期刊文献+
共找到646篇文章
< 1 2 33 >
每页显示 20 50 100
Second-Order Side-Channel Attacks on Kyber: Targeting the Masked Hash Function 被引量:2
1
作者 WANG Ya-Qi HUANG Fan +1 位作者 DUAN Xiao-Lin HU Hong-Gang 《密码学报(中英文)》 CSCD 北大核心 2024年第6期1415-1436,共22页
Recently,several PC oracle based side-channel attacks have been proposed against Kyber.However,most of them focus on unprotected implementations and masking is considered as a counter-measure.In this study,we extend P... Recently,several PC oracle based side-channel attacks have been proposed against Kyber.However,most of them focus on unprotected implementations and masking is considered as a counter-measure.In this study,we extend PC oracle based side-channel attacks to the second-order scenario and successfully conduct key-recovery attacks on the first-order masked Kyber.Firstly,we analyze the potential joint information leakage.Inspired by the binary PC oracle based attack proposed by Qin et al.at Asiacrypt 2021,we identify the 1-bit leakage scenario in the masked Keccak implementation.Moreover,we modify the ciphertexts construction described by Tanaka et al.at CHES 2023,extending the leakage scenario from 1-bit to 32-bit.With the assistance of TVLA,we validate these leakages through experiments.Secondly,for these two scenarios,we construct a binary PC oracle based on t-test and a multiple-valued PC oracle based on neural networks.Furthermore,we conduct practical side-channel attacks on masked Kyber by utilizing our oracles,with the implementation running on an ARM Cortex-M4 microcontroller.The demonstrated attacks require a minimum of 15788 and 648 traces to fully recover the key of Kyber768 in the 1-bit leakage scenario and the 32-bit leakage scenario,respectively.Our analysis may also be extended to attack other post-quantum schemes that use the same masked hash function.Finally,we apply the shuffling strategy to the first-order masked imple-mentation of the Kyber and perform leakage tests.Experimental results show that the combination strategy of shuffling and masking can effectively resist our proposed attacks. 展开更多
关键词 side-channel attack plaintext-checking oracle post-quantum cryptography masked Kyber masked hash function
在线阅读 下载PDF
Research on Fault Probability Based on Hamming Weight in Fault Injection Attack
2
作者 Tong Wu Dawei Zhou 《Computers, Materials & Continua》 2025年第11期3067-3094,共28页
Fault attacks have emerged as an increasingly effective approach for integrated circuit security attacks due to their short execution time and minimal data requirement.However,the lack of a unified leakage model remai... Fault attacks have emerged as an increasingly effective approach for integrated circuit security attacks due to their short execution time and minimal data requirement.However,the lack of a unified leakage model remains a critical challenge,as existing methods often rely on algorithm-specific details or prior knowledge of plaintexts and intermediate values.This paper proposes the Fault Probability Model based on Hamming Weight(FPHW)to address this.This novel statistical framework quantifies fault attacks by solely analyzing the statistical response of the target device,eliminating the need for attack algorithm details or implementation specifics.Building on this model,a Fault Injection Attack method based on Mutual Information(FPMIA)is introduced,which recovers keys by leveraging the mutual information between measured fault probability traces and simulated leakage derived from Hamming weight,reducing data requirements by at least 44%compared to the existing Mutual Information Analysis method while achieving a high correlation coefficient of 0.9403 between measured and modeled fault probabilities.Experimental validation on an AES-128 implementation via a Microcontroller Unit demonstrates that FPHW accurately captures the data dependence of fault probability and FPMIA achieves efficient key recovery with robust noise tolerance,establishing a unified and efficient framework that surpasses traditional methods in terms of generality,data efficiency,and practical applicability. 展开更多
