期刊文献+

网络撞库攻击信息特征潜在博弈欺骗鉴别算法 被引量:1

Network Attack Hit Feature Library Information Potential Game Cheating Identification Algorithm
下载PDF
导出
摘要 网络撞库攻击是一种从数据库中导出数据的攻击方式,通过网站入侵,非法实现对用户信息的窃取和修改,如何更好提高网络安全,提出一种改进的网络撞库攻击信息特征潜在博弈欺骗鉴别算法。首先构建信号模型,采用博弈论方法,对攻击行为的欺骗性进行鉴别,得到网络区分服务等级的服务质量量化函数,从而实现对撞库攻击信号的欺骗性鉴别,利用非单调性决策博弈方法,给出网络威胁离散度状态方程,得到骗性判别的鉴别函数,统计撞库攻击行为的参与者,构建接入网络的优服务质量函数,提取出有用的规则性异常数据特征,并结合后置分类处理和数据处理,实现对攻击信号的准确检测和欺骗信号的鉴别。仿真实验表明,采用该方法,能有效鉴别出网络撞库攻击信号的实质信息特征和欺骗信息特征,对攻击信号的检测性能优越,提高了鉴别准确率,提高了网络服务的质量。 Network hit the base attack from a database derived data an attack mode, invaded after the website, hackers steal its database, to realize user information stealing and modification. This paper proposes an improved network attack hit feature library information potential game cheating identification algorithm, is of great significance in the design of network security. First, construct the signal model, using game theory, the attack on the behavior of the deception of the identification, obtain service quality quantization function network differentiated service level, uses the game theory to realize the deceptive differential impinging library attack signal method, using non monotonic decision-making game method, given a network threat dispersion equation of state, get the diseriminant function deceive. Identification, participants statistics hit the storehouse of the attack, excellent service quality function construction of the access network, extract the characteristic rules of abnormal data useful, and combined with the post classification processing and data processing, realize the accurate detection and identification of deception signal to attack the signal. Simulation results show that using this method, can effectively identify network attacks hit the base signal substance characteristics of information and deception information characteristics, and improve the quality of network service, to improve the accuracy of identification, the detection performance of the signal to attack the superiority.
作者 唐翠微
出处 《科技通报》 北大核心 2015年第8期144-146,共3页 Bulletin of Science and Technology
关键词 撞库攻击 信息特征 博弈 鉴别算法 检测 hit the base attack information characteristics game identification algorithm detection
  • 相关文献

参考文献4

二级参考文献54

  • 1Nay P,Zhou C.Vertical handoff decision algorithm for integrated UMTS and LEO satellite networks//Proceedings of the WRI International Conference on Communications and Mobile Computing.Yunnan,China,2009:180-184.
  • 2Zhang Y Q,Zhuang W H,Saleh A.Vertical handoff between 802.11 and 802.16 wireless access networks//Proceedings of the IEEE GLOBECOM 2008.New Orleans,LA,USA,2008:1-6.
  • 3Liu M,Li C Z,Guo X B,Dutkiewicz E.Performance analysis and optimization of handoff algorithms in heterogeneous wireless networks.IEEE Transactions on Mobile Computing,2008,7(7):846-857.
  • 4Yang K,Gondal I,Qiu B.Multi-dimensional adaptive SINR based vertical handoff for heterogeneous wireless networks.IEEE Communications Letters,2008,12(6):438-440.
  • 5Stevens-Navarro E,Lin Y X,Vincent Wong W S.An MDP-based vertical handoff decision algorithm for heterogeneous wireless networks.IEEE Transactions on Vehicular Technology,2008,57(2):1243-1254.
  • 6Lee S K,Sriram K,Kim K,Kim Y H,Golmie N.Vertical handoff decision algorithms for providing optimized performance in heterogeneous wireless networks.IEEE Transactions on Vehicular Technology,2009,58(2):865-881.
  • 7Niyato D,Hossain E.A noncooperative game-theoretic framework for radio resource management in 4G heterogeneous wireless access networks.IEEE Transactions on Mobile Computing,2008,7(3):332-345.
  • 8Chai R,Zhou W G,Chen Q B,Tang L.A survey on vertical handoff decision for heterogeneous wireless networks//Proceedings of the IEEE Youth Conference on Information,Computing and Telecommunication.Beijing,China,2009:279-282.
  • 9Mitchell Tom M.Machine Learning.New York:McGraw-Hill,1997.
  • 10Noam N,Tim R,Eva T,Vijay V V.Algorithmic Game Theory.New York:Cambridge University Press,2007.

共引文献22

同被引文献10

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部