期刊文献+
共找到616篇文章
< 1 2 31 >
每页显示 20 50 100
An Improved Simple Power Attack against Camellia's Key Schedule
1
作者 LIU Shuanggen NI Haiying +1 位作者 HU Yupu LIAO Yunyan 《Wuhan University Journal of Natural Sciences》 CAS 2008年第5期591-594,共4页
This paper presents an improved simple power attack against the key schedule of Camellia. While the original attack required an exact determination of the Hamming weight of intermediate data values based on power meas... This paper presents an improved simple power attack against the key schedule of Camellia. While the original attack required an exact determination of the Hamming weight of intermediate data values based on power measurements, in this paper, two types of the simple power attack are presented and shown to be tolerant of errors that might occur in the Hamming weight determinations. In practical applications of the attack, such errors are likely to occur due to noise and distortion in the power measurements and their mapping to the Hamming weights of the data. To resist these attacks, the required design rationale of key schedules and several practical countermeasures are suggested. 展开更多
关键词 simple power attack CAMELLIA key schedule Hamming weight attack
在线阅读 下载PDF
Erratum to: An Improved Simple Power Attack against Camellia's Key Schedule
2
作者 Wuhan University Journal of Natural Sciences 《Wuhan University Journal of Natural Sciences》 CAS 2009年第6期552-552,共1页
Retraction: LIU Shuanggen, NI Haiying, HU Yupu, LIAO Yunyan. An Improved Simple Power Attack against Camellia's Key Schedule. Wuhan University Journal of Natural Sciences, 2008, 13(5): 591-594. DOI: 10.1007/s 11... Retraction: LIU Shuanggen, NI Haiying, HU Yupu, LIAO Yunyan. An Improved Simple Power Attack against Camellia's Key Schedule. Wuhan University Journal of Natural Sciences, 2008, 13(5): 591-594. DOI: 10.1007/s 11859-008-0516-3 展开更多
关键词 DOI An Improved Simple power attack against Camellia’s Key Schedule Erratum to
原文传递
Clustering Collision Power Attack on RSA-CRT 被引量:1
3
作者 Wunan Wan Jun Chen +3 位作者 Jinyue Xia Jinquan Zhang Shibin Zhang Hao Chen 《Computer Systems Science & Engineering》 SCIE EI 2021年第2期417-434,共18页
In this paper,we propose two new attack algorithms on RSA implementations with CRT(Chinese remainder theorem).To improve the attack efficiency considerably,a clustering collision power attack on RSA with CRT is introd... In this paper,we propose two new attack algorithms on RSA implementations with CRT(Chinese remainder theorem).To improve the attack efficiency considerably,a clustering collision power attack on RSA with CRT is introduced via chosen-message pairs.This attack method is that the key parameters dp and dq are segmented by byte,and the modular multiplication collisions are identified by k-means clustering.The exponents dp and dq were recovered by 12 power traces of six groups of the specific message pairs,and the exponent d was obtained.We also propose a second order clustering collision power analysis attack against RSA implementation with CRT,which applies double blinding exponentiation.To reduce noise and artificial participation,we analyze the power points of interest by preprocessing and k-means clustering with horizontal correlation collisions.Thus,we recovered approximately 91%of the secret exponents manipulated with a single power curve on RSA-CRT with countermeasures of double blinding methods. 展开更多
关键词 Collision attack power analysis attack chosen-message attack module exponentiation RSA-CRT
在线阅读 下载PDF
Correlation power attack on a message authentication code based on SM3
4
作者 Ye YUAN Kai-ge QU +2 位作者 Li-jiWU Jia-weiMA Xiang-min ZHANG 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2019年第7期930-946,共17页
Hash-based message authentication code(HMAC)is widely used in authentication and message integrity.As a Chinese hash algorithm,the SM3 algorithm is gradually winning domestic market value in China.The side channel sec... Hash-based message authentication code(HMAC)is widely used in authentication and message integrity.As a Chinese hash algorithm,the SM3 algorithm is gradually winning domestic market value in China.The side channel security of HMAC based on SM3(HMAC-SM3)is still to be evaluated,especially in hardware implementation,where only intermediate values stored in registers have apparent Hamming distance leakage.In addition,the algorithm structure of SM3 determines the difficulty in HMAC-SM3 side channel analysis.In this paper,a skillful bit-wise chosen-plaintext correlation power attack procedure is proposed for HMAC-SM3 hardware implementation.Real attack experiments on a field programmable gate array(FPGA)board have been performed.Experimental results show that we can recover the key from the hypothesis space of 2256 based on the proposed procedure. 展开更多