关键词 Fault attacks side-channel attacks AES hamming weight data dependence mutual information analysis
在线阅读 下载PDF
An Effective and Scalable VM Migration Strategy to Mitigate Cross-VM Side-Channel Attacks in Cloud 被引量:3
3
作者 Chao Yang Yunfei Guo +2 位作者 Hongchao Hu Wenyan Liu Yawen Wang 《China Communications》 SCIE CSCD 2019年第4期151-171,共21页
Co-residency of virtual machines(VMs) of different tenants on the same physical platform would possibly lead to cross-VM side-channel attacks in the cloud. While most of current countermeasures fail for real or immedi... Co-residency of virtual machines(VMs) of different tenants on the same physical platform would possibly lead to cross-VM side-channel attacks in the cloud. While most of current countermeasures fail for real or immediate deployment due to their requirement for modification of virtualization structure, we adopt dynamic migration, an inherent mechanism of the cloud platform, as a general defense against this kind of threats. To this end, we first set up a unified practical information leakage model which shows the factors affecting side channels and describes the way they influence the damage due to side-channel attacks. Since migration is adopted to limit the time duration of co-residency, we envision this defense as an optimization problem by setting up an Integer Linear Programming(ILP) to calculate optimal migration strategy, which is intractable due to high computational complexity. Therefore, we approximate the ILP with a baseline genetic algorithm, which is further improved for its optimality and scalability. Experimental results show that our migration-based defense can not only provide excellent security guarantees and affordable performance cost in both theoretical simulation and practical cloud environment, but also achieve better optimality and scalability than previous countermeasures. 展开更多
关键词 side-channel attackS information LEAKAGE virtual machine migration GENETIC algorithm
在线阅读 下载PDF
Intrusion Detection System for PS-Poll DoS Attack in 802.11 Networks Using Real Time Discrete Event System 被引量:5
4
作者 Mayank Agarwal Sanketh Purwar +1 位作者 Santosh Biswas Sukumar Nandi 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2017年第4期792-808,共17页
Wi-Fi devices have limited battery life because of which conserving battery life is imperative. The 802.11 Wi-Fi standard provides power management feature that allows stations(STAs) to enter into sleep state to prese... Wi-Fi devices have limited battery life because of which conserving battery life is imperative. The 802.11 Wi-Fi standard provides power management feature that allows stations(STAs) to enter into sleep state to preserve energy without any frame losses. After the STA wakes up, it sends a null data or PS-Poll frame to retrieve frame(s) buffered by the access point(AP), if any during its sleep period. An attacker can launch a power save denial of service(PS-DoS) attack on the sleeping STA(s) by transmitting a spoofed null data or PS-Poll frame(s) to retrieve the buffered frame(s) of the sleeping STA(s) from the AP causing frame losses for the targeted STA(s). Current approaches to prevent or detect the PS-DoS attack require encryption,change in protocol or installation of proprietary hardware. These solutions suffer from expensive setup, maintenance, scalability and deployment issues. The PS-DoS attack does not differ in semantics or statistics under normal and attack circumstances.So signature and anomaly based intrusion detection system(IDS) are unfit to detect the PS-DoS attack. In this paper we propose a timed IDS based on real time discrete event system(RTDES) for detecting PS-DoS attack. The proposed DES based IDS overcomes the drawbacks of existing systems and detects the PS-DoS attack with high accuracy and detection rate. The correctness of the RTDES based IDS is proved by experimenting all possible attack scenarios. 展开更多
