期刊文献+
共找到555篇文章
< 1 2 28 >
每页显示 20 50 100
面向HTTP/2流量多路复用特征的加密视频识别方法
1
作者 吴桦 罗浩 +3 位作者 赵士顺 刘嵩涛 程光 胡晓艳 《软件学报》 北大核心 2025年第7期3375-3404,共30页
视频应用平台的兴起使得视频得以快速传播并渗透社会生活的各个方面.网络中传播的视频也混杂了一些公害视频,因此网络空间安全监管迫切需要准确地识别网络中加密传播的公害视频.已有方法在网络主要接入点采集流量数据,提取加密视频流量... 视频应用平台的兴起使得视频得以快速传播并渗透社会生活的各个方面.网络中传播的视频也混杂了一些公害视频,因此网络空间安全监管迫切需要准确地识别网络中加密传播的公害视频.已有方法在网络主要接入点采集流量数据,提取加密视频流量的特征,基于公害视频库,通过流量特征的匹配识别出被传输的公害视频.然而随着视频加密传输协议的更新,使用新型多路复用技术的HTTP/2协议已经大规模部署应用,这导致传统的基于HTTP/1.1传输特征的流量分析方法无法识别使用HTTP/2传输的加密视频.此外,当前的研究大多针对的是播放时分辨率固定的视频,很少考虑到流媒体自适应播放时分辨率切换给识别带来的影响.针对以上问题,详细分析了视频平台使用HTTP/2协议传输视频时音视频数据长度发生偏移的原理,并提出了将多路复用的加密数据精准修正还原为组合音视频数据单元长度的方法,从而构建出精准还原的加密视频修正指纹.然后,利用加密视频修正指纹和大型视频明文指纹库,提出了视频修正指纹滑动匹配机制和以隐马尔可夫模型与维特比算法为基础的加密视频识别模型.该模型使用动态规划方法解决了视频分辨率自适应切换带来的问题,其在40万级的Facebook和Instagram真实指纹库场景中,对固定分辨率和自适应分辨率的加密视频的识别准确率分别达到了98.41%和97.91%.使用Triller、Twitter和芒果TV这3个视频平台进行了方法通用性和泛化性验证.与类似工作在识别效果、泛化性和时间开销方面的比较进一步验证了所提出的方法具有较高的应用价值. 展开更多
关键词 http/2 DASH 大型数据集 修正指纹 HMM 加密视频识别
在线阅读 下载PDF
Real-life practice of Kelleni’s protocol in treatment and post exposure prophylaxis of SARS-CoV-2 HV.1 and JN.1 subvariants
2
作者 Mina Thabet Kelleni 《World Journal of Virology》 2025年第3期1-5,共5页
This article discusses the evolving real-world practice using nitazoxanide,nonsteroidal anti-inflammatory drugs(NSAIDs)and/or azithromycin(Kelleni’s protocol)to manage the evolving manifestations of severe acute resp... This article discusses the evolving real-world practice using nitazoxanide,nonsteroidal anti-inflammatory drugs(NSAIDs)and/or azithromycin(Kelleni’s protocol)to manage the evolving manifestations of severe acute respiratory syndrome coronavirus 2(SARS-CoV-2)Omicron EG.5.1,its descendant HV.1 as well as BA.2.86 and its descendant JN.1 subvariants in Egypt in 2024.These subvariants are well-known for their highly evolved immune-evasive properties and the manifestations include some peculiar manifestations as persistent cough besides high fever in young children as well as high fever,persistent severe cough,change of voice,loss of taste and smell,epigastric pain,nausea,vomiting,diarrhea,generalized malaise and marked bone aches in adults including the high-risk groups.It’s suggested that the ongoing SARS-CoV-2 evolution is continuing to mostly affect the high-risk groups of patients,to some of whom we’ve also successfully prescribed nitazoxanide and/or NSAIDs for post-exposure prophylaxis of all household contacts.We also continue to recommend starting the immune-modulatory antiviral Kelleni’s protocol as soon as possible in the course of infection and adjusting it in a personalized manner to be more aggressive from the beginning for the high risk patients,at least until the currently encountered surge of infections subsides. 展开更多