关键词 HMAC-SM3 Side channel analysis Correlation power attack Bit-wise chosen-plaintext
原文传递
Research on High Power Inter-Channel Crosstalk Attack in Optical Networks 被引量:1
5
作者 张引发 任帅 +3 位作者 李娟 廖晓闽 李明 方园园 《Journal of Shanghai Jiaotong university(Science)》 EI 2015年第1期7-13,共7页
While all-optical networks become more and more popular as the basis of the next generation Internet(NGI)infrastructure,such networks raise many critical security issues.High power inter-channel crosstalk attack is on... While all-optical networks become more and more popular as the basis of the next generation Internet(NGI)infrastructure,such networks raise many critical security issues.High power inter-channel crosstalk attack is one of the security issues which have negative effect on information security in optical networks.Optical fiber in optical networks has some nonlinear characteristics,such as self phase modulation(SPM),cross phase modulation(XPM),four-wave mixing(FWM)and stimulated Raman scattering(SRS).They can be used to implement high power inter-channel crosstalk attack by malicious attackers.The mechanism of high power inter-channel crosstalk attack is analyzed.When an attack occurs,attack signal power and fiber nonlinear refractive index are the main factors which affect quality of legitimate signals.The effect of high power inter-channel crosstalk attack on quality of legitimate signals is investigated by building simulation system in VPI software.The results show that interchannel crosstalk caused by high power attack signal leads to quality deterioration of legitimate signals propagated in the same fiber.The higher the power of attack signal is,the greater the fiber nonlinear refractive index is.The closer the channel spacing away from the attack signal is,the more seriously the legitimate signals are affected by attack.We also find that when attack position and power of attack signal are constant,attack signal cannot infinitely spread,while its attack ability shows a fading trend with the extension of propagation distance. 展开更多
关键词 security of optical networks inter-channel crosstalk attack power of attack signal nonlinear characteristics of optical fiber
原文传递
Invariant of Enhanced AES Algorithm Implementations Against Power Analysis Attacks
6
作者 Nadia Mustaqim Ansari Rashid Hussain +1 位作者 Sheeraz Arif Syed Sajjad Hussain 《Computers, Materials & Continua》 SCIE EI 2022年第7期1861-1875,共15页
The security of Internet of Things(IoT)is a challenging task for researchers due to plethora of IoT networks.Side Channel Attacks(SCA)are one of the major concerns.The prime objective of SCA is to acquire the informat... The security of Internet of Things(IoT)is a challenging task for researchers due to plethora of IoT networks.Side Channel Attacks(SCA)are one of the major concerns.The prime objective of SCA is to acquire the information by observing the power consumption,electromagnetic(EM)field,timing analysis,and acoustics of the device.Later,the attackers perform statistical functions to recover the key.Advanced Encryption Standard(AES)algorithm has proved to be a good security solution for constrained IoT devices.This paper implements a simulation model which is used to modify theAES algorithm using logicalmasking properties.This invariant of the AES algorithm hides the array of bits during substitution byte transformation of AES.This model is used against SCAand particularly Power Analysis Attacks(PAAs).Simulation model is designed on MATLAB simulator.Results will give better solution by hiding power profiles of the IoT devices against PAAs.In future,the lightweight AES algorithm with false key mechanisms and power reduction techniques such as wave dynamic differential logic(WDDL)will be used to safeguard IoT devices against side channel attacks by using Arduino and field programmable gate array(FPGA). 展开更多
关键词 Side channel attacks power analysis attacks network security MASKING advance encryption standard
在线阅读 下载PDF
An Improved Empirical Mode Decomposition for Power Analysis Attack
7
作者 Han Gan Hongxin Zhang +3 位作者 Muhammad Saad khan Xueli Wang Fan Zhang Pengfei He 《China Communications》 SCIE CSCD 2017年第9期94-99,共6页
