期刊文献+
共找到22篇文章
< 1 2 >
每页显示 20 50 100
Practical Security Approaches against Border Gateway Protocol (BGP) Session Hijacking Attacks between Autonomous Systems 被引量:1
1
作者 Stephen Brako Oti James Ben Hayfron-Acquah 《Journal of Computer and Communications》 2014年第8期10-21,共12页
The border gateway protocol (BGP) is the default inter domain routing protocol used on the internet for exchanging information between autonomous systems. Available literature suggests that BGP is vulnerable to sessio... The border gateway protocol (BGP) is the default inter domain routing protocol used on the internet for exchanging information between autonomous systems. Available literature suggests that BGP is vulnerable to session hijacking attacks. There are a number of proposals aimed at improving BGP security which have not been fully implemented. This paper examines a number of approaches for securing BGP through a comparative study and identifies the reasons why these proposals have not been implemented commercially. This paper analyses the architecture of internet routing and the design of BGP while focusing on the problem of BGP session hijacking attacks. Using Graphical Network Simulator 3 (GNS-3), a session hijack is demonstrated and a solution which involves the implementation of route filtering, policy-maps and route-maps on CISCO routers representing ASes is carried out. In the end, a workable industry standard framework for securing and protecting BGP sessions and border routers from exploitation with little or no modification to the existing routing infrastructure is demonstrated. 展开更多
关键词 Inter-Domain ROUTING SESSION hijacking BGP SECURITY Autonomous Systems
下载PDF
A Customized Authentication Design for Traffic Hijacking Detection on Hardware-Trojan Infected NoCs
2
作者 Mubashir Hussain Hui Guo Sri Parameswaran 《Journal of Computer and Communications》 2018年第1期135-152,共18页
Traffic hijacking is a common attack perpetrated on networked systems, where attackers eavesdrop on user transactions, manipulate packet data, and divert traffic to illegitimate locations. Similar attacks can also be ... Traffic hijacking is a common attack perpetrated on networked systems, where attackers eavesdrop on user transactions, manipulate packet data, and divert traffic to illegitimate locations. Similar attacks can also be unleashed in a NoC (Network on Chip) based system where the NoC comes from a third-party vendor and can be engrafted with hardware Trojans. Unlike the attackers on a traditional network, those Trojans are usually small and have limited capacity. This paper targets such a hardware Trojan;Specifically, the Trojan aims to divert traffic packets to unauthorized locations on the NoC. To detect this kind of traffic hijacking, we propose an authentication scheme in which the source and destination addresses are tagged. We develop a custom design for the packet tagging and authentication such that the implementation costs can be greatly reduced. Our experiments on a set of applications show that on average the detection circuitry incurs about 3.37% overhead in area, 2.61% in power, and 0.097% in performance when compared to the baseline design. 展开更多
关键词 Packet hijacking DETECTION HARDWARE TROJAN NETWORK-ON-CHIP
下载PDF
VenomAttack: automated and adaptive activity hijacking in Android
3
作者 Pu SUN Sen CHEN +3 位作者 Lingling FAN Pengfei GAO Fu SONG Min YANG 《Frontiers of Computer Science》 SCIE EI CSCD 2023年第1期187-204,共18页
