Showing 981 - 1,000 results of 3,648 for search '"Attacker"', query time: 0.04s Refine Results
  1. 981

    Location publishing technology based on differential privacy-preserving for big data services by Lin ZHANG, Yan LIU, Ru-chuan WANG

    Published 2016-09-01
    “…Aiming at dealing with prospect knowledge and complex combinatorial attack,a new location big data publishing mechanism under differential privacy technology was given.And innovative usability evaluation feedback mechanism was designed.It gave corresponding solution details for the sensitive attributes and the identity recognition to analyze the quality of service,aimed at privacy protecting for location based big data under situations like combination of location information and non-location information and attacker’s arbitrary background knowledge.Simulation results based on different spatial indexing technology proved that the new publishing model has a higher accuracy under specified privacy conditions for the location query service.…”
    Get full text
    Article
  2. 982

    Situation Awareness Scheme Based on PUE Detecting for Cognitive Radio by Fangwei Li, Dejun Feng, Jiang Zhu

    Published 2013-12-01
    “…To timely and accurately grasp the attack situation over a wide range when a malicious user emulates the primary user and attacks the channel, and to display correctly spectrum situation, a situation awareness scheme for the interference situation of malicious users was proposed. …”
    Get full text
    Article
  3. 983

    Research on active defense application based on honeypot by Dequan YANG, Weimin LIU, Zhou YU

    Published 2018-01-01
    “…Abstract:With the rapid development of financial information technology,cyber security events on the financial system have also increased greatly.Active defense plays an important role in improving the defense level of defined private network.How to quickly and effectively deploy and apply honeypot to capture and attack behavior,analyze the attack intention and raise the threshold of attack is the key to ensure the security of the defined private network.From the perspective of active defense,the advantage of honeypot active defense was analyzed,an active defense and defense filling passive defense integration was designed,and a honeypot within private network experimental environment was set up,the results show that the active defense technology can effectively improve the threshold of the attacker's attack,so as to improve the security level of the whole network.…”
    Get full text
    Article
  4. 984

    Optimasi Keamanan Web Server Terhadap Serangan Brute-Force Menggunakan Penetration Testing by Fahmi Fachri

    Published 2023-02-01
    “…The opening of several ports that are still open and causes intruders to easily enter the system to carry out Brute Force attacks or others. The results of the simulation trial of the attack on the server were successfully carried out by obtaining a username and password, this is of course dangerous that the system can be taken over by intruders. …”
    Get full text
    Article
  5. 985

    Implementasi Algoritme Clefia 128-Bit untuk Pengamanan Modul Komunikasi Lora by Muhammad Fadhli Iman, Ari Kusyanti, Rakhmadhanny Primananda

    Published 2022-12-01
    “…In the known-plaintext-attack attack test, the attacker failed to find the original key used in the 128-bit Clefia algorithm, so the attacker failed to attack the system.   …”
    Get full text
    Article
  6. 986

    Design and detection of hardware Trojan based on satisfiability don't cares by Lingjuan WU, Jiacheng ZHU, Shibo TANG, Jing TAN, Wei HU

    Published 2021-04-01
    “…Hardware Trojans are intended malicious design modifications to integrated circuits, which can be used to launch powerful low-level attacks after being activated.A new security threat of lightweight stealthy hardware Trojans leveraging discrete satisfiability don't care signals was demonstrated.These don't care could not be satisfied under normal operation and thus the circuit design with Trojan is functionally equivalent to the Trojan-free baseline.The attacker could activate the Trojan through simple yet effective fault injection.Experimental results on a 1024-bit RSA cryptographic core show that the proposed hardware Trojan can escape from logic synthesis optimization, and that the RSA private key can be retrieved by simply over-clocking the design.A defense technique that can effectively detect such stealthy Trojan design was provided.…”
    Get full text
    Article
  7. 987

    Research on batch anonymous authentication scheme for VANET based on bilinear pairing by Cheng SONG, Ming-yue ZHANG, Wei-ping PENG, Zong-pu JIA, Zhi-zhong LIU, Xi-xi YAN