Correlation power analysis(CPA) has become a successful attack method about crypto-graphic hardware to recover the secret keys. However, the noise influence caused by the random process interrupts(RPIs) becomes an imp... Correlation power analysis(CPA) has become a successful attack method about crypto-graphic hardware to recover the secret keys. However, the noise influence caused by the random process interrupts(RPIs) becomes an important factor of the power analysis attack efficiency, which will cost more traces or attack time. To address the issue, an improved method about empirical mode decomposition(EMD) was proposed. Instead of restructuring the decomposed signals of intrinsic mode functions(IMFs), we extract a certain intrinsic mode function(IMF) as new feature signal for CPA attack. Meantime, a new attack assessment is proposed to compare the attack effectiveness of different methods. The experiment shows that our method has more excellent performance on CPA than others. The first and the second IMF can be chosen as two optimal feature signals in CPA. In the new method, the signals of the first IMF increase peak visibility by 64% than those of the tradition EMD method in the situation of non-noise. On the condition of different noise interference, the orders of attack efficiencies are also same. With external noise interference, the attack effect of the first IMF based on noise with 15dB is the best. 展开更多
关键词 power ANALYSIS attack EMD IMF CORRELATION power analysis RPIs
在线阅读 下载PDF
Analysis of Causes and Actual Events on Electric Power Infrastructure Impacted by Cyber Attack
8
作者 Hongxu Yin Rui Xiao Fenfei Lv 《Journal of Power and Energy Engineering》 2015年第4期77-84,共8页
With the development of electric power technology, information technology and military technology, the impact of cyber attack on electric power infrastructure has increasingly become a hot spot issue which calls both ... With the development of electric power technology, information technology and military technology, the impact of cyber attack on electric power infrastructure has increasingly become a hot spot issue which calls both domestic and foreign attention. First, main reasons of the impact on power infrastructure caused by cyber attack are analyzed from the following two aspects: 1) The dependence of electric power infrastructure on information infrastructure makes cyber attack issues in information field likely to affect electric power field. 2) As regards to the potential threat sources, it will be considerably profitable to launch cyber attacks on electric power infrastructure. On this basis, this paper gives a classified elaboration on the characteristics and the possibilities of cyber attacks on electrical infrastructures. Finally, the recently published actual events of cyber attacks in respect of threat sources, vulnerabilities and assaulting modes are analyzed and summarized. 展开更多
关键词 CYBER attack Electric power INFRASTRUCTURE Information INFRASTRUCTURE DEPENDENCE
在线阅读 下载PDF
Side-Channel Attacks & Data Exfiltration Using Wall Outlet USB Power Adapters
9
作者 Andrew Masters Vijay K. Madisetti 《Journal of Information Security》 2024年第4期433-447,共15页
The number and creativity of side channel attacks have increased dramatically in recent years. Of particular interest are attacks leveraging power line communication to 1) gather information on power consumption from ... The number and creativity of side channel attacks have increased dramatically in recent years. Of particular interest are attacks leveraging power line communication to 1) gather information on power consumption from the victim and 2) exfiltrate data from compromised machines. Attack strategies of this nature on the greater power grid and building infrastructure levels have been shown to be a serious threat. This project further explores this concept of a novel attack vector by creating a new type of penetration testing tool: an USB power adapter capable of remote monitoring of device power consumption and communicating through powerline communications. 展开更多
关键词 CYBERSECURITY Side Channel attack power Line Communication Penetration Testing Hotplug attack Tool
在线阅读 下载PDF
Secure and efficient elliptic curve cryptography resists side-channel attacks 被引量:8
10
作者 Zhang Tao Fan Mingyu Zheng Xiaoyu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2009年第3期660-665,共6页
An embedded cryptosystem needs higher reconfiguration capability and security. After analyzing the newly emerging side-channel attacks on elliptic curve cryptosystem (ECC), an efficient fractional width-w NAF (FWNA... An embedded cryptosystem needs higher reconfiguration capability and security. After analyzing the newly emerging side-channel attacks on elliptic curve cryptosystem (ECC), an efficient fractional width-w NAF (FWNAF) algorithm is proposed to secure ECC scalar multiplication from these attacks. This algorithm adopts the fractional window method and probabilistic SPA scheme to reconfigure the pre-computed table, and it allows designers to make a dynamic configuration on pre-computed table. And then, it is enhanced to resist SPA, DPA, RPA and ZPA attacks by using the random masking method. Compared with the WBRIP and EBRIP methods, our proposals has the lowest total computation cost and reduce the shake phenomenon due to sharp fluctuation on computation performance. 展开更多
关键词 elliptic curve cryptography side channel attack simple power attack differential power attack refined power analysis zero-point power analysis.
