The IEC60870-5-104 protocol lacks an integrated authentication mechanism during plaintext transmission, and is vulnerable to security threats, monitoring, tampering, or cutting off communication connections. In order ...The IEC60870-5-104 protocol lacks an integrated authentication mechanism during plaintext transmission, and is vulnerable to security threats, monitoring, tampering, or cutting off communication connections. In order to verify the security problems of 104 protocol, the 104 master-slave communication implemented DoS attacks, ARP spoofing and Ettercap packet filtering and other man-in-the-middle attacks. DoS attacks may damage the network functions of the 104 communication host, resulting in communication interruption. ARP spoofing damaged the data privacy of the 104 protocol, and Ettercap packet filtering cut off the communication connection between the master and the slave. In order to resist the man-in-the-middle attack, the AES and RSA hybrid encryption signature algorithm and the national secret SM2 elliptic curve algorithm are proposed. AES and RSA hybrid encryption increases the security strength of communication data and realizes identity authentication. The digital signature implemented by the SM2 algorithm can realize identity verification, ensure that the data has not been tampered with, and can ensure the integrity of the data. Both of them improve the communication security of the 104 protocol.展开更多
中间人攻击是网络攻击的一种常用手段,其中超文本传输安全(Hypertext Transfer Protocol Secure,HTTPS)协议的中间人攻击危害较大,已有检测方法主要面向单客户端,以证书匹配验证为主要手段,部署成本和性能开销较高。通过分析SSL(Secure ...中间人攻击是网络攻击的一种常用手段,其中超文本传输安全(Hypertext Transfer Protocol Secure,HTTPS)协议的中间人攻击危害较大,已有检测方法主要面向单客户端,以证书匹配验证为主要手段,部署成本和性能开销较高。通过分析SSL(Secure Sockets Layer)握手阶段的密钥协商、证书验证等关键报文,提出基于时间特征的HTTPS中间人攻击检测方法,从流量角度提供了一种检测思路,具有更广泛的适用场景。实验结果表明,该方法在互联网环境测试数据集下具有较高的准确率。展开更多
China clears up the crowded and sometimes chaotic third-party payment industry with new requirements As shoppers abandon four-wheel carts and long checkout lines for the convenience of a mouse click,Chinese policy makers
本研究建立了8500 a BP以来长江中游平原地区,从新石器时期至明清时期7534个古文化遗址的GIS数据库,利用ArcGIS软件,从环境考古学的角度,对不同时期古文化遗址分布的地貌类型、海拔高程、坡度特征进行了系统分析。研究结果显示,不同时...本研究建立了8500 a BP以来长江中游平原地区,从新石器时期至明清时期7534个古文化遗址的GIS数据库,利用ArcGIS软件,从环境考古学的角度,对不同时期古文化遗址分布的地貌类型、海拔高程、坡度特征进行了系统分析。研究结果显示,不同时代的文化遗址的空间分布特征存在显著差别:1)新石器文化遗址主要分布在平原边缘的山前台地—岗地和高冲积平原等海拔高程适中的地区,海拔高程较低的平原中心区与海拔较高的山地则分布很少;2)西周以后,文化遗址分布高程呈现下降趋势,从山前台地—岗地、高冲积平原向平缓的低冲积平原转移;秦汉至明清时期,文化遗址则主要分布在海拔高程更低、坡度平缓的低冲积平原和湖积—冲积平原;3)不同时期的文化遗址空间分布模式,反映了不同生产力水平下人类活动对自然环境变化的响应特点。展开更多
文摘The IEC60870-5-104 protocol lacks an integrated authentication mechanism during plaintext transmission, and is vulnerable to security threats, monitoring, tampering, or cutting off communication connections. In order to verify the security problems of 104 protocol, the 104 master-slave communication implemented DoS attacks, ARP spoofing and Ettercap packet filtering and other man-in-the-middle attacks. DoS attacks may damage the network functions of the 104 communication host, resulting in communication interruption. ARP spoofing damaged the data privacy of the 104 protocol, and Ettercap packet filtering cut off the communication connection between the master and the slave. In order to resist the man-in-the-middle attack, the AES and RSA hybrid encryption signature algorithm and the national secret SM2 elliptic curve algorithm are proposed. AES and RSA hybrid encryption increases the security strength of communication data and realizes identity authentication. The digital signature implemented by the SM2 algorithm can realize identity verification, ensure that the data has not been tampered with, and can ensure the integrity of the data. Both of them improve the communication security of the 104 protocol.
文摘China clears up the crowded and sometimes chaotic third-party payment industry with new requirements As shoppers abandon four-wheel carts and long checkout lines for the convenience of a mouse click,Chinese policy makers
文摘本研究建立了8500 a BP以来长江中游平原地区,从新石器时期至明清时期7534个古文化遗址的GIS数据库,利用ArcGIS软件,从环境考古学的角度,对不同时期古文化遗址分布的地貌类型、海拔高程、坡度特征进行了系统分析。研究结果显示,不同时代的文化遗址的空间分布特征存在显著差别:1)新石器文化遗址主要分布在平原边缘的山前台地—岗地和高冲积平原等海拔高程适中的地区,海拔高程较低的平原中心区与海拔较高的山地则分布很少;2)西周以后,文化遗址分布高程呈现下降趋势,从山前台地—岗地、高冲积平原向平缓的低冲积平原转移;秦汉至明清时期,文化遗址则主要分布在海拔高程更低、坡度平缓的低冲积平原和湖积—冲积平原;3)不同时期的文化遗址空间分布模式,反映了不同生产力水平下人类活动对自然环境变化的响应特点。