期刊文献+
共找到278篇文章
< 1 2 14 >
每页显示 20 50 100
An Optimized Cross Correlation Power Attack of Message Blinding Exponentiation Algorithms 被引量:1
1
作者 WAN Wunan YANG Wei CHEN Jun 《China Communications》 SCIE CSCD 2015年第6期22-32,共11页
The message blinding method is the most efficient and secure countermeasure against first-order differential power analysis(DPA).Although cross correlation attacks(CCAs) were given for defeating message blinding metho... The message blinding method is the most efficient and secure countermeasure against first-order differential power analysis(DPA).Although cross correlation attacks(CCAs) were given for defeating message blinding methods,however searching for correlation points is difficult for noise,misalignment in practical environment.In this paper,we propose an optimized cross correlation power attack for message blinding exponentiation algorithms.The attack method can select the more correlative power points of share one operation in the modular multiplication by comparing variances between correlation coefficients.Further we demonstrate that the attack method is more efficient in experiments with hardware implementation of RSA on a crypto chip card.In addition to the proposed CCA method can recovery all 1024 bits secret key and recognition rate increases to 100%even when the recorded signals are noisy. 展开更多
关键词 side channel attack correlationpower analysis cross correlation attacks module exponentiation.
下载PDF
FAST CORRELATION ATTACKS ON BLUETOOTH COMBINER
2
作者 Ma Weiju Feng Dengguo 《Journal of Electronics(China)》 2006年第6期888-891,共4页
A simple fast correlation attack is used to analysis the security of Bluetooth combiner in this paper. This attack solves the tradeoff between the length of the keystream and the computing complexity needed to recover... A simple fast correlation attack is used to analysis the security of Bluetooth combiner in this paper. This attack solves the tradeoff between the length of the keystream and the computing complexity needed to recover the secret key. We give the computing complexities of the attack algorithm according to different lengths of the known keystream. The result is less time-consuming than before. It is also shown that the secu-rity of the modified Bluetooth combiner by Hermelin and Nyberg is not significantly enhanced. 展开更多
关键词 Bluetooth combiner Combiner with memory correlation attacks
下载PDF
Abnormal Event Correlation and Detection Based on Network Big Data Analysis 被引量:2
3
作者 Zhichao Hu Xiangzhan Yu +1 位作者 Jiantao Shi Lin Ye 《Computers, Materials & Continua》 SCIE EI 2021年第10期695-711,共17页
With the continuous development of network technology,various large-scale cyber-attacks continue to emerge.These attacks pose a severe threat to the security of systems,networks,and data.Therefore,how to mine attack p... With the continuous development of network technology,various large-scale cyber-attacks continue to emerge.These attacks pose a severe threat to the security of systems,networks,and data.Therefore,how to mine attack patterns from massive data and detect attacks are urgent problems.In this paper,an approach for attack mining and detection is proposed that performs tasks of alarm correlation,false-positive elimination,attack mining,and attack prediction.Based on the idea of CluStream,the proposed approach implements a flow