This paper analyzes the characteristics of Interact space and confrontation, discussed on the main technology of network space attack and defense confrontation. The paper presents the realization scheme of network spa...This paper analyzes the characteristics of Interact space and confrontation, discussed on the main technology of network space attack and defense confrontation. The paper presents the realization scheme of network space attack defense confrontation system, and analyzes its feasibility. The technology and the system can provide technical support for the system in the network space of our country development, and safeguard security of network space in China, promote the development of the network space security industry of China, it plays an important role and significance to speed up China' s independent controllable security products development.展开更多
Traitor tracing schemes are introduced to combat the piracy scenarios. The notation of dynamic traitor tracing is proposed by Fiat and Tassa, which fights against rebroadcast of decrypted content. In this paper, using...Traitor tracing schemes are introduced to combat the piracy scenarios. The notation of dynamic traitor tracing is proposed by Fiat and Tassa, which fights against rebroadcast of decrypted content. In this paper, using the idea of searching user address level by level, a new dynamic traitor tracing scheme based on a multilevel structure of user set is constructed. The scheme proposed can efficiently combat with the immediate rebroadcast attack, and possesses lower tracing complexity. Importantly, the tracing scheme can be applicable to systems with different sizes of subscriber sets.展开更多
针对传统的IP欺骗攻击缓解方法存在运算开销大、缺乏灵活性等问题,提出了一种基于动态限制策略的软件定义网络(software defined network,SDN)中IP欺骗攻击缓解方法。首先,利用Packet-In消息中三元组信息回溯攻击路径,定位IP欺骗攻击源...针对传统的IP欺骗攻击缓解方法存在运算开销大、缺乏灵活性等问题,提出了一种基于动态限制策略的软件定义网络(software defined network,SDN)中IP欺骗攻击缓解方法。首先,利用Packet-In消息中三元组信息回溯攻击路径,定位IP欺骗攻击源头主机;然后,由控制器制定动态限制策略对连接攻击源头主机的交换机端口的新流转发功能进行限制,待限制期满再恢复其转发新流的功能,限制期的大小随着被检测为攻击源的次数而增长。研究结果表明:这种动态的限制策略可阻隔攻击流进入SDN网络,从而有效避免SDN交换机、控制器以及链路过载;由于在限制期间无需再对这些限制的交换机端口进行实时监测,该方法在应对长时攻击时较传统方法具有更高的缓解效率和更少的资源消耗。展开更多
在分布式物联网的大规模应用背景下,各实体设备中密码技术作为信息安全的底层支撑架构,正面临着侧信道攻击(SCA)这一物理层安全威胁的严峻挑战. SM4分组密码算法作为我国自主研制的商用密码算法标准,已深度集成于分布式物联网安全协议中...在分布式物联网的大规模应用背景下,各实体设备中密码技术作为信息安全的底层支撑架构,正面临着侧信道攻击(SCA)这一物理层安全威胁的严峻挑战. SM4分组密码算法作为我国自主研制的商用密码算法标准,已深度集成于分布式物联网安全协议中,但其实现层面的侧信道脆弱性问题亟待解决.针对SM4密钥扩展算法的侧信道攻击研究存在空白,现有攻击方法多依赖多能迹统计特性,而单能迹攻击研究匮乏.研究提出一种基于贝叶斯网络结合建模侧信道攻击的单能迹侧信道攻击方法,针对单条能量轨迹,通过构建概率图模型,结合置信传播算法,实现对轮子密钥的高效推测,进而恢复主密钥.仿真实验与实测实验表明该攻击方法有效,在理想实测环境下主密钥恢复成功率达85.74%,即使在实测能迹中添加大量高斯白噪声,使得信噪比仅为10 d B的条件下,成功率仍可达70%.与传统方法相比,所提方法在成功率、所需能量轨迹数量和攻击时间等方面优势显著,为分布式物联网系统含密设备的侧信道攻击研究提供了新的思路与技术手段,也为相关防护设计提供了理论依据和参考.展开更多
文摘This paper analyzes the characteristics of Interact space and confrontation, discussed on the main technology of network space attack and defense confrontation. The paper presents the realization scheme of network space attack defense confrontation system, and analyzes its feasibility. The technology and the system can provide technical support for the system in the network space of our country development, and safeguard security of network space in China, promote the development of the network space security industry of China, it plays an important role and significance to speed up China' s independent controllable security products development.
基金Supported by the National Key Basic Research and Development Program(973 Program)(2012CB316103)
文摘Traitor tracing schemes are introduced to combat the piracy scenarios. The notation of dynamic traitor tracing is proposed by Fiat and Tassa, which fights against rebroadcast of decrypted content. In this paper, using the idea of searching user address level by level, a new dynamic traitor tracing scheme based on a multilevel structure of user set is constructed. The scheme proposed can efficiently combat with the immediate rebroadcast attack, and possesses lower tracing complexity. Importantly, the tracing scheme can be applicable to systems with different sizes of subscriber sets.
文摘针对传统的IP欺骗攻击缓解方法存在运算开销大、缺乏灵活性等问题,提出了一种基于动态限制策略的软件定义网络(software defined network,SDN)中IP欺骗攻击缓解方法。首先,利用Packet-In消息中三元组信息回溯攻击路径,定位IP欺骗攻击源头主机;然后,由控制器制定动态限制策略对连接攻击源头主机的交换机端口的新流转发功能进行限制,待限制期满再恢复其转发新流的功能,限制期的大小随着被检测为攻击源的次数而增长。研究结果表明:这种动态的限制策略可阻隔攻击流进入SDN网络,从而有效避免SDN交换机、控制器以及链路过载;由于在限制期间无需再对这些限制的交换机端口进行实时监测,该方法在应对长时攻击时较传统方法具有更高的缓解效率和更少的资源消耗。
文摘在分布式物联网的大规模应用背景下,各实体设备中密码技术作为信息安全的底层支撑架构,正面临着侧信道攻击(SCA)这一物理层安全威胁的严峻挑战. SM4分组密码算法作为我国自主研制的商用密码算法标准,已深度集成于分布式物联网安全协议中,但其实现层面的侧信道脆弱性问题亟待解决.针对SM4密钥扩展算法的侧信道攻击研究存在空白,现有攻击方法多依赖多能迹统计特性,而单能迹攻击研究匮乏.研究提出一种基于贝叶斯网络结合建模侧信道攻击的单能迹侧信道攻击方法,针对单条能量轨迹,通过构建概率图模型,结合置信传播算法,实现对轮子密钥的高效推测,进而恢复主密钥.仿真实验与实测实验表明该攻击方法有效,在理想实测环境下主密钥恢复成功率达85.74%,即使在实测能迹中添加大量高斯白噪声,使得信噪比仅为10 d B的条件下,成功率仍可达70%.与传统方法相比,所提方法在成功率、所需能量轨迹数量和攻击时间等方面优势显著,为分布式物联网系统含密设备的侧信道攻击研究提供了新的思路与技术手段,也为相关防护设计提供了理论依据和参考.