    Published 2017-06-01
    “…To solve the problem of efficiency of anonymous authentication in vehicular ad hoc network,a batch anonymous authentication scheme was proposed by using bilinear pairing on elliptic curves .The signature was generated by the roadside unit node (RSU) and the vehicle together.Thus,the burden of VANET certification center was reduced and the authentication efficiency was proved.Meanwhile,the difficulty of the attacker to extract the key was increased.Furthermore,security proofs were given to the scheme in the random oracle model.Analysis shows that the proposed scheme can meet the needs of many kinds of security requirements,the computational overhead is significantly reduced,and the authentication efficiency is improved effectively too.Therefore,the scheme has important theoretical significance and application value under computational capability constrained Internet of things (IoT) environment.…”
    Get full text
    Article
  8. 988

    High-capacity image steganography algorithm combining image encryption and deep learning by Xiaoyuan YANG, Xinliang BI, Jia LIU, Siyuan HUANG

    Published 2021-09-01
    “…Aiming at the problem that the residual image of cover image and carrier image in the high-capacity image steganography scheme based on deep learning will expose the secret image, a high-capacity image steganography scheme combining image encryption and deep learning was proposed.An image feature extraction method was used, so that the features extracted from the cover image were consistent with the features extracted from the carrier image.Before the image steganography, the sender extracted features from the cover image as a key to encrypt the secret image.After the extractor extracted the encrypted secret image, the features were extracted from the carrier image as a key to decrypt the secret image.The experimental results show that the attacker cannot find the information of the secret image from the residual image, and the frequency of key transmission is lower, and the security of the algorithm is improved.…”
    Get full text
    Article
  9. 989

    Trajectory privacy protection scheme based on differential privacy by Si CHEN, Anmin FU, Mang SU, Huaijiang SUN

    Published 2021-09-01
    “…To solve the problem that the current sampling mechanism and data obfuscation method may raise insufficient data availability and privacy protection, a trajectory privacy protection scheme based on differential privacy was proposed.A new efficient sampling model based on time generalization and spatial segmentation was presented, and a k-means clustering algorithm was designed to process sampling data.By employing the differential privacy mechanism, the trajectory data was disturbed to solve the user privacy leaking problem caused by the attacker with powerful background knowledge.Simultaneously, to respond to the error boundary of the query range of pandemic, an effective prediction mechanism was designed to ensure the availability of released public track data.Simulation results demonstrate that compared with the existing trajectory differential privacy protection methods, the proposed scheme has obvious advantages in terms of processing efficiency, privacy protection intensity, and data availability.…”
    Get full text
    Article
  10. 990

    Les enfants de la guerre : Le Grand Cahier d’Agota Kristof by Carine Trevisan

    Published 2006-09-01
    “…Not only witness but also often victim of the brutality of the adults, the child can nevertheless “be identified with the attacker” and become a killer too. Giving fictitiously the word to children who make the test of the brutalisation of men’s and women’s behavior in the state of war, The Notebook, by the choice of an “ice-cold” writing – this book has been qualified of “exercise of cruelty” –, led to its extreme limit the representation of devastated childhood, so much so that it becomes disturbing: abolition of any faculty to dream, to imagine, anaesthesia of emotive life, destruction of anything that can make link with others, phenomena which produce insensitivity to death, received or given. …”
    Get full text
    Article
  11. 991

    Issues of identity verification of typical applications over mobile terminal platform by Xiaolin ZHANG, Dawu GU, Chi ZHANG

    Published 2020-12-01
    “…Recent studies have shown that attacks against USIM card are increasing,and an attacker can use the cloned USIM card to bypass the identity verification process in some applications and thereby get the unauthorized access.Considering the USIM card being cloned easily even under 5G network,the identity verification process of the popular mobile applications over mobile platform was analyzed.The application behaviors were profiled while users were logging in,resetting password,and performing sensitive operations,thereby the tree model of application authentication was summarized.On this basis,58 popular applications in 7 categories were tested including social communication,healthcare,etc.It found that 29 of them only need SMS verification codes to get authenticated and obtain permissions.To address this issue,two-step authentication was suggested and USIM anti-counterfeiting was applied to assist the authentication process.…”
    Get full text
    Article
  12. 992