clustering method and a two-step algorithm that guarantees efficient streaming and clustering.The context of an alarm in the attack chain is analyzed and the LightGBM method is used to perform falsepositive recognition with high accuracy.To accelerate the search for the filtered alarm sequence data to mine attack patterns,the PrefixSpan algorithm is also updated in the store strategy.The updated PrefixSpan increases the processing efficiency and achieves a better result than the original one in experiments.With Bayesian theory,the transition probability for the sequence pattern string is calculated and the alarm transition probability table constructed to draw the attack graph.Finally,a long-short-term memory network and embedding word-vector method are used to perform online prediction.Results of numerical experiments show that the method proposed in this paper has a strong practical value for attack detection and prediction. 展开更多
关键词 attack scene false positive alarm correlation sequence mining multi-step attack
下载PDF
Multi-Step Detection of Simplex and Duplex Wormhole Attacks over Wireless Sensor Networks
4
作者 Abrar M.Alajlan 《Computers, Materials & Continua》 SCIE EI 2022年第3期4241-4259,共19页
Detection of thewormhole attacks is a cumbersome process,particularly simplex and duplex over thewireless sensor networks(WSNs).Wormhole attacks are characterized as distributed passive attacks that can destabilize or... Detection of thewormhole attacks is a cumbersome process,particularly simplex and duplex over thewireless sensor networks(WSNs).Wormhole attacks are characterized as distributed passive attacks that can destabilize or disable WSNs.The distributed passive nature of these attacks makes them enormously challenging to detect.The main objective is to find all the possible ways in which how the wireless sensor network’s broadcasting character and transmission medium allows the attacker to interrupt network within the distributed environment.And further to detect the serious routing-disruption attack“Wormhole Attack”step by step through the different network mechanisms.In this paper,a new multi-step detection(MSD)scheme is introduced that can effectively detect the wormhole attacks for WSN.The MSD consists of three algorithms to detect and prevent the simplex and duplex wormhole attacks.Furthermore,the proposed scheme integrated five detection modules to systematically detect,recover,and isolate wormhole attacks.Simulation results conducted inOMNET++show that the proposedMSDhas lower false detection and false toleration rates.Besides,MSDcan effectively detect wormhole attacks in a completely distributed network environment,as suggested by the simulation results. 展开更多
关键词 Wireless sensor network wormhole attack node validation multi-step detection
下载PDF
Attention-based spatio-temporal graph convolutional network considering external factors for multi-step traffic flow prediction 被引量:2
5
作者 Jihua Ye Shengjun Xue Aiwen Jiang 《Digital Communications and Networks》 SCIE CSCD 2022年第3期343-350,共8页
