期刊文献+

内容耗散网络的缓存污染攻击命中率阈值控制

Threshold Control of Cache Pollution Attack Hit Rate Based on Content Dissipative Network
下载PDF
导出
摘要 内容耗散网络的缓存污染攻击命中率高,难以检测。研究内容耗散网络缓存污染攻击的命中率与域间传输阈值的关系,对降低攻击命中率提供控制模型基础。提出一种基于零周期数相变自适应冗余信息抑制的内容耗散网络缓存污染攻击命中阈值分析模型,提高对缓存污染攻击的检测概率。设计内容耗散网络及缓存污染攻击系统模型,基于url内容块检测模型,得到缓存污染攻击命中判决准则,通过AS-BOOST使用并行的读写操作,进行零周期数相变自适应冗余信息抑制,得到优化阈值分布下的判决准则。实验结果表明,采用该算法能通过合理设定域间阈值,达到消除缓存污染攻击的效果,实现对内容耗散网络的安全控制。 The cache pollution attacks hit rate is high in content dissipative network, it is difficult to detect. The relation-ship between contents of dissipative network cache pollution attacks hit rate and inter domain transfer threshold is re-search, to reduce the hit rate to provide data base. A content dissipative network cache pollution attacks hit rate analysismodel is proposed based on zero cycle phase adaptive redundancy suppression, improve the detection probability of cachepollution attacks. The content dissipative network and cache pollution attack system model is designed. Based on URL con-tent block detection model, decision criterion of cache pollution attacks hit is obtained. The parallel read and write opera-tion is used by AS-BOOST, the redundant information is suppressed with zero cycle several phase adaptive method, thresh-old distribution rule is optimized. The experimental results show that, the algorithm can through reasonably set inter domainthreshold, eliminate the effect of cache pollution attacks, security control of the content of dissipative network is realized.
作者 吴华 王海顺
出处 《科技通报》 北大核心 2014年第12期157-159,共3页 Bulletin of Science and Technology
关键词 内容耗散网络 缓存污染攻击 检测 content dissipative network cache pollution attack detection
  • 相关文献

参考文献6

二级参考文献21

  • 1穆成坡,黄厚宽,田盛丰.入侵检测系统报警信息聚合与关联技术研究综述[J].计算机研究与发展,2006,43(1):1-8. 被引量:70
  • 2常卫东,王正华,鄢喜爱.基于集成神经网络入侵检测系统的研究与实现[J].计算机仿真,2007,24(3):134-137. 被引量:29
  • 3周荃,王崇骏,王珺,周新民,陈世福.基于人工智能技术的网络入侵检测的若干方法[J].计算机应用研究,2007,24(5):144-149. 被引量:33
  • 4BORTHAKUR D. The hadoop distributed file system:architecture and design [EB/OL]. [2010-08- 25]. http://hadoop, apache, org/core/docs/current/ hdfs_desigru pdf.
  • 5MACKEY G, SEHRI S, WANG Jun. Improving metadata management for small files in HDFS [C/ OL.] // Proceedings of 2009 IEEE International Conference on Cluster Computing and Workshops. [2010- 08- 10]. http://ieeexplore, ieee. org/stamp/stamp. jsp? tp=&arnumber=5289133.
  • 6LIU Xuhui, HAN Jizhong, ZHONG Yunqin, et al. Implementing WebGIS on hadoop: a case study of im- proving small file I/O performance on HDFS [C/OL] //Proceedings of 2009 IEEE International Conference on Cluster Computing and Workshops. [2010-08-10]. http://ieeexplore, ieee. org/stamp/stamp, jsp? tp= &arnumber= 5289196.
  • 7DONG Bo, QIU Jie, ZHENG Qinghua, et al. A novel approach to improving the efficiency of storing and accessing small files on hadoop: a case study by PowerPoint files EC]ffProceedings of the 7th International Conference on Services Computing. Piscataway, NJ, USA: IEEE, 2010: 65-72.
  • 8HUANG Ruwei, YU Si, ZHUANG Wei, et al. Design of privacy-preserving cloud storage framework [C]//Proceedings of the 9th International Conference on Grid and Cloud Computing. Piseataway, NJ, USA:IEEE, 2010: 128-132.
  • 9SATTY T L. Axiomatic foundation of the analytic hierarchy process [J]. Management Science, 1986, 32 (7) - 841-855.
  • 10HAN Jiawei, KAMBER N.Data mining: concepts and techniques [M]. San Francisco, CA, USA:Morgan Kaufmann, 2006.

共引文献137

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部