期刊文献+
共找到3,186篇文章
< 1 2 160 >
每页显示 20 50 100
TrustZone半虚拟化与容器化实现机制
1
作者 余发江 王朝州 《信息网络安全》 北大核心 2025年第10期1523-1536,共14页
TrustZone广泛应用于移动平台,随着ARM CPU在云服务中大量部署,利用TrustZone增强虚拟机计算环境和数据的安全性需求日益凸显。但基础的TrustZone提供的硬件可信执行环境通常仅支持主机上的应用程序使用。为解决这一问题,文章提出一种Tr... TrustZone广泛应用于移动平台,随着ARM CPU在云服务中大量部署,利用TrustZone增强虚拟机计算环境和数据的安全性需求日益凸显。但基础的TrustZone提供的硬件可信执行环境通常仅支持主机上的应用程序使用。为解决这一问题,文章提出一种TrustZone半虚拟化与容器化实现机制pvTEE,使虚拟机或容器中的客户能够高效、并行利用主机平台的可信执行环境运行可信应用。pvTEE通过前端驱动vTEEdriver、虚拟设备vTEE、主机代理程序vTEEproxy以及后端驱动TEEdriver,将虚拟机或容器内客户的调用请求转发至可信执行环境中的可信应用执行。主机、虚拟机和容器中的客户仅可调用自身场景的可信应用,无法访问其他应用。同时,主机、虚拟机及容器各自有独立的日志获取能力与安全存储服务。pvTEE基于ARMv8.2 CPU服务器、QEMU KVM虚拟机和Docker容器实现,实验结果表明,客户在虚拟机中调用可信应用完成一次RSA加解密操作,相比在主机场景中仅增加约6%的时间开销。 展开更多
关键词 TRUSTZONE 可信执行环境 虚拟化 容器化 云服务
在线阅读 下载PDF
A multi-dimensional trust attestation solution in 5G-IoT
2
作者 Xiangrong Li Yu Zhang +2 位作者 Haotian Zhu Yubo Wang Junjia Huang 《Digital Communications and Networks》 2025年第1期225-233,共9页
The core missions of IoT are to sense data,transmit data and give feedback to the real world based on the calculation of the sensed data.The trust of sensing source data and transmission network is extremely important... The core missions of IoT are to sense data,transmit data and give feedback to the real world based on the calculation of the sensed data.The trust of sensing source data and transmission network is extremely important to IoT security.5G-IoT with its low latency,wide connectivity and high-speed transmission extends the business scenarios of IoT,yet it also brings new challenges to trust proof solutions of IoT.Currently,there is a lack of efficient and reliable trust proof solutions for massive dynamically connected nodes,while the existing solutions have high computational complexity and can't adapt to time-sensitive services in 5G-IoT scenarios.In order to solve the above problems,this paper proposes an adaptive multi-dimensional trust proof solution.Firstly,the static and dynamic attributes of sensing nodes are metricized,and the historical interaction as well as the recommendation information are combined with the comprehensive metric of sensing nodes,and a multi-dimensional fine-grained trusted metric model is established in this paper.Then,based on the comprehensive metrics,the sensing nodes are logically grouped and assigned with service levels to achieve the screening and isolation of malicious nodes.At the same time,the proposed solution reduces the energy consumption of the metric process and optimizes the impact of real-time metrics on the interaction latency.Simulation experiments show that the solution can accurately and efficiently identify malicious nodes and effectively guarantee the safe and trustworthy operation of 5G-IoT nodes,while having a small impact on the latency of the 5G network. 展开更多
关键词 5G-IoT Trusted metrics Trust model
在线阅读 下载PDF
基于TrustZone的以太坊密钥保护方法
3
作者 任正伟 虞雳 +4 位作者 王丽娜 贺广鑫 徐士伟 童言 邓莉 《武汉大学学报(理学版)》 北大核心 2025年第2期187-198,共12页
在以太坊中,用户数字资产的安全性与其私钥紧密相关,一旦私钥泄漏,用户将面临无法挽回的数字资产损失。加密货币钱包常被用于管理和保护区块链系统的密钥。但是,现有的加密货币钱包安全性不高。为了更好地保护以太坊用户的数字资产,在... 在以太坊中,用户数字资产的安全性与其私钥紧密相关,一旦私钥泄漏,用户将面临无法挽回的数字资产损失。加密货币钱包常被用于管理和保护区块链系统的密钥。但是,现有的加密货币钱包安全性不高。为了更好地保护以太坊用户的数字资产,在不影响以太坊系统正常功能的情况下,提出了一种基于TrustZone的以太坊密钥保护方法,以在用户通过支持TrustZone的移动终端接入和使用以太坊系统时,提高用户密钥在生成、存储和使用过程中的安全性。在该方法中,与私钥相关的操作都是在TrustZone的安全世界中进行的。私钥未被使用时,将以安全文件的形式被保存在本地文件系统中。当有交易需要被签名时,将存有对应私钥的安全文件加载到安全世界中,并恢复出私钥以对交易签名,从而使得私钥可以安全而持续地被使用。在模拟环境下实现了该方法的原型系统,并对系统的功能和性能进行了验证和测试。实验结果表明,本文的原型系统在以太坊系统中能够正常运行,性能开销在合理范围内,具有可行性。 展开更多
关键词 以太坊 加密货币钱包 密钥保护 TRUSTZONE 安全文件
原文传递
TPTVer: A Trusted Third Party Based Trusted Verifier for Multi-Layered Outsourced Big Data System in Cloud Environment 被引量:3
4
作者 Jing Zhan Xudong Fan +2 位作者 Lei Cai Yaqi Gao Junxi Zhuang 《China Communications》 SCIE CSCD 2018年第2期122-137,共16页
