期刊文献+
共找到96篇文章
< 1 2 5 >
每页显示 20 50 100
Security Risk Analysis Model for Identification and Resolution System of Industrial Internet
1
作者 MA Baoluo CHEN Wenqu CHI Cheng 《ZTE Communications》 2020年第1期49-54,共6页
Identification and resolution system of the industrial Internet is the“neural hub”of the industrial Internet for coordination.Catastrophic damage to the whole industrial Internet industry ecology may be caused if th... Identification and resolution system of the industrial Internet is the“neural hub”of the industrial Internet for coordination.Catastrophic damage to the whole industrial Internet industry ecology may be caused if the identification and resolution system is attacked.Moreover,it may become a threat to national security.Therefore,security plays an important role in identification and resolution system of the industrial Internet.In this paper,an innovative security risk analysis model is proposed for the first time,which can help control risks from the root at the initial stage of industrial Internet construction,provide guidance for related enterprises in the early design stage of identification and resolution system of the industrial Internet,and promote the healthy and sustainable development of the industrial identification and resolution system. 展开更多
关键词 industrial internet identification and resolution system security risk analysis model
下载PDF
MV-Honeypot:Security Threat Analysis by Deploying Avatar as a Honeypot in COTS Metaverse Platforms
2
作者 Arpita Dinesh Sarang Mohsen Ali Alawami Ki-Woong Park 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第10期655-669,共15页
Nowadays,theuse of Avatars that are unique digital depictions has increased by users to access Metaverse—a virtual reality environment—through multiple devices and for various purposes.Therefore,the Avatar and Metav... Nowadays,theuse of Avatars that are unique digital depictions has increased by users to access Metaverse—a virtual reality environment—through multiple devices and for various purposes.Therefore,the Avatar and Metaverse are being developed with a new theory,application,and design,necessitating the association of more personal data and devices of targeted users every day.This Avatar and Metaverse technology explosion raises privacy and security concerns,leading to cyber attacks.MV-Honeypot,or Metaverse-Honeypot,as a commercial off-the-shelf solution that can counter these cyber attack-causing vulnerabilities,should be developed.To fill this gap,we study user’s engagements with Avatars in Metaverse,analyze possible security vulnerabilities,and create a model named Simplified Avatar Relationship Association with Non-linear Gradient(SARANG)that draws the full diagram of infrastructure components and data flow through accessing Metaverse in this paper.We also determine the most significant threat for each component’s cyberattacks that will affect user data and Avatars.As a result,the commercial off-the-shelf(COTS)of the MV-Honeypot must be established. 展开更多
关键词 AVATAR metaverse CYBERsecurity cloud computing internet of things artificial intelligence security analysis
下载PDF
Risk Analysis of Industrial Internet Identity System 被引量:1
3
作者 TANG Kai 《ZTE Communications》 2020年第1期44-48,共5页
