期刊文献+
共找到677篇文章
< 1 2 34 >
每页显示 20 50 100
Network Log-Based SSH Brute-Force Attack Detection Model
1
作者 Jeonghoon Park Jinsu Kim +1 位作者 B.B.Gupta Namje Park 《Computers, Materials & Continua》 SCIE EI 2021年第7期887-901,共15页
The rapid advancement of IT technology has enabled the quick discovery,sharing and collection of quality information,but has also increased cyberattacks at a fast pace at the same time.There exists no means to block t... The rapid advancement of IT technology has enabled the quick discovery,sharing and collection of quality information,but has also increased cyberattacks at a fast pace at the same time.There exists no means to block these cyberattacks completely,and all security policies need to consider the possibility of external attacks.Therefore,it is crucial to reduce external attacks through preventative measures.In general,since routers located in the upper part of a firewall can hardly be protected by security systems,they are exposed to numerous unblocked cyberattacks.Routers block unnecessary services and accept necessary ones while taking appropriate measures to reduce vulnerability,block unauthorized access,and generate relevant logs.Most logs created through unauthorized access are caused by SSH brute-force attacks,and therefore IP data of the attack can be collected through the logs.This paper proposes a model to detect SSH brute-force attacks through their logs,collect their IP address,and control access from that IP address.In this paper,we present a model that extracts and fragments the specific data required from the packets of collected routers in order to detect indiscriminate SSH input attacks.To do so,the model multiplies a user’s access records in each packet by weights and adds them to the blacklist according to a final calculated result value.In addition,the model can specify the internal IP of an attack attempt and defend against the first 29 destination IP addresses attempting the attack. 展开更多
关键词 SSH brute-force attack ELK Stack IT infra LOG access control
在线阅读 下载PDF
Real-time trajectory planning for UCAV air-to-surface attack using inverse dynamics optimization method and receding horizon control 被引量:16
2
作者 Zhang Yu Chen Jing Shen Lincheng 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2013年第4期1038-1056,共19页
This paper presents a computationally efficient real-time trajectory planning framework for typical unmanned combat aerial vehicle (UCAV) performing autonomous air-to-surface (A/S) attack. It combines the benefits... This paper presents a computationally efficient real-time trajectory planning framework for typical unmanned combat aerial vehicle (UCAV) performing autonomous air-to-surface (A/S) attack. It combines the benefits of inverse dynamics optimization method and receding horizon optimal control technique. Firstly, the ground attack trajectory planning problem is mathematically formulated as a receding horizon optimal