Activity hijacking is one of the most powerful attacks in Android. Though promising, all the prior activity hijacking attacks suffer from some limitations and have limited attack capabilities. They no longer pose secu... Activity hijacking is one of the most powerful attacks in Android. Though promising, all the prior activity hijacking attacks suffer from some limitations and have limited attack capabilities. They no longer pose security threats in recent Android due to the presence of effective defense mechanisms. In this work, we propose the first automated and adaptive activity hijacking attack, named VenomAttack, enabling a spectrum of customized attacks (e.g., phishing, spoofing, and DoS) on a large scale in recent Android, even the state-of-the-art defense mechanisms are deployed. Specifically, we propose to use hotpatch techniques to identify vulnerable devices and update attack payload without re-installation and re-distribution, hence bypassing offline detection. We present a newly-discovered flaw in Android and a bug in derivatives of Android, each of which allows us to check if a target app is running in the background or not, by which we can determine the right attack timing via a designed transparent activity. We also propose an automated fake activity generation approach, allowing large-scale attacks. Requiring only the common permission INTERNET, we can hijack activities at the right timing without destroying the GUI integrity of the foreground app. We conduct proof-of-concept attacks, showing that VenomAttack poses severe security risks on recent Android versions. The user study demonstrates the effectiveness of VenomAttack in real-world scenarios, achieving a high success rate (95%) without users’ awareness. That would call more attention to the stakeholders like Google. 展开更多
关键词 ANDROID activity hijacking Android security mobile security
原文传递
Towards Blockchain-Based Secure BGP Routing,Challenges and Future Research Directions 被引量:1
4
作者 Qiong Yang Li Ma +3 位作者 Shanshan Tu Sami Ullah MuhammadWaqas Hisham Alasmary 《Computers, Materials & Continua》 SCIE EI 2024年第5期2035-2062,共28页
Border Gateway Protocol(BGP)is a standard inter-domain routing protocol for the Internet that conveys network layer reachability information and establishes routes to different destinations.The BGP protocol exhibits s... Border Gateway Protocol(BGP)is a standard inter-domain routing protocol for the Internet that conveys network layer reachability information and establishes routes to different destinations.The BGP protocol exhibits security design defects,such as an unconditional trust mechanism and the default acceptance of BGP route announcements from peers by BGP neighboring nodes,easily triggering prefix hijacking,path forgery,route leakage,and other BGP security threats.Meanwhile,the traditional BGP security mechanism,relying on a public key infrastructure,faces issues like a single point of failure and a single point of trust.The decentralization,anti-tampering,and traceability advantages of blockchain offer new solution ideas for constructing secure and trusted inter-domain routing mechanisms.In this paper,we summarize the characteristics of BGP protocol in detail,sort out the BGP security threats and their causes.Additionally,we analyze the shortcomings of the traditional BGP security mechanism and comprehensively evaluate existing blockchain-based solutions to address the above problems and validate the reliability and effectiveness of blockchain-based BGP security methods in mitigating BGP security threats.Finally,we discuss the challenges posed by BGP security problems and outline prospects for future research. 展开更多