关键词 SARS-CoV-2 HV.1 JN.1 Post exposure prophylaxis Kelleni’s protocol NITAZOXANIDE Non-steroidal anti-inflammatory drugs
暂未订购
基于HTTP/2的移动流媒体QoE优化策略
3
作者 葛志辉 白轩瑜 李陶深 《广西大学学报(自然科学版)》 CAS 北大核心 2020年第6期1396-1403,共8页
为了提高移动流媒体应用用户的体验质量(QoE),提出了基于HTTP/2的QoE模型,该模型综合考虑了移动设备剩余电量、网络状态、视频质量高低对QoE的影响,并提出了基于HTTP/2和移动设备应用场景的码率控制策略(CSHAS),避免了在HTTP/2下客户端... 为了提高移动流媒体应用用户的体验质量(QoE),提出了基于HTTP/2的QoE模型,该模型综合考虑了移动设备剩余电量、网络状态、视频质量高低对QoE的影响,并提出了基于HTTP/2和移动设备应用场景的码率控制策略(CSHAS),避免了在HTTP/2下客户端使用流推送时消耗移动设备过多电量的问题,实现了视频质量和剩余电量的平衡,提高了用户QoE。 展开更多
关键词 http/2 移动流媒体 QOE 剩余电量
在线阅读 下载PDF
基于HTTP的P2P流媒体直播系统构建 被引量:2
4
作者 郑艺芳 《长沙大学学报》 2012年第2期43-46,共4页
P2P技术在音视频直播中的应用,可以极大降低中心服务器的压力,为用户提供良好的服务体验,是新一代内容分发的核心技术.基于HTTP流媒体协议构建的P2P直播系统,可以使P2P终端具有更好的网络适应性;其中HTTP流媒体协议的切片技术,有利于P2... P2P技术在音视频直播中的应用,可以极大降低中心服务器的压力,为用户提供良好的服务体验,是新一代内容分发的核心技术.基于HTTP流媒体协议构建的P2P直播系统,可以使P2P终端具有更好的网络适应性;其中HTTP流媒体协议的切片技术,有利于P2P网络中资源的定位和查询,比起传统的P2P协议,更加适合专用网络中的音视频直播服务构建. 展开更多
关键词 http流直播 P2P 流媒体
在线阅读 下载PDF
一种基于HTTP/2协议的隐蔽序列信道方法 被引量:7
5
作者 刘政祎 嵩天 《计算机研究与发展》 EI CSCD 北大核心 2018年第6期1157-1166,共10页
隐蔽通信技术能够为使用者提供有效保证隐私安全的数据传输服务.现有存储类隐蔽信道一直存在隐蔽安全性疑问,而时间类信道较多选择网络及以下层协议作为载体,需额外提供复杂编码方法以降低误码率,且难以提供足够的传输速率.以新一代应... 隐蔽通信技术能够为使用者提供有效保证隐私安全的数据传输服务.现有存储类隐蔽信道一直存在隐蔽安全性疑问,而时间类信道较多选择网络及以下层协议作为载体,需额外提供复杂编码方法以降低误码率,且难以提供足够的传输速率.以新一代应用层协议HTTP/2为基础,提出了一种新的隐蔽信道方法——H2CSC.该方法通过控制HTTP/2协议服务器响应的数据传输过程,通过修改待发送数据帧的发送顺序,使用组合数学编码方法在数据帧序列中隐蔽消息,充分利用了HTTP/2协议提供信道可靠性及安全性.H2CSC方法在广泛使用的Apache Web服务器中以功能模块形式予以实现,并通过真实系统对该方法的有效性和可靠性进行测试,使用基于修正条件熵的逻辑回归分类检测方法进行安全性测试.实验证明:H2CSC方法能够达到574bps的隐蔽通信速度,具有较高的健壮性和隐蔽性. 展开更多
关键词 隐蔽信道 http/2协议 数据帧序列 组合数学编码方法 修正条件熵
在线阅读 下载PDF
HTTP/2新特性与Web性能关系的研究与实验 被引量:5
6
作者 许兆伟 王颖 《计算机技术与发展》 2017年第11期192-195,共4页
Web服务是Internet上使用最广泛的服务,而Web服务的基础HTTP协议也一直不断在发展。随着互联网的迅速发展,当前协议的主要版本HTTP/1.1已经不能满足用户和开发者对响应速度和协议性能的需求。HTTP/2即超文本传输协议第二个版本还未普及... Web服务是Internet上使用最广泛的服务,而Web服务的基础HTTP协议也一直不断在发展。随着互联网的迅速发展,当前协议的主要版本HTTP/1.1已经不能满足用户和开发者对响应速度和协议性能的需求。HTTP/2即超文本传输协议第二个版本还未普及。HTTP/2的主要目标是改进传输性能,实现低延迟和高吞吐量,致力于突破上一代的性能限制。对HTTP协议的发展历史进行了介绍,并对每个协议进行了分析与研究,着重分析了HTTP/1.1协议的设计缺陷。重点阐述了对HTTP/2的新特性以及其工作原理,以及如何改善HTTP/1.1协议连接利用率低、相同字段内容重复传输等缺陷。并设计了在不同网络协议环境下页面加载时间的对比实验,最终得出实验数据。实验结果表明,HTTP/2可以带来Web性能的提升,有助于改善互联网用户体验。 展开更多
关键词 http/1.1协议 http/2协议 SPDY协议 WEB性能
在线阅读 下载PDF
异构多网HTTP/2能量成本控制视频流传输模型 被引量:1
7
作者 翁壮 王普 《计算机工程与设计》 北大核心 2018年第1期5-10,48,共7页
考虑异构无线网和成本约束下的移动设备能源消耗,提出异构网络HTTP/2能量成本控制的多网视频流传输模型。相对于传统流媒体自适应模型,增加参数控制单元、跨层网络监控单元和重新排序单元,采用HTTP/2传输协议,设计视频流传输模型,实现... 考虑异构无线网和成本约束下的移动设备能源消耗,提出异构网络HTTP/2能量成本控制的多网视频流传输模型。相对于传统流媒体自适应模型,增加参数控制单元、跨层网络监控单元和重新排序单元,采用HTTP/2传输协议,设计视频流传输模型,实现多无线网络视频段传输;为降低设备能耗,设计HTTP/2协议下的能量成本函数,对模型参数选取过程进行设计。仿真结果表明,所提模型具有更高视频加载效率和能量节省能力,对数据丢包具有抑制能力。 展开更多
