期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
A Graph Theory Based Self-Learning Honeypot to Detect Persistent Threats
1
作者 R.T.Pavendan K.Sankar K.A.Varun Kumar 《Intelligent Automation & Soft Computing》 SCIE 2023年第3期3331-3348,共18页
Attacks on the cyber space is getting exponential in recent times.Illegal penetrations and breaches are real threats to the individuals and organizations.Conventional security systems are good enough to detect the kno... Attacks on the cyber space is getting exponential in recent times.Illegal penetrations and breaches are real threats to the individuals and organizations.Conventional security systems are good enough to detect the known threats but when it comes to Advanced Persistent Threats(APTs)they fails.These APTs are targeted,more sophisticated and very persistent and incorporates lot of evasive techniques to bypass the existing defenses.Hence,there is a need for an effective defense system that can achieve a complete reliance of security.To address the above-mentioned issues,this paper proposes a novel honeypot system that tracks the anonymous behavior of the APT threats.The key idea of honeypot leverages the concepts of graph theory to detect such targeted attacks.The proposed honey-pot is self-realizing,strategic assisted which withholds the APTs actionable tech-niques and observes the behavior for analysis and modelling.The proposed graph theory based self learning honeypot using the resultsγ(C(n,1)),γc(C(n,1)),γsc(C(n,1))outperforms traditional techniques by detecting APTs behavioral with detection rate of 96%. 展开更多
关键词 Graph theory DOMINATION Connected Domination Secure Connected Domination HONEYPOT self learning ransomware
下载PDF
A Multi-homed VPN Architecture Based on Extended SOCKS+TLS Protocols
2
作者 张宝良 胡汉平 陈翔 《Journal of Shanghai Jiaotong university(Science)》 EI 2005年第3期250-255,共6页
A multi-homed VPN architecture based on extended SOCKSv5 and TLS was proposed. The architecture employs a dynamic connection mechanism for multiple proxies in the end system,i n which the security-demanded transmissio... A multi-homed VPN architecture based on extended SOCKSv5 and TLS was proposed. The architecture employs a dynamic connection mechanism for multiple proxies in the end system,i n which the security-demanded transmission connections can switch smoothly among the multiple proxies by maint aining a coherent connection context.The mechanism is transparent to application programs and can support th e building of VPN.With the cooperation of some other security components,the mechanism guarantees the reso urce availability and reliability of the end system against some attacks to the specific ports or hosts. 展开更多
关键词 multi-homed SOCKSv5 security connection context virtual private network (VPN)
下载PDF
Secure connectivity analysis in unmanned aerial vehicle networks 被引量:4
3
作者 Xin YUAN Zhi-yong FENG +2 位作者 Wen-jun XU Zhi-qing WEI Ren-ping LIU 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2018年第3期409-422,共14页
The distinctive characteristics of unmanned aerial vehicle networks (UAVNs), including highly dynamic network topology, high mobility, and open-air wireless environments, may make UAVNs vulnerable to attacks and thr... The distinctive characteristics of unmanned aerial vehicle networks (UAVNs), including highly dynamic network topology, high mobility, and open-air wireless environments, may make UAVNs vulnerable to attacks and threats. In this study, we propose a novel trust model for UAVNs that is based on the behavior and mobility pattern of UAV nodes and the characteristics of inter-UAV channels. The proposed trust model consists of four parts: direct trust section, indirect trust section, integrated trust section, and trust update section. Based on the trust model, the concept of a secure link in UAVNs is formulated that exists only when there is both a physical link and a trust link between two UAVs. Moreover, the metrics of both the physical connectivity probability and the secure connectivity probability between two UAVs are adopted to analyze the connectivity of UAVNs. We derive accurate and analytical expressions of both the physical connectivity probability and the secure connectivity probability using stochastic geometry with or without Doppler shift. Extensive simulations show that compared with the physical connection probability with or without malicious attacks, the proposed trust model can guarantee secure communication and reliable connectivity between UAVs and enhance network performance when UAVNs face malicious attacks and other security risks. 展开更多
关键词 Unmanned aerial vehicle networks(UAVNs) Trust model Secure connectivity Doppler shift
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部