Traffic flow prediction is an important part of the intelligent transportation system. Accurate multi-step traffic flow prediction plays an important role in improving the operational efficiency of the traffic network... Traffic flow prediction is an important part of the intelligent transportation system. Accurate multi-step traffic flow prediction plays an important role in improving the operational efficiency of the traffic network. Since traffic flow data has complex spatio-temporal correlation and non-linearity, existing prediction methods are mainly accomplished through a combination of a Graph Convolutional Network (GCN) and a recurrent neural network. The combination strategy has an excellent performance in traffic prediction tasks. However, multi-step prediction error accumulates with the predicted step size. Some scholars use multiple sampling sequences to achieve more accurate prediction results. But it requires high hardware conditions and multiplied training time. Considering the spatiotemporal correlation of traffic flow and influence of external factors, we propose an Attention Based Spatio-Temporal Graph Convolutional Network considering External Factors (ABSTGCN-EF) for multi-step traffic flow prediction. This model models the traffic flow as diffusion on a digraph and extracts the spatial characteristics of traffic flow through GCN. We add meaningful time-slots attention to the encoder-decoder to form an Attention Encoder Network (AEN) to handle temporal correlation. The attention vector is used as a competitive choice to draw the correlation between predicted states and historical states. We considered the impact of three external factors (daytime, weekdays, and traffic accident markers) on the traffic flow prediction tasks. Experiments on two public data sets show that it makes sense to consider external factors. The prediction performance of our ABSTGCN-EF model achieves 7.2%–8.7% higher than the state-of-the-art baselines. 展开更多
关键词 multi-step traffic flow prediction Graph convolutional network External factors Attentional encoder network Spatiotemporal correlation
下载PDF
Black Hole and Sink Hole Attack Detection in Wireless Body Area Networks 被引量:1
6
作者 Rajesh Kumar Dhanaraj Lalitha Krishnasamy +1 位作者 Oana Geman Diana Roxana Izdrui 《Computers, Materials & Continua》 SCIE EI 2021年第8期1949-1965,共17页
In Wireless Body Area Networks(WBANs)with respect to health care,sensors are positioned inside the body of an individual to transfer sensed data to a central station periodically.The great challenges posed to healthca... In Wireless Body Area Networks(WBANs)with respect to health care,sensors are positioned inside the body of an individual to transfer sensed data to a central station periodically.The great challenges posed to healthcare WBANs are the black hole and sink hole attacks.Data from deployed sensor nodes are attracted by sink hole or black hole nodes while grabbing the shortest path.Identifying this issue is quite a challenging task as a small variation in medicine intake may result in a severe illness.This work proposes a hybrid detection framework for attacks by applying a Proportional Coinciding Score(PCS)and an MK-Means algorithm,which is a well-known machine learning technique used to raise attack detection accuracy and decrease computational difficulties while giving treatments for heartache and respiratory issues.First,the gathered training data feature count is reduced through data pre-processing in the PCS.Second,the pre-processed features are sent to the MK-Means algorithm for training the data and promoting classification.Third,certain attack detection measures given by the intrusion detection system,such as the number of data packages trans-received,are identified by the MK-Means algorithm.This study demonstrates that the MK-Means framework yields a high detection accuracy with a low packet loss rate,low communication overhead,and reduced end-to-end delay in the network and improves the accuracy of biomedical data. 展开更多