Cloud computing is very useful for big data owner who doesn't want to manage IT infrastructure and big data technique details. However, it is hard for big data owner to trust multi-layer outsourced big data system... Cloud computing is very useful for big data owner who doesn't want to manage IT infrastructure and big data technique details. However, it is hard for big data owner to trust multi-layer outsourced big data system in cloud environment and to verify which outsourced service leads to the problem. Similarly, the cloud service provider cannot simply trust the data computation applications. At last,the verification data itself may also leak the sensitive information from the cloud service provider and data owner. We propose a new three-level definition of the verification, threat model, corresponding trusted policies based on different roles for outsourced big data system in cloud. We also provide two policy enforcement methods for building trusted data computation environment by measuring both the Map Reduce application and its behaviors based on trusted computing and aspect-oriented programming. To prevent sensitive information leakage from verification process,we provide a privacy-preserved verification method. Finally, we implement the TPTVer, a Trusted third Party based Trusted Verifier as a proof of concept system. Our evaluation and analysis show that TPTVer can provide trusted verification for multi-layered outsourced big data system in the cloud with low overhead. 展开更多
关键词 big data security outsourced ser-vice security MapReduce behavior trustedverification trusted third party
在线阅读 下载PDF
Formal Compatibility Model for Trusted Computing Applications 被引量:2
5
作者 ZHU Lu YU Sheng +1 位作者 ZHANG Xing SHEN Changxiang 《Wuhan University Journal of Natural Sciences》 CAS 2009年第5期388-392,共5页
The Chinese specification for trusted computing, which has similar functions with those defined by the Trusted Computing Group (TCG), has adopted a different cryptography scheme. Applications designed for the TCG sp... The Chinese specification for trusted computing, which has similar functions with those defined by the Trusted Computing Group (TCG), has adopted a different cryptography scheme. Applications designed for the TCG specifications cannot directly function on platforms complying with Chinese specifications because the two cryptography schemes are not compatible with each other. In order to transplant those applications with little to no modification, the paper presents a formal compatibility model based on Zaremski and Wing's type system. Our model is concerned not only on the syntactic compatibility for data type, but also on the semantic compatibility for cryptographic attributes according to the feature of trusted computing. A compatibility algorithm is proposed based on the model to generate adapters for trusted computing applications. 展开更多
关键词 trusted computing compatibility trusted cryptography module (TCM) TCM service module (TSM)
原文传递
A Peer-to-Peer Resource Sharing Scheme Using Trusted Computing Technology 被引量:2
6
作者 CHEN Lu ZHANG Huanguo +2 位作者 ZHANG Liqiang LI Song CAI Liang 《Wuhan University Journal of Natural Sciences》 CAS 2008年第5期523-527,共5页
Facing the increasing security issues in P2P networks, a scheme for resource sharing using trusted computing technologies is proposed in this paper. We advance a RS-UCON model with decision continuity and attribute mu... Facing the increasing security issues in P2P networks, a scheme for resource sharing using trusted computing technologies is proposed in this paper. We advance a RS-UCON model with decision continuity and attribute mutability to control the usage process and an architecture to illustrate how TC technologies support policy enforcement with bidirectional attestation. The properties required for attestation should include not only integrity measurement value of platform and related application, but also reputation of users and access history, in order to avoid the limitation of the existing approaches. To make a permission, it is required to evaluate both the authorization and conditions of the subject and the object in resource usage to ensure trustable resources to be transferred to trusted users and platform. 展开更多
