網(wǎng)絡(luò)信息傳輸中對(duì)攻擊快速防御仿真研究
[Abstract]:The fast defense against attack in network information transmission can effectively guarantee the safe and reliable operation under attack. To prevent attacks in network information transmission, it is necessary to analyze the characteristics of network spectrum to detect the vulnerability of attack link layer, to evaluate the network intrusion attack quantitatively, and to finish the fast defense against the attack. The traditional methods are used to reduce the dimension of the data and build the hypersphere model of support vector machine, but the quantitative evaluation of the network intrusion attack is neglected, which leads to the unsatisfactory defense effect. This paper presents an attack defense method in network information transmission based on security threat quantification evaluation. Firstly, the analytical model of network intrusion defense is designed, the link vulnerability data under attack is decomposed by hyperbolic frequency modulation, and the slow fading characteristic of link vulnerability layer is analyzed. Using aliasing spectrum ambiguity function to analyze the characteristics of network spectrum to detect the vulnerability of attack link layer, to evaluate the network intrusion attack quantitatively, and to set up the quantitative evaluation index system of the profit and cost of network intrusion attack defense. Completes the network information transmission attack defense. Simulation results show that the proposed network attack detection method has good performance and shows the superior value of security and defense.
【作者單位】: 重慶醫(yī)科大學(xué)醫(yī)學(xué)信息學(xué)院;
【基金】:重慶市科技計(jì)劃重大專項(xiàng)(cstc2015shms-ztzx10011)
【分類號(hào)】:TP393.08
【相似文獻(xiàn)】
相關(guān)期刊論文 前10條
1 朱超軍;;計(jì)算機(jī)網(wǎng)絡(luò)入侵安全檢查分析研究[J];黑龍江科技信息;2009年23期
2 肖軍;李春鳴;譚敬華;楊慶華;;發(fā)現(xiàn)網(wǎng)絡(luò)入侵及做好防范應(yīng)注意的幾個(gè)問(wèn)題[J];黑龍江科技信息;2011年27期
3 吳林錦;武東英;劉勝利;劉龍;;基于本體的網(wǎng)絡(luò)入侵知識(shí)庫(kù)模型研究[J];計(jì)算機(jī)科學(xué);2013年09期
4 吳應(yīng)良,韋崗;網(wǎng)絡(luò)入侵及其安全防范對(duì)策研究[J];計(jì)算機(jī)應(yīng)用研究;2000年11期
5 崔毅,邵希娟;網(wǎng)絡(luò)入侵現(xiàn)象分析及防范對(duì)策[J];山西大學(xué)學(xué)報(bào)(自然科學(xué)版);2001年01期
6 曾澤建;網(wǎng)絡(luò)入侵與防御[J];川北教育學(xué)院學(xué)報(bào);2002年03期
7 李睿;計(jì)算機(jī)網(wǎng)絡(luò)入侵與反入侵技術(shù)初探[J];企業(yè)技術(shù)開發(fā);2002年06期
8 周學(xué)廣;無(wú)線網(wǎng)絡(luò)入侵初探[J];通信技術(shù);2002年10期
9 姜文凱;;怎樣防范網(wǎng)絡(luò)入侵?[J];金融電子化;2002年12期
10 梁云杰;網(wǎng)絡(luò)入侵與檢測(cè)技術(shù)分析[J];河南職業(yè)技術(shù)師范學(xué)院學(xué)報(bào);2003年01期
相關(guān)會(huì)議論文 前10條
1 錢桂瓊;許榕生;;網(wǎng)絡(luò)入侵取證審計(jì)數(shù)據(jù)分析技術(shù)的研究[A];第十七次全國(guó)計(jì)算機(jī)安全學(xué)術(shù)交流會(huì)暨電子政務(wù)安全研討會(huì)論文集[C];2002年
2 張樂(lè);郝文江;武捷;;美國(guó)網(wǎng)絡(luò)入侵信息披露制度簡(jiǎn)介[A];全國(guó)計(jì)算機(jī)安全學(xué)術(shù)交流會(huì)論文集·第二十五卷[C];2010年
3 鐘華;陶妍丹;;基于攻擊聚類的計(jì)算機(jī)網(wǎng)絡(luò)入侵預(yù)警研究[A];2007北京地區(qū)高校研究生學(xué)術(shù)交流會(huì)通信與信息技術(shù)會(huì)議論文集(上冊(cè))[C];2008年
4 范曉嵐;姜建國(guó);曾啟銘;;BO網(wǎng)絡(luò)入侵的實(shí)時(shí)檢測(cè)[A];中國(guó)工程物理研究院科技年報(bào)(1999)[C];1999年
5 王娟;舒敏;傅,
本文編號(hào):2424139
本文鏈接:http://sikaile.net/guanlilunwen/ydhl/2424139.html