关键词 Wireless body area network black hole attack sink hole attack proportional coinciding score intrusion detection correlation rate
下载PDF
A multi-step attack-correlation method with privacy protection 被引量:2
7
作者 ZHANG Yongtang LUO Xianlu LUO Haibo 《Journal of Communications and Information Networks》 2016年第4期133-142,共10页
In the era of global Internet security threats,there is an urgent need for different organizations to cooperate and jointly fight against cyber attacks.We present an algorithm that combines a privacy-preserving techni... In the era of global Internet security threats,there is an urgent need for different organizations to cooperate and jointly fight against cyber attacks.We present an algorithm that combines a privacy-preserving technique and a multi-step attack-correlation method to better balance the privacy and availability of alarm data.This algorithm is used to construct multi-step attack scenarios by discovering sequential attack-behavior patterns.It analyzes the time-sequential characteristics of attack behaviors and implements a support-evaluation method.Optimized candidate attack-sequence generation is applied to solve the problem of pre-defined association-rule complexity,as well as expert-knowledge dependency.An enhanced k-anonymity method is applied to this algorithm to preserve privacy.Experimental results indicate that the algorithm has better performance and accuracy for multi-step attack correlation than other methods,and reaches a good balance between efficiency and privacy. 展开更多
关键词 network security multi-step attack intrusion detection sequential pattern privacy protection data mining
原文传递
An Improved Empirical Mode Decomposition for Power Analysis Attack
8
作者 Han Gan Hongxin Zhang +3 位作者 Muhammad Saad khan Xueli Wang Fan Zhang Pengfei He 《China Communications》 SCIE CSCD 2017年第9期94-99,共6页
Correlation power analysis(CPA) has become a successful attack method about crypto-graphic hardware to recover the secret keys. However, the noise influence caused by the random process interrupts(RPIs) becomes an imp... Correlation power analysis(CPA) has become a successful attack method about crypto-graphic hardware to recover the secret keys. However, the noise influence caused by the random process interrupts(RPIs) becomes an important factor of the power analysis attack efficiency, which will cost more traces or attack time. To address the issue, an improved method about empirical mode decomposition(EMD) was proposed. Instead of restructuring the decomposed signals of intrinsic mode functions(IMFs), we extract a certain intrinsic mode function(IMF) as new feature signal for CPA attack. Meantime, a new attack assessment is proposed to compare the attack effectiveness of different methods. The experiment shows that our method has more excellent performance on CPA than others. The first and the second IMF can be chosen as two optimal feature signals in CPA. In the new method, the signals of the first IMF increase peak visibility by 64% than those of the tradition EMD method in the situation of non-noise. On the condition of different noise interference, the orders of attack efficiencies are also same. With external noise interference, the attack effect of the first IMF based on noise with 15dB is the best. 展开更多