关键词 resource sharing trusted computing VIRTUALIZATION UCON (usage control) chain of trust
在线阅读 下载PDF
A Trusted Environment Construction Method for Security-Sensitive Software
7
作者 LI Jing ZHANG Huanguo +1 位作者 ZHAO Bo FANG Lingling 《Wuhan University Journal of Natural Sciences》 CAS 2011年第5期383-390,共8页
This paper presents a trusted-environment construction method based on the underlying hardware.This method aims at protecting the security-sensitive software in the aspects of software loading,running,and storing in t... This paper presents a trusted-environment construction method based on the underlying hardware.This method aims at protecting the security-sensitive software in the aspects of software loading,running,and storing in the general operating system.It extends the trust chain of the traditional trusted computing technology to reach the target software,ensuring trusted loading.The extended memory management mechanism effectively pre-vents memory dumping and memory tampering for the high-sensitivity data.The file monitoring mechanism protects files from vicious operation made by attackers.Flexible-expanded storage environment provides the target software with static storing protection.Experimental system verifies that the method is suitable for general operating system and can effectively protect security-sensitive software with low overhead. 展开更多
关键词 information security trusted computing securitysensitive software trusted environment
原文传递
一种TrustZone架构下的密钥管理机制 被引量:2
8
作者 崔晓煜 赵波 +1 位作者 樊佩茹 肖钰 《山东大学学报(理学版)》 CAS CSCD 北大核心 2017年第6期92-98,共7页
针对嵌入式设备上用户隐私数据缺乏加密保护问题,提出一种TrustZone架构下的密钥管理机制。结合PUF技术与用户PIN码生成与设备、用户双关联的用户密钥,保护用户隐私数据的机密性和完整性;同时设计了一种适用于公用嵌入式设备的多用户数... 针对嵌入式设备上用户隐私数据缺乏加密保护问题,提出一种TrustZone架构下的密钥管理机制。结合PUF技术与用户PIN码生成与设备、用户双关联的用户密钥,保护用户隐私数据的机密性和完整性;同时设计了一种适用于公用嵌入式设备的多用户数据保护场景,提供多用户密钥的生成、存储、更新和销毁方法。最后,描述了基于TrustZone密钥管理模块的实现方法,并进行安全性分析与效率测试,实验表明,该机制具有很好的安全性和密钥管理效率。 展开更多
关键词 TRUSTZONE 隐私数据 PUF 密钥管理
原文传递
TrustZone架构下基于RPMB的隐私数据保护方法 被引量:3
9
作者 喻潇 田里 +1 位作者 刘喆 王捷 《计算机应用》 CSCD 北大核心 2018年第A02期164-169,共6页
针对当前移动终端中缺乏有效隐私数据保护方案的问题,利用RPMB分区提出了一种隐私数据保护方法。该方法对隐私数据进行加密保护,并且通过认证密钥以及写计数、随机数等机制实现对数据的认证读和认证写操作。首先,因为TrustZone架构在移... 针对当前移动终端中缺乏有效隐私数据保护方案的问题,利用RPMB分区提出了一种隐私数据保护方法。该方法对隐私数据进行加密保护,并且通过认证密钥以及写计数、随机数等机制实现对数据的认证读和认证写操作。首先,因为TrustZone架构在移动终端得到广泛支持,选取TrustZone架构作为RPMB分区载体;然后,基于TrustZone和RPMB两者在安全世界中添加支持模块;再次,通过认证密钥以及写计数、随机数等组件实现对数据的认证读和认证写操作;最后,搭建实验平台对环境作出仿真,同时模拟攻击测试。实验结果表明,该方法对读写操作的重放攻击有较好的防御功能。 展开更多
关键词 隐私数据保护 RPMB分区 TRUSTZONE eMMC存储 认证
在线阅读 下载PDF
Survey on Key Technology Development and Application in Trusted Computing 被引量:7
10
作者 Juan Wang Yuan Shi +5 位作者 Guojun Peng Huanguo Zhang Bo Zhao Fei Yan Fajiang Yu Liqiang Zhang 《China Communications》 SCIE CSCD 2016年第11期70-90,共21页
Trusted computing,which can effectively increase the credibility of information system,has made great achievements and is in continuous development. For country who is going to strengthen network construction like Chi... Trusted computing,which can effectively increase the credibility of information system,has made great achievements and is in continuous development. For country who is going to strengthen network construction like China,it is an important fundamental supporting technology worth researching. China is in the international forefront in the field of trusted computing. This paper gives comprehensive introductions to the new development and application of key technologies in trusted computing,such as various trusted platform modules(TPM、TCM、TPCM),TCG Software Stack(TSS),trusted cloud server and Trusted Execution Environment(TEE). We illustrate the progressing and application extension of these technologies and also point out some key problems worth studying in the future. 展开更多
