期刊文献+

车载终端网络渗透测试系统的研究

Research On The Penetration Test System Of Vehicle Terminal Network
下载PDF
导出
摘要 随着大数据技术在汽车行业的快速应用和发展,对车载终端的网络安全提出了一些要求。本文介绍了一种基于无线信号模拟器的渗透测试方案和系统。系统包括测试用例、数据入侵模拟工具、无线信号模拟器、屏蔽器和结果比对系统五部分。利用测试用例,入侵者以无线通信的方式渗透车载终端,通过预期结果与实际结果的比对,验证车载终端样品是否满足指标要求。本文通过系统样机的测试,证明了测试系统的可用性。 With the rapid application and development of big data technology in the automotive industry,some requirements are raised for the network security of vehicle terminal.This paper introduces a penetration testing solution and system based on wireless signal simulator.The system includes five parts:test case,data intrusion simulation tool,wireless signal simulator,shield and result comparison system.Using the test case,the intruder penetrates the vehicle terminal through wireless communication.Through the comparison between the predict results and the actual results,to check whether the vehicle terminal prototype meets the index requirements・In this paper,the availability of the testing system is proved by the verification of the system prototype.
作者 吴诗宇 赵丰 郝刚 吴超 WU Shi-yu;ZHAO Feng;HAO Gang;WU Chao(Chongqing Vehicle Tbst&Research Institute Co.Ltd.,National Bus Quality Supervision&Inspection Center,Chongqing 401122,China;PLA Army Equipment Department,Beijing 100071,China;Chongqing Key Laboratory of industry and information technology for electric vehicle safety evaluation,Chongqing 401122,China)
出处 《汽车科技》 2021年第4期2-7,共6页 Auto Sci-Tech
关键词 车载终端 渗透测试 测试用例 无线通信 Vehicle Terminal Penetration Test Test Case Wireless Communication
  • 相关文献

参考文献8

二级参考文献45

  • 1李德毅,刘常昱.论正态云模型的普适性[J].中国工程科学,2004,6(8):28-34. 被引量:886
  • 2刘常昱,冯芒,戴晓军,李德毅.基于云X信息的逆向云新算法[J].系统仿真学报,2004,16(11):2417-2420. 被引量:186
  • 3赖海光,许峰,黄皓,谢俊元.基于Dempster-Shafer证据理论的端口扫描检测方法[J].电子学报,2006,34(11):1946-1950. 被引量:6
  • 4郑君杰,肖军模,刘志华,王晓蕾,王宏涛.基于Honeypot技术的网络入侵检测系统[J].电子科技大学学报,2007,36(2):257-259. 被引量:12
  • 5曾剑平,郭东辉.一种基于HMM和遗传算法的伪装入侵检测方法[J].小型微型计算机系统,2007,28(7):1210-1215. 被引量:2
  • 6Lawrence R. Rabiner. A Tutorial on Hidden Markov Models and Selected APPlications in SPeech Recognition [ J ]. Proceedings of the IEEE, 1989, 77(2) :257 -286.
  • 7Lippmann R, et al. The 1999 DARPA offline intrusion detection evaluation[ J ]. Computer Networks, 2000,34 (4) :579 -595.
  • 8BANERIEEA B, MOONEY R. Semi-supervised cluste- ring by seeding [ C ]. Proceedings of the 19th Interna- tional Conference on Machine Learning. San Francisco, CA :Kaufmann Publishers,2002: 19-26.
  • 9FLANAGAN J A. Unsupervised clustering of symbol strings [ C ]. International Joint Conference on Neural Networks, IJCNN' 03. Portland Oregon, USA: 2003, 3250-3255.
  • 10LI Y ZH, LI ZH J. Anomaly intrusion detection method based on K-means clustering algorithm with particle swarm optimization [ C ]. International Conference of In- formation Technology, Computer Engineering and Man- agement Sciences, ICM 2011.

共引文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部