期刊文献+
共找到796篇文章
< 1 2 40 >
每页显示 20 50 100
User Station Security Protection Method Based on Random Domain Name Detection and Active Defense
1
作者 Hongyan Yin Xiaokang Ren +2 位作者 Jinyu Liu Shuo Zhang Wenkun Liu 《Journal of Information Security》 2023年第1期39-51,共13页
The power monitoring system is the most important production management system in the power industry. As an important part of the power monitoring system, the user station that lacks grid binding will become an import... The power monitoring system is the most important production management system in the power industry. As an important part of the power monitoring system, the user station that lacks grid binding will become an important target of network attacks. In order to perceive the network attack events on the user station side in time, a method combining real-time detection and active defense of random domain names on the user station side was proposed. Capsule network (CapsNet) combined with long short-term memory network (LSTM) was used to classify the domain names extracted from the traffic data. When a random domain name is detected, it sent instructions to routers and switched to update their security policies through the remote terminal protocol (Telnet), or shut down the service interfaces of routers and switched to block network attacks. The experimental results showed that the use of CapsNet combined with LSTM classification algorithm can achieve 99.16% accuracy and 98% recall rate in random domain name detection. Through the Telnet protocol, routers and switches can be linked to make active defense without interrupting services. 展开更多
关键词 User Station Random Domain Name Detection Capsule Network active defense Long Short Term Memory
下载PDF
Novel 18β-glycyrrhetinic acid amide derivatives show dual-acting capabilities for controlling plant bacterial diseases through ROS-mediated antibacterial efficiency and activating plant defense responses 被引量:2
2
作者 SONG Ying-lian LIU Hong-wu +7 位作者 YANG Yi-hong HE Jing-jing YANG Bin-xin YANG Lin-li ZHOU Xiang LIU Li-wei WANG Pei-yi YANG Song 《Journal of Integrative Agriculture》 SCIE CAS CSCD 2023年第9期2759-2771,共13页
Natural products have long been a crucial source of,or provided inspiration for new agrochemical discovery.Naturally occurring 18β-glycyrrhetinic acid shows broad-spectrum bioactivities and is a potential skeleton fo... Natural products have long been a crucial source of,or provided inspiration for new agrochemical discovery.Naturally occurring 18β-glycyrrhetinic acid shows broad-spectrum bioactivities and is a potential skeleton for novel drug discovery.To extend the utility of 18β-glycyrrhetinic acid for agricultural uses,a series of novel 18β-glycyrrhetinic acid amide derivatives were prepared and evaluated for their antibacterial potency.Notably,compound 5k showed good antibacterial activity in vitro against Xanthomonas oryzae pv.oryzae(Xoo,EC50=3.64 mg L–1),and excellent protective activity(54.68%)against Xoo in vivo.Compound 5k induced excessive production and accumulation of reactive oxygen species in the tested pathogens,resulting in damaging the bacterial cell envelope.More interestingly,compound 5k could increase the activities of plant defense enzymes including catalase,superoxide dismutase,peroxidase,and phenylalanine ammonia lyase.Taken together,these enjoyable results suggested that designed compounds derived from 18β-glycyrrhetinic acid showed potential for controlling intractable plant bacterial diseases by disturbing the balance of the phytopathogen’s redox system and activating the plant defense system. 展开更多
关键词 18β-glycyrrhetinic acid antibacterial activities defense enzyme activity reactive oxygen species
下载PDF
A Security Transfer Model Based on Active Defense Strategy
3
作者 Ying Zheng 《Communications and Network》 2010年第3期187-192,共6页
This paper proposes a security transfer model founded on the active defense strategy. In the unit of security domains of dynamic overlaying routers, this model defines the intelligent agent/ management of network elem... This paper proposes a security transfer model founded on the active defense strategy. In the unit of security domains of dynamic overlaying routers, this model defines the intelligent agent/ management of network element together with the self-similar, hierarchical and distributed management structure. Furthermore, we use deceptive packets so that the attackers can not trace back to the encrypted data packets. Finally, according to the digested information from data packets, this model is capable of detecting attacks and tracing back to the attackers immediately. In the meantime, the overlaying routers in the security domain are dynamically administered. In summary, this model not only improves the se-curity of data transfer on the web, but also enhances the effectiveness of the network management and switching efficiency of routers as well. 展开更多