关键词 BGP security blockchain prefix hijacking trust model secure routing
下载PDF
Terrorist Networks, Network Energy and Node Removal: A New Measure of Centrality Based on Laplacian Energy 被引量:16
5
作者 Xingqin Qi Robert D. Duval +6 位作者 Kyle Christensen Edgar Fuller Arian Spahiu Qin Wu Yezhou Wu Wenliang Tang Cunquan Zhang 《Social Networking》 2013年第1期19-31,共13页
In this work we propose a centrality measure for networks, which we refer to as Laplacian centrality, that provides a general framework for the centrality of a vertex based on the idea that the importance (or centrali... In this work we propose a centrality measure for networks, which we refer to as Laplacian centrality, that provides a general framework for the centrality of a vertex based on the idea that the importance (or centrality) of a vertex is related to the ability of the network to respond to the deactivation or removal of that vertex from the network. In particular, the Laplacian centrality of a vertex is defined as the relative drop of Laplacian energy caused by the deactivation of this vertex. The Laplacian energy of network G with?n?vertices is defined as , where ?is the eigenvalue of the Laplacian matrix of G. Other dynamics based measures such as that of Masuda and Kori and PageRank compute the importance of a node by analyzing the way paths pass through a node while our measure captures this information as well as the way these paths are “redistributed” when the node is deleted. The validity and robustness of this new measure are illustrated on two different terrorist social network data sets and 84 networks in James Moody’s Add Health in school friendship nomination data, and is compared with other standard centrality measures. 展开更多
关键词 NETWORK CENTRALITY LAPLACIAN ENERGY 9/11 hijacking Bali BOMBING Terrorism
下载PDF
High-Risk LEO Satellite Network Path Detection Based on Spatial and Temporal Delay Anomaly Analysis 被引量:1
6
作者 Tianyu Zhang Hewu Li +5 位作者 Jun Liu Lu Lu Qian Wu Shaowen Zheng Zeqi Lai Yuanjie Li 《China Communications》 SCIE CSCD 2023年第7期57-71,共15页
The gradual deployment of Low-Earth Orbit(LEO)mega constellations with inter-satellite links(ISLs)promises ubiquitous,low-latency,and high-throughput satellite network services.However,networked LEO satellites with IS... The gradual deployment of Low-Earth Orbit(LEO)mega constellations with inter-satellite links(ISLs)promises ubiquitous,low-latency,and high-throughput satellite network services.However,networked LEO satellites with ISLs are also at risk of routing attacks such as hijacking.Existing defenses against route hijacking in terrestrial networks can hardly work for the LEO satellite network due to its high spatiotemporal dynamics.To deal with it,we propose RPD,a high-risk routing path detection method for LEO mega-constellation networks.RPD detects abnormal high-risk LEO network paths by checking the consistency between the path delay and the geographical distance.This is efficiently achieved by combining in-band measurements and out-of-band