aircraft. Radar stealth and onboard electronic attack are two major techniques for the reduction of aircraft susceptibility. A tactical scenario for a strike mission is presented. The effect of aircraft radar cross section on the detection probability of a threat radar, as well as that of onboard jammer, are investigated. The guidance errors of radar guided surface to air missile and anti aircraft artillery, which are disturbed by radar cross section reduction or jammer radiated power and both of them are determined. The probability of aircraft kill given a single shot is calculated and finally the sortie survivability of an attack aircraft in a supposed hostile thread environment worked out. It is demonstrated that the survivability of a combat aircraft will be greatly enhanced by the combined radar stealth and onboard electronic attack, and the evaluation metho dology is effective and applicable.展开更多
In frequency domain,the power spectrum of Low-rate denial of service(LDoS) attacks is totally spread into the spectrum of normal traffic.It is a challenging task to detect and filter LDoS attack flows from the normal ...In frequency domain,the power spectrum of Low-rate denial of service(LDoS) attacks is totally spread into the spectrum of normal traffic.It is a challenging task to detect and filter LDoS attack flows from the normal traffic.Based on the analysis of LDoS attack flows and legitimate TCP traffic in time and frequency domains,the periodicity of the TCP traffic and LDoS attack flows is explored to facilitate the research of network traffic processing.Hence,an approach of LDoS attack flow filtering based on frequency spectrum analysis is proposed.In this approach,the TCP traffic and LDoS attack flows are transformed from the time domain into the frequency domain.Then the round-trip time(RTT) is estimated by using frequency domain search method.Analysis of amplitude spectrum shows that TCP traffic energy is mainly concentrated on the points of n/RTT.Therefore,a comb filter using infinite impulse response(IIR) filter is designed to filter out the LDoS attack flows in frequency domain,while most legitimate TCP traffic energy at the points of n/RTT are pass through.Experimental results show that the maximum pass rate for legitimate TCP traffic reaches 92.55%,while the maximum filtration rate of LDoS attack flows reaches 81.36%.The proposed approach can effectively filter the LDoS attack flows while less impact on the legitimate TCP traffic.展开更多
Steganalysis attack is to statistically estimate the embedded watermark in the watermarked multimedia,and the estimated watermark may be destroyed by the attacker.The existing methods of false negative probability,how...Steganalysis attack is to statistically estimate the embedded watermark in the watermarked multimedia,and the estimated watermark may be destroyed by the attacker.The existing methods of false negative probability,however,do not consider the influence of steganalysis attack.This paper proposed the game theory based false negative probability to estimate the impacts of steganalysis attack,as well as unintentional attack.Specifically,game theory was used to model the collision between the embedment and steganalysis attack,and derive the optimal building embedding/attacking strategy.Such optimal playing strategies devote to calculating the attacker destructed watermark,used for calculation of the game theory based false negative probability.The experimental results show that watermark detection reliability measured using our proposed method,in comparison,can better reflect the real scenario in which the embedded watermark undergoes unintentional attack and the attacker using steganalysis attack.This paper provides a foundation for investigating countermeasures of digital watermarking community against steganalysis attack.展开更多
Chosen-message pair Simple Power Analysis (SPA) attacks were proposed by Boer, Yen and Homma, and are attack methods based on searches for collisions of modular multiplication. However, searching for collisions is dif...Chosen-message pair Simple Power Analysis (SPA) attacks were proposed by Boer, Yen and Homma, and are attack methods based on searches for collisions of modular multiplication. However, searching for collisions is difficult in real environments. To circumvent this problem, we propose the Simple Power Clustering Attack (SPCA), which can automatically identify the modular multiplication collision. The insignificant effects of collision attacks were validated in an Application Specific Integrated Circuit (ASIC) environment. After treatment with SPCA, the automatic secret key recognition rate increased to 99%.展开更多