关键词 异构网络 http/2协议 视频流 成本控制 多网传输
在线阅读 下载PDF
在基于J2EE架构的网站中集成HTTP代理的设计与实现 被引量:4
8
作者 史承毅 《计算机应用》 CSCD 北大核心 2011年第A01期27-29,共3页
提出了一种在服务器上存在基于J2EE网站的情况下,将HTTP代理服务集成于网站的方案。相对于传统的HTTP代理服务,用该设计方法实现的HTTP代理,无需在浏览器客户端进行设置且不另外多开端口,提高了用户体验,同时降低了服务器安全风险。
关键词 http代理 集成 HTML解析 J2EE 网络管理
在线阅读 下载PDF
基于HTTP/2协议分析的网站挂马线索调查方法研究 被引量:1
9
作者 刘猛猛 徐国天 程斌 《警察技术》 2022年第2期41-45,共5页
当被挂马网站采用HTTP/2协议时,办案人员无法对加密传输的通信数据进行有效分析,影响了网站挂马案件调查分析工作的开展。针对这一问题,提出一种基于主机内部调查和网络信息监听的木马线索调查方法,在染毒计算机上浏览疑似被挂马的HTTP/... 当被挂马网站采用HTTP/2协议时,办案人员无法对加密传输的通信数据进行有效分析,影响了网站挂马案件调查分析工作的开展。针对这一问题,提出一种基于主机内部调查和网络信息监听的木马线索调查方法,在染毒计算机上浏览疑似被挂马的HTTP/2网站,对比浏览前后进程和网络连接变化情况,初步筛选出木马程序,再使用Wireshark捕获并解密通信数据,还原木马程序,结合数据包中的Referer字段分析,确定木马感染计算机的完整过程,找到网站被挂马的具体位置,提取相应恶意代码。实验结果表明,应用提出的方法可以准确还原木马程序和木马传播链条,分析出网站被挂马位置,确定黑客端相关信息。 展开更多
关键词 http/2 网站挂马 调查 WIRESHARK Referer
在线阅读 下载PDF
Mathematical Model Validation of Search Protocols in MP2P Networks 被引量:1
10
作者 Ajay Arunachalam Vinayakumar Ravi +2 位作者 Moez Krichen Roobaea Alroobaea Saeed Rubaiee 《Computers, Materials & Continua》 SCIE EI 2021年第8期1807-1829,共23页
Broadcasting is a basic technique in Mobile ad-hoc network(MANET),and it refers to sending a packet from one node to every other node within the transmission range.Flooding is a type of broadcast where the received pa... Broadcasting is a basic technique in Mobile ad-hoc network(MANET),and it refers to sending a packet from one node to every other node within the transmission range.Flooding is a type of broadcast where the received packet is retransmitted once by every node.The naive flooding technique,floods the network with query messages,while the random walk technique operates by contacting the subsets of every node’s neighbors at each step,thereby restricting the search space.One of the key challenges in an ad-hoc network is the resource or content discovery problem which is about locating the queried resource.Many earlier works have mainly focused on the simulation-based analysis of flooding,and its variants under a wired network.Although,there have been some empirical studies in peer-to-peer(P2P)networks,the analytical results are still lacking,especially in the context of P2P systems running over MANET.In this paper,we describe how P2P resource discovery protocols perform badly over MANETs.To address the limitations,we propose a new protocol named ABRW(Address Broadcast Random Walk),which is a lightweight search approach,designed considering the underlay topology aimed to better suit the unstructured architecture.We provide the mathematical model,measuring the