在线阅读 下载PDF
基于图像编码与多头自注意力卷积神经网络的电网虚假数据注入攻击检测
11
作者 席磊 李宗泽 +1 位作者 刘治洪 陈洪军 《中国电机工程学报》 北大核心 2026年第6期2407-2419,I0019,共14页
虚假数据注入攻击是影响电网安全运行的重要威胁之一。现有检测方法对空间特征的提取依赖于电网拓扑结构,可扩展性较差;且未充分提取电网量测数据中的深层空间信息,限制了检测方法的定位检测性能。因此,该文提出一种基于图像编码与多头... 虚假数据注入攻击是影响电网安全运行的重要威胁之一。现有检测方法对空间特征的提取依赖于电网拓扑结构,可扩展性较差;且未充分提取电网量测数据中的深层空间信息,限制了检测方法的定位检测性能。因此,该文提出一种基于图像编码与多头自注意力卷积神经网络的虚假数据注入攻击定位检测方法。该方法通过主成分分析和格拉姆角场对一维历史时间断面电网数据进行图像编码以提取电网量测数据中的深层空间信息,突破现有检测方法依赖于电网拓扑结构进行空间特征提取的局限性。在此基础上,将多头自注意力机制引入二维卷积神经网络中,以加强对二维图像数据中富含深层空间信息的重要特征的关注。通过对所提定位检测方法在IEEE-14和57节点系统进行仿真,验证所提方法的有效性;且与其他方法在不同场景下进行对比分析,验证所提方法具有更优的精确率、准确率、召回率和F1值。 展开更多
关键词 电力信息物理系统 虚假数据注入攻击 主成分分析 多头注意力机制 卷积神经网络 格拉姆角场
原文传递
最新电压毛刺(Power Glitch)攻击与防御方法研究 被引量:5
12
作者 段晓毅 李莉 +1 位作者 武玉华 靳济芳 《计算机科学》 CSCD 北大核心 2011年第B10期428-431,共4页
电压毛刺(Power Glitch)攻击是通过快速改变输入到芯片的电压,使得芯片里的某些晶体管受到影响,引起一个或多个触发器进入错误状态,从而导致处理器会跳过或实施错误的操作,使芯片内隐藏的信息随着产生的错误而泄露出来。对电压毛刺攻击... 电压毛刺(Power Glitch)攻击是通过快速改变输入到芯片的电压,使得芯片里的某些晶体管受到影响,引起一个或多个触发器进入错误状态,从而导致处理器会跳过或实施错误的操作,使芯片内隐藏的信息随着产生的错误而泄露出来。对电压毛刺攻击与防御技术的最新进展情况进行了综述。在攻击方面,针对攻击目的的不同,详细介绍了RSA-CRT签名运算、RSA非CRT签名运算、对非易失存储器的攻击技术。防御技术分别介绍了电压毛刺检测电路和掩码,并分析了各种防御方案的优缺点。 展开更多
关键词 电压毛刺攻击 智能卡 硬件安全 RSA攻击 存储器攻击
在线阅读 下载PDF
面向SM4侧信道攻击的高效方案的设计与实现
13
作者 付杰 张肖强 +5 位作者 林信南 高小芳 杨潇雨 李梁 吴大畏 郑辛星 《青岛大学学报(工程技术版)》 2026年第1期93-101,共9页
针对SM4算法无法抵御DPA攻击,其功耗数据直接用硬件采集和软件采集都需大量能量迹,成功率低的问题,本文提出在硅前开发阶段使用不同的汉明重量模型对算法进行DPA攻击评估,利用Synopsys的EDA工具开发了相应的实验验证平台;使用不同的猜... 针对SM4算法无法抵御DPA攻击,其功耗数据直接用硬件采集和软件采集都需大量能量迹,成功率低的问题,本文提出在硅前开发阶段使用不同的汉明重量模型对算法进行DPA攻击评估,利用Synopsys的EDA工具开发了相应的实验验证平台;使用不同的猜测密钥来和明文数据来模拟攻击点的输出,攻击拓展后密钥rk,共32位。通过使用多比特汉明重量模型运用到Matlab破解程序中,以首轮S盒的输出作为攻击点,得出初始密钥的低八位rk 0为8′hf9,次低八位rk 1为8′h86等等。结果表明,在硅前开发阶段使用不同的汉明重量模型评估DPA攻击效果避免了软硬件采集过程中获取功耗曲线时间过长却效果不佳的问题,同时验证了开发的软件采集平台的通用效果和准确性能。 展开更多
关键词 SM4 差分功耗攻击 汉明重量 功耗数据采集平台
在线阅读 下载PDF
基于数据挖掘的电力网络非法攻击检测方法
14
