在分析高级随机包标记算法(AMS)的基础上,提出了一种基于反向确认的攻击源追踪模型,该模型不再需要AMS过强的假设前提。
On the basis of analysis about advanced marking scheme (AMS), a reverse-validation IP traceback scheme is proposed, which no longer requires the too strong assumption of AMS.
基于最小特权原理,从分析进程的访问权限出发,提出了一种防御恶意程序攻击的数据保护模型。
After analyzing the access rights of the processes, this paper presents a data-protection model which will prevent the attack of the malicious processes on the base of minimal privilege principle.
结果表明,利用符号模型检测方法分析并发现密码协议重放攻击的漏洞是一种行之有效的方法。
Results show that the method using symbol model checker can discover replay attacks upon some cryptographic protocols and is effective.
以对现实世界中动物的行为分析为依据,建立了合理的敌对群体行为的通用攻击模型。
Based on the analysis of animals' behavior in the real world, reasonable universal attack models are established.
扩展的诚实理想分析模型不仅继承了原理论的有关性质,而且适应猜测攻击的分析。
The extended honest ideal model not only inherits its original characters, but also is adaptive for the analysis of guessing attack.
通过实例分析证明了算法模型适合全面分析网络安全性和攻击者可能采取的行为方式。
Through the analysis of an example, demonstrated algorithm model to be capable of comprehensive network security analysis and the potential attackers' behavior characteristic analysis.
提出了匿名通信系统中的两种统计型攻击模型,对两种攻击模型的攻击能力作了定量的分析。
Two models of statistical attack in anonymous communication system and the quantitative analysis of their attacking abilities are presented in this paper.
深入系统地分析了攻击树模型在抗攻击测试中应用。
Analyze the application of attack tree model used in anti-attack test thoroughly and systematically.
通过分析发现,利用攻击树模型对信息系统安全进行度量,是比较好的选择。最后对本模型的特点进行了讨论。
Throughout analysis, the attack tree model is a good choice to describe the information system security, finally, discusses the characteristics of this model.
最后,本文对系统模型应用于网络拒绝服务攻击环境的实例进行了分析,并提出了一种应用聚类分析对系统的改进方法。
Finally, our system is analyzed and evaluated in a "SYN flood" environment, and a method of applying clustering to anomaly detection is added to improve its performance.
在论述日志关联分析平台的体系结构与功能模块的基础上,提出一种新的网络攻击追踪系统模型。
The article provides the system architecture and the principal functions of the log correlation system, then presents a framework of network attacker-tracing system.
采用解析法建立了攻击机目标搜索模型;分析了对比度和能见距离对发现概率的影响。
Analytic method was used to build up a target searching model for the attacker, and the effect of contrast and visible distance on detection probability was analyzed.
给出了一个网络攻击模型,该模型将攻击过程归纳为若干阶段,并详细地分析了黑客在各阶段所采用技术方法。
This paper presents a network attack model , which departs attack into several steps , and describes technology that hacker adopts during each attack step.
通过对超视距空中机动目标的分析和合理的假设之后,提出了用空空导弹攻击超视距空中目标的基本模型。
The target detection model, booting attack model and using effect model of weapon are (presented) based on process analysis of the over-the-horizon (OTH) attack of the anti-ship missile.
本文通过对大量的网络弱点的分析,结合网络的特性,建立了安全性分析模型,生成网络攻击图。
Based on the analysis of a lot of network vulnerabilities and the characteristic of computer network, in this paper the model of network security status was built, and attack graphs were generated.
最后,对该信任模型的有效性和抗攻击能力进行了理论分析和实验验证。
Finally, the effectiveness and resistibility of the proposed trust model are analyzed theoretically and evaluated experimentally.
分析结果表明,该模型在可信节点剩余很少时仍能完成网络中节点的认证,亦可避免攻击者获取足够的私钥分量进行非法认证。
The analysis shows that this model can avoid attackers getting enough weight for the private key for lawlessly validating and validate the network nodes when trust nodes remain small.
以对策论为基础,构建空战机动攻击阶段的对策模型,通过模糊决策分析找出最优机动策略。
Based on game theory, a model for air combat maneuvering decision-making was established. Then the optimal maneuvering strategy was obtained through fuzzy decision analysis.
其次我们分析了网络环境下的攻击者模型,考虑了承诺方案应该具备的性质,并形式化定义出在裸公钥模型下承诺方案应该达到的安全属性。
Next we consider the adversarial model in the Internet environment. We analyze properties that commitment schemes should have especially in the bare public key model and give a formal definition.
其次我们分析了网络环境下的攻击者模型,考虑了承诺方案应该具备的性质,并形式化定义出在裸公钥模型下承诺方案应该达到的安全属性。
Next we consider the adversarial model in the Internet environment. We analyze properties that commitment schemes should have especially in the bare public key model and give a formal definition.
应用推荐