关键词 active defense Digested Information ROUTING Control Deceptive PACKETS HIERARCHICAL Management
下载PDF
A NEW DYNAMIC DEFENSE MODEL BASED ON ACTIVE DECEPTION
4
作者 Gong Jing Sun Zhixin Gu Qiang 《Journal of Electronics(China)》 2009年第2期205-213,共9页
Aiming at the traditional passive deception models,this paper constructs a Decoy Platform based on Intelligent Agent(DPIA) to realize dynamic defense.The paper explores a new dynamic defense model based on active dece... Aiming at the traditional passive deception models,this paper constructs a Decoy Platform based on Intelligent Agent(DPIA) to realize dynamic defense.The paper explores a new dynamic defense model based on active deception,introduces its architecture,and expatiates on communication methods and security guarantee in information transference.Simulation results show that the DPIA can attract hacker agility and activity,lead abnormal traffic into it,distribute a large number of attack data,and ensure real network security. 展开更多
关键词 欺骗 基础 模型 防御 南京大学 通讯
下载PDF
Threat Modeling and Application Research Based on Multi-Source Attack and Defense Knowledge
5
作者 Shuqin Zhang Xinyu Su +2 位作者 Peiyu Shi Tianhui Du Yunfei Han 《Computers, Materials & Continua》 SCIE EI 2023年第10期349-377,共29页
Cyber Threat Intelligence(CTI)is a valuable resource for cybersecurity defense,but it also poses challenges due to its multi-source and heterogeneous nature.Security personnel may be unable to use CTI effectively to u... Cyber Threat Intelligence(CTI)is a valuable resource for cybersecurity defense,but it also poses challenges due to its multi-source and heterogeneous nature.Security personnel may be unable to use CTI effectively to understand the condition and trend of a cyberattack and respond promptly.To address these challenges,we propose a novel approach that consists of three steps.First,we construct the attack and defense analysis of the cybersecurity ontology(ADACO)model by integrating multiple cybersecurity databases.Second,we develop the threat evolution prediction algorithm(TEPA),which can automatically detect threats at device nodes,correlate and map multisource threat information,and dynamically infer the threat evolution process.TEPA leverages knowledge graphs to represent comprehensive threat scenarios and achieves better performance in simulated experiments by combining structural and textual features of entities.Third,we design the intelligent defense decision algorithm(IDDA),which can provide intelligent recommendations for security personnel regarding the most suitable defense techniques.IDDA outperforms the baseline methods in the comparative experiment. 展开更多
关键词 Multi-source data fusion threat modeling threat propagation path knowledge graph intelligent defense decision-making
下载PDF
DLP:towards active defense against backdoor attacks with decoupled learning process
6
作者 Zonghao Ying Bin Wu 《Cybersecurity》 EI CSCD 2024年第1期122-134,共13页
Deep learning models are well known to be susceptible to backdoor attack,where the attacker only needs to provide a tampered dataset on which the triggers are injected.Models trained on the dataset will passively impl... Deep learning models are well known to be susceptible to backdoor attack,where the attacker only needs to provide a tampered dataset on which the triggers are injected.Models trained on the dataset will passively implant the backdoor,and triggers on the input can mislead the models during testing.Our study shows that the model shows different learning behaviors in clean and poisoned subsets during training.Based on this observation,we propose a general training pipeline to defend against backdoor attacks actively.Benign models can be trained from the unreli-able dataset by decoupling the learning process into three stages,i.e.,supervised learning,active unlearning,and active semi-supervised fine-tuning.The effectiveness of our approach has been shown in numerous experiments across various backdoor attacks and datasets. 展开更多
关键词 Deep learning Backdoor attack active defense
原文传递
Neural mechanism of proposer's decision-making in the ultimatum and dictator games 被引量:2
7
作者 Hongming Zheng Liqi Zhu 《Neural Regeneration Research》 SCIE CAS CSCD 2013年第4期357-362,共6页