关键词 cyberspace security information security information system security CRYPTOGRAPHY trusted computing
在线阅读 下载PDF
A Trusted Mobile Payment Environment Based on Trusted Computing and Virtualization Technology 被引量:2
11
作者 WANG Juan LIN Wutao +3 位作者 LI Haoyu DU Bianxia MENG Ke WANG Jiang 《Wuhan University Journal of Natural Sciences》 CAS 2014年第5期379-384,共6页
In this paper, we propose a trusted mobile payment environment (TMPE) based on trusted computing and virtualization technology. There are a normal operating system (OS) and a trusted OS (TOS) in TMPE. We store t... In this paper, we propose a trusted mobile payment environment (TMPE) based on trusted computing and virtualization technology. There are a normal operating system (OS) and a trusted OS (TOS) in TMPE. We store the image of TOS in a memory card to hinder tampering. The integrity of TOS is protected by means of a trusted platform module (TPM). TOS can only be updated through a trusted third party. In addition, virtualization technology is applied to isolate TOS from normal OS. Users complete ordinary affairs in normal OS and security-sensitive affairs in TOS. TMPE can offer users a highly protected environment for mobile payment. Moreover, TMPE has good compatibility in different hardware architectures of mobile platforms. As the evaluation shows, TMPE satisfies the requirement of mobile payment well. 展开更多
关键词 trusted computing mobile payment VIRTUALIZATION mobile platform
原文传递
Temporal Dynamics in Social Trust Prediction 被引量:1
12
作者 CAI Guoyong LV Rui +1 位作者 TANG Jiliang LIU Huan 《Wuhan University Journal of Natural Sciences》 CAS 2014年第5期369-378,共10页
Inferring unknown social trust relations attracts increasing attention in recent years. However, social trust, as a social concept, is intrinsically dynamic, and exploiting temporal dynamics provides challenges and op... Inferring unknown social trust relations attracts increasing attention in recent years. However, social trust, as a social concept, is intrinsically dynamic, and exploiting temporal dynamics provides challenges and opportunities for social trust prediction. In this paper, we investigate social trust prediction by exploiting temporal dynamics. In particular, we model the dynamics of user preferences in two principled ways. The first one focuses on temporal weight; the second one targets temporal smoothness. By incorporating these two types of temporal dynamics into traditional matrix factorization based social trust prediction model, two extended social trust prediction models are proposed and the cor- responding algorithms to solve the models are designed too. We conduct experiments on a real-world dataset and the results dem- onstrate the effectiveness of our proposed new models. Further experiments are also conducted to understand the importance of temporal dynamics in social trust prediction. 展开更多
关键词 trust prediction temporal dynamics social network
原文传递
A Trustworthiness-Based Distribution Model for Data Leakage Prevention 被引量:1
13
作者 YIN Fan WANG Yu +1 位作者 WANG Lina YU Rongwei 《Wuhan University Journal of Natural Sciences》 CAS 2010年第3期205-209,共5页
