期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
通信网络动目标防御技术研究 被引量:5
1
作者 向征 谭田天 +2 位作者 蔡桂林 王小峰 罗跃斌 《高技术通讯》 北大核心 2017年第8期690-698,共9页
论述了通信网络动目标防御(MTD)概念,从攻击面特征及动目标防御功能性内涵的角度,对现有动目标防御技术进行了归类和分析。在现有研究的基础上设计了基于端信息跳变的动目标防御系统,并对其抗攻击性能进行了分析。该系统能通过通信过程... 论述了通信网络动目标防御(MTD)概念,从攻击面特征及动目标防御功能性内涵的角度,对现有动目标防御技术进行了归类和分析。在现有研究的基础上设计了基于端信息跳变的动目标防御系统,并对其抗攻击性能进行了分析。该系统能通过通信过程中持续变化攻击面增大攻击成本、复杂度和降低攻击成功率,从根本上提高防御攻击的性能。该研究可为多机制结合的动目标防御系统的设计与实现提供理论基础。 展开更多
关键词 通信网络安全 动目标防御(MTD) 综述 防御 变换机制
在线阅读 下载PDF
动目标防御机制 被引量:1
2
作者 王东霞 冯学伟 赵刚 《信息网络安全》 2014年第9期98-100,共3页
动目标防御是安全领域的一个新探索,旨在通过动态变化增加攻击者的难度,从而提升系统的安全性。文章从对抗条件下实现安全的机理入手,分析了动目标防御的原理和有效性,建立了动目标防护技术体系,描述了不同层次和粒度的动目标防御机制,... 动目标防御是安全领域的一个新探索,旨在通过动态变化增加攻击者的难度,从而提升系统的安全性。文章从对抗条件下实现安全的机理入手,分析了动目标防御的原理和有效性,建立了动目标防护技术体系,描述了不同层次和粒度的动目标防御机制,分析了实现动目标防御面临的问题和挑战。 展开更多
关键词 动目标防御 攻击面 多样化
在线阅读 下载PDF
网络服务DDoS攻击主动防御框架 被引量:5
3
作者 柴新忠 李凯 +1 位作者 龚梦瑶 赵原 《计算机工程与设计》 北大核心 2021年第10期2770-2775,共6页
为高效保护在线网络服务,提出一种基于动目标防御的主动防御框架,其通过周期性地重组网络服务系统中接入用户和反向代理服务器之间的网络连接来保证系统的安全性,这就是所谓的“洗牌”。通过这种方式,恶意用户难以对系统进行分布式拒绝... 为高效保护在线网络服务,提出一种基于动目标防御的主动防御框架,其通过周期性地重组网络服务系统中接入用户和反向代理服务器之间的网络连接来保证系统的安全性,这就是所谓的“洗牌”。通过这种方式,恶意用户难以对系统进行分布式拒绝服务(DDoS)攻击,但动目标防御也带来了巨大的资源消耗,阻碍了其大规模的应用与推广。为解决上述问题,提出一种面向在线网络服务DDoS攻击的智能化主动防御框架DQ-MOTAG,将深度强化学习与动目标防御进行结合。设计一个算法生成每个洗牌周期的最优持续时间,指导后续的洗牌过程。进行一系列实验验证DQ-MOTAG与现有方法相比,在防御性能、误封率和网络源消耗等方面具有明显的优越性。 展开更多
关键词 动目标防御 深度强化学习 自适应策略 DDOS攻击 在线网络服务
在线阅读 下载PDF
跳变信息服务系统研究 被引量:4
4
作者 赵鑫 《软件》 2018年第3期204-208,共5页
针对复杂网络空间对抗条件下提升信息服务系统动态主动防御能力的需求,基于动目标防御思想提出了一种跳变信息服务系统架构及构建方法。首先利用多态化的软件栈模板构建出由不同异构虚拟服务器组成的服务器池;然后,通过审计清洗、服务... 针对复杂网络空间对抗条件下提升信息服务系统动态主动防御能力的需求,基于动目标防御思想提出了一种跳变信息服务系统架构及构建方法。首先利用多态化的软件栈模板构建出由不同异构虚拟服务器组成的服务器池;然后,通过审计清洗、服务请求调度、服务器动态管控等模块之间的交互控制,实现根据各虚拟服务器的状态信息和负载情况进行服务请求调度和服务器状态切换,在保证服务质量的前提下使得信息服务系统随时间动态、随机地变化。 展开更多
关键词 动目标防御 跳变信息服务 网络空间安全
在线阅读 下载PDF
Game theoretic analysis for the mechanism of moving target defense 被引量:5
5
作者 Gui-lin CAI Bao-sheng WANG Qian-qian XING 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2017年第12期2017-2034,共18页
Moving target defense (MT_D) is a novel way to alter the asymmetric situation of attacks and defenses, and a lot of MTD studies have been carried out recently. However, relevant analysis for the defense mechanism of... Moving target defense (MT_D) is a novel way to alter the asymmetric situation of attacks and defenses, and a lot of MTD studies have been carried out recently. However, relevant analysis for the defense mechanism of the MTD technology is still absent. In this paper, we analyze the defense mechanism of MTD technology in two dimensions. First, we present a new defense model named MP2R to describe the proactivity and effect of MTD technology intuitively. Second, we use the incomplete information dynamic game theory to verify the proactivity and effect of MTD technology. Specifically, we model the interaction between a defender who equips a server with different types of MTD techniques and a visitor who can be a user or an attacker, and analyze