performance of our proposed search scheme with different widely popular benchmarked search techniques.Further,we also derive three relevant search performance metrics,i.e.,mean no.of steps needed to find a resource,the probability of finding a resource,and the mean no.of message overhead.We validated the analytical expressions through simulations.The simulation results closely matched with our analyticalmodel,justifying our findings.Our proposed search algorithm under such highly dynamic self-evolving networks performed better,as it reduced the search latency,decreased the overall message overhead,and still equally had a good success rate. 展开更多
关键词 Search protocols random walk MANET P2P networks P2P MANET mathematical model peer-to-peer wireless ad hoc network FLOODING mobile P2P UNSTRUCTURED P2P NS-2 network simulator
在线阅读 下载PDF
基于卷积神经网络的5G网络HTTP/2协议低速DoS识别方法
11
作者 张奕鸣 刘彩霞 +2 位作者 刘树新 潘菲 石灏苒 《信息工程大学学报》 2022年第4期392-401,共10页
当前,为满足多种应用场景的各项指标需求,5G网络引入HTTP/2协议以提高网络功能数据传输速率和并发能力,然而针对HTTP/2协议的低速DoS攻击具有流量峰值低、攻击过程隐蔽等特点,严重威胁网络安全。通过分析现有低速DoS攻击原理和识别算法... 当前,为满足多种应用场景的各项指标需求,5G网络引入HTTP/2协议以提高网络功能数据传输速率和并发能力,然而针对HTTP/2协议的低速DoS攻击具有流量峰值低、攻击过程隐蔽等特点,严重威胁网络安全。通过分析现有低速DoS攻击原理和识别算法的不足,提出一种基于卷积神经网络的HTTP/2协议低速DoS识别方法。首先,提取HTTP/2控制帧字节级别数据构建流量特征灰度图;其次,设计具有卷积计算、池化降维和全连接dropout的卷积神经网络,并将特征灰度图输入到神经网络中训练调优;最后,将训练好的模型用于低速DoS流量识别。仿真结果表明,所提方法在分类准确性、泛化性等方面优于现有识别分类算法,为5G网络安全提供更好的防护。 展开更多
关键词 5G网络 http/2协议 卷积神经网络 低速DoS
在线阅读 下载PDF
Research on a Secure Communication Protocol Based on National Secret SM2 Algorithm 被引量:1
12
作者 Youhai Shao Yong Wang +1 位作者 Yun Yang Xiang Wang 《Journal of Computer and Communications》 2022年第1期42-56,共15页
Most of the public key algorithms used in the exchange of information for power data transmission protocols are RSA. The core of the key part of this kind of algorithm system has not been announced. For the domestic s... Most of the public key algorithms used in the exchange of information for power data transmission protocols are RSA. The core of the key part of this kind of algorithm system has not been announced. For the domestic sensitive information data field, there are threats such as preset backdoors and security vulnerabilities. In response to the above problems, the article introduces a secure communication protocol based on the optimized Secret SM2 algorithm, which uses socket programming to achieve two-way encrypted communication between clients and services, and is able to complete the security protection of data encryption transmission, authentication, data tampering, etc., and proves through experiments that the security protocol is more secure than traditional methods, can effectively identify each other, carry out stable and controllable data encryption transmission, and has good applicability. 展开更多