control problem (RHC-OCP). In particular, an approximate elliptic launch acceptable region (LAR) model is proposed to model the critical weapon delivery constraints. Secondly, a planning algorithm based on inverse dynamics optimization, which has high computational efficiency and good convergence properties, is developed to solve the RHCOCP in real-time. Thirdly, in order to improve robustness and adaptivity in a dynamic and uncer- tain environment, a two-degree-of-freedom (2-DOF) receding horizon control architecture is introduced and a regular real-time update strategy is proposed as well, and the real-time feedback can be achieved and the not-converged situations can be handled. Finally, numerical simulations demon- strate the efficiency of this framework, and the results also show that the presented technique is well suited for real-time implementation in dynamic and uncertain environment. 展开更多
关键词 Air-to-surface attack Direct method Inverse dynamics Motion planning Real time control Receding horizon control Trajectory planning Unmanned combat aerial vehicles
原文传递
A CALCULATING METHOD OF THE KILL PROBABILITY ATTACK AREA FOR AAM 被引量:1
3
作者 Li Ting-jie, Liu Run-quan and Wang Chao-zhiBeijing University of Aeronautics and Astronautics Zhu Gu-xiang and Wang Li-zhen014 Center of Ministry of Aeronautics and Astronautics 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 1991年第4期339-346,共8页
This paper provides a calculating method which can be used in calculation of the kill probability attack area for every AAM. At first, attack area of AAM and kill probability of every characteristic point are obtained... This paper provides a calculating method which can be used in calculation of the kill probability attack area for every AAM. At first, attack area of AAM and kill probability of every characteristic point are obtained by combining trajectory calculation with kill probability calculation. Then, coordinates of a fire point relative to standard kill probability value in terms of standardization method are found. At last, equivalent kill probability curve equations are formulated by means of curve fitting method. 展开更多
关键词 A CALCULATING method OF THE KILL PROBABILITY attack AREA FOR AAM area
在线阅读 下载PDF
Research on Detection Method of Interest Flooding Attack on Content Centric Network
4
作者 Yabin Xu Ting Xu Xiaowei Xu 《Computers, Materials & Continua》 SCIE EI 2020年第8期1075-1089,共15页
To improve the attack detection capability of content centric network(CCN),we propose a detection method of interest flooding attack(IFA)making use of the feature of self-similarity of traffic and the information entr... To improve the attack detection capability of content centric network(CCN),we propose a detection method of interest flooding attack(IFA)making use of the feature of self-similarity of traffic and the information entropy of content name of interest packet.On the one hand,taking advantage of the