期刊文献+

受攻击后的网络可靠性估计模型设计 被引量:1

Design of reliability estimation model of network after attack
下载PDF
导出
摘要 网络受到攻击入侵后容易出现信道失稳和链路输出失真,导致网络的可靠性下降,因此提出一种基于自适应均衡的受攻击后的网络可靠性估计模型。构建网络受攻击后的传输链路模型,采用链路衰落调制方法减少网络攻击对传输信道的损害,对网络传输信道进行分段均衡处理,采用自适应加权算法进行链路失真补偿,实现网络链路自适应均衡。仿真试验结果表明,采用该方法进行受攻击后的网络可靠性估计提高了对网络入侵的检测能力,抑制了攻击对网络的信道损害,提高网络安全性。 It is easy to occur channel instability,link output distortion,and network reliability reduction after network attack and intrusion.Therefore,an adaptive equalization based reliability estimation model of network after attack is proposed.The transmission link model after network attack is constructed.The link fading modulation method is adopted to reduce transmission channel damage from network intrusion.The segment equalization is performed for network transmission channels.The adaptive weighted algorithm is used to compensate link distortion and realize network link adaptive equalization.The simulation results show that the method for the reliability estimation of network after attack can enhance the capability of detecting network intrusion,suppress channel damage from network attack,and improve network security.
作者 林薇
出处 《现代电子技术》 北大核心 2017年第22期63-65,共3页 Modern Electronics Technique
关键词 网络攻击 自适应均衡 信道失稳 可靠性估计 链路输出失真 network intrusion adaptive equalization channel instability reliability estimation link output distortion
  • 相关文献

参考文献7

二级参考文献47

  • 1李发根,胡予濮,李刚.一个高效的基于身份的签密方案[J].计算机学报,2006,29(9):1641-1647. 被引量:73
  • 2王伟.多信息源的实时入侵检测方法研究[M].西安:西安交通大学出版社,2005.
  • 3B Waters. Egleient identity - based encryption without random ora - cles [ C ]. Advances in Cryptology - EUROCRYPT 2005. Ber- lin : Springer - Verlag, 2005 : 114 - 127.
  • 4Roberto Perdisci, Giorgio Giacinto, Fabio Roll. Alarm clustering for intrusion detection systems in computer networks[J]. Engineer- ing Applications of Artificial Intelligence, 2006, 19 ( 4 ) : 429 -438.
  • 5Everthon Silva Fonseea, Rodrigo Capobianco Guido, Paulo Rog:rio Scalassara, Carlos Dias Maciel, Jos6 Carlos Pereira. Wavelet time - frequency analysis and least squares support vector machines for the identification of voice disorders[J]. Computers in Biology and Medicine, 2007,37(4) :571 -578.
  • 6Ivan Goethals, Kristiaan Pelckmans, Johan A K Suykens, Bart De Moor. Identification of MIMO Hammerstein models using least squares support vector machines [ J ]. Automatica, 2005,41 ( 7 ) : 1263 - 1272.
  • 7Bimal K M, Gholam M A. Differential epidemic model of virus and worms in computer network [J]. International Journal of Network Security,2012,14(3) : 149-155.
  • 8Li Hong, Qian Chang-j i, Sun Li-zhen, et al. Simulation of a flexi- ble polymer tethered to a flat adsorbing surface [J]. Journal of Applied Polymer Science, 2012,124 : 282-287.
  • 9Zhu Q Y, Yang X F, Yang L X, et al. Optimal control of computer virus under a delayed model [J]. Applied Mathematics and Com putation, 2012,218(23) : 11613-11619.
  • 10董贵山,卢显良,邓春梅,罗俊.一种Linux网络硬件加密高性能并发调度方法[J].计算机应用,2008,28(1):65-67. 被引量:8

共引文献127

同被引文献14

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部