关键词 Fault detection and diagnosis intrusion detection system(IDS) null data frame power save attack PS-Poll frame real time discrete event system(DES)
在线阅读 下载PDF
Real-time trajectory planning for UCAV air-to-surface attack using inverse dynamics optimization method and receding horizon control 被引量:15
5
作者 Zhang Yu Chen Jing Shen Lincheng 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2013年第4期1038-1056,共19页
This paper presents a computationally efficient real-time trajectory planning framework for typical unmanned combat aerial vehicle (UCAV) performing autonomous air-to-surface (A/S) attack. It combines the benefits... This paper presents a computationally efficient real-time trajectory planning framework for typical unmanned combat aerial vehicle (UCAV) performing autonomous air-to-surface (A/S) attack. It combines the benefits of inverse dynamics optimization method and receding horizon optimal control technique. Firstly, the ground attack trajectory planning problem is mathematically formulated as a receding horizon optimal control problem (RHC-OCP). In particular, an approximate elliptic launch acceptable region (LAR) model is proposed to model the critical weapon delivery constraints. Secondly, a planning algorithm based on inverse dynamics optimization, which has high computational efficiency and good convergence properties, is developed to solve the RHCOCP in real-time. Thirdly, in order to improve robustness and adaptivity in a dynamic and uncer- tain environment, a two-degree-of-freedom (2-DOF) receding horizon control architecture is introduced and a regular real-time update strategy is proposed as well, and the real-time feedback can be achieved and the not-converged situations can be handled. Finally, numerical simulations demon- strate the efficiency of this framework, and the results also show that the presented technique is well suited for real-time implementation in dynamic and uncertain environment. 展开更多
关键词 Air-to-surface attack Direct method Inverse dynamics Motion planning Real time control Receding horizon control Trajectory planning Unmanned combat aerial vehicles
原文传递
Time delay compensation in lateral-directional flight control systems at high angles of attack 被引量:2
6
作者 Lin SHEN Da HUANG Genxing WU 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2021年第4期1-18,共18页
The previous studies of time delay compensation in flight control systems are all based on the conventional aerodynamic derivative model and conducted in longitudinal motions at low angles of attack.In this investigat... The previous studies of time delay compensation in flight control systems are all based on the conventional aerodynamic derivative model and conducted in longitudinal motions at low angles of attack.In this investigation,the effects of time delay on the lateral-directional stability augmentation system in high-a regime are discussed based on theβmodel,which is proposed in our previous work and proved as a more accurate aerodynamic model to reveal the lateraldirectional unsteady aerodynamic characteristics at high angles of attack.Both theβmodel and the quasi-steady model are used for simulating the effects of time delay on the flying qualities in high-a maneuvers.The comparison between the simulation results shows that the flying qualities are much more sensitive to the mismatch of feedback gains than the state errors caused by time delay.Then a typical adaptive controller based on the conventional dynamic derivative model and a gain-prediction compensator based onβmodel are designed to address the time delay in different maneuvers.The simulation results show that the gain-prediction compensator is much simpler and more efficient at high angles of attack.Finally,the gain-prediction compensator is combined with a linearizedβmodel reference adaptive controller to compensate the adverse effects of very large time delay,which exhibits excellent performance when addressing the extreme conditions at high angles of attack. 展开更多
关键词 Adaptive control Flying quality High angles of attack Time delay Yaw-roll coupling