characteristics of self-similarity is very sensitive to traffic changes,calculating the Hurst index of the traffic,to identify initial IFA attacks.On the other hand,according to the randomness of user requests,calculating the information entropy of content name of the interest packets,to detect the severity of the IFA attack,is.Finally,based on the above two aspects,we use the bilateral detection method based on non-parametric CUSUM algorithm to judge the possible attack behavior in CCN.The experimental results show that flooding attack detection method proposed for CCN can not only detect the attack behavior at the early stage of attack in CCN,but also is more accurate and effective than other methods. 展开更多
关键词 CCN interest flooding attack self-similar feature information entropy bilateral detection method
在线阅读 下载PDF
Iterative Dichotomiser Posteriori Method Based Service Attack Detection in Cloud Computing
5
作者 B.Dhiyanesh K.Karthick +1 位作者 R.Radha Anita Venaik 《Computer Systems Science & Engineering》 SCIE EI 2023年第2期1099-1107,共9页
Cloud computing(CC)is an advanced technology that provides access to predictive resources and data sharing.The cloud environment represents the right type regarding cloud usage model ownership,size,and rights to acces... Cloud computing(CC)is an advanced technology that provides access to predictive resources and data sharing.The cloud environment represents the right type regarding cloud usage model ownership,size,and rights to access.It introduces the scope and nature of cloud computing.In recent times,all processes are fed into the system for which consumer data and cache size are required.One of the most security issues in the cloud environment is Distributed Denial of Ser-vice(DDoS)attacks,responsible for cloud server overloading.This proposed sys-tem ID3(Iterative Dichotomiser 3)Maximum Multifactor Dimensionality Posteriori Method(ID3-MMDP)is used to overcome the drawback and a rela-tively simple way to execute and for the detection of(DDoS)attack.First,the pro-posed ID3-MMDP method calls for the resources of the cloud platform and then implements the attack detection technology based on information entropy to detect DDoS attacks.Since because the entropy value can show the discrete or aggregated characteristics of the current data set,it can be used for the detection of abnormal dataflow,User-uploaded data,ID3-MMDP system checks and read risk measurement and processing,bug ratingfile size changes,orfile name changes and changes in the format design of the data size entropy value.Unique properties can be used whenever the program approaches any data error to detect abnormal data services.Finally,the experiment also verifies the DDoS attack detection capability algorithm. 展开更多
关键词 ID3(Iterative dichotomiser 3)maximum multifactor dimensionality posterior method(ID3-MMDP) distributed denial of service(DDoS)attacks detection of abnormal dataflow SK measurement and processing bug ratingfile size