关键词 POWER ANALYSIS attack EMD IMF correlation POWER analysis RPIs
下载PDF
A graph based system for multi-stage attacks recognition
9
作者 Safaa O.Al-Mamory 《High Technology Letters》 EI CAS 2008年第2期167-173,共7页
Building attack scenario is one of the most important aspects in network security.This paper pro-posed a system which collects intrusion alerts,clusters them as sub-attacks using alerts abstraction,ag-gregates the sim... Building attack scenario is one of the most important aspects in network security.This paper pro-posed a system which collects intrusion alerts,clusters them as sub-attacks using alerts abstraction,ag-gregates the similar sub-attacks,and then correlates and generates correlation graphs.The scenarios wererepresented by alert classes instead of alerts themselves so as to reduce the required rules and have the a-bility of detecting new variations of attacks.The proposed system is capable of passing some of the missedattacks.To evaluate system effectiveness,it was tested with different datasets which contain multi-stepattacks.Compressed and easily understandable Correlation graphs which reflect attack scenarios were gen-erated.The proposed system can correlate related alerts,uncover the attack strategies,and detect newvariations of attacks. 展开更多
关键词 network security intrusion detection alert correlation attack graph SCENARIO clus-tering
下载PDF
随机空间几何构型下物联网络攻击节点定位
10
作者 程高飞 姜建华 《信息技术》 2024年第6期147-153,共7页
物联网各节点形成的空间几何构型随机性,决定了攻击节点的空间分辨率出现较大波动,继而影响攻击节点的定位精度。针对物联网下各节点形成的空间几何构型随机性,利用节点脉冲和功率的关联属性不受空间几何构型影响的特征,设计一种攻击节... 物联网各节点形成的空间几何构型随机性,决定了攻击节点的空间分辨率出现较大波动,继而影响攻击节点的定位精度。针对物联网下各节点形成的空间几何构型随机性,利用节点脉冲和功率的关联属性不受空间几何构型影响的特征,设计一种攻击节点定位算法。定位算法检测节点脉冲信号,设计最优功率关联算法,关联功率与脉冲的属性。通过关联属性构建节点距离测算定位方法。实验结果表明:文中的物联网攻击节点定位方法,在低、中、高阶三种攻击特征形式下,可以实时准确定位攻击性节点位置,具备较强的实用性。 展开更多
关键词 物联网 攻击节点定位 脉冲信号 功率-脉冲关联 节点距离测算
下载PDF
针对ZUC算法硬件实现的相关能量攻击与多粒度时域敏感区域检测
11
作者 吴一 赵昱霖 +5 位作者 潘雨洋 马哲 李彦昭 彭乾 乌力吉 张向民 《密码学报(中英文)》 CSCD 北大核心 2024年第3期637-648,共12页
本文通过合理分解模加操作,优化流水线结构,构建ZUC算法硬件实现,并基于FPGA开发板搭建ZUC算法功耗采集平台.构建粗细粒度时域敏感区域的泄漏检测方法,利用移动平均算子,发掘高信噪比风险区域,采用自相关滤波器与峰值检测算子,发掘具有... 本文通过合理分解模加操作,优化流水线结构,构建ZUC算法硬件实现,并基于FPGA开发板搭建ZUC算法功耗采集平台.构建粗细粒度时域敏感区域的泄漏检测方法,利用移动平均算子,发掘高信噪比风险区域,采用自相关滤波器与峰值检测算子,发掘具有明显重复特征的运算区间,并对泄漏高风险区域进行标定,实现高精度的泄漏风险定位.通过分析ZUC算法的脆弱性,本文提出一种基于选择初始向量IV的CPA攻击方案,对输入的IV信息进行选择,通过固定部分明文的方法有效提高采集信号的信噪比,并采集实际3000条功耗曲线,在算法初始化首轮,成功提取8 bit密钥信息,从而证明该方案的有效性,对ZUC算法的硬件实现进行侧信道防护是必要的.总结ZUC算法侧信道防护方案,对比方案优劣. 展开更多
关键词 ZUC 相关能量分析 侧信道攻击
下载PDF
FeNO及血清β-catenin水平与支气管哮喘患儿气道炎症因子、肺功能相关指标的相关性分析
12
作者 田文秋 谢菲 +2 位作者 伊文霞 陈瑞东 徐春艳 《检验医学与临床》 CAS 2024年第23期3431-3435,3441,共6页