A kind of attack strategy based on a probabilistic cloning machine is proposed in this letter. The security of BB84 and the six-state quantum key distribution protocols under this attack is studied by theoretic analys...A kind of attack strategy based on a probabilistic cloning machine is proposed in this letter. The security of BB84 and the six-state quantum key distribution protocols under this attack is studied by theoretic analyses and corroborated by simulations. It is concluded that the quantum key distribution protocols still have an asymptotic perfect security even if the eavesdropper adopts the proposed attack strategy.展开更多
In order to protect the website and assess the security risk of website, a novel website security risk assessment method is proposed based on the improved Bayesian attack graph(I-BAG) model. First, the Improved Bayesi...In order to protect the website and assess the security risk of website, a novel website security risk assessment method is proposed based on the improved Bayesian attack graph(I-BAG) model. First, the Improved Bayesian attack graph model is established, which takes attack benefits and threat factors into consideration. Compared with the existing attack graph models, it can better describe the website's security risk. Then, the improved Bayesian attack graph is constructed with optimized website attack graph, attack benefit nodes, threat factor nodes and the local conditional probability distribution of each node, which is calculated accordingly. Finally, website's attack probability and risk value are calculated on the level of nodes, hosts and the whole website separately. The experimental results demonstrate that the risk evaluating method based on I-BAG model proposed is a effective way for assessing the website security risk.展开更多
Aimed at modern high-density,high overlapped and powerful antipersonnel stealthy penetration environment,route planning techniques on active-attack strategy were thoroughly and further studied,in order to get good pro...Aimed at modern high-density,high overlapped and powerful antipersonnel stealthy penetration environment,route planning techniques on active-attack strategy were thoroughly and further studied,in order to get good probability of survival and perfect efficiency of task accomplishment.It provides a new thought for and a new solution to the application of route planning in new era.展开更多
To deal with Byzantine attacks in 5 G cognitive radio networks,a bilateral threshold selection-based algorithm is proposed in the spectrum sensing process. In each round,secondary uses( SUs) first submit the energy va...To deal with Byzantine attacks in 5 G cognitive radio networks,a bilateral threshold selection-based algorithm is proposed in the spectrum sensing process. In each round,secondary uses( SUs) first submit the energy values and instantaneous detection signal-to-noise ratios( SNRs) to the fusion center( FC). According to detection SNRs,the FC conducts normalization calculations on the energy values. Then,the FC makes a sort operation for these normalized energy values and traverses all the possible mid-points between these sorted normalized energy values to maximize the classification accuracy of each SU. Finally,by introducing the recognition probability and misclassification probability,the distributions of the normalized energy values are analyzed and the bilateral threshold of classification accuracy is obtained via a target misclassification probability. Hence,the blacklist of malicious secondary users( MSUs) is obtained. Simulation results show that the proposed scheme outperforms the current mainstream schemes in correct sensing probability,false alarm probability and detection probability.展开更多
In the last decade,cognitive radio(CR) has emerged as a major next generation wireless networking technology,which is the most promising candidate solution to solve the spectrum scarcity and improve the spectrum utili...In the last decade,cognitive radio(CR) has emerged as a major next generation wireless networking technology,which is the most promising candidate solution to solve the spectrum scarcity and improve the spectrum utilization.However,there exist enormous challenges for the open and random access environment of CRNs,where the unlicensed secondary users(SUs) can use the channels that are not currently used by the licensed primary users(PUs) via spectrum-sensing technology.Because of this access method,some malicious users may access the cognitive network arbitrarily and launch some special attacks,such as primary user emulation attack,falsifying data or denial of service attack,which will cause serious damage to the cognitive radio network.In addition to the specifi c security threats of cognitive network,CRNs also face up to the conventional security threats,such as eavesdropping,tampering,imitation,forgery,and noncooperation etc..Hence,Cognitive radio networks have much more risks than traditional wireless networks with its special network model.In this paper,we considered the security threats from passive and active attacks.Firstly,the PHY layer security is presented in the view of passive attacks,and it is a compelling idea of using the physical properties of the radio channel to help provide secure wireless communications.Moreover,malicious user detection is introduced in the view of active attacks by means of the signal detection techniques to decrease the interference and the probabilities of false alarm and missed detection.Finally,we discuss the general countermeasures of security threats in three phases.In particular,we discuss the far reaching effect of defensive strategy against attacks in CRNs.展开更多