关键词 Secret Algorithm SM2 Communication protocol Hybrid Encryption Security Protection
在线阅读 下载PDF
加密HTTP/2流中网页对象的识别研究
13
作者 石健 马子扬 唐屹 《电脑知识与技术》 2018年第7Z期190-191,207,共3页
伴随着HTTP/2协议的到来,加密网页也越来越广泛地应用于互联网。对加密网页的流量分析,有助于帮助网络安全管理人员实现特定网页的访问识定位,网页识别基于网页对象大小的识别,现有的网页对象识别基于网络包的头部信息字段,这种特征抽... 伴随着HTTP/2协议的到来,加密网页也越来越广泛地应用于互联网。对加密网页的流量分析,有助于帮助网络安全管理人员实现特定网页的访问识定位,网页识别基于网页对象大小的识别,现有的网页对象识别基于网络包的头部信息字段,这种特征抽取模式并不适用于利用HTTP/2协议的数据包。该文基于TLS协议,设计实现一个识别HTTP/2传输的网页对象的方法,有助于进一步设计针对HTTP/2的流量分析方法。 展开更多
关键词 流量分析 网页识别 网页对象 http/2 TLS
在线阅读 下载PDF
3D (Three-Dimensional) Caco-2 Spheroids: Optimized in vitro Protocols to Favor Their Differentiation Process and to Analyze Their Cell Growth Behavior 被引量:1
14
作者 Gabriella Rainaldi Alessandra Boe Sandra Gessani 《Journal of Pharmacy and Pharmacology》 2016年第7期341-350,共10页
3D (Three-dimensional) Caco-2 spheroids closely recapitulating in vivo physiological organization of intestinal epithelial cells, provide an excellent in vitro model system to study their pathophysiology and their r... 3D (Three-dimensional) Caco-2 spheroids closely recapitulating in vivo physiological organization of intestinal epithelial cells, provide an excellent in vitro model system to study their pathophysiology and their response to stressful stimuli. The objective of this technical note is to provide optimized in vitro experimental protocols for culturing 3D Caco-2 spheroids and for analyzing their cell growth features. An optimized 3D Caco-2 spheroid culturing technique based on a new configuration of the culture medium is provided A methodological approach to determine the distribution of the cell cycle phases in disaggregated Caco-2 spheroids by using cytofluorimetric analysis is also described. The optimized culturing protocol favors 3D Caco-2 spheroid differentiation process, as evaluated by the number of well-differentiated spheroids with a single hollow lumen. The cytofluorimetric analysis allows rapid collection of cell cycle phase data from high numbers of spheroid samples, thus, permitting to estimate their growth dynamics in a relatively short time. The optimized technical approaches described here can be applied in systematic manner to a variety of research activities utilizing 3D Caco-2 spheroids. Ease of use, time and economic saving advantages deriving from these protocols further highlight their potential. 展开更多
关键词 3D multicellular spheroids 3D intestinal epithelial spheroids 3D Caco-2 spheroid culture systems optimizedexperimental protocols.