原文传递
Hybrid-triggered consensus for multi-agent systems with time-delays,uncertain switching topologies, and stochastic cyber-attacks 被引量:1
7
作者 Xia Chen Li-Yuan Yin +1 位作者 Yong-Tai Liu Hao Liu 《Chinese Physics B》 SCIE EI CAS CSCD 2019年第9期131-144,共14页
We propose a new approach to discuss the consensus problem of multi-agent systems with time-varying delayed control inputs, switching topologies, and stochastic cyber-attacks under hybrid-triggered mechanism.A Bernoul... We propose a new approach to discuss the consensus problem of multi-agent systems with time-varying delayed control inputs, switching topologies, and stochastic cyber-attacks under hybrid-triggered mechanism.A Bernoulli variable is used to describe the hybrid-triggered scheme, which is introduced to alleviate the burden of the network.The mathematical model of the closed-loop control system is established by taking the influences of time-varying delayed control inputs,switching topologies, and stochastic cyber-attacks into account under the hybrid-triggered scheme.A theorem as the main result is given to make the system consistent based on the theory of Lyapunov stability and linear matrix inequality.Markov jumps with uncertain rates of transitions are applied to describe the switch of topologies.Finally, a simulation example demonstrates the feasibility of the theory in this paper. 展开更多
关键词 hybrid-triggered CONSENSUS multi-agent system time-delay and cyber-attacks switching TOPOLOGIES
原文传递
Further Analysis of Block Ciphers against Timing Attacks
8
作者 LI Wei GU Dawu 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1629-1632,共4页
Timing attacks break a cryptosystem by time measurement to recover keys. Most available countermeasures protect block ciphers based on the safety of modules. This paper gives a complete definition of timing attacks an... Timing attacks break a cryptosystem by time measurement to recover keys. Most available countermeasures protect block ciphers based on the safety of modules. This paper gives a complete definition of timing attacks and studies the vulnerability of operations and modules on timing attacks. We present a method to transfer the security of the algorithm to that of secure operations by reduction. As a result, we hopefully tend to reconcile the provable security notions and modem cryptography with real-world implementations of block ciphers. 展开更多
关键词 timing attacks block ciphers REDUCTION
在线阅读 下载PDF
Side-channel attack-resistant AES S-box with hidden subfield inversion and glitch-free masking
9
作者 Xiangyu Li Pengyuan Jiao Chaoqun Yang 《Journal of Semiconductors》 EI CAS CSCD 2021年第3期60-65,共6页
A side-channel attack(SCA)-resistant AES S-box implementation is proposed,which is an improvement from the power-aware hiding(PAH)S-box but with higher security and a smaller area.We use the composite field approach a... A side-channel attack(SCA)-resistant AES S-box implementation is proposed,which is an improvement from the power-aware hiding(PAH)S-box but with higher security and a smaller area.We use the composite field approach and apply the PAH method to the inversion in the nonlinear kernel and a masking method to the other parts.In addition,a delaymatched enable control technique is used to suppress glitches in the masked parts.The evaluation results show that its area is contracted to 63.3%of the full PAH S-box,and its power-delay product is much lower than that of the masking implementation.The leakage assessment using simulation power traces concludes that it has no detectable leakage under t-test and that it at least can thwart the moment-correlation analysis using 665000 noiseless traces. 展开更多
关键词 ASIC side-channel attack AES S-box power-aware hiding glitch-free
在线阅读 下载PDF
Timing Attack Analysis on AA<sub>β</sub>Cryptosystem
10
作者 A. H. A. Ghafar M. R. K. Ariffin 《Journal of Computer and Communications》 2014年第4期1-9,共9页