Many animals are sensitive to ultraviolet light and also possess UV-reflective regions on their body surface. Individu- als reflecting UV have been shown to be preferred during social interactions such as mate choice ...Many animals are sensitive to ultraviolet light and also possess UV-reflective regions on their body surface. Individu- als reflecting UV have been shown to be preferred during social interactions such as mate choice or shoaling decisions. However, whether those body UV-reflections enhance also the conspicuousness to UV-sensitive predators and thereforeentail costs for its bearer is less well documented. Two size-matched three-spined sticklebacks Gasterosteus aculeatus, one enclosed in a UV-transmitting (UV+) and another in a UV-blocking (UV-) chamber, were simultaneously presented to individual brown trout Salmo trutta. "yearlings". Brown trout of this age are sensitive to the UV part of the electromagnetic spectnun and are natural predators of three-spined sticklebacks. The stickleback that was attacked first as well as the subsequent number of attacks was recorded. Sticklebacks enclosed in the UV-transmitting chamber were attacked first significantly more often compared to stickle- backs enclosed in the UV-blocking chamber. Control experiments using neutral density filters revealed that this was more likely due to LrV having an influence on hue perception rather than brighmess discrimination. The difference in attack probability cor- responded to the difference in chromatic contrasts between sticklebacks and the experimental background calculated for both the UV+ and UV- conditions in a physiological model of trout colour vision. UV reflections seem to be costly by enhancing the risk of predation due to an increased conspicuousness of prey. This is the first study in a vertebrate, to our knowledge, demonstrating direct predation risk due to UV wavelengths [Current Zoology 59 (2): 151-159, 2013].展开更多
文摘针对攻击防御软件存在攻击拦截率较小的问题,笔者设计并开发一个基于大数据分析技术的远程网络攻击防御软件。首先,按照远程网络的运行模式建立抵御攻击干扰框架,构建一个漏洞攻击验证,利用大数据分析技术选择攻击特征;其次,使用NAPI(New Application Program Interface)技术与DPDK轮询驱动模式结合的形式,传输攻击属性的数据至大页内存内,输出映射关系的防御激活码,完成对防御软件的开发;最后,搭建远程网络攻击拓扑结构后,准备基于带内遥测技术的防御软件、基于OpenFlow协议的防御软件以及设计的防御软件参与测试。测试结果表明:设计的防御软件产生的攻击拦截率最大,防御效果最佳。
基金The National Natural Science Foundation of China (No.70671025)the Scientific Research Foundation of Graduate School of Southeast University (No.YBJJ1014)
文摘The inter-bank market network models are constructed based on the inter-bank credit lending relationships, and the network efficiency characters of the Chinese inter-bank market are studied. Since it is impossible to obtain the specific credit data among banks, this paper estimates the inter-bank lending matrix based on the partial information of banks. Thus, directed network models of the Chinese inter-bank market are constructed by using the threshold method. The network efficiency measures and the effects of random attacks and selective attacks on the global efficiency of the inter-bank network are analyzed based on the network models of the inter-bank market. Empirical results suggest that the efficiency measures are sensitive to the threshold, and that the global efficiency is little affected by random attacks, while it is highly sensitive to selective attacks. Properties such as inter-bank market network efficiency would be useful for risk management and stability of the inter-bank market.
文摘The combat survivability is an essential factor to be considered in the development of recent military aircraft. Radar stealth and onboard electronic attack are two major techniques for the reduction of aircraft susceptibility. A tactical scenario for a strike mission is presented. The effect of aircraft radar cross section on the detection probability of a threat radar, as well as that of onboard jammer, are investigated. The guidance errors of radar guided surface to air missile and anti aircraft artillery, which are disturbed by radar cross section reduction or jammer radiated power and both of them are determined. The probability of aircraft kill given a single shot is calculated and finally the sortie survivability of an attack aircraft in a supposed hostile thread environment worked out. It is demonstrated that the survivability of a combat aircraft will be greatly enhanced by the combined radar stealth and onboard electronic attack, and the evaluation metho dology is effective and applicable.