在线阅读 下载PDF
Refined entropy analysis in turbine cascade:A novel loss decomposition method for flow with large separation
6
作者 Junheng WANG Weihao ZHANG +2 位作者 Yufan WANG Dongming HUANG Zhengping ZOU 《Chinese Journal of Aeronautics》 2025年第12期134-147,共14页
To address the deficiency in loss diagnostic methods for turbines working at off-design angles of attack,a novel loss decomposition method suitable for cascade flow with large separation is proposed.The method propose... To address the deficiency in loss diagnostic methods for turbines working at off-design angles of attack,a novel loss decomposition method suitable for cascade flow with large separation is proposed.The method proposed has the following advantages over existing methods:(A)It enables refined loss decomposition for cascade flows,capable of identifying the spatial range of specific regions such as shear layers and backflow regions,thereby obtaining the loss characteristics of these regions.(B)The region identification criteria in this method have clear physical meanings,rather than relying on arbitrary area division.(C)The method has good applicability and is suitable for cascade flows under various angles of attack.Validation shows that this method achieves satisfactory results.Based on this method,the loss mechanisms of a low-pressure turbine cascade at a low Reynolds number of 4.3×10^(4)and angles of attack of-5°,-20°,and-45°are investigated using Large Eddy Simulations(LESs).Entropy analysis quantitatively demonstrates significant differences in the composition of losses among flow regions,due to their different flow characteristics.From the perspective of flow regions,wake loss dominates total loss,while loss in backflow region is negligible.Furthermore,the variation mechanisms of loss with incidence differ among different flow regions. 展开更多
关键词 Entropy analysis Large eddy simulation Loss decomposition method Negative angle of attack Turbine cascade Unsteady aerodynamics
原文传递
拆分学习系统的隐私攻击和防御技术综述
7
作者 刘雅欣 王鹃 +5 位作者 杨梦达 李子昂 易文哲 徐枭洋 陈美会 韦韬 《计算机研究与发展》 北大核心 2026年第3期710-734,共25页
拆分学习是一种新兴的分布式学习技术,其主要思想是将完整的机器学习模型进行拆分,并分别部署于客户端和服务器。在系统的训练和推理过程中,客户端的数据保留在本地,只向服务器传递编码后的中间特征,因此在一定程度上保护了客户端的数... 拆分学习是一种新兴的分布式学习技术,其主要思想是将完整的机器学习模型进行拆分,并分别部署于客户端和服务器。在系统的训练和推理过程中,客户端的数据保留在本地,只向服务器传递编码后的中间特征,因此在一定程度上保护了客户端的数据隐私,同时缓解了模型端侧运行的计算负荷。随着拆分学习技术在多个领域的广泛应用,针对拆分学习系统的各种隐私攻击也层出不穷,攻击者能利用中间特征和分割层的梯度等中间信息重构出用户隐私数据或者推断出其隐私信息,严重危及数据的隐私性。目前,学术界尚缺乏针对拆分学习研究成果的系统性、全面性综述,部分研究将其与联邦学习技术混淆,或总结不够详尽具体。因此,为填补这一空白,需全面总结拆分学习的相关攻击与防御技术,为后续研究发展提供指导。首先介绍拆分学习技术的定义以及其训练和推理过程,并对其多种扩展架构进行概述。随后分析拆分学习系统的威胁模型,并针对拆分学习系统的重构攻击和属性推理、成员推理、标签推理等推理攻击的基本概念、实施阶段和现有方案进行总结归纳。接着总结相应的防御技术,包括异常检测、正则化防御、噪声混淆、对抗性表征学习、特征裁剪等方法。最后探讨拆分学习中隐私安全问题的研究挑战和未来研究方向。 展开更多
关键词 拆分学习 数据隐私 重构攻击 推理攻击 防御方法
在线阅读 下载PDF
基于非定常涡格-涡粒子的开式转子气动噪声预测方法研究
8
作者 陈南树 刘汉儒 +2 位作者 朱磊 贺象 王掩刚 《推进技术》 北大核心 2026年第1期98-115,共18页