Under the global circumstances where data leakage gets more and more severe, we present a trustworthiness-based distribution model that aims at data leakage prevention (DLP). In our model, first, the distributor cal... Under the global circumstances where data leakage gets more and more severe, we present a trustworthiness-based distribution model that aims at data leakage prevention (DLP). In our model, first, the distributor calculates the user's trustworthiness based on his historical behaviors; second, according to the user's trustworthiness and his obtained file set overlapping leaked file set, the distributor accesses the probability of the user's intentional leak behavior as the subjective risk assessment; third, the distributor evaluates the user's platform vulnerability as an objective element; last, the distributor makes decisions whether to distribute the file based on the integrated risk assessment. The experiments indicate that the model can distinguish users of different types and make the probability of malicious users' requirements being denied much higher than that of honest users' requirements being denied, so that the model is capable of preventing data leakage validly. 展开更多
关键词 distribution model trustworthiness data leakage prevention (DLP)
原文传递
Static Analysis-Based Behavior Model Building for Trusted Computing Dynamic Verification
14
作者 YU Fajiang YU Yue 《Wuhan University Journal of Natural Sciences》 CAS 2010年第3期195-200,共6页
Current trusted computing platform only verifies application's static Hash value, it could not prevent application from being dynamic attacked. This paper gives one static analysis-based behavior model building metho... Current trusted computing platform only verifies application's static Hash value, it could not prevent application from being dynamic attacked. This paper gives one static analysis-based behavior model building method for trusted computing dynamic verification, including control flow graph (CFG) building, finite state automata (FSA) constructing, e run cycle removing, e transition removing, deterministic finite state (DFA) constructing, trivial FSA removing, and global push down automata (PDA) constructing. According to experiment, this model built is a reduced model for dynamic verification and covers all possible paths, because it is based on binary file static analysis. 展开更多
关键词 trusted computing dynamic verification behavior model finite-state automata (FSA) push down automata (PDA)
原文传递
TVIDS: Trusted Virtual IDS With SGX
15
作者 Juan Wang Shirong Hao +5 位作者 Yi Li Zhi Hong Fei Yan Bo Zhao Jing Ma Huanguo Zhang 《China Communications》 SCIE CSCD 2019年第10期133-150,共18页
Network functions such as intrusion detection systems (IDS) have been increasingly deployed as virtual network functions or outsourced to cloud service providers so as to achieve the scalability and agility, and reduc... Network functions such as intrusion detection systems (IDS) have been increasingly deployed as virtual network functions or outsourced to cloud service providers so as to achieve the scalability and agility, and reducing equipment costs and operational cost. However, virtual intrusion detection systems (VIDS) face more serious security threats due to running in a shared and virtualized environment instead of proprietary devices. Cloud service providers or malicious tenants may illegally access and tamper with the policies, packet information, and internal processing states of intrusion detection systems, thereby violating the privacy and security of tenant’s networks. To address these challenges, we use Intel Software Guard Extensions (SGX) to build a Trusted Virtual Intrusion Detection System (TVIDS). For TVIDS, to prevent cloud service providers from accessing sensitive information about the users’ network, we build a trusted execution environment for security policy, packets processing, and internal state so that cloud service providers and other malicious tenants can’t access the protected code, policy, processing states, and packets information of the intrusion detection system. We implemented TVIDS on the basis of the Snort which is a famous open-source IDS and evaluated its results on real SGX hardware.The results show that our method can protect the security of the virtual IDS and brings acceptable performance overhead. 展开更多