基金supported in part by the National Natural Science Foundation under grant No.U1533107the Major Program of Natural Science Foundation of Tianjin under grant No.17JCZDJC30900+1 种基金the Fundamental Research Funds for the Central Universities of CAUC under grant No.3122016D003the graduate program of curriculum development project of Civil Aviation University of China(2050070515)
文摘In frequency domain,the power spectrum of Low-rate denial of service(LDoS) attacks is totally spread into the spectrum of normal traffic.It is a challenging task to detect and filter LDoS attack flows from the normal traffic.Based on the analysis of LDoS attack flows and legitimate TCP traffic in time and frequency domains,the periodicity of the TCP traffic and LDoS attack flows is explored to facilitate the research of network traffic processing.Hence,an approach of LDoS attack flow filtering based on frequency spectrum analysis is proposed.In this approach,the TCP traffic and LDoS attack flows are transformed from the time domain into the frequency domain.Then the round-trip time(RTT) is estimated by using frequency domain search method.Analysis of amplitude spectrum shows that TCP traffic energy is mainly concentrated on the points of n/RTT.Therefore,a comb filter using infinite impulse response(IIR) filter is designed to filter out the LDoS attack flows in frequency domain,while most legitimate TCP traffic energy at the points of n/RTT are pass through.Experimental results show that the maximum pass rate for legitimate TCP traffic reaches 92.55%,while the maximum filtration rate of LDoS attack flows reaches 81.36%.The proposed approach can effectively filter the LDoS attack flows while less impact on the legitimate TCP traffic.
基金supported by the National Natural Science Foundation of China(No. 71020107027) in part by the Doctoral Startup Fundation of Xinjiang University of Finace and Economics
文摘Steganalysis attack is to statistically estimate the embedded watermark in the watermarked multimedia,and the estimated watermark may be destroyed by the attacker.The existing methods of false negative probability,however,do not consider the influence of steganalysis attack.This paper proposed the game theory based false negative probability to estimate the impacts of steganalysis attack,as well as unintentional attack.Specifically,game theory was used to model the collision between the embedment and steganalysis attack,and derive the optimal building embedding/attacking strategy.Such optimal playing strategies devote to calculating the attacker destructed watermark,used for calculation of the game theory based false negative probability.The experimental results show that watermark detection reliability measured using our proposed method,in comparison,can better reflect the real scenario in which the embedded watermark undergoes unintentional attack and the attacker using steganalysis attack.This paper provides a foundation for investigating countermeasures of digital watermarking community against steganalysis attack.
基金supported in part by the National Natural Science Foundation of China under Grant No. 60873216Scientific and Technological Research Priority Projects of Sichuan Province under Grant No. 2012GZ0017Basic Research of Application Fund Project of Sichuan Province under Grant No. 2011JY0100
文摘Chosen-message pair Simple Power Analysis (SPA) attacks were proposed by Boer, Yen and Homma, and are attack methods based on searches for collisions of modular multiplication. However, searching for collisions is difficult in real environments. To circumvent this problem, we propose the Simple Power Clustering Attack (SPCA), which can automatically identify the modular multiplication collision. The insignificant effects of collision attacks were validated in an Application Specific Integrated Circuit (ASIC) environment. After treatment with SPCA, the automatic secret key recognition rate increased to 99%.
文摘A kind of attack strategy based on a probabilistic cloning machine is proposed in this letter. The security of BB84 and the six-state quantum key distribution protocols under this attack is studied by theoretic analyses and corroborated by simulations. It is concluded that the quantum key distribution protocols still have an asymptotic perfect security even if the eavesdropper adopts the proposed attack strategy.
基金supported by the project of the State Key Program of National Natural Science Foundation of China (No. 90818021)supported by a grant from the national high technology research and development program of China (863program) (No.2012AA012903)
文摘In order to protect the website and assess the security risk of website, a novel website security risk assessment method is proposed based on the improved Bayesian attack graph(I-BAG) model. First, the Improved Bayesian attack graph model is established, which takes attack benefits and threat factors into consideration. Compared with the existing attack graph models, it can better describe the website's security risk. Then, the improved Bayesian attack graph is constructed with optimized website attack graph, attack benefit nodes, threat factor nodes and the local conditional probability distribution of each node, which is calculated accordingly. Finally, website's attack probability and risk value are calculated on the level of nodes, hosts and the whole website separately. The experimental results demonstrate that the risk evaluating method based on I-BAG model proposed is a effective way for assessing the website security risk.