开式转子发动机具备高效率、高燃油经济性的优点,然而开式转子叶片巨大的噪声辐射是亟待解决的问题。基于非定常涡格法、涡粒子法和Ffowcs-Williams and Hawkings方程,发展了不依赖于空间体网格的开式转子气动-噪声高效预测方法,引入三... 开式转子发动机具备高效率、高燃油经济性的优点,然而开式转子叶片巨大的噪声辐射是亟待解决的问题。基于非定常涡格法、涡粒子法和Ffowcs-Williams and Hawkings方程,发展了不依赖于空间体网格的开式转子气动-噪声高效预测方法,引入三维普朗特-葛劳渥法则,进行可压缩性修正。针对NASA(National Aeronautics and Space Administration)SR-7A单排开式转子的起飞工况进行了验证计算,气动结果与NASA试验值和商业软件计算值的误差均小于1%,主要单音噪声与总声压级指向性结果预测误差可低至1 dB以内。在同等研究对象和硬件条件下,本文方法计算所需CPU核时低于通用URANS(Unsteady Reynolds-Averaged Navier-Stokes)计算所需的1%。考虑起飞迎角下的周向不均匀来流畸变,系统研究了SR-7A单排转子在0°~20°来流迎角下的气动参数和噪声特性。结果表明,随着来流迎角的增大,转子的时均推力、功率、效率呈现指数增长趋势,转子桨盘内载荷时均值呈现线性增长趋势。转子各项载荷的非定常波动幅值随着迎角的增大而增加。单个叶片的载荷波动峰谷值与运动相位相比存在17°~56°的相位滞后现象,这与噪声周向指向性结果中的偏转非常相关。在0°~20°迎角内,转子上方总声压级从107 dB降低至99 dB,转子下方位置总声压级从107 dB升高至114 dB。此外,来流迎角与桨盘的相互作用会额外导致最高达73 dB的轴频率单音噪声。针对单排转子的噪声源项解耦分析表明,来流迎角对非定常载荷噪声的增益作用非常显著。本文开发的方法可以用较低成本得到开式转子的非定常气动及噪声特性,并且具备多角度的噪声源解耦能力,为未来低噪声开式转子设计提供了有力工具。 展开更多
关键词 开式转子 非定常涡格法 涡粒子法 气动噪声 起飞迎角
原文传递
基于噪声能量检测音频对抗样本
9
作者 冯燕茹 李靖 《计算机应用与软件》 北大核心 2026年第1期210-215,共6页
针对智能语音系统的对抗样本攻击给人工智能应用带来了严重的安全威胁。现有的检测方法均为特定的攻击而设计,难以应对不同的攻击。通过分析信号能量特征,证明对抗音频与原始音频存在能量差异,在此基础上提出一个基于噪声能量的检测模型... 针对智能语音系统的对抗样本攻击给人工智能应用带来了严重的安全威胁。现有的检测方法均为特定的攻击而设计,难以应对不同的攻击。通过分析信号能量特征,证明对抗音频与原始音频存在能量差异,在此基础上提出一个基于噪声能量的检测模型Noise-Energy。实验表明,Noise-Energy模型对CW攻击的检测准确率达到99.5%,对其他多种攻击的准确率均超过98%,表现出较强的鲁棒性和良好的泛化性。 展开更多
关键词 对抗样本 自动语音识别 噪声能量 检测方法
在线阅读 下载PDF
吴勉华教授基于以毒攻毒法应用虫类药治疗慢性癌性疼痛经验
10
作者 朱恒舟 俞心河 +2 位作者 吴艳 杜婉莹 李文婷 《南京中医药大学学报》 北大核心 2026年第2期307-314,共8页
慢性癌性疼痛是癌症患者常见的症状之一,其病机复杂,涉及癌毒、痰瘀互结等多种病理因素。吴勉华教授在长期临床实践中,总结了“以毒攻毒为法,虫类药为用”的特色治法,通过虫类药之毒,携整方之效,直达病灶,破瘀通络,祛毒止痛,有效缓解顽... 慢性癌性疼痛是癌症患者常见的症状之一,其病机复杂,涉及癌毒、痰瘀互结等多种病理因素。吴勉华教授在长期临床实践中,总结了“以毒攻毒为法,虫类药为用”的特色治法,通过虫类药之毒,携整方之效,直达病灶,破瘀通络,祛毒止痛,有效缓解顽固性疼痛。本文从吴勉华教授基于癌毒理论对慢性癌性疼痛的认识出发,探讨以毒攻毒法的理论内涵、作用机制、慢性癌痛的病机特点及辨治原则,并依据癌毒伴随病理因素不同,根据癌性疼痛痰毒、郁毒、瘀毒、虚毒核心病机,选择相应的虫类药物进行治疗。通过系统总结以毒攻毒法运用虫类药的实践经验,进一步拓宽癌毒理论在癌性疼痛治疗中的应用范畴,为中医药干预癌性疼痛提供新的思路与方法。 展开更多
关键词 癌毒理论 以毒攻毒法 虫类药 慢性癌性疼痛 痛证 名医经验 吴勉华
暂未订购
基于BiTCN的无人机指挥控制链路DoS攻击检测方法
11
作者 赵长啸 方玉麟 汪克念 《航空学报》 北大核心 2026年第1期249-265,共17页
无人机指挥控制(C2)链路的开放性使其易遭受非授信攻击,导致无人机失控、坠毁乃至恶意攻击第三方的风险,针对C2链路中拒绝服务(DoS)攻击风险,考虑实际检测数据集缺失条件,提出了一种基于具有多源特征融合能力的双向时间卷积网络(BiTCN)... 无人机指挥控制(C2)链路的开放性使其易遭受非授信攻击,导致无人机失控、坠毁乃至恶意攻击第三方的风险,针对C2链路中拒绝服务(DoS)攻击风险,考虑实际检测数据集缺失条件,提出了一种基于具有多源特征融合能力的双向时间卷积网络(BiTCN)的攻击检测方法,基于网络数据与物理数据的信息特征融合构建检测数据集,通过时间戳对齐与前向填充,解决网络与物理数据的异步问题;实验基于完整数据集和数据缺失率为5%、15%、30%、40%、50%的数据集展开,利用BiTCN模型通过双向机制捕捉数据的前后文信息,完成特征提取和分类,实现对DoS攻击的检测。将所提方法在真实无人机攻击数据集上进行验证,结果表明:与纯网络数据和纯物理数据检测模型相比,该方法准确率(97.8%)、召回率(95.9%)、F1分数(97.8%)和AUC(0.997)均优于单一维度数据检测模型;与传统FNN、1D-CNN、LSTM、GRU检测模型相比,即使在40%的数据缺失情况下,所提方法仍能保持较高检测精度。 展开更多
关键词 无人机C2链路 DOS攻击检测 双向时间卷积网络 网络数据与物理数据融合 攻击检测方法
原文传递
虚假数据注入攻击下直流微电网分布式弹性控制
12
作者 邰源政 孟范伟 张煜 《东北大学学报(自然科学版)》 北大核心 2026年第1期67-74,81,共9页
针对直流微电网在虚假数据注入攻击下出现电压偏差和电流分配失衡的问题,以多分布式电源的孤岛直流微电网为研究对象,提出一种分布式弹性协同控制方法.该方法能有效消除虚假数据注入攻击的影响,在正常情况下也不会干扰到系统的运行.通过... 针对直流微电网在虚假数据注入攻击下出现电压偏差和电流分配失衡的问题,以多分布式电源的孤岛直流微电网为研究对象,提出一种分布式弹性协同控制方法.该方法能有效消除虚假数据注入攻击的影响,在正常情况下也不会干扰到系统的运行.通过Lyapunov稳定理论证明了直流微电网在受到任意常值虚假数据注入攻击时均能保证正常稳定运行,实现电压调控和电流分配2个控制目标.利用MATLAB/Simulink搭建了仿真模型,验证了该控制方法的有效性. 展开更多
