Single method may hardly satisfy fast and full-scale identification owing to the limitation of capability and speed, especially under the trend of new applications emerging and capacity expanding in Internet. An onlin...
详细信息
ISBN:
(纸本)9783642253485;9783642253492
Single method may hardly satisfy fast and full-scale identification owing to the limitation of capability and speed, especially under the trend of new applications emerging and capacity expanding in Internet. An online identification architecture is proposed, in which identify units are assembled flexibly with various topologies to perform diverse tasks. Furthermore, the front end unit filters traffic according to the feedback of identifying results of back end units. Process pressure of system is reduced for core identifying units so that the system processes can achieve convenient capacity expanding and smooth capability updating. Low cost and high performance online identification is achieved.
In d-S evidence theory, the dempster's rule always leads to counter-intuitive results when combining conflicting evidences. The methods proposed to solve these problems all simply focus on BBA features, and ignore...
详细信息
A new web attack pattern called HTTP Parameter Pollution has been presented in recent years. The harm anddetection method about HPP has become a hot topic in the field of web application security. In the paper, we st...
详细信息
With the development of NGN which has SIP as the core protocol, there are more and more video communication services. It becomes focused on how to implement the interception and control in Video communication system b...
详细信息
Hurst parameter estimation accuracy is very important in ddoS attack detection model based on traffic self-similarity changes. If the estimation accuracy is poor, the undetected and false detection should happen. This...
详细信息
Hurst parameter estimation accuracy is very important in ddoS attack detection model based on traffic self-similarity changes. If the estimation accuracy is poor, the undetected and false detection should happen. This paper proposed the fractional Fourier transform method to estimate Hurst parameter. Combined with the idea of regression diagnosis and change point analysis, an effective, adaptive estimator of Hurst parameter based on weighted least squares was presented. We used FGN data set to verify our idea. The experimental results show that our method has high estimation accuracy, and the ability to select the optimal scale interval adaptively than the existing common method. So the method can improve the detection performance of ddoS attacks effectively.
Since the emergence of Peer-to-Peer(P2P) networking in the late 90's, P2 P applications are evolving rapidly. In contrast to the first-generation P2 P which used well-defined port numbers, current P2 P application...
详细信息
Since the emergence of Peer-to-Peer(P2P) networking in the late 90's, P2 P applications are evolving rapidly. In contrast to the first-generation P2 P which used well-defined port numbers, current P2 P applications have ability to communicate with each other through arbitrary port by consultation. After studying current P2 P applications, this paper presents a FPGA implementation of scheme to identify P2 P flow based on the connection pattern of P2 P flow. We take full use of HASH algorithm to accelerate the search processing. Ourresults indicate the scheme achieves the purpose of online processing.
Single next hop routing algorithm which widely used centralize the transmission paths and leads to a waste of network resources and transmission congestion. For better performance, recently researches focus on multi n...
详细信息
The present study conducted a multi-scale dynamic functional connectivity analysis to evaluate dynamic behavior of acupuncture at Taichong (Lr3) and sham acupoints surrounding Taichong results showeddifferences in ...
详细信息
The present study conducted a multi-scale dynamic functional connectivity analysis to evaluate dynamic behavior of acupuncture at Taichong (Lr3) and sham acupoints surrounding Taichong results showeddifferences in wavelet transform coherence characteristic curves in the declive, precuneus, postcentral gyrus, supramarginal gyrus, and occipital lobe between acupuncture at Taichong and acupuncture at sham acupoints. The differences in characteristic curves revealed that the specific effect of acupuncture existedduring the post-acupuncture rest state and lasted for 5 minutes.
The problem of wireless security for the downlink of MISO-OFdMA systems operating over a frequency-selective channel is *** exploiting the dimensions provided by multiuser MISO-OFdMA systems forrandom user selection ...
详细信息
The problem of wireless security for the downlink of MISO-OFdMA systems operating over a frequency-selective channel is *** exploiting the dimensions provided by multiuser MISO-OFdMA systems forrandom user selection and beamforming,a novel physical-layer security method is to achieve low probability of interception (LPI),which let the attacker’s equivalent channel be a random one,is proposed in the ***,hypothesis testing is used to determine which subcarriers belong to him by any intended user without user selection *** results have verified the effective-ness.
Control flow obfuscation is an important way of software copyright protection, the main purpose is to make the static analysis tools produce wrong control flow graph, and then prevent malicious use of reverse engineer...
详细信息
Control flow obfuscation is an important way of software copyright protection, the main purpose is to make the static analysis tools produce wrong control flow graph, and then prevent malicious use of reverse engineering against software. In this paper we ropose an approach to implement control flow obfuscation using Windows structured exception handling mechanism. Programs are obfuscated by replacing branch instructions with exception code and inserting fake branch instruction after the exception code. Furthermore, exception code random technology is used to improve the resilience of the obfuscated code. Experimental results show that disassemble tools fail to identify 56.7% control flow of the obfuscated code, and have a misunderstanding of 40% control flow. The increase in program size and execute time of the obfuscated code is also modest.
暂无评论