Timing attack is an attack on the implementation of a cryptographic primitive. The attack collects leaked secret data via certain implementation techniques either on software or hardware. This paper provides an analys... Timing attack is an attack on the implementation of a cryptographic primitive. The attack collects leaked secret data via certain implementation techniques either on software or hardware. This paper provides an analysis of a theoretical timing attack on the AAβ algorithm. The attack discussed in this paper gives avenues for secure implementation of AAβ against timing attacks. The simulation of the attack is important to provide invulnerability features for the algorithm in order to be implemented and embedded on applications. At the end of the attack, a method to overcome it will be introduced and it is called AAβ blinding. 展开更多
关键词 timing attack side-channel attack Public-Key CRYPTOSYSTEM AAβ Public Key CRYPTOSYSTEM
在线阅读 下载PDF
An Efficient Method against Side-Channel Attacks on ECC
11
作者 LIU Shuanggen HU Yupu XU Wensheng 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1573-1576,共4页
Side-channel attacks (SCA) may exploit leakage information to break cryptosystems. In this paper we present a new SCA resistant Elliptic Curve scalar multiplication algorithm. The proposed algorithm, builds a sequen... Side-channel attacks (SCA) may exploit leakage information to break cryptosystems. In this paper we present a new SCA resistant Elliptic Curve scalar multiplication algorithm. The proposed algorithm, builds a sequence of bit-strings representing the scalar k, characterized by the fact that all bit-strings are different from zero; this property will ensure a uniform computation behavior for the algorithm, and thus will make it secure against simple power analysis attacks (SPA). With other randomization techniques, the proposed countermeasures do not penalize the computation time. The proposed scheme is more efficient than MOEller's one, its cost being about 5% to 10% smaller than MOEller's one. 展开更多
关键词 side-channel attacks ECC scalar multiplication algorithm
在线阅读 下载PDF
Information Theoretic Distinguishers for Timing Attacks with Partial Profiles: Solving the Empty Bin Issue
12
作者 Eloi De Chérisey Sylvain Guilley +1 位作者 Olivier Rioul Darshana Jayasinghe 《Journal of Information Security》 2021年第1期1-33,共33页
In any side-channel attack, it is desirable to exploit all the available leakage data to compute the distinguisher’s values. The profiling phase is essential to obtain an accurate leakage model, yet it may not be exh... In any side-channel attack, it is desirable to exploit all the available leakage data to compute the distinguisher’s values. The profiling phase is essential to obtain an accurate leakage model, yet it may not be exhaustive. As a result, information theoretic distinguishers may come up on previously unseen data, a phenomenon yielding empty bins. A strict application of the maximum likelihood method yields a distinguisher that is not even sound. Ignoring empty bins reestablishes soundness, but seriously limits its performance in terms of success rate. The purpose of this paper is to remedy this situation. In this research, we propose six different techniques to improve the performance of information theoretic distinguishers. We study t</span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">hem thoroughly by applying them to timing attacks, both with synthetic and real leakages. Namely, we compare them in terms of success rate, and show that their performance depends on the amount of profiling, and can be explained by a bias-variance analysis. The result of our work is that there exist use-cases, especially when measurements are noisy, where our novel information theoretic distinguishers (typically the soft-drop distinguisher) perform the best compared to known side-channel distinguishers, despite the empty bin situation. 展开更多
关键词 timing attacks Profiling attacks Dirichlet Priors Success Rates
在线阅读 下载PDF
A Novel Technique for Detection of Time Delay Switch Attack on Load Frequency Control
13