在线阅读 下载PDF
An Optimization of HTTP/2 for Mobile Applications
15
作者 DONG Zhenjiang SHUANG Kai +2 位作者 CAI Yanan WANG Wei LI Congbing 《ZTE Communications》 2016年第B12期35-42,共8页
In recent years, Hyper Text Transfer Protocol (HTTP) spreads quickly and steadily in the usage of mobile applications as a common web protocol, so that the mobile applications can also benefit from HTTP/2, which is ... In recent years, Hyper Text Transfer Protocol (HTTP) spreads quickly and steadily in the usage of mobile applications as a common web protocol, so that the mobile applications can also benefit from HTTP/2, which is the new version of HTTP based on SPDY developed by Google to speed up the Internet transmission speed. HTTP/2 enables a more efficient use of network resources and a reduced perception of latency by in- troducing header field compression and allowing multiple concurrent exchanges on the same connection. However, what H3TP/2 focuses on is visiting websites through a browser, and mobile applications are not considered much. In this paper, firstly, mobile applications are classified based on the da- ta flow characteristics. Based on the classification, we propose an optimization of HTTP/2 for mobile applications, called HTTP/2-Advance, which uses multiple Transmission Control Protocol (TCP) connections to multiplex HTYP requests and responses. Then we build a tiny system which simulates actu- al requests and responses between mobile applications and servers. We figure out the best choice of the number of multiple TCP connections for mobile applications, and compare the performance of HTTP, HTTP/2 and HTrP/2-Advance in both simulated and in-situ experiments in our system. 展开更多
关键词 Hq^FP/2 http optimization multiple connection header compression
在线阅读 下载PDF
Performance comparison of multicast routing protocols based on NS-2
16
作者 HUANG Shao-bin WU Yan-xia PIAO Xiu-feng 《Journal of Marine Science and Application》 2005年第4期47-52,共6页
The electronic system in a comprehensive shipboard has a extremely wide bandwidth. It supports synchronized and asynchronous data transmission, muhimedia correspondence, and videophone conferencing. In order to guaran... The electronic system in a comprehensive shipboard has a extremely wide bandwidth. It supports synchronized and asynchronous data transmission, muhimedia correspondence, and videophone conferencing. In order to guarantee the security and correspondent real time of the communication, choosing a multicast routing protocol based on different applications is a key problem in terms of the complexity of the system. A simulation model was first designed for existing multicast routing protocols in NS-2 and analysis was performed on their corresponding application environments. The experiments proved that PIM-DM based on the shortest-path tree protocol is suitable for communication in the field of comprehensive shipboard. Further work that is necessary is also discussed. 展开更多
关键词 NS-2 multicast routing protocol network performance ship communication
在线阅读 下载PDF
基于聚类的HTTP/HTTPS协议资产发现
17
