ARP-based Distributed Denial of Service (DDoS) attacks due to ARP-storms can happen in local area networks where many computer systems are infected by worms such as Code Red or by DDoS agents. In ARP attack, the DDoS ...ARP-based Distributed Denial of Service (DDoS) attacks due to ARP-storms can happen in local area networks where many computer systems are infected by worms such as Code Red or by DDoS agents. In ARP attack, the DDoS agents constantly send a barrage of ARP requests to the gateway, or to a victim computer within the same sub-network, and tie up the resource of attacked gateway or host. In this paper, we set to measure the impact of ARP-attack on resource exhaustion of computers in a local area network. Based on attack experiments, we measure the exhaustion of processing and memory resources of a victim computer and also other computers, which are located on the same network as the victim computer. Interestingly enough, it is observed that an ARP-attack not only exhausts resource of the victim computer but also significantly exhausts processing resource of other non-victim computers, which happen to be located on the same local area network as the victim computer.展开更多
A controlled bidirectional quantum secret direct communication scheme is proposed by using a Greenberger- Horne-Zeilinger (GHZ) state. In the scheme, two users can exchange their secret messages simultaneously with ...A controlled bidirectional quantum secret direct communication scheme is proposed by using a Greenberger- Horne-Zeilinger (GHZ) state. In the scheme, two users can exchange their secret messages simultaneously with a set of devices under the control of a third party. The security of the scheme is analysed and confirmed.展开更多
This work aims at optimizing densification parameters as well as resistance to hydration and slag attack of MgO-Dolomite refractory grains, processed from Egyptian dolomitc-magnesite raw material up to firing for 1-4 ...This work aims at optimizing densification parameters as well as resistance to hydration and slag attack of MgO-Dolomite refractory grains, processed from Egyptian dolomitc-magnesite raw material up to firing for 1-4 h at 1400-1600 ℃, in relation to their phase composition and microfabric. Minor amount of natural ilmenite mineral (0-2 wt%), separated from Egyptian black sands was used in doping the dolomitc-magnesite.展开更多
To counter BTT guidance mode, new relative motion equations of the targetaircraft and the attack aircraft are proposed. The inverse system theory of the nonlinearcontrol is used, and the direct BTT-180 guidance comman...To counter BTT guidance mode, new relative motion equations of the targetaircraft and the attack aircraft are proposed. The inverse system theory of the nonlinearcontrol is used, and the direct BTT-180 guidance command is solved, which can operatethe attack aircraft to automatically complete the flight mission of the preceding stage ofthe terminal weapon delivery, and thus the automatic attack is extended from the stage ofthe terminal weapon delivery to the preceding stage of the terminal weapon delivery.展开更多
Software defined networking(SDN)has attracted significant attention from both academia and industry by its ability to reconfigure network devices with logically centralized applications.However,some critical security ...Software defined networking(SDN)has attracted significant attention from both academia and industry by its ability to reconfigure network devices with logically centralized applications.However,some critical security issues have also been introduced along with the benefits,which put an obstruction to the deployment of SDN.One root cause of these issues lies in the limited resources and capability of devices involved in the SDN architecture,especially the hardware switches lied in the data plane.In this paper,we analyze the vulnerability of SDN and present two kinds of SDN-targeted attacks:1)data-to-control plane saturation attack which exhausts resources of all SDN components,including control plane,data plane,and the in-between downlink channel and 2)control plane reflection attack which only attacks the data plane and gets conducted in a more efficient and hidden way.Finally,we propose the corresponding defense frameworks to mitigate such attacks.展开更多
文摘ARP-based Distributed Denial of Service (DDoS) attacks due to ARP-storms can happen in local area networks where many computer systems are infected by worms such as Code Red or by DDoS agents. In ARP attack, the DDoS agents constantly send a barrage of ARP requests to the gateway, or to a victim computer within the same sub-network, and tie up the resource of attacked gateway or host. In this paper, we set to measure the impact of ARP-attack on resource exhaustion of computers in a local area network. Based on attack experiments, we measure the exhaustion of processing and memory resources of a victim computer and also other computers, which are located on the same network as the victim computer. Interestingly enough, it is observed that an ARP-attack not only exhausts resource of the victim computer but also significantly exhausts processing resource of other non-victim computers, which happen to be located on the same local area network as the victim computer.
基金Supported by the National Natural Science Foundation of China under Grant Nos 10534030 and 10304022.
文摘A controlled bidirectional quantum secret direct communication scheme is proposed by using a Greenberger- Horne-Zeilinger (GHZ) state. In the scheme, two users can exchange their secret messages simultaneously with a set of devices under the control of a third party. The security of the scheme is analysed and confirmed.
文摘This work aims at optimizing densification parameters as well as resistance to hydration and slag attack of MgO-Dolomite refractory grains, processed from Egyptian dolomitc-magnesite raw material up to firing for 1-4 h at 1400-1600 ℃, in relation to their phase composition and microfabric. Minor amount of natural ilmenite mineral (0-2 wt%), separated from Egyptian black sands was used in doping the dolomitc-magnesite.
文摘To counter BTT guidance mode, new relative motion equations of the targetaircraft and the attack aircraft are proposed. The inverse system theory of the nonlinearcontrol is used, and the direct BTT-180 guidance command is solved, which can operatethe attack aircraft to automatically complete the flight mission of the preceding stage ofthe terminal weapon delivery, and thus the automatic attack is extended from the stage ofthe terminal weapon delivery to the preceding stage of the terminal weapon delivery.
基金supported in part by the National Key R&D Program of China under Grant No.2017YFB0801701the National Science Foundation of China under Grant No.61472213CERNET Innovation Project(NGII20160123)
文摘Software defined networking(SDN)has attracted significant attention from both academia and industry by its ability to reconfigure network devices with logically centralized applications.However,some critical security issues have also been introduced along with the benefits,which put an obstruction to the deployment of SDN.One root cause of these issues lies in the limited resources and capability of devices involved in the SDN architecture,especially the hardware switches lied in the data plane.In this paper,we analyze the vulnerability of SDN and present two kinds of SDN-targeted attacks:1)data-to-control plane saturation attack which exhausts resources of all SDN components,including control plane,data plane,and the in-between downlink channel and 2)control plane reflection attack which only attacks the data plane and gets conducted in a more efficient and hidden way.Finally,we propose the corresponding defense frameworks to mitigate such attacks.