期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
Saturation attack based route planning and threat avoidance algorithm for cruise missiles 被引量:12
1
作者 Guanghui Wang Xuefeng Sun +1 位作者 Liping Zhang Chao Lv 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2011年第6期948-953,共6页
According to the characteristic of cruise missiles,navigation point setting is simplified,and the principle of route planning for saturation attack and a concept of reference route are put forward.With the help of the... According to the characteristic of cruise missiles,navigation point setting is simplified,and the principle of route planning for saturation attack and a concept of reference route are put forward.With the help of the shortest-tangent idea in route-planning and the algorithm of back reasoning from targets,a reference route algorithm is built on the shortest range and threat avoidance.Then a route-flight-time algorithm is built on navigation points.Based on the conditions of multi-direction saturation attack,a route planning algorithm of multi-direction saturation attack is built on reference route,route-flight-time,and impact azimuth.Simulation results show that the algorithm can realize missiles fired in a salvo launch reaching the target simultaneously from different directions while avoiding threat. 展开更多
关键词 aerospace system engineering control and navigation technology of aero-craft mission planning route planning cruise missile saturation attack threat avoidance.
下载PDF
Study on Anti-ship Missile Saturation Attack Model 被引量:1
2
作者 王光辉 孙学锋 +1 位作者 严建钢 谢宇鹏 《Defence Technology(防务技术)》 SCIE EI CAS 2010年第1期10-15,共6页
Based on the analysis for the interception process of ship-to-air missile system to the anti-ship missile stream, the antagonism of ship-to-air missile and anti-ship missile stream was modeled by Monte Carlo method. T... Based on the analysis for the interception process of ship-to-air missile system to the anti-ship missile stream, the antagonism of ship-to-air missile and anti-ship missile stream was modeled by Monte Carlo method. This model containing the probability of acquiring anti-ship missile, threat estimation, firepower distribution, interception, effectiveness evaluation and firepower turning, can dynamically simulate the antagonism process of anti-ship missile attack stream and anti-air missile weapon system. The anti-ship missile's saturation attack stream for different ship-to-air missile systems can be calculated quantitatively. The simulated results reveal the relations among the anti-ship missile saturation attack and the attack intensity of anti-ship missile, interception mode and the main parameters of anti-air missile weapon system. It provides a theoretical basis for the effective operation of anti-ship missile. 展开更多
关键词 operational research system engineering anti-ship missile ship-to-air missile saturation attack antagonism model penetrate efficiency
下载PDF
An Efficient Scheme to Defend Data-to-Control-Plane Saturation Attacks in Software-Defined Networking
3
作者 Xuan-Bo Huang Kai-Ping Xue +3 位作者 Yi-Tao Xing Ding-Wen Hu Ruidong Li Qi-Bin Sun 《Journal of Computer Science & Technology》 SCIE EI CSCD 2022年第4期839-851,共13页
Software-defined networking (SDN) decouples the data and control planes. However, attackers can lead catastrophic results to the whole network using manipulated flooding packets, called the data-to-control-plane satur... Software-defined networking (SDN) decouples the data and control planes. However, attackers can lead catastrophic results to the whole network using manipulated flooding packets, called the data-to-control-plane saturation attacks. The existing methods, using centralized mitigation policies and ignoring the buffered attack flows, involve extra network entities and make benign traffic suffer from long network recovery delays. For these purposes, we propose LFSDM, a saturation attack detection and mitigation system, which solves these challenges by leveraging three new techniques: 1) using linear discriminant analysis (LDA) and extracting a novel feature called control channel occupation rate (CCOR) to detect the attacks, 2) adopting the distributed mitigation agents to reduce the number of involved network entities and, 3) cleaning up the buffered attack flows to enable fast recovery. Experiments show that our system can detect the attacks timely and accurately. More importantly, compared with the previous work, we save 81% of the network recovery delay under attacks ranging from 1,000 to 4,000 packets per second (PPS) on average, and 87% of the network recovery delay under higher attack rates with PPS ranging from 5,000 to 30,000. 展开更多
关键词 software-defined networking(SDN) saturation attack fast recovery linear discriminant analysis
原文传递
Survey of Attacks and Countermeasures for SDN
4
作者 BAI Jiasong ZHANG Menghao BI Jun 《ZTE Communications》 2018年第4期3-8,共6页
Software defined networking(SDN)has attracted significant attention from both academia and industry by its ability to reconfigure network devices with logically centralized applications.However,some critical security ... Software defined networking(SDN)has attracted significant attention from both academia and industry by its ability to reconfigure network devices with logically centralized applications.However,some critical security issues have also been introduced along with the benefits,which put an obstruction to the deployment of SDN.One root cause of these issues lies in the limited resources and capability of devices involved in the SDN architecture,especially the hardware switches lied in the data plane.In this paper,we analyze the vulnerability of SDN and present two kinds of SDN-targeted attacks:1)data-to-control plane saturation attack which exhausts resources of all SDN components,including control plane,data plane,and the in-between downlink channel and 2)control plane reflection attack which only attacks the data plane and gets conducted in a more efficient and hidden way.Finally,we propose the corresponding defense frameworks to mitigate such attacks. 展开更多
关键词 SDN indirect/direct data plane event data-to-control plane saturation attack control plane reflection attack
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部