关键词 直流微电网 虚假数据注入攻击 分布式二次控制 弹性控制方法 电压调控 电流分配
在线阅读 下载PDF
云端存储数据未知密钥共享攻击忆阻神经网络检测方法
13
作者 徐小林 王轶群 李春辉 《微型电脑应用》 2026年第1期230-234,共5页
针对云端存储数据在访问与传输过程中面临的未知秘钥共享攻击威胁,提出一种忆阻神经网络检测方法。利用数据转化系统,将云端数据格式化为忆阻神经网络可处理的输入,并利用忆阻器的忆阻突触权值计算与尖峰时间依赖可塑性(STDP)学习规则... 针对云端存储数据在访问与传输过程中面临的未知秘钥共享攻击威胁,提出一种忆阻神经网络检测方法。利用数据转化系统,将云端数据格式化为忆阻神经网络可处理的输入,并利用忆阻器的忆阻突触权值计算与尖峰时间依赖可塑性(STDP)学习规则动态调整,模拟生物神经系统的复杂行为,精准捕捉数据受攻击时的特征模式。构建忆阻神经网络中的十字交叉阵列卷积结构,结合不断优化的突触权值更新卷积核,迭代强化检测能力。实验结果显示,所提出的方法在检测未知秘钥共享攻击时,实现了低遗漏率与低误报率(均小于5次),在待检测数据总数量最大为3000个时,所提出的方法的遗漏率为0.17%,误报率为0.10%。因此,所提出的方法有效降低了检测未知密钥共享攻击的遗漏率和误报率,并提高了检测精度,为云端存储数据的安全传输提供了强有力的技术保障。 展开更多
关键词 云端存储数据 未知密钥共享攻击 忆阻神经网络 攻击检测方法
在线阅读 下载PDF
Hybrid hierarchical trajectory planning for a fixed-wing UCAV performing air-to-surface multi-target attack 被引量:5
14
作者 Yu Zhang Jing Chen Lincheng Shen 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2012年第4期536-552,共17页
This paper considers the problem of generating a flight trajectory for a single fixed-wing unmanned combat aerial vehicle (UCAV) performing an air-to-surface multi-target attack (A/SMTA) mission using satellite-gu... This paper considers the problem of generating a flight trajectory for a single fixed-wing unmanned combat aerial vehicle (UCAV) performing an air-to-surface multi-target attack (A/SMTA) mission using satellite-guided bombs. First, this problem is formulated as a variant of the traveling salesman problem (TSP), called the dynamic-constrained TSP with neighborhoods (DCT- SPN). Then, a hierarchical hybrid approach, which partitions the planning algorithm into a roadmap planning layer and an optimal control layer, is proposed to solve the DCTSPN. In the roadmap planning layer, a novel algorithm based on an updatable proba- bilistic roadmap (PRM) is presented, which operates by randomly sampling a finite set of vehicle states from continuous state space in order to reduce the complicated trajectory planning problem to planning on a finite directed graph. In the optimal control layer, a collision-free state-to-state trajectory planner based on the Gauss pseudospectral method is developed, which can generate both dynamically feasible and optimal flight trajectories. The entire process of solving a DCTSPN consists of two phases. First, in the offline preprocessing phase, the algorithm constructs a PRM, and then converts the original problem into a standard asymmet- ric TSP (ATSP). Second, in the online querying phase, the costs of directed edges in PRM are updated first, and a fast heuristic searching algorithm is then used to solve the ATSP. Numerical experiments indicate that the algorithm proposed in this paper can generate both feasible and near-optimal solutions quickly for online purposes. 展开更多
关键词 hierarchical trajectory planning air-to-surface multi-target attack (A/SMTA) traveling salesman problem (TSP) proba-bilistic roadmap Gauss pseudospectral method unmanned com-bat aerial vehicle (UCAV).
