-
1081
Intelligent planning method for cyber defense strategies based on bounded rationality
Published 2023-05-01“…Considering that network defense subjects were usually resource-constrained, an intelligent planning and au-tonomous implementation of network defense strategies under bounded rationality was studied considering the concept of intelligent confrontation.First, attack graph, general knowledge and domain-specific knowledge were fused to construct a network defense security ontology.On that basis, knowledge reasoning was utilized to recommend security defense strategies to better adapt to the security needs of protected network information assets and current attack threats.Finally, an autonomous planning and implementation of defense strategies was achieved under the constraints of limited network security defense resources and dynamic changes of network information assets with the help of bounded rationality.The example shows that the proposed method is robust under dynamic attacks.The experiments show that the defense effec-tiveness is improved by 5.6%~26.12% compared with existing game theory and attack graph-based methods against a typical APT attack.…”
Get full text
Article -
1082
Enhanced Invisibility and Robustness of Digital Image Watermarking Based on DWT-SVD
Published 2022-01-01“…In research, a system is being developed to handle veracious types of watermarked attacks, for obtaining extreme security and an adequate level of visibility and robustness. …”
Get full text
Article -
1083
Provably secure biometric and PUF-based authentication for roaming service in global mobility network
Published 2025-02-01“…To ensure secure mutual authentication and prevent attacks such as impersonation, physical attacks, and DoS attacks, GLOMONET must provide strong anonymity, address loss of synchronization issues, and incorporate unclonable devices as an essential security feature. …”
Get full text
Article -
1084
Threat analysis and defense methods of deep-learning-based data theft in data sandbox mode
Published 2021-11-01“…The threat model of deep-learning-based data theft in data sandbox model was analyzed in detail, and the degree of damage and distinguishing characteristics of this attack were quantitatively evaluated both in the data processing stage and the model training stage.Aiming at the attack in the data processing stage, a data leakage prevention method based on model pruning was proposed to reduce the amount of data leakage while ensuring the availability of the original model.Aiming at the attack in model training stage, an attack detection method based on model parameter analysis was proposed to intercept malicious models and prevent data leakage.These two methods do not need to modify or encrypt data, and do not need to manually analyze the training code of deep learning model, so they can be better applied to data theft defense in data sandbox mode.Experimental evaluation shows that the defense method based on model pruning can reduce 73% of data leakage, and the detection method based on model parameter analysis can effectively identify more than 95% of attacks.…”
Get full text
Article -
1085
Improved direct anonymous attestation scheme for mobile computing platforms
Published 2013-06-01“…The security flaws of a direct anonymous attestation scheme proposed by Ge,et al.Were analyzed,and the re-sult shows that the authentication protocol of the scheme is vulnerable to reply attacks and platform masquerade attacks when being used for remote attestation.An improved direct anonymous attestation authentication scheme with the in-volvement of key agreement was proposed to provide the property of mutual authentication.The analysis shows that the proposal can realize direct anonymous attestation with the properties of forgery-resistance and anonymity,and resist reply attacks and platform masquerade attacks; the scheme is effective and suitable for the mobile trusted computing platforms.…”
Get full text
Article -
1086
Investigation on the botnets activities
Published 2007-01-01“…Botnets have become the first-choice attack platform for the network attackers to launch distributed denial of service attacks,steal sensitive information and send spam.They have raised serious threats to normal operation of the Internet and the benefits of the Internet users.The investigation on the wild botnets activities is the necessary for the fur-ther monitering and countermeasure against world-wide botnets.Based on the investigation and analysis on tracking re-cords of 1 961 wild botnets,it shows the statistical results of botnet activities,including amount of botnets,command and control channel distributions,botnet size and end-host distributions,and various types of botnet attack activities.…”
Get full text
Article -
1087
Adversarial detection based on feature invariant in license plate recognition systems
Published 2024-12-01“…Presently, most existing defense and detection technologies against adversarial samples show promising results for specific types of adversarial attacks. However, they often lack generality in addressing all types of adversarial attacks. …”
Get full text
Article -
1088
Analysis of prodromal symptoms and need for short-term prophylaxis in angioedema patients under long-term prophylaxis
Published 2025-02-01“…Among them, 18 experienced zero to three attacks since starting LTP. Abdominal attacks constituted 60% of all attacks, followed by swellings of the extremities and head and neck. …”
Get full text
Article -
1089
ECC-Based Authentication Protocol for Military Internet of Drone (IoD): A Holistic Security Framework
Published 2025-01-01“…The proposed protocol demonstrates strong resistance to various military threats, including DoS attacks, replay attacks, and man-in-the-middle attacks. …”