作者 朱金庆 陈兴儒 +2 位作者 陈敏 海圆圆 高红 《电子设计工程》 2026年第7期119-124,共6页
电力网络非法攻击手段不断变化,现有方法无法深度准确检测电力网络各种非法攻击行为。为提高电力网络非法攻击检测效果,针对漏洞利用型攻击,以PTES模型的“渗透攻击”阶段为例,提出基于数据挖掘的电力网络非法攻击检测方法。通过采集电... 电力网络非法攻击手段不断变化,现有方法无法深度准确检测电力网络各种非法攻击行为。为提高电力网络非法攻击检测效果,针对漏洞利用型攻击,以PTES模型的“渗透攻击”阶段为例,提出基于数据挖掘的电力网络非法攻击检测方法。通过采集电力网络数据,对电力网络进行预处理,利用受限玻尔兹曼机提取非法攻击行为特征,并采用数据挖掘技术建立电力网络非法攻击检测模型,实现攻击检测。结果表明,该方法能够精准检测不同类型非法攻击行为,提高电力网络安全防护能力。 展开更多
关键词 电力网络 非法攻击 检测分类器 数据挖掘
在线阅读 下载PDF
私有算法密码芯片非入侵式攻击检测框架
15
作者 魏淙洺 王菁 +3 位作者 王安 丁瑶玲 孙绍飞 祝烈煌 《软件学报》 北大核心 2026年第2期894-914,共21页
近年来,密码芯片迅速发展,与此同时也面临着非入侵式攻击的严重威胁.目前已有国内外标准给出了非入侵式攻击检测流程与方法,但这些标准均针对公开算法制定,对于私有算法并不适用,私有算法密码芯片存在着很大的安全隐患.针对这一问题,提... 近年来,密码芯片迅速发展,与此同时也面临着非入侵式攻击的严重威胁.目前已有国内外标准给出了非入侵式攻击检测流程与方法,但这些标准均针对公开算法制定,对于私有算法并不适用,私有算法密码芯片存在着很大的安全隐患.针对这一问题,提出面向私有算法密码芯片的非入侵式攻击检测框架,该框架包含计时分析测试、简单能量/电磁分析测试、差分能量/电磁分析测试3大部分.对于计时分析测试,采用基于平均去噪的计时分析方法,提高所采集时间的可用性.针对简单能量/电磁分析,提出面向私有密码算法的视觉观察法和交叉关联分析方法.针对差分能量/电磁分析,通过TVLA-1和TVLA-2双重检测方法有效检测私有算法密码芯片不同来源的泄露,评估私有算法密码芯片的抗差分能量/电磁攻击能力.该框架是对传统非入侵式攻击检测的有效补充,极大提高了非入侵式攻击检测的检测范围.为了验证该框架的有效性,在多款密码芯片上开展黑盒实验,实验结果表明该框架能够有效检测私有算法密码芯片的抗非入侵式攻击安全性. 展开更多
关键词 非入侵式攻击 私有算法 密码芯片 计时分析 能量分析
在线阅读 下载PDF
考虑潮流和拓扑约束的电力系统虚拟数据注入攻击生成方法
16
作者 凌颖 黎新 +1 位作者 谢铭 董运昌 《电力信息与通信技术》 2026年第1期79-85,共7页
针对传统虚假数据注入攻击将量测值与状态变量间的非线性函数关系近似作为直流模型进行处理,且未考虑交流潮流和不完整拓扑信息的问题,文章提出一种虚拟数据注入攻击(dummy data injection attack,DDIA)生成方法。首先,详细分析交流状... 针对传统虚假数据注入攻击将量测值与状态变量间的非线性函数关系近似作为直流模型进行处理,且未考虑交流潮流和不完整拓扑信息的问题,文章提出一种虚拟数据注入攻击(dummy data injection attack,DDIA)生成方法。首先,详细分析交流状态评估及不良状态检测方法,为后续DDIA生成提供理论依据;其次,提出了计及交流潮流和拓扑约束的DDIA生成方法,并考虑DDIA的虚拟性特征,通过确保量测数据与被攻击数据距离最小的数据点,即可构造被篡改的量测数据;最后,在IEEE 14、IEEE 118和IEEE 300节点系统上进行攻击模拟,结果表明,提出的虚拟数据注入攻击十分隐蔽且对电力系统的稳定运行造成了严重影响。 展开更多
关键词 信息物理系统 虚假数据注入攻击 电力系统 交流潮流 拓扑约束
在线阅读 下载PDF
电力工控网络周期性APT攻击检测方法研究
17
作者 周凯 《自动化应用》 2026年第2期230-232,237,共4页