作者 Arman Sargolzaei Kang K. Yen +2 位作者 Mohamed N. Abdelghani Abolfazl Mehbodniya Saman Sargolzaei 《Intelligent Control and Automation》 2015年第4期205-214,共10页
In this paper, we focus on the estimation of time delays caused by adversaries in the sensing loop (SL). Based on the literature review, time delay switch (TDS) attacks could make any control system, in particular a p... In this paper, we focus on the estimation of time delays caused by adversaries in the sensing loop (SL). Based on the literature review, time delay switch (TDS) attacks could make any control system, in particular a power control system, unstable. Therefore, future smart grids will have to use advanced methods to provide better situational awareness of power grid states keeping smart grids reliable and safe from TDS attacks. Here, we introduce a simple method for preventing time delay switch attack on networked control systems. The method relies on an estimator that will estimate and track time delays introduced by an adversary. Knowing the maximum tolerable time delay of the plant’s optimal controller for which the plant remains stable, a time-delay detector issues an alarm signal when the estimated time delay is larger than the minimum one and directs the system to alarm state. In an alarm state, the plant operates under the control of an emergency controller that is local to the plant and remains in this mode until the networked control system state is restored. This method is an inexpensive and simple way to guarantee that an industrial control system remains stable and secure. 展开更多
关键词 Time Delay SWITCH attack Load Frequency Control DETECTION and Estimation EMERGENCY CONTROLLER
暂未订购
EBCache:A Novel Cache-Based Mechanism for Mitigating the Spectre Attacks for RISC-V Processor
14
作者 Wu Dehua Xiao Wan’ang Gao Wanlin 《China Communications》 SCIE CSCD 2024年第12期166-185,共20页
The cache-based covert channel is one of the common vulnerabilities exploited in the Spectre attacks.Current mitigation strategies focus on blocking the eviction-based channel by using a random/encrypted mapping funct... The cache-based covert channel is one of the common vulnerabilities exploited in the Spectre attacks.Current mitigation strategies focus on blocking the eviction-based channel by using a random/encrypted mapping function to translate memory address to the cache address,while the updated-based channel is still vulnerable.In addition,some mitigation strategies are also costly as it needs software and hardware modifications.In this paper,our objective is to devise low-cost,comprehensive-protection techniques for mitigating the Spectre attacks.We proposed a novel cache structure,named EBCache,which focuses on the RISC-V processor and applies the address encryption and blacklist to resist the Spectre attacks.The addresses encryption mechanism increases the difficulty of pruning a minimal eviction set.The blacklist mechanism makes the updated cache lines loaded by the malicious updates invisible.Our experiments demonstrated that the EBCache can prevent malicious modifications.The EBCache,however,reduces the processor’s performance by about 23%but involves only a low-cost modification in the hardware. 展开更多
关键词 cache structure out-of-order execution side-channel attacks the Spectre attacks
在线阅读 下载PDF
Side-Channel Attacks Based on Collaborative Learning
15
作者 Biao Liu Zhao Ding +2 位作者 Yang Pan Jiali Li Huamin Feng 《国际计算机前沿大会会议论文集》 2017年第1期139-141,共3页
Side-channel attacks based on supervised learning require that the attacker have complete control over the cryptographic device and obtain a large number of labeled power traces.However,in real life,this requirement i... Side-channel attacks based on supervised learning require that the attacker have complete control over the cryptographic device and obtain a large number of labeled power traces.However,in real life,this requirement is usually not met.In this paper,an attack algorithm based on collaborative learning is proposed.The algorithm only needs to use a small number of labeled power traces to cooperate with the unlabeled power trace to realize the attack to cryptographic device.By experimenting with the DPA contest V4 dataset,the results show that the algorithm can improve the accuracy by about 20%compared with the pure supervised learning in the case of using only 10 labeled power traces. 展开更多