作者 马琰 苏马婧 +2 位作者 姚旺君 权晓文 刘红 《电子技术应用》 2025年第11期98-106,共9页
网络探测扫描是发现网络资产的重要方法,在探测结果中HTTP/HTTPS协议占比较高,是重要的互联网资产识别来源。随着网络环境的日益复杂,应用HTTP/HTTPS协议的资产种类和数量也在急剧增加,这使得传统基于指纹规则的网络资产识别方法面临着... 网络探测扫描是发现网络资产的重要方法,在探测结果中HTTP/HTTPS协议占比较高,是重要的互联网资产识别来源。随着网络环境的日益复杂,应用HTTP/HTTPS协议的资产种类和数量也在急剧增加,这使得传统基于指纹规则的网络资产识别方法面临着识别效率低、适应性差等问题,无法满足HTTP/HTTPS协议识别的需要。因此,提出了一种新型HTTP/HTTPS协议资产发现方法,通过自动化规则生成器对HTTP/HTTPS协议响应数据进行处理,并基于词频统计和相似度信息对原始数据进行预过滤,利用文本编码模型实现对HTTP/HTTPS协议响应体信息的文本编码和特征融合,结合无监督聚类算法实现对HTTP/HTTPS协议资产的发现。实验结果表明,所提出的方法能够显著提高HTTP/HTTPS协议资产发现效率,提升资产标注速度,并可在无先验知识下发现未知资产。 展开更多
关键词 网络资产发现 http/httpS协议 自动规则生成 无监督聚类 Word2Vec DBSCAN
在线阅读 下载PDF
利用Winsock2 SPI技术防止用HTTP代理服务器上网 被引量:1
18
作者 商林 张峰 《电脑编程技巧与维护》 2005年第10期57-59,共3页
现在高校都有自己的网络系统,但是有些学生利用代理服务器共享上网,从而逃避上网费用,这给学校的网络管理和运营带来很大的损失。如果利用SPI技术,在3A中加入SPI技术,就可以防止利用代理服务器共享上网。本文主要阐述了这一思想。
关键词 SPI WINSOCK API 代理服务器 分层服务提供者 包转发 SPI技术 WINSOCK2 共享上网 http
在线阅读 下载PDF
169也精彩——SocksCap32和Socks 2HTTP软件使用简介
19
作者 ronnier 《软件》 2001年第2期40-41,共2页
虽然现在很多地区的163网和169网已经合并了,但还是有一些手头不宽裕的朋友和我一样仍在使用无法直接出国的169网,而且也有不少通过局域网上网的朋友整日苦于只有HTTP出口,而无法使用FTP软件,无法使用ICQ和OICQ,甚至无法正常收发邮件。... 虽然现在很多地区的163网和169网已经合并了,但还是有一些手头不宽裕的朋友和我一样仍在使用无法直接出国的169网,而且也有不少通过局域网上网的朋友整日苦于只有HTTP出口,而无法使用FTP软件,无法使用ICQ和OICQ,甚至无法正常收发邮件。其实只要通过一些软件的帮助,我们就能够摆脱这种困窘。 展开更多
关键词 SocksCap32软件 Socks2http软件 代理客户端软件 协议转换软件 代理服务器 局域网
在线阅读 下载PDF
AES RSA-SM2 Algorithm against Man-in-the-Middle Attack in IEC 60870-5-104 Protocol
20
作者 Shan Shi Yong Wang +1 位作者 Cunming Zou Yingjie Tian 《Journal of Computer and Communications》 2022年第1期27-41,共15页
The IEC60870-5-104 protocol lacks an integrated authentication mechanism during plaintext transmission, and is vulnerable to security threats, monitoring, tampering, or cutting off communication connections. In order ... The IEC60870-5-104 protocol lacks an integrated authentication mechanism during plaintext transmission, and is vulnerable to security threats, monitoring, tampering, or cutting off communication connections. In order to verify the security problems of 104 protocol, the 104 master-slave communication implemented DoS attacks, ARP spoofing and Ettercap packet filtering and other man-in-the-middle attacks. DoS attacks may damage the network functions of the 104 communication host, resulting in communication interruption. ARP spoofing damaged the data privacy of the 104 protocol, and Ettercap packet filtering cut off the communication connection between the master and the slave. In order to resist the man-in-the-middle attack, the AES and RSA hybrid encryption signature algorithm and the national secret SM2 elliptic curve algorithm are proposed. AES and RSA hybrid encryption increases the security strength of communication data and realizes identity authentication. The digital signature implemented by the SM2 algorithm can realize identity verification, ensure that the data has not been tampered with, and can ensure the integrity of the data. Both of them improve the communication security of the 104 protocol. 展开更多
关键词 104 protocol Man in the Middle Attack AES and RSA Hybrid Encryption Signature National Secret SM2 Algorithm
在线阅读 下载PDF
上一页 1 2 28 下一页 到第
使用帮助 返回顶部