期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
网络扫描攻击以及拒绝服务攻击的检测方法 被引量:1
1
作者 杨小平 刘大昕 王桐 《应用科技》 CAS 2004年第1期34-36,共3页
网络扫描攻击和拒绝服务攻击是2种非常重要的攻击类型,而且检测比较困难,分析了它们的共同特征,提出了运用计数器的检测方法,并设计实现了一个高效的计数器算法.
关键词 网络安全 计算机 网络扫描攻击 拒绝服务攻击 检测方法 计数器
下载PDF
物联网感知节点安全威胁自动检测系统设计 被引量:6
2
作者 蓝土庆 《制造业自动化》 CSCD 2019年第5期148-151,共4页
物联网可将任意物品与互联网相连接,是一个开放的环境,但负责物品信息采集的节点能力脆弱,容易受到安全威胁。针对传统物联网节点威胁检测方法存在的漏洞检测不全面、检测效率低等缺点,提出一种基于OVALSchema的物联网感知节点安全威胁... 物联网可将任意物品与互联网相连接,是一个开放的环境,但负责物品信息采集的节点能力脆弱,容易受到安全威胁。针对传统物联网节点威胁检测方法存在的漏洞检测不全面、检测效率低等缺点,提出一种基于OVALSchema的物联网感知节点安全威胁智能检测系统。该系统涵盖检测代理与控制台两大部分,检测代理依赖于网络攻击行为扫描器,可以在不损害物联网系统和物联网感知节点的情况下,全面有效地检测感知节点安全威胁,并将各个感知节点的威胁信息结果上报给控制台,而控制台实现可同时控制物联网内各感知节点的威胁扫描,并将整个物联网感知节点的威胁信息汇总。实验结果表明,所设计的智能检测系统可检测的漏洞数量明显高于当前广泛应用的节点威胁检测系统,尤其在检测效率上有明显提升,可保障物联网技术的安全运行。 展开更多
关键词 物联网 OVAL SCHEMA 检测代理 网络攻击行为扫描 控制台
下载PDF
HTTP-sCAN:Detecting HTTP-Flooding Attack by Modeling Multi-Features of Web Browsing Behavior from Noisy Web-Logs 被引量:3
3
作者 WANG Jin ZHANG Min +2 位作者 YANG Xiaolong LONG Keping XU Jie 《China Communications》 SCIE CSCD 2015年第2期118-128,共11页
HTTP-flooding attack disables the victimized web server by sending a large number of HTTP Get requests.Recent research tends to detect HTTP-flooding with the anomaly-based approaches,which detect the HTTP-flooding by ... HTTP-flooding attack disables the victimized web server by sending a large number of HTTP Get requests.Recent research tends to detect HTTP-flooding with the anomaly-based approaches,which detect the HTTP-flooding by modeling the behavior of normal web surfers.However,most of the existing anomaly-based detection approaches usually cannot filter the web-crawling traces from unknown searching bots mixed in normal web browsing logs.These web-crawling traces can bias the base-line profile of anomaly-based schemes in their training phase,and further degrade their detection performance.This paper proposes a novel web-crawling tracestolerated method to build baseline profile,and designs a new anomaly-based HTTP-flooding detection scheme(abbr.HTTP-sCAN).The simulation results show that HTTP-sCAN is immune to the interferences of unknown webcrawling traces,and can detect all HTTPflooding attacks. 展开更多
关键词 IP network DDoS relative entropy cluster algorithm
下载PDF
Research on the Essential Network Equipment Risk Assessment Methodology based on Vulnerability Scanning Technology
4
作者 Xiaoqin Song 《International Journal of Technology Management》 2015年第10期50-52,共3页
In this paper, we conduct research on the essential network equipment risk assessment method based on vulnerability scanning technology. A growing number of hackers wanton invasion of the computer, through the network... In this paper, we conduct research on the essential network equipment risk assessment method based on vulnerability scanning technology. A growing number of hackers wanton invasion of the computer, through the network to steal important information, or destroy the network, the paralyzed which caused huge losses to the state and society. Find a known vulnerability rather than to find the unknown vulnerabilities much easier, which means that most of the attacker' s use is common vulnerabilities. Therefore, we adopt the advantages of the technique to finalize the methodology for the essential network equipment risk assessment which will be meaningful. 展开更多
关键词 Risk Assessment Vulnerability Scanning Network Security Essential Equipment.
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部