the equilibria and their conditions for these models. Then, we take an existing incomplete information dynamic game model for traditional defense and its equilibrium result as baseline for comparison, to validate the proactivity and effect of MTD technology. We also identify the factors that will influence the proactivity and effectiveness of the MTD approaches. This work gives theoretical support for understanding the defense process and defense mechanism of MTD technology and provides suggestions to improve the effectiveness of MTD approaches. 展开更多
关键词 Network security Moving target defense (MTD) Defense mechanism Defense model Game theory
原文传递
On the deterring effect of a butterfly's eyespot in juvenile and sub-adult chickens 被引量:1
6
作者 Martin OLOFSSON Christer WIKLUND Anna FAVATI 《Current Zoology》 SCIE CAS CSCD 2015年第4期749-757,共9页
Circular patterns, or eyespots, are common anti-predator features in a variety of animals. Two defensive functions have been documented: large eyespots may intimidate predators, whereas smaller marginal eyespots may ... Circular patterns, or eyespots, are common anti-predator features in a variety of animals. Two defensive functions have been documented: large eyespots may intimidate predators, whereas smaller marginal eyespots may divert attacks. However, a given eyespot potentially serves both functions, possibly depending on the predator's size and/or experience. Naive predators are potentially more likely to misdirect their attacks towards eyespots; alternatively, their typically smaller size would make them more intimidated by the same eyespots. Here we test how juvenile and sub-adult naive chickens respond to a single eyespot on a butterfly's wing. We presented the birds with dead wall brown butterflies, Lasiommata megera, that had their apical eyespot visible or painted over. We assessed the birds' responses' by (i) scoring their intimidation reaction, (ii) whether they uttered alarm calls and, (iii) if they attacked the butterfly and where they targeted their attacks. Results show that both age categories received higher intimidation scores when offered a butterfly with a visible eyespot. Juveniles were more intimidated by the butterfly than the sub-adults: they received higher intimidation scores and were more prone to utter alarm calls. Moreover, only sub-adults at- tacked and did so by preferentially attacking the butterfly's anterior. We demonstrate an intimidating effect of the type of eyespot that has previously been shown only to divert attacks. We suggest that one and the same eyespot may serve two functions relative to different predators; however, further experiments are needed to disentangle the role of predator identity and its link to size, on- togeny and experience [Current Zoology 61 (4): 749-757, 2015]. 展开更多
关键词 Predator-prey interactions Prey-attack behaviour BUTTERFLY BIRD EYESPOT ONTOGENY
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部