在线阅读 下载PDF
Introduction of firefighting methods in U.S. underground mines 被引量:1
15
作者 ZHANG Xi-chen ZHANG Yu-tao Jerry C. Tien 《西安科技大学学报》 CAS 北大核心 2011年第6期672-678,697,共8页
Underground mine fire always exists since the mining activity was practiced.It poses a severe safety hazard to the mine workers and may also cause a tremendous economic loss to the mines.Methods for controlling and ex... Underground mine fire always exists since the mining activity was practiced.It poses a severe safety hazard to the mine workers and may also cause a tremendous economic loss to the mines.Methods for controlling and extinguishing fires in underground mine have long been studied and there have been significant improvements.In order to know clearly about the firefighting technology used,this paper summarizes most of the underground mine firefighting methods used in the United States the past 150 years.This paper describes not only the accepted firefighting theories,but also the technologies,both direct and indirect attacking,in accordance to regulations or codes,with special attention is given to the indirect attack method and its related technologies.Further research needed is also briefly discussed at the end of this paper. 展开更多
关键词 FIREFIGHTING extinguishing agent attack method remote sealing
在线阅读 下载PDF
XMAM:X-raying models with a matrix to reveal backdoor attacks for federated learning 被引量:1
16
作者 Jianyi Zhang Fangjiao Zhang +3 位作者 Qichao Jin Zhiqiang Wang Xiaodong Lin Xiali Hei 《Digital Communications and Networks》 SCIE CSCD 2024年第4期1154-1167,共14页
Federated Learning(FL),a burgeoning technology,has received increasing attention due to its privacy protection capability.However,the base algorithm FedAvg is vulnerable when it suffers from so-called backdoor attacks... Federated Learning(FL),a burgeoning technology,has received increasing attention due to its privacy protection capability.However,the base algorithm FedAvg is vulnerable when it suffers from so-called backdoor attacks.Former researchers proposed several robust aggregation methods.Unfortunately,due to the hidden characteristic of backdoor attacks,many of these aggregation methods are unable to defend against backdoor attacks.What's more,the attackers recently have proposed some hiding methods that further improve backdoor attacks'stealthiness,making all the existing robust aggregation methods fail.To tackle the threat of backdoor attacks,we propose a new aggregation method,X-raying Models with A Matrix(XMAM),to reveal the malicious local model updates submitted by the backdoor attackers.Since we observe that the output of the Softmax layer exhibits distinguishable patterns between malicious and benign updates,unlike the existing aggregation algorithms,we focus on the Softmax layer's output in which the backdoor attackers are difficult to hide their malicious behavior.Specifically,like medical X-ray examinations,we investigate the collected local model updates by using a matrix as an input to get their Softmax layer's outputs.Then,we preclude updates whose outputs are abnormal by clustering.Without any training dataset in the server,the extensive evaluations show that our XMAM can effectively distinguish malicious local model updates from benign ones.For instance,when other methods fail to defend against the backdoor attacks at no more than 20%malicious clients,our method can tolerate 45%malicious clients in the black-box mode and about 30%in Projected Gradient Descent(PGD)mode.Besides,under adaptive attacks,the results demonstrate that XMAM can still complete the global model training task even when there are 40%malicious clients.Finally,we analyze our method's screening complexity and compare the real screening time with other methods.The results show that XMAM is about 10–10000 times faster than the existing methods. 展开更多
关键词 Federated learning Backdoor attacks Aggregation methods
在线阅读 下载PDF
GPS Spoofing Attack Detection in Smart Grids Based on Improved CapsNet 被引量:1
17
作者 Yuancheng Li Shanshan Yang 《China Communications》 SCIE CSCD 2021年第3期174-186,共13页
This paper analyzes the influence of the global positionong system(GPS)spoofing attack(GSA)on phasor measurement units(PMU)measurements.We propose a detection method based on improved Capsule Neural Network(CapsNet)to... This paper analyzes the influence of the global positionong system(GPS)spoofing attack(GSA)on phasor measurement units(PMU)measurements.We propose a detection method based on improved Capsule Neural Network(CapsNet)to handle this attack.In the improved CapsNet,the gated recurrent unit(GRU)is added to the front of the full connection layer of the CapsNet.The improved CapsNet trains and updates the network parameters according to the historical measurements of the smart grid.The detection method uses different structures to extract the temporal and spatial features of the measurements simultaneously,which can accurately distinguish the attacked data from the normal data,to improve the detection accuracy.Finally,simulation experiments are carried out on IEEE 14-,IEEE 118-bus systems.The experimental results show that compared with other detection methods,our method is proved to be more efficient. 展开更多
