Digital method is an effective way to protect the intangible cultural heritage food resources. In this paper, with the development background of modern digital transformation, the use of "Internet plus", web...
详细信息
For reducing the complexity, improving the reusability and shorten the composition period, the service composition process is proposed to be divided into service template composition based on functional planning and t...
详细信息
Artificial intelligence has played a significant role in the expansion of the agriculture industry in recent times by evaluating data and making recommendations for better production. An automated method for determini...
详细信息
For securing mobile ad-hoc networks, asymmetric key cryptosystem is one of effective technologies for encryption and authentication. However, for public-key distribution, the assumption about the availability of on-li...
详细信息
ISBN:
(纸本)9781424435890
For securing mobile ad-hoc networks, asymmetric key cryptosystem is one of effective technologies for encryption and authentication. However, for public-key distribution, the assumption about the availability of on-line trusted authorities or certificate repositories is unrealistic due to the very nature of ad-hoc networks. In this paper, a group-based public-key management system that allows users to generate public/private key pairs by themselves is proposed. In the proposed system, a group head issues certificates for group members and each node can perform authentication without requirement of on-line fixed trusted authorities. Taking self-securing approach, the proposal eliminates the problem of unrealistic assumption by introducing a localized trust model and suggesting an adaptive public-key distribution mechanism. Moreover, in the public-key distribution scheme, a solution for reducing overhead is proposed to adapt our system with the scalability of networks. Therefore, the system is suitable for any contemporary routing protocols in large mobile ad-hoc networks.
Aiming at the retail forecasting problem, this article uses software such as MATLAB, SPSS, and Python as tools, and uses dual correlation analysis, LSTM neural network-ARIMA joint model, and BP neural network-based su...
详细信息
The paper proposes a new network intrusion detection system based on fuzzy neural network by redesigning the intrusion detection system's architecture and arithmetic. In order to overcome the difficulty of specify...
详细信息
ISBN:
(纸本)7900719229
The paper proposes a new network intrusion detection system based on fuzzy neural network by redesigning the intrusion detection system's architecture and arithmetic. In order to overcome the difficulty of specifying the membership function of rules depending on experiences of experts in multi-dimension space.,neural network is introduced to distinguish non-linearly input/output characteristics of complex system and to generate rule sets and membership functions automatically. The new architecture adopts the network processor to collect and analyse the data in the low layer of network.,and to establish a prototype system. This system demonstrated in this experiment appears to be better intrusion detection ability, moreover, which is able to detect unknown attack and plays down false alarms.
In this paper, we study a new class of attacks, the i nvisible LOC alization ( iLOC ) attack, which can accurately and invisibly localize monitors of Internet threat monitoring (ITM) systems, a class of widely deplo...
详细信息
In this paper, we study a new class of attacks, the i nvisible LOC alization ( iLOC ) attack, which can accurately and invisibly localize monitors of Internet threat monitoring (ITM) systems, a class of widely deployed facilities to characterize Internet threats, such as worm propagation, denial-of-service (DoS) attacks. In the iLOC attack, the attacker launches low-rate port-scan traffic, encoded with a selected pseudo-noise code (PN- code), to targeted networks. While the secret PN-code is invisible to others, the attacker can accurately determine the existence of monitors in the targeted networks based on whether the PN-code is embedded in the report data queried from the data center of the ITM system. We conduct extensive simulations on the iLOC attack using real-world traces. Our data demonstrate that the iLOC attack can accurately identify monitors while remaining invisible to the ITM. Finally, we present a set of guidelines to counteract the iLOC attack.
暂无评论