The risks of the current identity system represented by Domain Name System(DNS)and Object Identifier(OID)are studied.According to the characteristics of the industrial Internet Identity(Ⅲ)system,four open ecosystem p... The risks of the current identity system represented by Domain Name System(DNS)and Object Identifier(OID)are studied.According to the characteristics of the industrial Internet Identity(Ⅲ)system,four open ecosystem planes are divided,and a corresponding risk analysis view is established to analyze risks for various planes.This paper uses Isaiah Berlin’s definition of liberty to more generally express the concept of security as positive rights and negative rights.In the risk analysis view,the target system is modeled from four dimensions:stakeholders,framework,architecture,and capability delivery.At last,three defensive lines are proposed to establish the identity credit system. 展开更多
关键词 industrial internet identity credit system risk analysis view right framework security attribute
下载PDF
A Novel Formal Theory for Security Protocol Analysis of Denial of Service Based on Extended Strand Space Model
4
作者 JIANG Rui 《China Communications》 SCIE CSCD 2010年第4期23-28,共6页
Denial of Service Distributed Denial of Service (DOS) attack, especially (DDoS) attack, is one of the greatest threats to Internet. Much research has been done for it by now, however, it is always concentrated in ... Denial of Service Distributed Denial of Service (DOS) attack, especially (DDoS) attack, is one of the greatest threats to Internet. Much research has been done for it by now, however, it is always concentrated in the behaviors of the network and can not deal with the problem exactly. In this paper, we start from the security of the protocol, then we propose a novel theory for security protocol analysis of Denial of Service in order to deal with the DoS attack. We first introduce the conception of weighted graph to extend the strand space model, then we extend the penetrator model and define the goal of anti-DoS attack through the conception of the DoS-stop protocol, finally we propose two kinds of DoS test model and erect the novel formal theory for security protocol analysis of Denial of Service. Our new formal theory is applied in two example protocols. It is proved that the Internet key exchange (IKE) easily suffers from the DoS attacks, and the efficient DoS- resistant secure key exchange protocol (JFK) is resistant against DoS attack for the server, respectively. 展开更多
关键词 Denial of Service security Protocol analysis Formal Theory Strand Space Model internet Key Exchange
下载PDF
Internet测量与分析综述 被引量:109
5
作者 张宏莉 方滨兴 +3 位作者 胡铭曾 姜誉 詹春艳 张树峰 《软件学报》 EI CSCD 北大核心 2003年第1期110-116,共7页
Internet的测量与分析为加强网络管理、提高网络利用率、防范大规模网络攻击提供了技术平台,已成为学术界、企业界和国家政府部门所普遍关心的重要问题之一.介绍了网络测量与分析的主要研究内容,以及国内外相关领域的研究现状,并对该领... Internet的测量与分析为加强网络管理、提高网络利用率、防范大规模网络攻击提供了技术平台,已成为学术界、企业界和国家政府部门所普遍关心的重要问题之一.介绍了网络测量与分析的主要研究内容,以及国内外相关领域的研究现状,并对该领域的关键技术和难点问题进行了分析,同时给出了网络测量与分析的3个典型应用案例. 展开更多
关键词 internet 测量 分析 网络安全 网络管理 TCP/IP协议
下载PDF
The Application of Epidemiology for Categorising DNS Cyber Risk Factors
6
作者 Jessemyn Modini Timothy Lynar +1 位作者 Elena Sitnikova Keith Joiner 《Journal of Computer and Communications》 2020年第12期12-28,共17页