关键词 smart grid detection method improved capsule neural network phasor measurement units global positioning system spoofing attack
在线阅读 下载PDF
Multiple attacks on virtualization-based security monitoring
18
作者 闫广禄 罗森林 +1 位作者 韦伟 潘丽敏 《Journal of Beijing Institute of Technology》 EI CAS 2016年第2期254-263,共10页
Three kinds of vulnerabilities that may exist in some of current virtualization-based security monitoring systems were proposed: page mapping problem,lack of overall protection,and inherent limitations. Aiming at the... Three kinds of vulnerabilities that may exist in some of current virtualization-based security monitoring systems were proposed: page mapping problem,lack of overall protection,and inherent limitations. Aiming at these vulnerabilities,relative attack methods were presented in detail. Our experiments show that the attack methods,such as page mapping attack,data attack,and non-behavior detection attack,can attack simulated or original security monitors successfully. Defenders,who need to effectively strengthen their security monitors,can get an inspiration from these attack methods and find some appropriate solutions. 展开更多
关键词 VIRTUALIZATION VULNERABILITY attack method security threat virtual machine monitor
在线阅读 下载PDF
COMPUTATION OF FIELD STRUCTURE AND AERODYNAMIC CHARACTERISTICS OF DELTA WINGS AT HIGH ANGLES OF ATTACK
19
作者 杨立芝 高正红 《Applied Mathematics and Mechanics(English Edition)》 SCIE EI 2005年第6期797-806,共10页
A numerical investigation of the structure of the vortical flowfield over delta wings at high angles of attack in longitudinal and with small sideslip angle is presented. Three-dimensional Navier-Stokes numerical simu... A numerical investigation of the structure of the vortical flowfield over delta wings at high angles of attack in longitudinal and with small sideslip angle is presented. Three-dimensional Navier-Stokes numerical simulations were carried out to predict the complex leeward-side flowfield characteristics that are dominated by the effect of the breakdown of the leading-edge vortices. The methods that analyze the flowfield structure quantitatively were given by using flowfield data from the computational results. In the region before the vortex breakdown, the vortex axes are approximated as being straight line. As the angle of attack increases, the vortex axes are closer to the root chord, and farther away from the wing surface. Along the vortex axes, as the adverse pressure gradients occur, the axial velocity decreases, that is, A is negativee, so the vortex is unstable, and it is possible to breakdown. The occurrence of the breakdown results in the instability of lateral motion for a delta wing, and the lateral moment diverges after a small perturbation occurs at high angles of attack. However, after a critical angle of attack is reached the vortices breakdown completely at the wing apex, and the instability resulting from the vortex breakdown disappears. 展开更多
关键词 computational method high angle of attack vortex flow
在线阅读 下载PDF
Access Control Attacks on PLC Vulnerabilities
20
作者 Yong Wang Jinyong Liu +3 位作者 Can Yang Lin Zhou Shuangfei Li Zhaoyan Xu 《Journal of Computer and Communications》 2018年第11期311-325,共15页
In Industrial Control Systems (ICS), security issues are getting more and more attention. The number of hacking attacks per year is endless, and the attacks on industrial control systems are numerous. Programmable Log... In Industrial Control Systems (ICS), security issues are getting more and more attention. The number of hacking attacks per year is endless, and the attacks on industrial control systems are numerous. Programmable Logic Controller (PLC) is one of the main controllers of industrial processes. Since the industrial control system network is isolated from the external network, many people think that PLC is a safety device. However, virus attacks in recent years, such as Stuxnet, have confirmed the erroneousness of this idea. In this paper, we use the vulnerability of Siemens PLC to carry out a series of attacks, such as S7-200, S7-300, S7-400, S7-1200 and so on. We read the data from the PLC output and then rewrite the data and write it to the PLC. We tamper with the writing of data to achieve communication chaos. When we attack the primary station, all slave devices connected to the primary station will be in a state of communication confusion. The attack methods of us can cause delay or even loss of data in the communications from the Phasor Data Concentrator (PMU) to the data concentrator. The most important thing is that our attack method generates small traffic and short attack time, which is difficult to be identified by traditional detection methods. 展开更多
关键词 ICS PLC PMU Data Tampering Delay attack methods
暂未订购
上一页 1 2 34 下一页 到第
使用帮助 返回顶部