关键词 network function VIRTUALIZATION INTRUSION detection system SGX TRUSTED EXECUTION environment
在线阅读 下载PDF
CipherTrust为企业信息系统带来强大的安全防护能力
16
《信息安全与通信保密》 2006年第5期35-36,共2页
关键词 企业信息系统 安全防护能力 Trust公司 垃圾邮件 信息安全 间谍软件 网关设备 安全邮件 行为分析 MAIL
原文传递
Trust in AI:How to build global confidence
17
作者 Heather West Wan Sie Lee +1 位作者 Wael Diab Cao Xinxin 《China Standardization》 2024年第6期59-62,共4页
During the ISO Annual Meeting,the session themed on“Trust in AI:How to build global confidence”was held on September 10.Wael Diab,Chair of ISO/IEC JTC 1/SC 42 on AI,Heather West,Senior Director of Cybersecurity&... During the ISO Annual Meeting,the session themed on“Trust in AI:How to build global confidence”was held on September 10.Wael Diab,Chair of ISO/IEC JTC 1/SC 42 on AI,Heather West,Senior Director of Cybersecurity&Privacy Services at U.S.based law firm Venable and coordinator of the alliance for trust in AI,and Wan Sie Lee,Director of Trusted AI&Data at Singapore's Infocomm Media Development Authority(IMDA)were invited as vips to discuss how to prevent potential risks brought by the rapid development of AI technologies,and how standards can play a crucial role in the process to build global confidence on AI.The meeting took place in hybrid forms,attracting participants from all over the world both on site and online. 展开更多
关键词 AUTHORITY DIRECTOR attracting
原文传递
基于ResFGRU的路由器高精度时延识别方法
18
作者 崔竞松 杨超 +2 位作者 张童桐 郭迟 郭文飞 《计算机应用与软件》 北大核心 2026年第1期127-134,共8页
路由器的识别对于维护网络安全具有重要意义。传统路由器特征识别的指纹存在着数据获取困难、硬件局限性、指纹特征分析复杂等问题,为此提出一种基于深度学习的路由器识别方法,将数据包在路由器中被转发处理所消耗的高精度时延这一必然... 路由器的识别对于维护网络安全具有重要意义。传统路由器特征识别的指纹存在着数据获取困难、硬件局限性、指纹特征分析复杂等问题,为此提出一种基于深度学习的路由器识别方法,将数据包在路由器中被转发处理所消耗的高精度时延这一必然存在的侧信道信息作为设备指纹识别依据,并提出融合全卷积神经网络、门控循环网络和残差网络优势的ResFGRU模型提高识别精度,实验表明在构建的路由器高精度时延数据集上使用该模型进行分类可达到99.8%识别准确率,证明了高精度时延作为路由器设备的特征指纹进行分类识别的有效性。 展开更多
关键词 路由器特征识别 高精度时延 全卷积神经网络 残差网络 深度学习
在线阅读 下载PDF
局部特征引导的室内自监督单目深度估计方法的改进
19
作者 艾浩军 张锋 +2 位作者 吕鹏飞 唐雪华 王中元 《计算机研究与发展》 北大核心 2026年第2期338-351,共14页
近年来,自监督单目深度估计方法取得了显著的性能提升,但在复杂的室内场景生成结构化深度图时性能明显下降,为此,提出局部特征引导知识蒸馏的自监督单目深度估计方法LoFtDepth改进训练过程。首先,使用预训练的深度估计网络预测结构化的... 近年来,自监督单目深度估计方法取得了显著的性能提升,但在复杂的室内场景生成结构化深度图时性能明显下降,为此,提出局部特征引导知识蒸馏的自监督单目深度估计方法LoFtDepth改进训练过程。首先,使用预训练的深度估计网络预测结构化的相对深度图作为深度先验,从中提取局部特征作为边界点引导局部深度估计细化,减少深度无关特征的干扰,将深度先验中的边界知识传递到自监督深度估计网络中。同时,引入逆自动掩模加权的表面法线损失,通过对齐自监督网络预测的深度图和深度先验在无纹理区域的法线方向来提升深度估计精度。最后,根据相机运动的连续性,对相机位姿残差估计施加位姿一致性约束以适应室内场景相机位姿的频繁变化来减小训练误差和提升模型性能。主要的室内公开数据集上的实验结果表明,LoFtDepth性能提升显著,将相对误差降至0.121,且生成的深度图具有更高的全局准确度和良好的结构特征。 展开更多
关键词 单目深度估计 自监督学习 局部特征 知识蒸馏 表面法线约束
在线阅读 下载PDF
基于设备时延和混合深度学习模型的网络设备检测方法
20
作者 崔竞松 郭孟伟 郭迟 《计算机工程》 北大核心 2026年第2期221-235,共15页
针对目前基于硬件指纹的网络设备识别方法采集和提取特征效率低下以及基于流量特征的设备分类方法仅考虑已有类型而不能对异常设备进行检测的问题,提出基于设备时延和混合深度学习模型的网络设备检测方法。该方法基于全球导航卫星系统(G... 针对目前基于硬件指纹的网络设备识别方法采集和提取特征效率低下以及基于流量特征的设备分类方法仅考虑已有类型而不能对异常设备进行检测的问题,提出基于设备时延和混合深度学习模型的网络设备检测方法。该方法基于全球导航卫星系统(GNSS)高精度授时技术提取纳秒级精度网络设备处理时延特征,构建贝叶斯卷积自动编码器模型BCNN-AE,包含特征提取模块、特征重构模块和复合预测模块,实现了对于已知网络设备类型的识别和未知网络设备类型的检测,具体为:首先采用GNSS高精度授时技术实现对于网络流量处理时延的纳秒级精度测量,并构建设备时延分布特征向量;接着特征提取模块使用贝叶斯卷积提取时延分布特征信息,特征重构模块使用自动编码器(AE)学习时延特征向量的压缩重构表示;最后复合预测模块基于不确定性阈值和重构误差阈值进行综合判断,实现已知类型识别和未知/异常设备类型检测。在实验室仿真环境下采集的数据集和公开数据集Aalto上的实验结果表明,采用设备时延能够实现不同网络设备类型的准确表示,并且BCNN-AE模型除了能取得比基线模型更高的识别准确率之外,还能够实现对于未知/异常设备类型的检测。 展开更多
关键词 设备识别与检测 设备时延 贝叶斯卷积网络 自动编码器 全球导航卫星系统授时技术
在线阅读 下载PDF
上一页 1 2 160 下一页 到第
使用帮助 返回顶部