In recent years, the power grid in Jiangxi Province has entered a new phase of construction in the context of a new power system. However, the traditional networksecurity protection system of the company is facing in...
详细信息
ISBN:
(纸本)9783031807121;9783031807138
In recent years, the power grid in Jiangxi Province has entered a new phase of construction in the context of a new power system. However, the traditional networksecurity protection system of the company is facing increasing security risks [1]. This paper first elucidates the network structure characteristics of the new power system and identifies the security risks it faces. Subsequently, combining the characteristics of boundary protection and static protection in the existing networksecurity protection system, this paper analyzes the challenges faced by the protection system from aspects such as power source structure, grid configuration, business models, and technical foundations. Based on the content of security challenges, the paper proposes the requirements for networksecurity protection in terms of trusted access, intelligent perception, and precise protection. Lastly, in conjunction with the development trends of security systems and new technologies, the paper summarizes the technological development directions in areas such as perception technology, blocking technology, security detection and evaluation technology, and validation technology.
software plagiarism is the reuse of software code without proper attribution and in violation of software licensing agreements or copyright laws. With the popularity of open-source software and the rapid emergence of ...
详细信息
ISBN:
(纸本)9783031649530;9783031649547
software plagiarism is the reuse of software code without proper attribution and in violation of software licensing agreements or copyright laws. With the popularity of open-source software and the rapid emergence of AI Large Language Models such as ChatGPT and Google Bard, the concerns of plagiarized AI-generated code have been rising. Code attribution has been used to aid in the detection of software plagiarism cases. In this paper, we investigate the authorship of AI-generated code. We analyze the feasibility of code attribution approaches to verify authorship of source code generated by AI-based tools and investigate scenarios when plagiarized AI code can be identified. We perform an attribution analysis of an AI-generated source code on a large sample of programs written by software developers and generated by ChatGPT and Google Bard tools. We believe our work offers valuable insights for both academia and the software development community while contributing to the research in the authorship style of the fast-growing AI conversational models, ChatGPT and Bard.
Vehicular ad hoc network (VANET) provides short range communication for vehicles, achieving information sharing to improve road safety and traffic efficiency. However, public communication between vehicles has led to ...
详细信息
ISBN:
(纸本)9789819608072;9789819608089
Vehicular ad hoc network (VANET) provides short range communication for vehicles, achieving information sharing to improve road safety and traffic efficiency. However, public communication between vehicles has led to issues with vehicle communication security and privacy leakage, which seriously restricts the development of VANET. The authentication mechanism can verify the reliability of messages and the validity of identities, thereby ensuring communication security between vehicles. Therefore, this paper proposes a certificateless authentication scheme based on the characteristics of blockchain, such as decentralization, traceability, and tamper resistance, combined with a pairing-free certificateless password mechanism. Through security proofs and analysis, it is demonstrated that we achieve high security and satisfies security requirements such as integrity, traceability, anonymity, and revocability. Furthermore, simulation comparisons with existing schemes show that we have lower computational overhead and communication costs.
Sybil attack consists to generate several false identities in order to bypass access control and thus produce false messages to seriously undermine the normal operation of Wireless Sensor networks (WSN). It is conside...
详细信息
ISBN:
(纸本)9783031815690;9783031815706
Sybil attack consists to generate several false identities in order to bypass access control and thus produce false messages to seriously undermine the normal operation of Wireless Sensor networks (WSN). It is considered one of the major threats to WSNs. The problem has been widely taken into account by researchers. However, detecting this attack and effectively countering it in the context of resource-constrained connected objects remains a challenge. In this paper, we propose a lightweight authentication system based on elliptic curve cryptography to counter this attack. This asymmetric encryption system uses smaller encryption keys than RSA and EL-Gamal, but offers the same level of security.
Traditional network architecture can no longer meet the development needs of technologies such as cloud computing and big data. SDN network architecture has the characteristics of high openness and programmability, wh...
详细信息
The widespread presence of peripheral devices in households, connecting to desktops and laptops, creates a substantial security vulnerability. These devices can be manipulated at the hardware level, allowing unauthori...
详细信息
The importance of computernetwork experiments in teaching is elaborated, while traditional computernetwork systems have low efficiency and chaotic management, these shortcomings affect the effectiveness of related t...
详细信息
Captchas are widely used to distinguish between human and machine programs and protect computers from malicious attacks. However, with the development of image recognition and deep learning techniques, the attack succ...
详细信息
ISBN:
(纸本)9783031649479;9783031649486
Captchas are widely used to distinguish between human and machine programs and protect computers from malicious attacks. However, with the development of image recognition and deep learning techniques, the attack success rate of traditional text-based and image-based captcha is getting higher. This leads to increasing demand for more secure captcha. In recent years, some captcha service providers such as Tencent, NetEase, Geetest, etc. put forward novel visual reasoning captchas to improve the safety level, and reduce the risk of attacks. There has been little research on this kind of novel captcha. Existing method mainly uses modular method to break it, but has to train separately and is still insufficient for reasoning task. In order to solve above challenges for visual reasoning captcha, this paper introduces a novel end-to-end graph reasoning network to crack the visual reasoning captcha for the first time. We use object detection model to identify all the objects in the captcha. Then, we extract the distribution of question attention and image features to build a graph neural network. Finally, an end-to-end reasoning framework for attacking visual reasoning captcha is constructed by using reasoning module to integrate multi-modal. We achieve a higher success rate of attack on some very popular visual reasoning captchas. The results will provide technical and theory support for the security evaluation of captchas, and promote research on more secure captchas.
In this paper, we propose a lattice-based certificateless signature scheme and certificateless aggregate signature which can be used to verify a large number of signatures simultaneously efficiently. To improve the se...
详细信息
ISBN:
(纸本)9783031649479;9783031649486
In this paper, we propose a lattice-based certificateless signature scheme and certificateless aggregate signature which can be used to verify a large number of signatures simultaneously efficiently. To improve the security of our scheme, we have implemented our signature algorithm without trusted third parties. The security of our proposed signature algorithm can be reduced to the SIS problem under the random oracle model. Moreover, our construction only needs matrix multiplication and rejection sampling operation, so the algorithm is naturally simple and efficient. Besides, we've done some experiments using the NTL library, indicating our scheme has less time overhead and storage overhead than other schemes. To our best knowledge, we propose the first certificateless aggregate signature without trapdoors.
The growth of "distributed denial-of-service" attacks has become one of the most serious threats to Internet security in recent years. They are classified as serious and have the potential to disrupt network...
详细信息
暂无评论