Previous studies have demonstrated that reactions to unfair offers in the ultimatum game are correlated with negative emotion. However, little is known about the difference in neural activity between a proposer's dec... Previous studies have demonstrated that reactions to unfair offers in the ultimatum game are correlated with negative emotion. However, little is known about the difference in neural activity between a proposer's decision-making in the ultimatum game compared with the dictator game. The present functional magnetic resonance imaging study revealed that proposing fair offers in the dictator game elicited greater activation in the right supramarginal gyrus, right medial frontal gyrus and left anterior cingulate cortex compared with proposing fair offers in the ultimatum game in 23 Chinese undergraduate and graduate students from Beijing Normal University in China. However, greater activation was found in the right superior temporal gyrus and left cingulate gyrus for the reverse contrast. "The results indicate that proposing fair offers in the dictator game is more strongly associated with cognitive control and conflicting information processing compared with proposing fair offers in the ultimatum game. 展开更多
关键词 neural regeneration neuroimaging functional magnetic resonance imaging decision-making fair behavior neural mechanism brain brain activation cognition emotion grants-supported paper photographs-containing paper neuroregeneration
下载PDF
Geographically Distinct Expression Profile of Host Defense Peptides in the Skin of the Chinese Odorous Frog, Odorrana margaretae
8
作者 Guiying LING Li LI +3 位作者 Jiuxiang GAO Haining YU Yipeng WANG Jiang ZHOU 《Asian Herpetological Research》 SCIE 2013年第4期288-297,共10页
Odorrana margaretae (Anura: Ranidae) is widely distributed in the southern provinces of China. Previously, 72 antimicrobial peptides (AMPs) belonging to 21 families were identified from the skin of O. margaretae,... Odorrana margaretae (Anura: Ranidae) is widely distributed in the southern provinces of China. Previously, 72 antimicrobial peptides (AMPs) belonging to 21 families were identified from the skin of O. margaretae, which were captured in the Hunan province. In the present study, five O. margaretae frogs were captured from the Guizhou province and a total of 28 cDNAs encoding 17 host defense peptides (HDPs) belonging to 14 families were cloned from the skin cDNA library of O. margaretae. Among the 17 HDPs, only one (brevinin-1-Omar5) had been characterized. The distinct HDP expression profiles for O. margaretae in the previous and present study may be attributed to the environmental differences between the sampling locations and the genetic divergence among O. margaretae populations. Besides, 11 of the 17 HDPs identified in the present study were novel for ranids. In order to understand their roles in host defense reactions, three HDPs (odorranain-H-OM1, odorranain-M-OM and ranatuerin-2-OM), which possess low sequence similarity with the known amphibian HDPs, were selected for further chemical synthesis and functional analysis. Odorranain-H-OM1 showed direct antimicrobial activity against bacteria and fungi. Odorranain-M-OM exhibited concentration-dependent anti-oxidant activity. Ranatuerin-2-OM showed lectin-like activity and could strongly hemagglu -tinate human intact erythrocytes with or without the presence of Ca2+. The diverse activities of HDPs implied that they may play different roles in host defense reactions of O. margaretae. 展开更多
关键词 AMPHIBIAN host defense peptides (HDPs) Odorrana margaretae antimicrobial activity anti-oxidant activity erythrocytes hemagglutinating activity
下载PDF
An Exploration of the Mechanism of Educational Scientific Decision-making in View of Bounded Rationality
9
作者 ZHU Mei-xia 《Journal of Literature and Art Studies》 2018年第7期1103-1108,共6页
The scientific decision-making of education policies is not absolutely a complete rational process.The bounded rationality which takes rationality as the judgement standard is the essential connotation of the scientif... The scientific decision-making of education policies is not absolutely a complete rational process.The bounded rationality which takes rationality as the judgement standard is the essential connotation of the scientific decision-making of education policies.Therefore,based on this view and through shaping reasonable education policy values,this research gives full play to the driving force of educational scientific research on education policies and designs effective education decision-making information content and running agenda,thus optimizing the weigh principle of education policy proposals,advocating risk assessment and practice of education decisions,constructing institutional rationality of educational scientific decision-making,and finally realizing the rationality and scientificity of education policy decision-making. 展开更多
关键词 BOUNDED RATIONALITY EDUCATION activity EDUCATION decision-making EXPLORATION
下载PDF
Herbicidal activity and biochemical characteristics of the botanical drupacine against Amaranthus retroflexus L.