关键词 side-channel attackS Supervised LEARNING COLLABORATIVE LEARNING POWER TRACE
在线阅读 下载PDF
Robust first two rounds access driven cache timing attack on AES
16
作者 ZHAO Xin-jie WANG Tao ZHENG Yuan-yuan 《通讯和计算机(中英文版)》 2009年第6期20-25,共6页
关键词 高速缓存 多进程共享 计算机技术 加密方法
在线阅读 下载PDF
ICPS multi-target constrained comprehensive security control based on DoS attacks energy grading detection and compensation
17
作者 HAN Yinlong HAN Xiaowu 《Journal of Measurement Science and Instrumentation》 CAS CSCD 2024年第4期518-531,共14页
Aiming at the industry cyber-physical system(ICPS)where Denial-of-Service(DoS)attacks and actuator failure coexist,the integrated security control problem of ICPS under multi-objective constraints was studied.First,fr... Aiming at the industry cyber-physical system(ICPS)where Denial-of-Service(DoS)attacks and actuator failure coexist,the integrated security control problem of ICPS under multi-objective constraints was studied.First,from the perspective of the defender,according to the differential impact of the system under DoS attacks of different energies,the DoS attacks energy grading detection standard was formulated,and the ICPS comprehensive security control framework was constructed.Secondly,a security transmission strategy based on event triggering was designed.Under the DoS attack energy classification detection mechanism,for large-energy attacks,the method based on time series analysis was considered to predict and compensate for lost data.Therefore,on the basis of passive and elastic response to small energy attacks,the active defense capability against DoS attacks was increased.Then by introducing the conecomplement linearization algorithm,the calculation methods of the state and fault estimation observer and the integrated safety controller were deduced,the goal of DoS attack active and passive hybrid intrusion tolerance and actuator failure active fault tolerance were realized.Finally,a simulation example of a four-capacity water tank system was given to verify the validity of the obtained conclusions. 展开更多
关键词 industry cyber-physical system(ICPS) Denial-of-Service(DoS)attacks energy grading detection security event triggering mechanism time series analysis methods cone complementary linearization
在线阅读 下载PDF
云计算下智能船舶通信网络入侵攻击特征提取
18
作者 潘俊 《舰船科学技术》 北大核心 2025年第11期160-164,共5页
本文提出云计算下智能船舶通信网络入侵攻击特征提取方法。在云计算环境下,分析智能船舶通信网络信号主特征矢量,重构出通信信号的状态空间,分析重构后的输入输出关系,提取出与入侵信号关联性较高的信号,初步获取入侵攻击信号识别结果;... 本文提出云计算下智能船舶通信网络入侵攻击特征提取方法。在云计算环境下,分析智能船舶通信网络信号主特征矢量,重构出通信信号的状态空间,分析重构后的输入输出关系,提取出与入侵信号关联性较高的信号,初步获取入侵攻击信号识别结果;构建智能船舶通信网络的无向图模型,使用连续小波变换对该模型的攻击信号实施经验模态特征分解处理,建立出入侵攻击信号模型,将该信号模型的最大信息增益特征视为搜索起点,提取出入侵攻击信号特征。实验结果表明,所提方法的信号分解时频表示效果好、入侵攻击信号识别能力强,入侵攻击信号特征提取完整性强。 展开更多
关键词 云计算环境 船舶通信网络 入侵攻击信号 信号特征提取 时域状态空间
在线阅读 下载PDF
核电厂时钟系统的网络安全研究
19
作者 李江海 龙振海 李博远 《自动化仪表》 2025年第9期86-90,共5页
时钟系统面临的网络安全威胁,不仅影响时钟系统自身,还可能波及与其连接的其他需授时系统,因此该系统是全厂网络风险中的关键节点。结合标准和案例,综述核电厂时钟系统网络安全的实践和研究现状。在时钟系统工作流程和系统架构梳理的基... 时钟系统面临的网络安全威胁,不仅影响时钟系统自身,还可能波及与其连接的其他需授时系统,因此该系统是全厂网络风险中的关键节点。结合标准和案例,综述核电厂时钟系统网络安全的实践和研究现状。在时钟系统工作流程和系统架构梳理的基础上,从网络安全防护目标出发,分析列举时钟系统遭受攻击后的可能后果。假想若干典型的攻击方式作为防护的基准,并通过搭建测试平台进行模拟验证。根据试验结果和现有标准,提出网络安全防护建议。研究结果表明,至少有三类可行的入侵时钟系统并波及其他核电厂系统的网络攻击方式,因此应加强对时钟系统的网络安全防护。该研究可提升时钟系统在未来核电智能化发展中的可靠性和安全性。 展开更多
关键词 核电厂 时钟系统 网络安全 时间同步攻击 安全监测
在线阅读 下载PDF
命名数据网络中基于WEASEL算法的协同Interest包泛洪攻击检测方法
20
作者 邢光林 黄英 《中南民族大学学报(自然科学版)》 2025年第5期647-653,共7页
兴趣包泛洪攻击(IFA)是命名数据网络(NDN)中一种典型的分布式拒绝服务攻击,而协同兴趣包泛洪攻击(CIFA)在IFA的基础上改变了攻击模式并且得到了协同生产者的辅助,比IFA更具隐蔽性和危害性.借鉴时间序列分类思想,提出了一种基于WEASEL算... 兴趣包泛洪攻击(IFA)是命名数据网络(NDN)中一种典型的分布式拒绝服务攻击,而协同兴趣包泛洪攻击(CIFA)在IFA的基础上改变了攻击模式并且得到了协同生产者的辅助,比IFA更具隐蔽性和危害性.借鉴时间序列分类思想,提出了一种基于WEASEL算法的CIFA检测方法,通过对网络流量时间序列进行预测分类来检测CIFA.仿真结果表明:所提方法可以有效检测CIFA,并在误报率和漏报率方面具有良好的效果. 展开更多
关键词 命名数据网络 协同兴趣包泛洪攻击 WEASEL算法 时间序列分类
在线阅读 下载PDF
上一页 1 2 33 下一页 到第
使用帮助 返回顶部