    Method of Webshell detection based on multi-view feature fusion by Feng LIN, Liujing XU, Xiaohua CHEN, Weiqiang QI, Ke CHEN, Tiantian ZHU

    Published 2020-06-01
    “…Webshell is a malicious script file on the Web.It is usually uploaded by the attacker to the target server to achieve the purpose of illegal access control.In order to overcome the shortcoming of the existing Webshell detection methods,such as single network traffic behavior,simple by passed signature comparison,and easily bypassed signature comparison,a method of Webshell detection based on multi-view feature fusion for PHP Webshell detecting was proposed.Firstly,multiple features including lexical features,syntactic features,and abstract features were extracted.Secondly,fisher score was used to sort and filter all features according to the degree of importance.Finally,a model that can effectively distinguish Webshell from normal scripts was established through SVM.The large-scale experiment in real-world scenario shows that the final accuracy of our model can reach 92.1%.…”
    Get full text
    Article
  13. 993

    Vulnerability Analysis of CSP Based on Stochastic Game Theory by Jiajun Shen, Dongqin Feng

    Published 2016-01-01
    “…The situation of multiple attack routes is considered for depicting the practical attack scenarios, and the introduction of time aspect characterizes the success probabilities of attackers actions. …”
    Get full text
    Article
  14. 994

    Analysis and improvement of the BACnet/IP based on identity authentication by Pengshou XIE, Jiafeng ZHU, Yongping KANG, Tao FENG, Wei LI, Yuxiang RAN

    Published 2024-03-01
    “…To solve security issues arising from multiple attackable vulnerabilities and key leakage in BACnet/IP authentication, a security-enhanced BACnet/IP-SA protocol authentication scheme was proposed.By analyzing the authentication message flow model of the protocol and modeling it using colored Petri net theory and CPN Tools, vulnerabilities in the security of BACnet/IP were identified.An improvement scheme was proposed based on the Dolev-Yao attacker model and formal analysis method.The BACnet/IP-SA protocol utilized the device’s pseudo-identity to safeguard the actual identity information.It emploied the PUF response for authentication and verified the authenticity of the counterparty’s identity.The session key was generated through the authentication value of the multi-information set.The protocol’s security was demonstrated by combining BAN logic and non-formal methods.The experimental results indicate that the proposed scheme can effectively resist security threats from multi-class attacks and key leakage, enhancing the security of the protocol authentication while reducing computational overhead.…”
    Get full text
    Article
  15. 995

    Network function heterogeneous redundancy deployment method based on immune algorithm by Qingqing ZHANG, Hongbo TANG, Wei YOU, Yingle LI

    Published 2021-02-01
    “…Aiming at the problem that the existing security defense methods cannot resist many unknown vulnerabilities and backdoors in the network function virtualization platform, a mimic defense architecture for network function virtualization using mimic defense ideas was proposed, a heterogeneous redundant deployment method based on an immune algorithm for the construction of heterogeneous pools was proposed.Firstly, the degree of heterogeneity between heterogeneous entities was quantitatively evaluated in combination with the entropy value method, then the network function heterogeneous redundant deployment problem was constructed into a minimax problem with the optimization goal of maximizing the degree of heterogeneity between heterogeneous entities, and finally the immune algorithm was used to quickly solve the optimal deployment solution of network functions.Simulation results show that the proposed method can quickly converge to an optimal deployment scheme and ensure that the overall distribution of heterogeneity between heterogeneous bodies is at a high level, effectively increasing the diversity between heterogeneous bodies and improving the attacker's difficulty.…”
    Get full text
    Article
  16. 996