This Epidemiology can be applied to cybersecurity as a novel approach for analysing and detecting cyber threats and their risks. It provides a systematic model for the analysis of likelihood, consequence, management, ... This Epidemiology can be applied to cybersecurity as a novel approach for analysing and detecting cyber threats and their risks. It provides a systematic model for the analysis of likelihood, consequence, management, and prevention measures to examine malicious behaviours like disease. There are a few research studies in discrete cybersecurity risk factors;however, there is a significant research gap on the analysis of collective cyber risk factors and measuring their cyber risk impacts. Effective cybersecurity risk management requires the identification and estimation of the probability of infection, based on a comprehensive range of historical and environmental factors, including human behaviour and technology characteristics. This paper explores how an epidemiological principle can be applied to identify cybersecurity risk factors. These risk factors comprise both human and machine behaviours profiled as risk factors. This paper conducts a preliminary analysis of the relationships between these risk factors utilising Domain Name System (DNS) data sources. The experimental results indicated that the epidemiological principle can effectively examine and estimate cyber risk factors. The proposed principle has a great potential in enhancing new machine learning-enabled intrusion detection solutions by utilising this principle as a risk assessment module of the solutions. 展开更多
关键词 EPIDEMIOLOGY CYBERsecurity Artificial Intelligence internet of Things (IoT) Epidemiological security analysis Machine Learning
下载PDF
大规模网络拓扑测量中的关键技术 被引量:8
7
作者 张宏莉 方滨兴 +2 位作者 何慧 张宇 毕慧 《通信学报》 EI CSCD 北大核心 2004年第7期55-61,共7页
Internet的测量与分析为加强网络管理、提高网络利用率、防范大规模网络攻击提供技术平台,已成为学术界、企业界和国家政府部门所普遍关心的重要问题之一。本文首先介绍面向Internet的网络拓扑测量的研究背景,然后探讨大规模网络拓扑测... Internet的测量与分析为加强网络管理、提高网络利用率、防范大规模网络攻击提供技术平台,已成为学术界、企业界和国家政府部门所普遍关心的重要问题之一。本文首先介绍面向Internet的网络拓扑测量的研究背景,然后探讨大规模网络拓扑测量的总体方案,提出存在的主要难点问题及采取的关键技术,最后给出实验结果和下一步工作计划。 展开更多
关键词 网络测量与分析 internet拓扑 网络安全 网络管理
下载PDF
基于C-V2X直连通信的车辆编队安全威胁分析
8
作者 张广顺 王炜 +1 位作者 江军 吴超 《信息安全与通信保密》 2024年第2期93-104,共12页
基于蜂窝车联网技术支持的智能车辆编队行驶场景,研究智能车辆面临的信息安全威胁,并提出安全防护建议。通过分析车辆编队在直连通信接口中的车队内部及与路侧单元间的通信,以及车队编组、管理的通信过程,识别智能车辆编队行驶面临的信... 基于蜂窝车联网技术支持的智能车辆编队行驶场景,研究智能车辆面临的信息安全威胁,并提出安全防护建议。通过分析车辆编队在直连通信接口中的车队内部及与路侧单元间的通信,以及车队编组、管理的通信过程,识别智能车辆编队行驶面临的信息泄露、信息篡改、身份仿冒等安全威胁,并针对性地提出车辆编队行驶安全防护方案,如通信内容加密,引入区块链技术实现成员身份鉴别和数据安全等。 展开更多
关键词 车联网 车辆编队 安全威胁分析 直连通信
下载PDF
ID Updating-Based RFID Mutual Authentication Protocol for Low-Cost Tags 被引量:1
9
作者 李剑 宋丹劼 +2 位作者 郭晓静 谢丰 彭勇 《China Communications》 SCIE CSCD 2011年第7期122-127,共6页
In order to solve the various privacy and security problems in RFID system, a new low-cost RFID mutual authentication protocol based on ID updating mechanics is proposed. In the proposed scheme, the backend server kee... In order to solve the various privacy and security problems in RFID system, a new low-cost RFID mutual authentication protocol based on ID updating mechanics is proposed. In the proposed scheme, the backend server keeps both the current ID and potential next ID for each tag, thus to solve the possible problem of de-synchronization attack in the most ID updating-based schemes. In the security analysis section, comparing several protocols in property required and attacker resistances, the comparison results show that the proposed protocol provides strong authentication and strong integrity of the transmissions and can withstand most the possible attacks that break the security of the previous schemes. In the performance evaluation section, the analysis results also indicate that, in terms of computational cost and storage requirement, the proposed scheme is safer, more efficient, more suitable for low-cost tag and more feasible in practice. 展开更多