目的探讨呼出气一氧化氮(FeNO)、血清β-连环素(β-catenin)水平与支气管哮喘(BA)患儿气道炎症因子、肺功能指标水平的相关性。方法选取2022年1月至2023年1月该院收治的120例BA患儿作为研究对象,其中急性发作期组78例,缓解期组42例;另... 目的探讨呼出气一氧化氮(FeNO)、血清β-连环素(β-catenin)水平与支气管哮喘(BA)患儿气道炎症因子、肺功能指标水平的相关性。方法选取2022年1月至2023年1月该院收治的120例BA患儿作为研究对象,其中急性发作期组78例,缓解期组42例;另外选取同时期在该院体检的118例健康儿童作为对照组。检测3组研究对象的气道炎症因子[高敏C反应蛋白(hs-CRP)、白细胞介素-6(IL-6)、白细胞介素-17(IL-17)、转化生长因子-β(TGF-β)、免疫球蛋白E(IgE)、外周血嗜酸性粒细胞计数(EOS)]及肺功能指标[用力呼气容积肺活量(FVC)、第1秒用力呼气量(FEV1)、FEV1/FCV百分比(FEV1%)、最高呼吸气流(PEF)];采用酶联免疫吸附试验检测各组血清β-catenin和FeNO水平;采用Pearson相关分析FeNO、β-catenin水平与肺功能相关指标、气道炎症因子水平的相关性;绘制受试者工作特征(ROC)曲线评估FeNO、血清β-catenin对BA患儿急性发作的诊断价值。结果与对照组相比,缓解期组与急性发作期组FeNO水平、EOS及血清hs-CRP、IL-17、IL-6、TGF-β、IgE、β-catenin水平明显升高(P<0.05),FVC、FEV1、FEV1%、PEF明显降低(P<0.05);与缓解期组相比,急性发作期组FeNO水平、EOS及血清hs-CRP、IL-17、IL-6、TGF-β、IgE、β-catenin水平明显升高(P<0.05),FVC、FEV1、FEV1%、PEF明显降低(P<0.05);Pearson相关性分析结果显示,急性发作期BA患儿FeNO及血清β-catenin水平均与hs-CRP、IL-17、IL-6、TGF-β、IgE水平及EOS呈正相关(P<0.05),与FVC、FEV1、FEV1%、PEF呈负相关(P<0.05);ROC曲线分析结果显示,FeNO、血清β-catenin水平单独及联合诊断急性发作期BA患儿的AUC分别为0.849、0.878、0.935,二者联合诊断的AUC显著高于FeNO、血清β-catenin单独诊断(Z=2.845,P=0.002;Z=1.885,P=0.030)。结论BA患儿FeNO及血清β-catenin水平与气道炎症因子hs-CRP、IL-17、IL-6、TGF-β、IgE水平及EOS呈正相关,与肺功能相关指标FVC、FEV1、FEV1%、PEF呈负相关,二者对于急性发作期BA的诊断具有重要价值,可用于BA患儿的病情评估。 展开更多
关键词 支气管哮喘 急性发作期 缓解期 呼出气一氧化氮 Β-连环素 肺功能 气道炎症 相关性
下载PDF
LiCi算法的相关密钥不可能差分分析
13
作者 吴铜 袁征 +1 位作者 魏锦鹏 申龙 《密码学报(中英文)》 CSCD 北大核心 2024年第5期1078-1089,共12页
不可能差分攻击是一种重要的密钥恢复攻击方法,它利用概率为0的不可能出现的差分特征过滤错误密钥,已被广泛应用于多种分组算法的分析.LiCi算法是2017年Patil等人提出的一种新轻量级分组密码算法,基于平衡Feistel结构,采用轻量级S盒和... 不可能差分攻击是一种重要的密钥恢复攻击方法,它利用概率为0的不可能出现的差分特征过滤错误密钥,已被广泛应用于多种分组算法的分析.LiCi算法是2017年Patil等人提出的一种新轻量级分组密码算法,基于平衡Feistel结构,采用轻量级S盒和简单移位操作等新型轻量级分组密码的设计理念,通过较少的轮函数运算产生数量相对较大的活跃S盒,具有结构紧凑、能耗低、占用面积小等特性,非常适用于资源受限的环境.关于LiCi算法目前最好的分析结果为16轮差分分析和17轮不可能差分分析.为进一步研究LiCi算法抵抗不可能差分攻击的能力,构造了11轮不可能差分区分器,并向前扩展3轮,向后扩展3轮,结合S盒输入输出特征,使用不可能差分分析方法分析了17轮LiCi算法.分析的数据复杂度为2^(61.59),时间复杂度为2^(75.5),存储复杂度为2^(72.59).与已知结果相比,在攻击轮数相同的情况下,该攻击降低了数据复杂度和时间复杂度.同时结合密钥扩展算法的特点和轮函数特征,构造出3条16轮的相关密钥不可能差分区分器,从中选取一条向前扩展3轮,向后扩展2轮,结合S盒输入输出特征,并使用相关密钥与不可能差分复合的方法分析了21轮LiCi算法.分析的数据复杂度为2^(61.2),时间复杂度2^(68.05),存储复杂度为2^(75.2).由此说明21轮LiCi算法对相关密钥不可能差分密码分析是不免疫的. 展开更多
关键词 LiCi算法 轻量级分组密码 不可能差分 相关密钥
下载PDF
Fast correlation attack on streamcipher ABC v3 被引量:7
14
作者 ZHANG HaiNa LI Lin WANG XiaoYun 《Science in China(Series F)》 2008年第7期936-947,共12页
ABC v3 is a stream cipher submitted to the ECRYPT eStream project and has entered the second evaluation phase. Its key length is 128 bits. In this paper, we find large numbers of new weak keys of ABC family and introd... ABC v3 is a stream cipher submitted to the ECRYPT eStream project and has entered the second evaluation phase. Its key length is 128 bits. In this paper, we find large numbers of new weak keys of ABC family and introduce a method to search for them, and then apply a fast correlation attack to break ABC v3 with weak keys. We show that there are at least 2^103.71 new weak keys in ABC v3. Recovering the internal state of a weak key requires 236.05 keystream words and 2^50.56 operations. The attack can be applied to ABC vl and v2 with the same complexity as that of ABC v3. However, the number of weak keys of ABC vl as well as ABC v2 decreases to 2^97 + 20^95.19,It reveals that ABC v3 incurs more weak keys than that of ABC vl and v2. 展开更多
关键词 CRYPTANALYSIS stream cipher fast correlation attack ABC v3
原文传递
弱关联节点强化下网络泛洪攻击检测方法研究
15
作者 李晓粉 张兆娟 《现代电子技术》 北大核心 2024年第7期100-103,共4页
由于网络中泛洪攻击生成的恶意流量常与正常流量在一定程度上具有相似性,使得传统方法将正常流量认定为恶意攻击,定位准确性较低。为此,研究弱关联节点强化下网络泛洪攻击检测方法。构建网络弱关联节点分布模型,结合已知节点和未知节点... 由于网络中泛洪攻击生成的恶意流量常与正常流量在一定程度上具有相似性,使得传统方法将正常流量认定为恶意攻击,定位准确性较低。为此,研究弱关联节点强化下网络泛洪攻击检测方法。构建网络弱关联节点分布模型,结合已知节点和未知节点位置关系,建立弱关联节点快速定位方程,以定位节点位置;将弱关联节点接收报文的周期性作为特征,检测泛洪攻击;通过在检测到泛洪攻击的弱关联节点伪造报警包的方式强化节点,遵循泛洪攻击报文发送的路径回溯,完成泛洪攻击防御。实验结果表明,该方法定位弱关联节点测度指标值均高于0.9,可检测到泛洪攻击,并实现泛洪攻击防御。 展开更多
关键词 弱关联节点 网络 泛洪攻击 节点强化 周期性 攻击检测 攻击防御 通信速率
下载PDF
具有故障概率分析功能的故障注入攻击平台的设计与应用
