Generating attack pattern automatically based on attack tree is studied. The extending definition of attack tree is proposed. And the algorithm of generating attack tree is presented. The method of generating attack p...Generating attack pattern automatically based on attack tree is studied. The extending definition of attack tree is proposed. And the algorithm of generating attack tree is presented. The method of generating attack pattern automatically based on attack tree is shown, which is tested by concrete attack instances. The results show that the algorithm is effective and efficient. In doing so, the efficiency of generating attack pattern is improved and the attack trees can be reused.展开更多
The wind tunnel experiments is conducted to get inspiration for understanding the mechanism of the asymmetric flow pattern and developing an innovative flow control technique for a slender body at high angle of attack...The wind tunnel experiments is conducted to get inspiration for understanding the mechanism of the asymmetric flow pattern and developing an innovative flow control technique for a slender body at high angle of attack. The bi-stable situation of the side forces is observed, which could be easily switched by a tiny disturbances either from coming flow or from artificial disturbances at nose tip (including manufacturing defect). In turbulent flows the side forces switched randomly between positive and negative. There exists a hysteresis loop of side force with the rolling angle. A rod in front of the slender body is used to change the vortex pattern, which could be kept even the rod is moved out from the stream. A miniature strake attached to the nose tip of the model can be moved to different circumferential position. When the strake is stationary, the hysteresis loop disappears and the side force does not change with the turbulent fluctuation of coming flow. The results from dynamic measurements of section side force indicates that when the strake swung at lower frequency the side force can follow the cadence of the swinging strake. With increasing frequency, the magnitude of the side force decreases. At still high frequency, the side force diminishes to zero. If the strake is swinging, while the middle position can be changed to different circumferential angle Фs on either left or right side, the side forces can be changed proportionally with the angle Фs. On the basis of the experimental results, the mechanism of the asymmetry is discussed.展开更多
A common way to gain control of victim hosts is to launch buffer overflow attacks by remote exploits.This paper proposes a behavior-based buffer overflow attacker blocker,which can dynamically detect and prevent remot...A common way to gain control of victim hosts is to launch buffer overflow attacks by remote exploits.This paper proposes a behavior-based buffer overflow attacker blocker,which can dynamically detect and prevent remote buffer overflow attacks by filtering out the client requests that contain malicious executable codes.An important advantage of this approach is that it can block the attack before the exploit code begins affecting the target program.The blocker is composed of three major components,packet decoder,disassembler,and behavior-based detection engine.It decodes the network packets,extract possible instruction sequences from the payload,and analyzes whether they contain attack behaviors.Since this blocker based its effectiveness on the commonest behavior patterns of buffer overflow shellcode,it is expected to detect not only existing attacks but also zero-day attacks.Moreover,it has the capability of detecting attack-size obfuscation.展开更多
Detecting cyber-attacks undoubtedly has become a big data problem. This paper presents a tutorial on data mining based cyber-attack detection. First,a data driven defence framework is presented in terms of cyber secur...Detecting cyber-attacks undoubtedly has become a big data problem. This paper presents a tutorial on data mining based cyber-attack detection. First,a data driven defence framework is presented in terms of cyber security situational awareness. Then, the process of data mining based cyber-attack detection is discussed. Next,a multi-loop learning architecture is presented for data mining based cyber-attack detection. Finally,common data mining techniques for cyber-attack detection are discussed.展开更多
文摘Generating attack pattern automatically based on attack tree is studied. The extending definition of attack tree is proposed. And the algorithm of generating attack tree is presented. The method of generating attack pattern automatically based on attack tree is shown, which is tested by concrete attack instances. The results show that the algorithm is effective and efficient. In doing so, the efficiency of generating attack pattern is improved and the attack trees can be reused.
文摘The wind tunnel experiments is conducted to get inspiration for understanding the mechanism of the asymmetric flow pattern and developing an innovative flow control technique for a slender body at high angle of attack. The bi-stable situation of the side forces is observed, which could be easily switched by a tiny disturbances either from coming flow or from artificial disturbances at nose tip (including manufacturing defect). In turbulent flows the side forces switched randomly between positive and negative. There exists a hysteresis loop of side force with the rolling angle. A rod in front of the slender body is used to change the vortex pattern, which could be kept even the rod is moved out from the stream. A miniature strake attached to the nose tip of the model can be moved to different circumferential position. When the strake is stationary, the hysteresis loop disappears and the side force does not change with the turbulent fluctuation of coming flow. The results from dynamic measurements of section side force indicates that when the strake swung at lower frequency the side force can follow the cadence of the swinging strake. With increasing frequency, the magnitude of the side force decreases. At still high frequency, the side force diminishes to zero. If the strake is swinging, while the middle position can be changed to different circumferential angle Фs on either left or right side, the side forces can be changed proportionally with the angle Фs. On the basis of the experimental results, the mechanism of the asymmetry is discussed.
文摘A common way to gain control of victim hosts is to launch buffer overflow attacks by remote exploits.This paper proposes a behavior-based buffer overflow attacker blocker,which can dynamically detect and prevent remote buffer overflow attacks by filtering out the client requests that contain malicious executable codes.An important advantage of this approach is that it can block the attack before the exploit code begins affecting the target program.The blocker is composed of three major components,packet decoder,disassembler,and behavior-based detection engine.It decodes the network packets,extract possible instruction sequences from the payload,and analyzes whether they contain attack behaviors.Since this blocker based its effectiveness on the commonest behavior patterns of buffer overflow shellcode,it is expected to detect not only existing attacks but also zero-day attacks.Moreover,it has the capability of detecting attack-size obfuscation.
文摘Detecting cyber-attacks undoubtedly has become a big data problem. This paper presents a tutorial on data mining based cyber-attack detection. First,a data driven defence framework is presented in terms of cyber security situational awareness. Then, the process of data mining based cyber-attack detection is discussed. Next,a multi-loop learning architecture is presented for data mining based cyber-attack detection. Finally,common data mining techniques for cyber-attack detection are discussed.