电力工控网络存在周期性高级持续性威胁(APT)攻击,而强化后的攻击目标常通过单目标判别实现检测,导致检测稳定性降低。为此,提出对电力工控网络周期性APT攻击检测方法。通过引入金字塔机制,提取APT攻击行为特征,增设检测触发机制,放大... 电力工控网络存在周期性高级持续性威胁(APT)攻击,而强化后的攻击目标常通过单目标判别实现检测,导致检测稳定性降低。为此,提出对电力工控网络周期性APT攻击检测方法。通过引入金字塔机制,提取APT攻击行为特征,增设检测触发机制,放大攻击行为特征,实现强化处理。采用多阶段判别标识的方法,在周期性范围内建立目标映射,以强化后的目标作为映射点,实现攻击检测范围覆盖,判别攻击类型,标识攻击位置。采用标识目标近似归约匹配的方式,在电力工控网络更新后,同步匹配与APT类型相同的攻击点,实现同步检测。实验结果表明,所提方法得出的AUC值在1.2~1.4,具有极强的稳定性,检测性能明显提高。 展开更多
关键词 电力工控 电网 周期性 APT攻击 攻击检测 异常识别
在线阅读 下载PDF
热电联合网络中数据传输链路泛洪攻击防御
18
作者 乔溢 李阿妮 《计算机仿真》 2026年第1期142-146,共5页
在热电联合网络环境中,攻击流量与正常流量在概率分布上高度重叠,分类器输出的概率矩阵呈现无序性,使得基于单一分类器的检测模型难以准确量化分类器间的相关性,进而无法有效修正证据,从而影响攻击检测的准确性。因此,提出一种热电联合... 在热电联合网络环境中,攻击流量与正常流量在概率分布上高度重叠,分类器输出的概率矩阵呈现无序性,使得基于单一分类器的检测模型难以准确量化分类器间的相关性,进而无法有效修正证据,从而影响攻击检测的准确性。因此,提出一种热电联合网络数据传输链路泛洪攻击防御方法。计算基分类器输出的原始概率矩阵混乱程度,通过多分类器内修正,消除概率分布偏差。将修正后的概率矩阵通过小波变换转换为信号曲线并进行重构,提取特征构建矩阵。计算特征行间内互信息,量化多分类器之间的相关性,并结合D-S证据理论融合修正证据,完成传输链路泛洪攻击检测。依据热电联合网络数据传输规则动态部署防御节点,实现精准链路泛洪攻击拦截。实验分析表明,所提方法洪攻击防御成功率整体保持在95%以上,泛洪攻击防御性能波动系数保持在0.05以下,具有良好的传输链路泛洪攻击防御性能,能够有效保护热电联合网络数据。 展开更多
关键词 热电联合网络数据 传输链路 泛洪攻击 防御
在线阅读 下载PDF
电网网络安全防护中人工智能技术应用研究
19
作者 魏博文 郭姗姗 《科技资讯》 2026年第2期34-36,共3页
在电网系统日益复杂的环境之下,传统的人工检测和防护手段已难以满足日益增长的网络安全需求。人工智能(Artificial Intelligence,AI)技术具有强大的数据处理和分析能力,能够自动识别异常行为,提高检测的效率和准确性,为电网网络安全提... 在电网系统日益复杂的环境之下,传统的人工检测和防护手段已难以满足日益增长的网络安全需求。人工智能(Artificial Intelligence,AI)技术具有强大的数据处理和分析能力,能够自动识别异常行为,提高检测的效率和准确性,为电网网络安全提供强有力的技术支持。本文对AI技术进行概述,阐述了其在电网网络安全防护中应用的重要性,分析了其在实际电网网络安全防护中应用存在的问题,并提出了有针对性的解决策略,以期为电网网络安全防护提供帮助。 展开更多
关键词 人工智能 电网 网络安全防护 网络攻击
在线阅读 下载PDF
Intrusion Detection System for PS-Poll DoS Attack in 802.11 Networks Using Real Time Discrete Event System 被引量:5
20
作者 Mayank Agarwal Sanketh Purwar +1 位作者 Santosh Biswas Sukumar Nandi 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2017年第4期792-808,共17页