16
作者 周大伟 吴童 王丹 《实验技术与管理》 CAS 北大核心 2024年第3期101-107,共7页
针对故障攻击中数据需求量大、方法可移植性不强、抗噪性不强、计算复杂度高等问题,设计了一套具有故障概率分析功能的故障注入攻击平台。该平台由攻击目标、故障注入控制器、示波器监控模块和数据采集处理模块构成。利用该平台以MCU密... 针对故障攻击中数据需求量大、方法可移植性不强、抗噪性不强、计算复杂度高等问题,设计了一套具有故障概率分析功能的故障注入攻击平台。该平台由攻击目标、故障注入控制器、示波器监控模块和数据采集处理模块构成。利用该平台以MCU密码靶为攻击对象,开展了故障注入攻击教学与探索性实验。借助该平台展示各型故障注入攻击的密钥恢复过程,可以使学生更好地掌握故障攻击、泄漏测量和评估技术,培养学生的实践动手能力及知识综合运用能力。 展开更多
关键词 故障注入攻击 故障概率 模板攻击 互信息分析 关联性分析
下载PDF
一种考虑攻击连续性的告警关联聚合方法
17
作者 王文博 马海龙 +1 位作者 韩伟涛 王程禹 《信息工程大学学报》 2024年第3期292-297,共6页
现有告警关联聚合方法无法深度刻画攻击意图,难以挖掘告警之间的内在逻辑关系。针对上述问题,设计一种考虑攻击连续性的告警关联聚合方法。该方法按照源IP到目的IP过滤原始告警序列,从攻击载荷相似性、攻击者身份信息、攻击触发位置和... 现有告警关联聚合方法无法深度刻画攻击意图,难以挖掘告警之间的内在逻辑关系。针对上述问题,设计一种考虑攻击连续性的告警关联聚合方法。该方法按照源IP到目的IP过滤原始告警序列,从攻击载荷相似性、攻击者身份信息、攻击触发位置和武器平台信息等4方面出发评估相邻恶意请求的连续性,并以此为依据将初始告警聚合成组。在多种真实漏洞构建的场景中,开展2种不同类型的攻击实验。实验结果证明,所提算法能够在聚合冗余告警的同时区分攻击类型,为多步骤攻击的分析关联工作提供支撑。 展开更多
关键词 高级持续性威胁检测 告警关联 告警聚合 恶意连续性
下载PDF
基于多维桶分组技术改进算法对电子病历隐私信息研究
18
作者 张付霞 《计算机应用与软件》 北大核心 2024年第2期86-92,163,共8页
多维桶分组技术给出的三种算法在敏感属性数量增多时,发布数据隐匿率增大,且该算法对准标识符属性没有泛化处理,易遭受背景知识攻击。针对此问题,提出改进的最大桶优先算法。该算法依据敏感属性关联性来对敏感属性表进行划分,每个敏感... 多维桶分组技术给出的三种算法在敏感属性数量增多时,发布数据隐匿率增大,且该算法对准标识符属性没有泛化处理,易遭受背景知识攻击。针对此问题,提出改进的最大桶优先算法。该算法依据敏感属性关联性来对敏感属性表进行划分,每个敏感属性子表采用最大选择度优先的方法实现匿名化处理,并增加对准标识符属性泛化处理;增加对每个等价类中的复合敏感属性向量随机交换来抵御关联攻击。实验结果表明,改进算法能够在使得发布数据保持一定数据可用性基础上更好地保护用户的敏感属性信息。 展开更多
关键词 隐私保护 背景知识攻击 多敏感属性 相关性
下载PDF
Correlation power attack on a message authentication code based on SM3
19
作者 Ye YUAN Kai-ge QU +2 位作者 Li-jiWU Jia-weiMA Xiang-min ZHANG 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2019年第7期930-946,共17页
Hash-based message authentication code(HMAC)is widely used in authentication and message integrity.As a Chinese hash algorithm,the SM3 algorithm is gradually winning domestic market value in China.The side channel sec... Hash-based message authentication code(HMAC)is widely used in authentication and message integrity.As a Chinese hash algorithm,the SM3 algorithm is gradually winning domestic market value in China.The side channel security of HMAC based on SM3(HMAC-SM3)is still to be evaluated,especially in hardware implementation,where only intermediate values stored in registers have apparent Hamming distance leakage.In addition,the algorithm structure of SM3 determines the difficulty in HMAC-SM3 side channel analysis.In this paper,a skillful bit-wise chosen-plaintext correlation power attack procedure is proposed for HMAC-SM3 hardware implementation.Real attack experiments on a field programmable gate array(FPGA)board have been performed.Experimental results show that we can recover the key from the hypothesis space of 2256 based on the proposed procedure. 展开更多
关键词 HMAC-SM3 Side channel analysis correlation power attack Bit-wise chosen-plaintext
原文传递
对空域图像LSB隐写术的提取攻击 被引量:18
20
作者 张卫明 李世取 刘九芬 《计算机学报》 EI CSCD 北大核心 2007年第9期1625-1631,共7页
隐写分析的研究一直集中于检测隐藏信息的存在性,而关于如何提取隐藏信息(即对隐写术的提取攻击)的研究还非常少.对于使用密钥的隐写术,提取攻击等价于恢复隐写密钥.文中结合隐写分析中的检测技术和密码分析中的相关攻击技术,对空域图像... 隐写分析的研究一直集中于检测隐藏信息的存在性,而关于如何提取隐藏信息(即对隐写术的提取攻击)的研究还非常少.对于使用密钥的隐写术,提取攻击等价于恢复隐写密钥.文中结合隐写分析中的检测技术和密码分析中的相关攻击技术,对空域图像LSB隐写术提出了一种隐写密钥恢复方法.理论分析说明:此攻击方法的计算复杂度主要由所需的样本量决定,并且当嵌入率r接近0或1时攻击将失败.作者通过混合高斯模型给出了一个估计最小样本量的方法.针对隐写软件"HideandSeek4.1"的实验表明:此攻击方法可以成功恢复隐写密钥,从而提取隐藏的消息.如果消息长度L未知,当嵌入率5.3%<r<94.7%时攻击可以成功;如果L已知,当1.1%<r<98.4%时攻击可以成功,并且当11%<r<50%时,使用估计的最小样本量可以将攻击速度提高10%~45%. 展开更多
关键词 隐写术 隐写分析 提取攻击 相关攻击 混合分布
下载PDF
上一页 1 2 14 下一页 到第
使用帮助 返回顶部