关键词 internet of Things RFID mutual authentication ID updating security analysis performance evaluation
下载PDF
Detecting Vulnerability on IoT Device Firmware: A Survey 被引量:2
10
作者 Xiaotao Feng Xiaogang Zhu +3 位作者 Qing-Long Han Wei Zhou Sheng Wen Yang Xiang 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2023年第1期25-41,共17页
Internet of things (IoT) devices make up 30%of all network-connected endpoints,introducing vulnerabilities and novel attacks that make many companies as primary targets for cybercriminals.To address this increasing th... Internet of things (IoT) devices make up 30%of all network-connected endpoints,introducing vulnerabilities and novel attacks that make many companies as primary targets for cybercriminals.To address this increasing threat surface,every organization deploying IoT devices needs to consider security risks to ensure those devices are secure and trusted.Among all the solutions for security risks,firmware security analysis is essential to fix software bugs,patch vulnerabilities,or add new security features to protect users of those vulnerable devices.However,firmware security analysis has never been an easy job due to the diversity of the execution environment and the close source of firmware.These two distinct features complicate the operations to unpack firmware samples for detailed analysis.They also make it difficult to create visual environments to emulate the running of device firmware.Although researchers have developed many novel methods to overcome various challenges in the past decade,critical barriers impede firmware security analysis in practice.Therefore,this survey is motivated to systematically review and analyze the research challenges and their solutions,considering both breadth and depth.Specifically,based on the analysis perspectives,various methods that perform security analysis on IoT devices are introduced and classified into four categories.The challenges in each category are discussed in detail,and potential solutions are proposed subsequently.We then discuss the flaws of these solutions and provide future directions for this research field.This survey can be utilized by a broad range of readers,including software developers,cyber security researchers,and software security engineers,to better understand firmware security analysis. 展开更多
关键词 Firmware emulation internet of things(IoT)firmware network fuzzing security static analysis
下载PDF
基于物联网技术的电厂信息化智能化监测与控制系统设计
11
作者 张龙 《通信电源技术》 2024年第8期10-12,共3页
解析电厂在信息化智能化监测与控制方面的具体需求,深入讨论物联网技术在电力行业中的应用现状,阐述设计基于物联网技术的电厂信息化智能化监测与控制系统的意义。基于物联网技术的电厂信息化智能化监测与控制系统的架构设计,包括系统... 解析电厂在信息化智能化监测与控制方面的具体需求,深入讨论物联网技术在电力行业中的应用现状,阐述设计基于物联网技术的电厂信息化智能化监测与控制系统的意义。基于物联网技术的电厂信息化智能化监测与控制系统的架构设计,包括系统的整体规划、传感器与执行器的选择和布局、数据采集与传输方案的设计以及数据存储和管理机制的建立,涉及的核心算法与技术包括实时数据的处理与分析算法、异常检测与故障诊断技术、自适应控制算法与应用策略以及安全与隐私保护机制,以期提升电厂整体的安全性和供电的可靠性。 展开更多
关键词 物联网技术 系统架构设计 数据处理与分析 安全与隐私保护
下载PDF
基于物联网的智能电网设备管理系统研究
12
作者 王峰 《通信电源技术》 2024年第12期158-160,共3页
随着物联网技术的发展,智能电网设备管理系统的研究成为电力系统自动化、智能化的关键。通过设计实现设备监测、数据分析、故障诊断以及远程控制等功能,提高电力系统的运行效率和安全性。同时,采用身份认证、数据加密、访问控制以及安... 随着物联网技术的发展,智能电网设备管理系统的研究成为电力系统自动化、智能化的关键。通过设计实现设备监测、数据分析、故障诊断以及远程控制等功能,提高电力系统的运行效率和安全性。同时,采用身份认证、数据加密、访问控制以及安全审计等措施,确保系统的安全性,经过测试,系统运行良好,可以满足电网设备管理需求。 展开更多
关键词 物联网 智能电网 设备管理 需求分析 功能模块设计 安全架构设计