statistical processing to detect the anomaly of the clustering feature in the reference delay matrix.RPD avoids the recalculation of the header cryptographic marks when the handover occurs,thus greatly reducing the cost and improving the performance of highrisk path detection.Experiments showed that the proposed RPD mechanism achieves an average detection accuracy of 91.64%under normal network conditions,and maintain about 89%even when congestion occurs in multiple areas of the network and measurement noise is considered.In addition,RPD does not require any cryptographic operation on the intermediate node,only minimal communication cost with excellent scalability and deployability. 展开更多
关键词 LEO satellite networks route hijacking path verification risky path detection
下载PDF
hijack(劫机)的由来
7
作者 李德信 《语言教育》 2002年第2期34-34,共1页
2001年9月11日恐怖主义者劫持美国民航客机,袭击了世贸中心和国防部五角大楼。“9.11”事件举世震惊,hijack(劫机)一词也随之而家喻户晓。
关键词 举世震惊 民航客机 世贸中心 HIJACK 劫机事件 美国宪法 跳出来 呼语 acker
下载PDF
可升级的网络攻击检测问题的研究(英文)
8
作者 Cui Wei Zhang Qishan 《科技经济市场》 2006年第2期65-66,共2页
关键词 Network Intrusion Detection Communication Complexity TCP Connection hijacking
下载PDF
Audio Hijack Pro万能录音机
9
《数字技术与应用》 2004年第12期46-46,共1页
Audio Hijack Pro是由Rogue amoeba开发的音频软件,它的功能非常强大只要是你的Mac能放的声音。这个程序都可以录下来.从流媒体广播到DVD音频.还可以为任何程序作数字声效处理,可以使iTunes和Quicktime电台效果明显改善。
关键词 Rogue amoeba公司 音频软件 AUDIO HIJACK PRO 功能
下载PDF
英语学习中的类比构词
10
作者 李冲 《学园》 2009年第10期59-59,共1页
类比构词(Word—Formation by Analogy)是英语中一种有趣而又实用的构词方式。其构词特点是,以某个同类词为模式,在语义上进行联想类比,替换其中某个词素,构造出与之对应或类似的新词来。例如,work aholic(工作迷)系仿alcoholi... 类比构词(Word—Formation by Analogy)是英语中一种有趣而又实用的构词方式。其构词特点是,以某个同类词为模式,在语义上进行联想类比,替换其中某个词素,构造出与之对应或类似的新词来。例如,work aholic(工作迷)系仿alcoholic(嗜酒者)而造,而seajack(海上劫持)和skyjack(空中劫持)则是类比hijack(拦路抢劫)而成,故都属类比词。 展开更多
关键词 联想类比 构词方式 英语学习 HIJACK 构词特点 work 类比词 语义
下载PDF
英语类比构词趣谈
11
作者 张红朝 《魅力中国》 2010年第31期73-73,共1页
类比构词(Wora—Formation by Analogy)是英语中一种有趣而又实用的构词方式。其构词特点是,以某个同类词为模式,在语义上进行联想类比,替换其中某个词素,构造出与之对应或类似的新词来。例如,workaholic(工作迷)系仿alco—ho... 类比构词(Wora—Formation by Analogy)是英语中一种有趣而又实用的构词方式。其构词特点是,以某个同类词为模式,在语义上进行联想类比,替换其中某个词素,构造出与之对应或类似的新词来。例如,workaholic(工作迷)系仿alco—holic(嗜酒者)而造,而seajack(海上劫持)和skyjack(空中劫持)则是类比hijack(拦路抢劫)而成,故都属类比词。 展开更多
关键词 类比构词 英语 HIJACK 构词方式 构词特点 联想类比 类比词 语义
下载PDF
英语词语探源
12
作者 王春 《中学生英语(初中版)》 2003年第12期10-10,共1页
1 ACHILLE’S HEEL 这个短话来源于古希腊神话。Achille是古希腊传说中的一位杰出英雄,他在特洛伊战争中身经百战,屡建功勋。据说,Achille出生时也只是一个极其普通的孩子。他的母亲为了锻炼他坚强的意志,造就他一副刀枪不入的钢铁之躯... 1 ACHILLE’S HEEL 这个短话来源于古希腊神话。Achille是古希腊传说中的一位杰出英雄,他在特洛伊战争中身经百战,屡建功勋。据说,Achille出生时也只是一个极其普通的孩子。他的母亲为了锻炼他坚强的意志,造就他一副刀枪不入的钢铁之躯,便倒提着他的身体放到环绕地狱的河——冥河中去浸泡。果然,经过浸泡。 展开更多
关键词 英语 “S.0.S.” 词汇 词源 初中 HIJACK 词义
下载PDF
A buffer overflow detection and defense method based on RiSC-V instruction set extension
13
作者 Chang Liu Yan-Jun Wu +1 位作者 Jing-Zheng Wu Chen Zhao 《Cybersecurity》 EI CSCD 2024年第2期28-43,共16页
Buffer overflow poses a serious threat to the memory security of modern operating systems.It overwrites the con-tents of other memory areas by breaking through the buffer capacity limit,destroys the system execution e... Buffer overflow poses a serious threat to the memory security of modern operating systems.It overwrites the con-tents of other memory areas by breaking through the buffer capacity limit,destroys the system execution environ-ment,and provides implementation space for various system attacks such as program control flow hijacking.That makes it a wide range of harms.A variety of security technologies