基金The National Natural Science Foundation of China(No.60475027)
文摘Aimed at modern high-density,high overlapped and powerful antipersonnel stealthy penetration environment,route planning techniques on active-attack strategy were thoroughly and further studied,in order to get good probability of survival and perfect efficiency of task accomplishment.It provides a new thought for and a new solution to the application of route planning in new era.
基金The National Natural Science Foundation of China(No.61771126,61372104)the Science and Technology Project of State Grid Corporation of China(No.SGRIXTKJ[2015]349)
文摘To deal with Byzantine attacks in 5 G cognitive radio networks,a bilateral threshold selection-based algorithm is proposed in the spectrum sensing process. In each round,secondary uses( SUs) first submit the energy values and instantaneous detection signal-to-noise ratios( SNRs) to the fusion center( FC). According to detection SNRs,the FC conducts normalization calculations on the energy values. Then,the FC makes a sort operation for these normalized energy values and traverses all the possible mid-points between these sorted normalized energy values to maximize the classification accuracy of each SU. Finally,by introducing the recognition probability and misclassification probability,the distributions of the normalized energy values are analyzed and the bilateral threshold of classification accuracy is obtained via a target misclassification probability. Hence,the blacklist of malicious secondary users( MSUs) is obtained. Simulation results show that the proposed scheme outperforms the current mainstream schemes in correct sensing probability,false alarm probability and detection probability.
基金supported in part by the National Natural Science Foundation of China(61227801,61121001,61201152,and 61421061)the Program for New Century Excellent Talents in University(NCET-01-0259)the Fundamental Research Funds for the Central Universities(2013RC0106)
文摘In the last decade,cognitive radio(CR) has emerged as a major next generation wireless networking technology,which is the most promising candidate solution to solve the spectrum scarcity and improve the spectrum utilization.However,there exist enormous challenges for the open and random access environment of CRNs,where the unlicensed secondary users(SUs) can use the channels that are not currently used by the licensed primary users(PUs) via spectrum-sensing technology.Because of this access method,some malicious users may access the cognitive network arbitrarily and launch some special attacks,such as primary user emulation attack,falsifying data or denial of service attack,which will cause serious damage to the cognitive radio network.In addition to the specifi c security threats of cognitive network,CRNs also face up to the conventional security threats,such as eavesdropping,tampering,imitation,forgery,and noncooperation etc..Hence,Cognitive radio networks have much more risks than traditional wireless networks with its special network model.In this paper,we considered the security threats from passive and active attacks.Firstly,the PHY layer security is presented in the view of passive attacks,and it is a compelling idea of using the physical properties of the radio channel to help provide secure wireless communications.Moreover,malicious user detection is introduced in the view of active attacks by means of the signal detection techniques to decrease the interference and the probabilities of false alarm and missed detection.Finally,we discuss the general countermeasures of security threats in three phases.In particular,we discuss the far reaching effect of defensive strategy against attacks in CRNs.
文摘Many animals are sensitive to ultraviolet light and also possess UV-reflective regions on their body surface. Individu- als reflecting UV have been shown to be preferred during social interactions such as mate choice or shoaling decisions. However, whether those body UV-reflections enhance also the conspicuousness to UV-sensitive predators and thereforeentail costs for its bearer is less well documented. Two size-matched three-spined sticklebacks Gasterosteus aculeatus, one enclosed in a UV-transmitting (UV+) and another in a UV-blocking (UV-) chamber, were simultaneously presented to individual brown trout Salmo trutta. "yearlings". Brown trout of this age are sensitive to the UV part of the electromagnetic spectnun and are natural predators of three-spined sticklebacks. The stickleback that was attacked first as well as the subsequent number of attacks was recorded. Sticklebacks enclosed in the UV-transmitting chamber were attacked first significantly more often compared to stickle- backs enclosed in the UV-blocking chamber. Control experiments using neutral density filters revealed that this was more likely due to LrV having an influence on hue perception rather than brighmess discrimination. The difference in attack probability cor- responded to the difference in chromatic contrasts between sticklebacks and the experimental background calculated for both the UV+ and UV- conditions in a physiological model of trout colour vision. UV reflections seem to be costly by enhancing the risk of predation due to an increased conspicuousness of prey. This is the first study in a vertebrate, to our knowledge, demonstrating direct predation risk due to UV wavelengths [Current Zoology 59 (2): 151-159, 2013].