10
作者 YU Hua-long TIAN Ci +5 位作者 SHEN Rong-yan Zhao Han YANG Juan DONG Jin-gao ZHANG Li-hui MA Shu-jie 《Journal of Integrative Agriculture》 SCIE CAS CSCD 2023年第5期1434-1444,共11页
Botanical herbicide has been a hot topic in the research and development of novel pesticides. The herbicidal activity and biochemical characteristics of the botanical compound drupacine were studied by evaluating its ... Botanical herbicide has been a hot topic in the research and development of novel pesticides. The herbicidal activity and biochemical characteristics of the botanical compound drupacine were studied by evaluating its effects on seed germination, seedling growth, morphological and physiological characteristics of Amaranthus retroflexus. Drupacine inhibited seed germination and seedling growth, and had a median inhibition concentration(IC50) value of 38.99 mg L-1against A. retroflexus root. The α-amylase activity and soluble sugar content in treated plants were significantly lower than that of the control. The expression of α-amylase gene was dosage-dependently inhibited compared to the untreated control. This suggested that inhibition of α-amylase activity was a mode of action on seed germination. The root hairs were significantly decreased and part of the root cap fell off after treatment with drupacine. The ultrastructure observation showed that cell damage of root tips increased with the treatment time. Drupacine also increased the relative conductivity and malondialdehyde(MDA) content. Peroxidase(POD), catalase(CAT), and superoxide dismutase(SOD) activities were significantly enhanced in the treatment compared to the control. These findings indicated that the physiological and biochemical reaction changes leading to morphological and membrane injuries were the main effects of drupacine on the inhibition of seedling growth. Drupacine can be developed as a botanical herbicide. 展开更多
关键词 drupacine herbicidal activITY PHYSIOLOGICAL CHARACTERISTIC defense capacity AMARANTHUS retroflexus
下载PDF
Research on Cyberspace Attack and Defense Confrontation Technology
11
作者 Chengjun ZHOU 《International Journal of Technology Management》 2015年第3期11-14,共4页
关键词 网络空间安全 对抗技术 攻防对抗 对抗系统 互动空间 攻击防御 技术支持 安全产业
下载PDF
Active resilient defense control against false data injection attacks in smart grids
12