have been proposed to deal with system security problems including buffer overflow.For example,No eXecute(NX for short)is a memory management technology commonly used in Harvard architecture.It can refuse the execution of code which residing in a specific memory,and can effectively suppress the abnormal impact of buffer overflow on control flow.Therefore,in recent years,it has also been used in the field of system security,deriving a series of solutions based on NX technology,such as ExecShield,DEP,StackGuard,etc.However,these security solutions often rely too much on the processor archi-tecture so that the protection coverage is insufficient and the accuracy is limited.Especially in the emerging system architecture field represented by RiSC-V,there is still a lack of effective solutions for buffer overflow vulnerabilities.With the continuous rapid development of the system architecture,it is urgent to develop defense methods that are applicable to different system application environments and oriented to all executable memory spaces to meet the needs of system security development.Therefore,we propose BOP,A new system memory security design method based on RISC-V extended instructions,to build a RISC-V buffer overflow detection and defense system and deal with the buffer overflow threat in RIsC-V.According to this method,NX technology can be combined with program control flow analysis,and Nx bit mechanism can be used to manage the executability of memory space,so as to achieve a more granular detection and defense of buffer overflow attacks that may occur in RISC-V system environment.In addition,The memory management and control function of BOP is not only very suitable for solving the security problems in the existing single architecture system,but also widely applicable to the combina-tion of multiple heterogeneous systems. 展开更多
关键词 RISc-V Operating system security Buffer overflow Control flow hijacking Nx bit Xibop
原文传递
格式化字符串漏洞原理的研究
14
作者 龙恒 《网络安全技术与应用》 2024年第6期55-59,共5页
本文基于x86架构处理器和64位版本的Linux操作系统组成的平台,使用对两个有漏洞的程序进行渗透测试的方法对格式化字符串漏洞的原理进行了分析。首先介绍了格式化字符串漏洞产生的原因;随后以两种常见的攻击方式为例,讲解了利用格式化... 本文基于x86架构处理器和64位版本的Linux操作系统组成的平台,使用对两个有漏洞的程序进行渗透测试的方法对格式化字符串漏洞的原理进行了分析。首先介绍了格式化字符串漏洞产生的原因;随后以两种常见的攻击方式为例,讲解了利用格式化字符串漏洞进行攻击的原理,介绍了格式化字符串函数参数位置的确定方法,给出了生成攻击载荷的算法以及栈和进程地址的计算方法,分析了编程方式的不同以及使用不同安全机制对渗透测试过程的影响;最后介绍了格式化字符串的漏洞的防范方法。 展开更多
关键词 格式化字符串漏洞 渗透测试 Return-into-libc攻击 hijack GOT攻击
原文传递
Communication-Based Attacks Detection in Android Applications 被引量:2
15
作者 Chuan Ma Tao Wang +3 位作者 Limin Shen Dongkui Liang Shuping Chen Dianlong You 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2019年第5期596-614,共19页
The Android operating system provides a rich Inter-Component Communication(ICC) method that brings enormous convenience. However, the Android ICC also increases security risks. To address this problem, a formal method... The Android operating system provides a rich Inter-Component Communication(ICC) method that brings enormous convenience. However, the Android ICC also increases security risks. To address this problem, a formal method is proposed to model and detect inter-component communication behavior in Android applications. Firstly,we generate data flow graphs and data facts for each component through component-level data flow analysis.Secondly, our approach treats ICC just like method calls. After analyzing the fields and data dependencies