Wi-Fi devices have limited battery life because of which conserving battery life is imperative. The 802.11 Wi-Fi standard provides power management feature that allows stations(STAs) to enter into sleep state to prese... Wi-Fi devices have limited battery life because of which conserving battery life is imperative. The 802.11 Wi-Fi standard provides power management feature that allows stations(STAs) to enter into sleep state to preserve energy without any frame losses. After the STA wakes up, it sends a null data or PS-Poll frame to retrieve frame(s) buffered by the access point(AP), if any during its sleep period. An attacker can launch a power save denial of service(PS-DoS) attack on the sleeping STA(s) by transmitting a spoofed null data or PS-Poll frame(s) to retrieve the buffered frame(s) of the sleeping STA(s) from the AP causing frame losses for the targeted STA(s). Current approaches to prevent or detect the PS-DoS attack require encryption,change in protocol or installation of proprietary hardware. These solutions suffer from expensive setup, maintenance, scalability and deployment issues. The PS-DoS attack does not differ in semantics or statistics under normal and attack circumstances.So signature and anomaly based intrusion detection system(IDS) are unfit to detect the PS-DoS attack. In this paper we propose a timed IDS based on real time discrete event system(RTDES) for detecting PS-DoS attack. The proposed DES based IDS overcomes the drawbacks of existing systems and detects the PS-DoS attack with high accuracy and detection rate. The correctness of the RTDES based IDS is proved by experimenting all possible attack scenarios. 展开更多
关键词 Fault detection and diagnosis intrusion detection system(IDS) null data frame power save attack PS-Poll frame real time discrete event system(DES)
在线阅读 下载PDF
上一页 1 2 31 下一页 到第
使用帮助 返回顶部