Get full text
Article -
1090
Dual-verified secure localization method for unmanned intelligent vehicles
Published 2024-06-01“…Unmanned intelligent vehicles are exposed to high risks of network attack, hardware attack, operating system attack and software attack. …”
Get full text
Article -
1091
Survey of artificial intelligence data security and privacy protection
Published 2021-02-01“…Artificial intelligence and deep learning algorithms are developing rapidly.These emerging techniques have been widely used in audio and video recognition, natural language processing and other fields.However, in recent years, researchers have found that there are many security risks in the current mainstream artificial intelligence model, and these problems will limit the development of AI.Therefore, the data security and privacy protection was studied in AI.For data and privacy leakage, the model output based and model update based problem of data leakage were studied.In the model output based problem of data leakage, the principles and research status of model extraction attack, model inversion attack and membership inference attack were discussed.In the model update based problem of data leakage, how attackers steal private data in the process of distributed training was discussed.For data and privacy protection, three kinds of defense methods, namely model structure defense, information confusion defense and query control defense were studied.In summarize, the theoretical foundations, classic algorithms of data inference attack techniques were introduced.A few research efforts on the defense techniques were described in order to provoke further research efforts in this critical area.…”
Get full text
Article -
1092
A Blind Reversible Robust Watermarking Scheme for Relational Databases
Published 2013-01-01“…Our extensive analysis and experimental results show that the proposed scheme is robust against a variety of data attacks, for example, alteration attacks, deletion attacks, mix-match attacks, and sorting attacks.…”
Get full text
Article -
1093
Analysis and Enhancement of a Password Authentication and Update Scheme Based on Elliptic Curve Cryptography
Published 2014-01-01“…., and Li have found out that Islam and Biswas’ improvement was vulnerable to offline password guessing attack, stolen verifier attack, privilege insider attack, and denial of service attack. …”
Get full text
Article -
1094
Model typowania sprawców zamachów z wykorzystaniem bojowych środków chemicznych
Published 2023-04-01“…The purpose of this article is to try to identify the types of individuals and/or non-state organizations that are most capable of carrying out attacks on passenger aircraft using chemical warfare agents. …”
Get full text
Article -
1095
Modeling of the mimic defense based on heterogeneous redundancy
Published 2020-05-01“…The unbalanced development status of network security was introduced.The main hazards and the mechanism model of penetration testing were described,and the inherent shortcomings of many existing traditional defense methods were analyzed.However,new method of the mimic defense model makes the attack information obtained invalid by dynamically selecting the executive set and adaptively changing the system composition.The same attack mode is difficult to be maintained or reproduced.Based on the attack chain model,the traditional defensetechnology and mimic defense technology were analyzed and compared,and it was demonstrated that it had a protective role in multiple stages of the attack chain.Finally,the effectiveness and superiority of the mimic defense was verified by experiments,and the model was summarized and prospected.…”
Get full text
Article -
1096
An Entropy Based Anomaly Traffic Detection Approach in SDN
Published 2015-09-01“…Besides, the controller can be protected from attack based on our system.…”
Get full text
Article -
1097
Research on security threat of intelligent connected vehicle
Published 2019-12-01“…Intelligent connected vehicle (ICV) is becoming the mainstream of automotive industry in the future,and automobile safety has gradually become a problem that cannot be ignored in the automotive industry.The threat attack surfaces in ICV were analyzed in detail,and some representative attack methods were summarized.On this basis,a practical case of using the vulnerabilities of controller area network bus and telematics service provider to attack the Luxgen U5 car was discussed.The experimental results show that there are many attack surfaces that can be used in ICV.Finally,some feasible defensive measures against the threats in ICV were put forward.…”
Get full text
Article -
1098
Security-enhanced three-factor remote user authentication scheme based on Chebyshev chaotic maps
Published 2019-04-01“…The security analysis indicates that the proposed scheme can withstand various well-known attacks including offline guessing attack, impersonation attack, and so on. …”
Get full text
Article -
1099
Bioterrorism in Canada: An Economic Assessment of Prevention and Postattack Response
Published 2001-01-01“…The present paper calculates the human and economic consequences of a bioterrorist attack on Canadian soil using aerosolized Bacillus anthracis and Clostridium botulinum. …”
Get full text
Article -
1100
<span style="font-variant: small-caps">Ventinel</span>: Automated Detection of Android Vishing Apps Using Optical Character Recognition
Published 2025-01-01“…Vishing, a blend of “voice” and “phishing”, has evolved to include techniques like Call Redirection and Display Overlay Attacks, causing significant financial losses. Existing research has largely focused on user behavior and awareness, leaving gaps in addressing attacks originating from vishing applications. …”
Get full text
Article