of the intent, we identify the ICC caller and callee, track the data flow between them, and construct the ICC model. Thirdly,the behavior model of Android applications is constructed by a formal mapping method for component data flow graph based on Pi calculus. The runtime sensitive path trigger detection algorithm is then given. Communicationbased attacks are detected by analyzing intent abnormity. Finally, we analyze the modeling and detection efficiency,and compare it with relevant methods. Analysis of 57 real-world applications partly verifies the effectiveness of the proposed method. 展开更多
关键词 ANDROID inter-component COMMUNICATION intents COMPONENT hijacking attack DETECTION
原文传递
Security Analysis of Application Layer Protocols on Wireless Local Area Networks 被引量:1
16
作者 杨明豪 《Journal of Shanghai Jiaotong university(Science)》 EI 2011年第5期586-592,共7页
This paper aims at analyzing the security issues that lie in the application layer (AL) protocols when users connect to the Internet via a wireless local area network (WLAN) through an access point. When adversaries l... This paper aims at analyzing the security issues that lie in the application layer (AL) protocols when users connect to the Internet via a wireless local area network (WLAN) through an access point. When adversaries launch deauthentication flood attacks cutting users' connection, the connection managers will automatically research the last access point's extended service set identifier (ESSID) and then re-establish connection. However, such re-connection can lead the users to a fake access point with the same ESSID set by attackers. As the attackers hide behind users' access points, they can pass AL's authentication and security schemes, e.g. secure socket layer (SSL). We have proved that they can even spy on users' account details, passwords, data and privacy. 展开更多
关键词 man-in-the-middle (MITM) attacks session hijacking wireless local area network (WLAN)
原文传递
我国TEMPEST发展亟待解决的问题与对策 被引量:4
17
作者 胡延军 孙德刚 杜虹 《信息安全与通信保密》 2003年第6期18-21,共4页
本文从TEMPEST技术基础研究、检测、防护、产品结构四个方面对其发展中亟待解决的问题与对策进行了深入探讨。
关键词 中国 TEMPEST技术 信息安全 HIJACK NONSTOP SOFT—TEMPEST 电磁波 电磁泄漏 声光 安全隔离交换系统 技术管理 防护产品
原文传递
利用Putty hijack劫持SSH会话
18
作者 古典娃娃 《黑客防线》 2009年第2期26-27,共2页
前几天了,朋友在群里面问有没有人玩过Puttyhijack。Putty我用过,Puttyhijack是什么我就不太清楚了,看名字好像是PuttY劫持什么的。到Google和百度里搜索出来的结果都是英文和下载的,几乎没什么详细的使用说明。所以我就做了一下实... 前几天了,朋友在群里面问有没有人玩过Puttyhijack。Putty我用过,Puttyhijack是什么我就不太清楚了,看名字好像是PuttY劫持什么的。到Google和百度里搜索出来的结果都是英文和下载的,几乎没什么详细的使用说明。所以我就做了一下实验,也给大家简单的介绍一下使用过程。 展开更多
关键词 工具 PUTTY HIJACK SSH
原文传递
音乐特效软件Audio Hijack Pro1.1
19
《桌面黄页》 2003年第5期15-15,共1页
关键词 音乐特效软件 AUDIO HIJACK Pro1.1 定时器 MP3录音
原文传递
蒸发的劫机者
20
作者 陆离 《八小时以外》 2014年第4期102-105,共4页
搜索 1971年11月25日,美国华盛顿州,斯内克河流域。〈br〉 巨大的峡谷两岸密布着高大的松树和云杉,森林的脚下则是湍急的斯内克河。这是美国地形最崎岖的地方,人迹罕至。可是今天森林中悠闲生活着的北美棕熊和驼鹿却惊慌失措地... 搜索 1971年11月25日,美国华盛顿州,斯内克河流域。〈br〉 巨大的峡谷两岸密布着高大的松树和云杉,森林的脚下则是湍急的斯内克河。这是美国地形最崎岖的地方,人迹罕至。可是今天森林中悠闲生活着的北美棕熊和驼鹿却惊慌失措地四处躲避,原本寂静得只能听见鸟叫的伊甸园从早上开始就变得异常喧闹,到处是穿着黑色制服的警察和蓝色夹克的联邦调查局探员。一位联邦调查局的探员正举着手电在昨天暴雨后泥泞的林地中艰难前行,他一边拨开湿漉漉挡道的灌木一边仔细搜索着四周,身上的对讲机则不断传来伴着滋滋干扰声的对话:“我这边没发现可疑痕迹,你那边呢?”“连只兔子都没看见!”“见鬼!我踩泥里了!”听着同侪的交流,可怜的探员突然感到又冷了许多:“这都快到零度了吧!这混蛋怎么挑感恩节动手!”抹去脸上冰冷的雨水后,他开始想念家里那温暖的壁炉,“现在老婆和孩子们该吃火鸡了吧,烤成深棕色的肉,再蘸上肉汁和红莓酱!该死,找到那混蛋饶不了他!”腹诽几句之后,探员又打起精神仔细搜索。而在他周围的方圆几十公里内,300位同事正和他一样,进行着一次美国历史上最大规模的地毯式搜查。这些人放弃了香喷喷的感恩节火鸡和馅饼如此劳师动众,到底是为了找谁? 展开更多
关键词 HIJACK 联邦调查局 蒸发 美国历史 华盛顿州 最大规模 感恩节 搜索
原文传递
上一页 1 2 下一页 到第
使用帮助 返回顶部