作者 Xiaoyuan Luo Lingjie Hou +3 位作者 Xinyu Wang Ruiyang Gao Shuzheng Wang Xinping Guan 《Control Theory and Technology》 EI CSCD 2023年第4期515-529,共15页
The emerging of false data injection attacks(FDIAs)can fool the traditional detection methods by injecting false data,which has brought huge risks to the security of smart grids.For this reason,a resilient active defe... The emerging of false data injection attacks(FDIAs)can fool the traditional detection methods by injecting false data,which has brought huge risks to the security of smart grids.For this reason,a resilient active defense control scheme based on interval observer detection is proposed in this paper to protect smart grids.The proposed active defense highlights the integration of detection and defense against FDIAs in smart girds.First,a dynamic physical grid model under FDIAs is modeled,in which model uncertainty and parameter uncertainty are taken into account.Then,an interval observer-based detection method against FDIAs is proposed,where a detection criteria using interval residual is put forward.Corresponding to the detection results,the resilient defense controller is triggered to defense the FDIAs if the system states are affected by FDIAs.Linear matrix inequality(LMI)approach is applied to design the resilient controller with H_(∞)performance.The system with the resilient defense controller can be robust to FDIAs and the gain of the resilient controller has a certain gain margin.Our active resilient defense approach can be built in real time and show accurate and quick respond to the injected FDIAs.The effectiveness of the proposed defense scheme is verified by the simulation results on an IEEE 30-bus grid system. 展开更多
关键词 active resilient defense Attack detection Cyber attacks Cyber-attack detection Cyber grid elements Cyber threat False data injection attack Smart grids security Interval observer
原文传递
基于演化博弈的拟态防御策略优化
13
作者 王敏 付文昊 +1 位作者 王宝通 石乐义 《计算机应用研究》 CSCD 北大核心 2024年第2期576-581,共6页
网络空间拟态防御是近些年出现的一种主动防御理论,以异构冗余和动态反馈机制不断调整执行环境来抵抗攻击。然而,面对黑客的多样化攻击手段,仅凭借拟态防御抵抗攻击是不安全的。为了增强系统的安全防御能力,在目前已有的防御系统基础上... 网络空间拟态防御是近些年出现的一种主动防御理论,以异构冗余和动态反馈机制不断调整执行环境来抵抗攻击。然而,面对黑客的多样化攻击手段,仅凭借拟态防御抵抗攻击是不安全的。为了增强系统的安全防御能力,在目前已有的防御系统基础上提出更为合理的防御选取方法。将有限理性的演化博弈引入到拟态防御中,构建了由攻击者、防御者和合法用户组成的三方演化博弈模型,并提出了最优防御策略求解方法。该博弈模型利用复制动态方程得到了演化稳定策略。仿真实验结果表明,系统通过执行推理的演化稳定策略可以降低损失,遏制攻击方的攻击行为,对拟态防御系统中防御策略选取和安全性增强具有一定的借鉴意义。 展开更多
