With the increasing number of cyber-attack behaviors, it has caused great harm to the contemporary society. Currently, the cyber attack behavior recognition module is usually implemented by adopting a strategy based o...
ISBN:
(纸本)9798400716485
With the increasing number of cyber-attack behaviors, it has caused great harm to the contemporary society. Currently, the cyber attack behavior recognition module is usually implemented by adopting a strategy based on rule-base matching, which often fails to identify the attack behaviors when faced with unpreset path attack behaviors of the actual attack process due to its reliance on predefined abnormal behavior patterns and attack labels. Therefore, this paper proposes an efficient and accurate unpreset behavior detection framework for cyber-attack behaviors, introduces machine learning techniques into the identification of unpreset attack behaviors, proposes an RF-Corr feature importance assessment method based on the Kendall correlation coefficient between features and the feature weight values, and designs an unpreset attack behavior identification method based on BiLSTM neural network, which improves the current effectiveness of identification and detection for unpresetted behavior of cyber attacks, and provides a solution for artificial intelligence detection of unpresetted behavior of cyber attacks.
Current white-box attack to deep neural networks have achieved considerable success, but not for black-box attack. The main reason is poor transferability, as the adversarial examples are crafted with single deep neur...
详细信息
Neural networks are vulnerable when input data is applied with human-imperceptible perturbations, which is called adversarial examples. When used in image classification models, adversarial examples mislead neural net...
详细信息
Code clones are code fragments that are similar in composition or semantics of code statements, which can significantly improve software development efficiency and reduce costs by improving the quality of reusable cod...
详细信息
Cyberspace is vulnerable to continuous malicious attacks. Traceability of network attacks is an effective defense means to curb and counter network attacks. In this paper, the evolutionary game model is used to analyz...
详细信息
At present,there is a problem of false positives caused by the too vast mimic scope in mimic transformation *** studies have focused on the“compensation”method to deal with this problem,which is expensive and cannot...
详细信息
At present,there is a problem of false positives caused by the too vast mimic scope in mimic transformation *** studies have focused on the“compensation”method to deal with this problem,which is expensive and cannot fundamentally solve *** paper provides new insights into coping with the ***,this study summarizes the false-positive problem in the mimic transformation,analyzes its possible harm and the root ***,three properties about the mimic scope are *** on the three properties and security quantification technology,the best mimic component set theory is put forward to solve the false-positive *** are two algorithms,the supplemental method and the subtraction *** best mimic component set obtained by these two algorithms can fundamentally solve the mimic system’s false-positive problem but reduce the cost of mimic *** make up for the lack of previous researches.
Zn–Mn aqueous batteries (ZMABs)present potential for grid-scale energy storage with the benefits of low cost,high safety and eco-friendliness [1].Since 1866 (Leclanchéwet cell), we have witnessed the prosperity ...
Zn–Mn aqueous batteries (ZMABs)present potential for grid-scale energy storage with the benefits of low cost,high safety and eco-friendliness [1].Since 1866 (Leclanchéwet cell), we have witnessed the prosperity of ZMABs in the primary battery market and an increasing interest in rechargeable ZMABs.
With increasing number of software vulnerabilities, the quantity of attacks utilizing malicious samples is also on rise, leading to intensified adversarial competition. In particular, the application of automatic vuln...
详细信息
Software testing is an effective means of ensuring software quality. The cost of software testing is the main component of the total cost of software development. The generation of test data is very important in testi...
详细信息
The mining and exploitation of security vulnerabilities have always been the focus of offensive and defensive confrontations. In recent years, with the application of technologies such as fuzzing in vulnerability mini...
详细信息
暂无评论