下载PDF
Logistic Regression with Elliptical Curve Cryptography to Establish Secure IoT
13
作者 J.R.Arunkumar S.Velmurugan +3 位作者 Balarengadurai Chinnaiah G.Charulatha M.Ramkumar Prabhu A.Prabhu Chakkaravarthy 《Computer Systems Science & Engineering》 SCIE EI 2023年第6期2635-2645,共11页
Nowadays,Wireless Sensor Network(WSN)is a modern technology with a wide range of applications and greatly attractive benefits,for example,self-governing,low expenditure on execution and data communication,long-term fu... Nowadays,Wireless Sensor Network(WSN)is a modern technology with a wide range of applications and greatly attractive benefits,for example,self-governing,low expenditure on execution and data communication,long-term function,and unsupervised access to the network.The Internet of Things(IoT)is an attractive,exciting paradigm.By applying communication technologies in sensors and supervising features,WSNs have initiated communication between the IoT devices.Though IoT offers access to the highest amount of information collected through WSNs,it leads to privacy management problems.Hence,this paper provides a Logistic Regression machine learning with the Elliptical Curve Cryptography technique(LRECC)to establish a secure IoT structure for preventing,detecting,and mitigating threats.This approach uses the Elliptical Curve Cryptography(ECC)algorithm to generate and distribute security keys.ECC algorithm is a light weight key;thus,it minimizes the routing overhead.Furthermore,the Logistic Regression machine learning technique selects the transmitter based on intelligent results.The main application of this approach is smart cities.This approach provides continuing reliable routing paths with small overheads.In addition,route nodes cooperate with IoT,and it handles the resources proficiently and minimizes the 29.95%delay. 展开更多
关键词 Wireless sensor network internet of things security elliptical curve cryptography machine learning regression analysis
下载PDF
用Melnikov方法研究船舶在随机横浪中的倾覆 被引量:11
14
作者 唐友刚 谷家扬 +1 位作者 郑宏宇 李红霞 《船舶力学》 EI 2004年第5期27-34,共8页
本文应用Melnikov函数和相空间转移率研究船舶在随机波浪中的强非线性横摇运动及其倾覆问题,分析了波浪特征频率、特征波高、船舶非线性恢复力臂以及阻尼特性对相空间转移率的影响。以长30.7m、宽6.9m的渔船为例,采用ISSC波浪谱,在时域... 本文应用Melnikov函数和相空间转移率研究船舶在随机波浪中的强非线性横摇运动及其倾覆问题,分析了波浪特征频率、特征波高、船舶非线性恢复力臂以及阻尼特性对相空间转移率的影响。以长30.7m、宽6.9m的渔船为例,采用ISSC波浪谱,在时域内计算了Melnikov函数,得到了相空间转移率与Melnikov函数之间的关系以及有义波高对相空间转移率的影响。研究表明:随有义波高增大,相空间转移率不断增大,船舶航行的安全域迅速减小。从而揭示了相空间转移率与船舶倾覆内在的密切联系,为船舶的设计和稳性衡准提供了有价值的参考。 展开更多
关键词 Melnikov方法 船舶 倾覆 随机波浪 非线性横摇运动 稳性 相空间转移率
下载PDF
基于攻防博弈模型的网络安全测评和最优主动防御 被引量:153
15
作者 姜伟 方滨兴 +1 位作者 田志宏 张宏莉 《计算机学报》 EI CSCD 北大核心 2009年第4期817-827,共11页
为了进行网络信息系统安全测评和主动防御,提出了网络防御图模型、攻防策略分类及其成本量化方法、网络攻防博弈模型和基于上述模型的最优主动防御选取算法.最后通过一个典型的网络实例分析了上述模型和算法在网络安全测评和最优主动防... 为了进行网络信息系统安全测评和主动防御,提出了网络防御图模型、攻防策略分类及其成本量化方法、网络攻防博弈模型和基于上述模型的最优主动防御选取算法.最后通过一个典型的网络实例分析了上述模型和算法在网络安全测评和最优主动防御中的应用.分析结果表明,提出的模型和方法是可行的、有效的. 展开更多
关键词 网络安全 防御图 成本量化 攻防博弈 最优主动防御
下载PDF
可信网络研究 被引量:253
16
作者 林闯 彭雪海 《计算机学报》 EI CSCD 北大核心 2005年第5期751-758,共8页
当前孤立、单一和附加的网络安全系统已经不能满足客观需求.该文在分析可信网络的产生背景和动机的基础上,提出了可信网络的概念,揭示了其基本属性,即安全性、可生存性和可控性,阐述了它们之间的紧密联系,并讨论了可信网络研究需要解决... 当前孤立、单一和附加的网络安全系统已经不能满足客观需求.该文在分析可信网络的产生背景和动机的基础上,提出了可信网络的概念,揭示了其基本属性,即安全性、可生存性和可控性,阐述了它们之间的紧密联系,并讨论了可信网络研究需要解决的关键科学问题.最后,介绍了国际上与此相关的研究工作. 展开更多
关键词 可信网络 安全性 可生存性 可控性
下载PDF
基于IIS的Web网站的安全研究与设计 被引量:12
17
作者 谢剑猛 许飞 《华东交通大学学报》 2003年第5期62-65,共4页
详细分析了Web网站的安全隐患,给出了Web网站安全设计原则,并结合实践经验,从网络体系、操作系统、Web服务器、脚本程序、数据库和管理制度安全意识等几个方面探讨了基于IIS的Web网站的安全设计.