关键词 拟态防御 主动防御 演化博弈 演化稳定策略 防御决策
下载PDF
攻防对抗视角下的网络安全主动防御体系研究
14
作者 李庆华 郭晓黎 +3 位作者 张锋军 张小军 石凯 许杰 《信息安全与通信保密》 2024年第1期77-85,共9页
为了解决纵深防御体系中防御能力固化、灵活性不足等问题,从攻防对抗视角出发,提出一种网络安全主动防御体系。首先,基于情报收集、监测预警、防御指挥和防御行动等要素的详细描述,设计了用于规划主动防御系统的能力组成框架;其次,选择... 为了解决纵深防御体系中防御能力固化、灵活性不足等问题,从攻防对抗视角出发,提出一种网络安全主动防御体系。首先,基于情报收集、监测预警、防御指挥和防御行动等要素的详细描述,设计了用于规划主动防御系统的能力组成框架;其次,选择网络杀伤链、ATT&CK知识库和OODA循环法则,设计了一个以攻助防的防御模型,并分析了引入博弈论进行防御算法设计的优势;最后,以实现为目标,构想了一个典型应用场景,以期为安全能力的体系化设计提供有益借鉴。 展开更多
关键词 网络安全 攻防对抗 主动防御 ATT&CK OODA
下载PDF
复合木霉制剂防治黄连根腐病及其机理研究
15
作者 伍晓丽 王钰 +1 位作者 刘飞 陈大霞 《植物保护》 CAS CSCD 北大核心 2024年第1期97-109,共13页
为评价复合木霉制剂对黄连根腐病的防治效果,并揭示其防病机理,为黄连根腐病专用微生物农药的研发奠定基础,本试验将深绿木霉Trichoderma atroviride、长枝木霉T.longibrachiatum、钩状木霉T.hamatum、拟康宁木霉T.koningiopsis等4种木... 为评价复合木霉制剂对黄连根腐病的防治效果,并揭示其防病机理,为黄连根腐病专用微生物农药的研发奠定基础,本试验将深绿木霉Trichoderma atroviride、长枝木霉T.longibrachiatum、钩状木霉T.hamatum、拟康宁木霉T.koningiopsis等4种木霉配制的复合制剂和尖镰孢Fusarium oxysporum以不同的方式分别施用于黄连,统计根腐病发生情况,检测黄连根部防御酶活性,用高通量测序分析根际土壤真菌群落结构。结果表明,复合木霉制剂对尖镰孢导致的根腐病具有明显预防效果;复合木霉制剂和尖镰孢分别接种黄连可提高SOD、POD、CAT、PAL、PPO等防御性酶活性,产生诱导抗性;而它们先后接种黄连可产生强化效应,从另一个途径提高植株抗病性。复合木霉制剂和尖镰孢都会降低真菌的数量、多样性,和某些真菌的相对丰度,而复合木霉制剂的抑菌作用更强烈,尤其能明显抑制尖镰孢、Ilyonectria sp.等病原真菌的生长,且能改善土壤真菌群落结构。木霉和尖镰孢都能在土壤中较长期定殖。可见,复合木霉制剂可以预防尖镰孢导致的黄连根腐病,防病机理包括诱导黄连植株产生抗性,接种后再遭受病原菌侵染产生的强化效应,优化土壤真菌群落结构,抑制土壤中病原菌等,且有效期较长。因此复合木霉制剂具有开发为微生物农药防治黄连根腐病的潜力。 展开更多
关键词 复合木霉制剂 黄连根腐病 根际土壤 防御酶活性 真菌群落结构
下载PDF
三体对抗中的主动防御鲁棒最优预测制导律研究
16
作者 陈维义 何凡 +1 位作者 李逸源 董海迪 《北京理工大学学报》 EI CAS CSCD 北大核心 2024年第6期645-654,共10页
考虑防御导弹和我方目标控制系统内部扰动和未准确建模动态特性等因素造成的不确定性影响,设计了鲁棒最优预测制导律(robust optimal predictive guidance law,ROPGL)和鲁棒协同最优预测制导律(robust cooperative optimal predictive g... 考虑防御导弹和我方目标控制系统内部扰动和未准确建模动态特性等因素造成的不确定性影响,设计了鲁棒最优预测制导律(robust optimal predictive guidance law,ROPGL)和鲁棒协同最优预测制导律(robust cooperative optimal predictive guidance law,RCOPGL)拦截来袭寻的导弹.首先,通过对非线性运动学方程线性化和降阶得到简化后的标称系统的状态方程;其次,考虑控制系统的不确定性,建立鲁棒制导问题的模型;再次,基于动态规划方法得到最优制导问题的制导指令关系式,并利用李雅普诺夫稳定性理论证明了最优制导问题的制导指令能够使鲁棒制导问题稳定;然后,引入界值函数得到线性二次型最优制导问题,通过求解黎卡提矩阵微分方程得到制导指令;最后,对设计的制导律的性能进行仿真验证.仿真结果表明,相比于其他制导律,设计的制导律能够抑制不确定性的影响,实现防御导弹对寻的导弹的拦截. 展开更多
关键词 最优制导 预测制导 鲁棒性 不确定性 主动防御
下载PDF
面向人脸属性编辑的三阶段对抗扰动生成主动防御算法
17
作者 陈北京 张海涛 李玉茹 《计算机学报》 EI CAS CSCD 北大核心 2024年第3期677-689,共13页