    Trajectory privacy protection method based on location obfuscation by Shaobo ZHANG, Qin LIU, Guojun WANG

    Published 2018-07-01
    “…In the process of continuous queries,a method of trajectory privacy protection based on location obfuscation was proposed to solve the problem that K-anonymity was difficult to guarantee user privacy in third party architectrue.Firstly,the (G-1) query obfuscation locations through the location prediction was obtained and the dummy location selection mechanism,and then sent them together with the user’s real query location to different anonymizers to form cloaking regions and sent them to the LBS server for queries,and the query results were returned to the user by different anonymizers.In this method,the user’s real query location was confused by the location obfuscation,and the attacker couldn’t deduce the user’s trajectory from a single anonymizer or the LBS server.The method can enhance the privacy of the user’s trajectory and can effectively solve the performance bottleneck in the single anonymizer structure.Security analysis shows the security of the proposed approach,and experiments show this method can reduce the number of interactions between the user and the LBS server and the overhead of the single anonymizer.…”
    Get full text
    Article
  17. 997

    Attribute generalization mix-zone based on multiple secure computation by Bin WANG, Lei ZHANG, Guoyin ZHANG

    Published 2019-04-01
    “…In order to cope with the problems of resist the attack of user tracking with attributes and resist the disguised attack in road networks,based on the conception of attribute generalization and the methods of homomorphic encryption,a privacy protection method to complete the calculation of attribute generalization in private state and achieve attribute generalization was proposed.The proposed method utilized the homomorphic encryption to achieve secret bidding selection with an agent,and then utilize secure multi-party computation to calculate the similar attributes and achieve the attribute generalization in the end.With the help of fully attribute generalization,this method can solve the problem of users can be tracked by the potential attributes,and at the same time the privacy calculation also does not reveal any information to participants,so this method can prevent the disguised attacker that obtains user’s information in mix-zone.At last,in order to demonstrate the superiority of the proposed method in both of academically and practicality,the security analysis and experimental verification are given,and the procedure of formulation verification and the result of experiment further substantiate the superiorities of the proposed method.…”
    Get full text
    Article
  18. 998

    Homomorphic encryption location privacy-preserving scheme based on Markov model by Kai ZHOU, Chang-gen PENG, Yi-jie ZHU, Jian-qiong HE

    Published 2017-01-01
    “…The scheme makes the LBS receives k+1 query contents which let malicious server or attacker can't determine the corresponding relation between queried user's real identity and queried content. …”
    Get full text
    Article
  19. 999

    Framework for Secure Wireless Communication in Wireless Sensor Networks by Muhammad Usama, Fahad T. Bin Muhaya

    Published 2013-12-01
    “…The restricted and constrained nature of sensors along with potentially dynamic behavior of WSNs demands the proper implementation of framework for secure communication in order to prevent attacker from illegally accessing or altering the transmission. …”
    Get full text
    Article
  20. 1000

    Research on RTF array overflow vulnerability detection by De-guang LE, Sheng-rong GONG, Shao-gang WU, Feng XU, Wen-sheng LIU

    Published 2017-05-01
    “…When the virtual function was executed,it could cause array overflow vulnerability due to error operation of the virtual function table of C++ object.By attacking the virtual function,it could cause the system crash,or even the attacker to control the execution of program directly was allowed,which threatened user’s security seriously.In order to find and fix this potential security vulnerability as soon as possible,the technology for detecting such security vulnerability was studied.Based on the analysis of the virtual function call during the MS Word parsing RTF files,the array overflow vulnerability generated by MS Word parsing abnormal RTF files,and a new RTF array overflow vulnerability detection method based on the file structure analytical Fuzzing was proposed.Besides,an RTF array overflow vulnerability detection tool (RAVD,RTF array vulnerability detector) was designed.The test results show RAVD can detect RTF array overflow vulnerabilities correctly.Moreover,the Fuzzing results show RAVD has higher efficiency in comparison with traditional file Fuzzing tools.…”
    Get full text
    Article