关键词 IIS WEB网站 网络安全 安全隐患 安全设计 脚本程序 数据库 管理制度
下载PDF
基于车辆行为分析的车联网超可靠低时延通信关键技术 被引量:10
18
作者 张海霞 刘文杰 +1 位作者 薛彤 梁聪 《中兴通讯技术》 2020年第1期12-18,共7页
为解决车辆高速移动性导致的车联网超可靠低时延通信(URLLC)性能下降问题,提出了大数据驱动的车辆行为分析技术,并阐述了基于车辆行为分析的移动管理技术、资源分配技术和信息安全技术。认为车辆行为分析技术是实现URLLC的基础,移动管... 为解决车辆高速移动性导致的车联网超可靠低时延通信(URLLC)性能下降问题,提出了大数据驱动的车辆行为分析技术,并阐述了基于车辆行为分析的移动管理技术、资源分配技术和信息安全技术。认为车辆行为分析技术是实现URLLC的基础,移动管理技术是提高通信可靠性的重要手段,资源分配技术是降低通信时延的有效方法,信息安全技术是实现URLLC的前提和保障。 展开更多
关键词 车联网 URLLC 车辆行为分析 移动管理 资源分配 信息安全
下载PDF
物联网中安全通信协议的形式化分析 被引量:6
19
作者 吴名欢 程小辉 《桂林理工大学学报》 CAS 北大核心 2013年第2期333-338,共6页
针对物联网通信协议安全性不足和使用非形式化方法进行分析时容易出现错误的问题,提出了一种物联网安全通信协议,建立了协议主体模型和攻击者模型,采用通信顺序进程CSP的形式化方法对协议模型进行了分析。该通信协议对传送的信息进行加... 针对物联网通信协议安全性不足和使用非形式化方法进行分析时容易出现错误的问题,提出了一种物联网安全通信协议,建立了协议主体模型和攻击者模型,采用通信顺序进程CSP的形式化方法对协议模型进行了分析。该通信协议对传送的信息进行加密,采用的加密方式是散列函数结合异或运算。协议主体进行了相互认证,认证服务器为协议主体通信分配了会话密钥,解决了读写器非法扫描和信息安全传送的问题。利用故障发散改进检测器(FDR)对该协议模型CSP进程进行了检测,结果表明:该协议主体进行了相互认证,会话密钥是安全的,所提出的物联网通信协议是安全可靠的,CSP方法用于分析协议的安全性是可行的。 展开更多
关键词 物联网 形式化分析 安全协议 通信顺序进程
下载PDF
IPv6环境下的入侵检测系统模型设计 被引量:3
20
作者 张博 李伟华 +1 位作者 史兴键 王文奇 《西北工业大学学报》 EI CAS CSCD 北大核心 2005年第1期79-83,共5页
IPv6将作为下一代 Internet的网络协议 ,对信息安全提出了新的挑战 ,入侵检测技术也需要进一步发展。针对此提出了 IPv6环境下入侵检测系统模型 ( IDSMIPv6)。探讨了流量分析、网络阻断、灾难恢复、IP追踪、快速捕包和高速地址匹配等关... IPv6将作为下一代 Internet的网络协议 ,对信息安全提出了新的挑战 ,入侵检测技术也需要进一步发展。针对此提出了 IPv6环境下入侵检测系统模型 ( IDSMIPv6)。探讨了流量分析、网络阻断、灾难恢复、IP追踪、快速捕包和高速地址匹配等关键技术 ,并利用协同技术 ,实现了各个模块的总体控制。依据此系统模型构建的 展开更多
关键词 入侵检测 IPV6 网络安全
下载PDF
上一页 1 2 5 下一页 到第
使用帮助 返回顶部