针对恶意人脸属性编辑行为,基于取证的被动防御技术只能对篡改行为进行取证并不能防止其产生,从而难以消除恶意篡改行为已经造成的损失.因此,主动防御技术应运而生,其可以破坏属性编辑的输出从而避免人脸被篡改使用.然而,现有两阶段训... 针对恶意人脸属性编辑行为,基于取证的被动防御技术只能对篡改行为进行取证并不能防止其产生,从而难以消除恶意篡改行为已经造成的损失.因此,主动防御技术应运而生,其可以破坏属性编辑的输出从而避免人脸被篡改使用.然而,现有两阶段训练人脸篡改主动防御框架存在迁移性和扰动鲁棒性不足的问题,为此本文通过优化两阶段训练架构及损失函数和引入一个辅助分类器,提出一种三阶段对抗扰动主动防御框架.本文首先修改两阶段训练架构中的代理目标模型并基于此设计了训练扰动生成器的属性编辑损失,以提升代理模型的重建性能和属性约束能力,从而减少对代理模型的过拟合;其次,在训练阶段引入辅助分类器对代理模型提取的编码后特征进行源属性分类并基于此设计训练扰动生成器的辅助分类器损失,从而将原本的两阶段交替训练改为代理目标模型、辅助分类器和扰动生成器的三阶段交替训练,期望通过对抗攻击辅助分类器以促进对篡改模型的主动防御;最后,在扰动生成器的训练中,引入攻击层以促进对抗扰动对滤波和JPEG压缩的鲁棒性.实验结果验证,本文提出的框架能够比现有框架更好地将主动防御从白盒的代理目标模型迁移到黑盒的属性编辑模型,黑盒性能提升16.17%,且生成的对抗扰动较基线算法具有更强的鲁棒性,针对JPEG压缩的性能(PSNR)提升13.91%,针对高斯滤波提升17.76%. 展开更多
关键词 人脸属性编辑 主动防御 对抗攻击 辅助分类器 交替训练
下载PDF
SGPot:一种基于强化学习的智能电网蜜罐框架
18
作者 王毓贞 宗国笑 魏强 《计算机科学》 CSCD 北大核心 2024年第2期359-370,共12页
随着工业4.0的快速推进,与之互联的电力数据采集与监视控制(Supervisory Control and Data Acquisition,SCADA)系统逐渐趋于信息化和智能化。由于这些系统本身具有脆弱性以及受到攻击和防御能力的不对等性,使得系统存在各种安全隐患。... 随着工业4.0的快速推进,与之互联的电力数据采集与监视控制(Supervisory Control and Data Acquisition,SCADA)系统逐渐趋于信息化和智能化。由于这些系统本身具有脆弱性以及受到攻击和防御能力的不对等性,使得系统存在各种安全隐患。近年来,针对电力攻击事件频发,亟需提出针对智能电网的攻击缓解方法。蜜罐作为一种高效的欺骗防御方法,能够有效地收集智能电网中的攻击行为。针对现有的智能电网蜜罐中存在的交互深度不足、物理工业过程仿真缺失、扩展性差的问题,设计并实现了一种基于强化学习的智能电网蜜罐框架——SGPot,它能够基于电力行业真实设备中的系统不变量模拟智能变电站控制端,通过电力业务流程的仿真来提升蜜罐欺骗性,诱使攻击者与蜜罐深度交互。为了评估蜜罐框架的性能,搭建了小型智能变电站实验验证环境,同时将SGPot和现有的GridPot以及SHaPe蜜罐同时部署在公网环境中,收集了30天的交互数据。实验结果表明,SGPot收集到的请求数据比GridPot多20%,比SHaPe多75%。SGPot能够诱骗攻击者与蜜罐进行更深度的交互,获取到的交互会话长度大于6的会话数量多于GridPot和SHaPe。 展开更多
关键词 智能电网 强化学习 智能交互 主动防御 蜜罐
下载PDF
一种基于扰动补偿的机弹协同LOS主动防御制导律
19
作者 王捷 刘俊辉 +2 位作者 陈昊 赵琦 刘维 《现代防御技术》 北大核心 2024年第2期94-103,共10页
随着无人技术和军事科技发展,无人近距空战引起了世界军事强国的广泛关注。面临高速大机动能力来袭导弹的威胁,传统的抛洒箔条或释放热焰弹等被动防御措施无法确保目标飞行器安全逃逸,通过发射拦截弹协同目标飞行器机动实施的主动防御... 随着无人技术和军事科技发展,无人近距空战引起了世界军事强国的广泛关注。面临高速大机动能力来袭导弹的威胁,传统的抛洒箔条或释放热焰弹等被动防御措施无法确保目标飞行器安全逃逸,通过发射拦截弹协同目标飞行器机动实施的主动防御是一种可行的方法。由于来袭导弹机动能力较强且加速度信息未知,是目标飞行器-拦截弹制导律协同设计的难点。提出一种基于扰动补偿的LOS主动防御拦截制导律,通过设计一种非线性扰动观测器来估计来袭弹产生的机动的影响,并在机弹协同LOS主动防御制导律设计中补偿。通过仿真算例验证了所提方法能够有效拦截具有未知机动能力的来袭导弹,为研究三体攻防问题提供了一定的参考。 展开更多
关键词 机弹协同 LOS制导 扰动观测器 主动防御 三体博弈 制导策略
下载PDF
城市轨道交通云平台网络安全访问控制技术研究 被引量:1
20
作者 刘为俊 《铁道通信信号》 2024年第3期69-74,共6页
通过分析城市轨道交通云平台网络安全常见风险及应用实施需求,首先论述访问控制技术的适用性,提出以资源隔离为主,结合安全策略实施的解决方案;其次采取业务系统分区分域的策略对城轨云平台进行边界划分,形成保障系统安全的基础架构,并... 通过分析城市轨道交通云平台网络安全常见风险及应用实施需求,首先论述访问控制技术的适用性,提出以资源隔离为主,结合安全策略实施的解决方案;其次采取业务系统分区分域的策略对城轨云平台进行边界划分,形成保障系统安全的基础架构,并遵循风险检测与控制的安全标准体系,实现基于主动防御技术的城轨云安全态势感控平台;最后按照等级保护规范的要求,提出一套基于安全标记的强制访问控制技术模型,从安全级别和安全范畴2个维度进行安全标记设计,按照数据敏感度和完整性设定安全级别,按照业务类型和业务区域进行安全范畴的抽象和定义,从而有效支持城轨云平台达到所设计的网络安全标记等级。 展开更多
关键词 城市轨道交通 云平台 网络安全 访问控制 主动防御 安全标记
下载PDF
上一页 1 2 40 下一页 到第
使用帮助 返回顶部