security flaws existed in protocol implementations might be exploited by malicious attackers and the consequences can be very serious. Therefore, detecting vulnerabilities of network protocol implementations is becomi...
详细信息
We propose a evaluation model of botnet based on peer to peer. We propose key metrics to measure their activities(e.g, Stealthy, Effectiveness, Efficiency and Robustness). Using these performance metrics, we can study...
详细信息
The displaced phase center antenna(DPCA)technique is an effective strategy to achieve wide-swath synthetic aperture radar(SAR)imaging with high azimuth ***,traditionally,it requires strict limitation of the pulse repe...
详细信息
The displaced phase center antenna(DPCA)technique is an effective strategy to achieve wide-swath synthetic aperture radar(SAR)imaging with high azimuth ***,traditionally,it requires strict limitation of the pulse repetition frequency(PRF)to avoid non-uniform ***,any deviation could bring serious ambiguity if the data are directly processed using a matched *** break this limitation,a recently proposed spectrum reconstruction method is capable of recovering the true spectrum from the nonuniform ***,the performance is sensitive to the selection of the *** regularization based imaging may provide a way to overcome this *** existing time-domain method,however,requires a large-scale observation matrix to be built,which brings a high computational *** this paper,we propose a frequency domain method,called the iterative spectrum reconstruction method,through integration of the sparse regularization technique with spectrum analysis of the DPCA *** approximately expressing the observation in the frequency domain,which is realized via a series of decoupled linear operations,the method performs SAR imaging which is then not directly based on the observation matrix,which reduces the computational cost from O(N2)to O(N log N)(where N is the number of range cells),and is therefore more efficient than the time domain *** sparse regularization scheme,realized via a fast thresholding iteration,has been adopted in this method,which brings the robustness of the imaging process to the PRF *** provide a series of simulations and ground based experiments to demonstrate the high efficiency and robustness of the *** simulations show that the new method is almost as fast as the traditional mono-channel algorithm,and works well almost independently of the PRF ***,the suggested method can be accepted as a practical and efficient wide-swath SAR imaging technique.
Quantizing Error during the process of JPEG compression is analyzed, and a new information hiding algorithm is proposed based on Quantizing Error of JPEG image. Experimental results show that the proposed algorithm ca...
详细信息
Cloud computing is a hot topic of current research, for anonymous authentication is required in many applications scenarios of e-business based on cloud computing, users do not want to expose their identity, users jus...
详细信息
Boolean functions with large algebraic immunity resist algebraic attacks to a certain degree, but they may not resist fast algebraic attacks (FAA's). It is necessary to study the resistance of Boolean functions ag...
详细信息
In this paper, a novel steganography based on joint photographic expert-group (JPEG) is proposed. The proposed method embeds two secret bits into each middle frequency coefficient using the least two-significant bits ...
详细信息
In this paper, a novel steganography based on joint photographic expert-group (JPEG) is proposed. The proposed method embeds two secret bits into each middle frequency coefficient using the least two-significant bits (2-LSBs). For the rest coefficients, the quantization error, resulting from processing the JPEG-compressed image, is compensated while embedding variable-length secret bits. At last, a JPEG stego-image is generated using the quality factor with the value of 100. Experimental results show that, the proposed steganographic method can provide a high information hiding capacity and keep the visual quality well.
Protocol state machine is very essential in networksecurity and implementation fields, however, improper management of software evolution, compounded by changing and imprecise requirements, along with "short tim...
详细信息
Protocol state machine is very essential in networksecurity and implementation fields, however, improper management of software evolution, compounded by changing and imprecise requirements, along with "short time to market" phenomenon, often leads to a lack of up-to-date specifications and they are often characterized by bugs, anomalies and even threads. How to mine the accurate protocol state machine under investigation is still an open problem. We address this problem by using an interactive grammar inference technique as it could generate queries to the protocol implementation in learning process. This paper describes: (1) a flexible method to construct and parse real packet according to the packet format, (2) how to generate packet queries to explore protocol state machine space, (3) applies the QSM technology to mine protocol state machine from network traces. To access the usefulness of our approach, several experiments for different protocols are performed and we could get more objective and accurate results compared with other protocol specification mining methods.
security flaws existed in protocol implementations might be exploited by malicious attackers and the consequences can be very serious. Therefore, detecting vulnerabilities of network protocol implementations is becomi...
详细信息
ISBN:
(纸本)9781467307215
security flaws existed in protocol implementations might be exploited by malicious attackers and the consequences can be very serious. Therefore, detecting vulnerabilities of network protocol implementations is becoming a hot research topic recently. However, protocol security test is a very complex, challenging and error-prone task, as constructing test packets manually or randomly are not practical. This paper presents an efficient mutation-based approach for detecting implementation flaws of network protocol. Compared with other protocol testing tools, our approach divides the procedure of protocol testing into many phases, and flexible design can cover many testing cases for the protocol implementations under testing, and could apply for testing various protocol implementations quite easily. Besides, this approach is more comprehensible that makes the protocol security test easier to carry out. To assess the usefulness of this approach, several experiments are performed on four FTP server implementations and the results showed that our approach can find flaws of protocol implementation very easily. The method is of the important application value and can improve the security of network protocols.
暂无评论