期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
Strategy Selection for Moving Target Defense in Incomplete Information Game 被引量:1
1
作者 Huan Zhang Kangfeng Zheng +2 位作者 Xiujuan Wang shoushan luo Bin Wu 《Computers, Materials & Continua》 SCIE EI 2020年第2期763-786,共24页
As a core component of the network,web applications have become one of the preferred targets for attackers because the static configuration of web applications simplifies the exploitation of vulnerabilities by attacke... As a core component of the network,web applications have become one of the preferred targets for attackers because the static configuration of web applications simplifies the exploitation of vulnerabilities by attackers.Although the moving target defense(MTD)has been proposed to increase the attack difficulty for the attackers,there is no solo approach can cope with different attacks;in addition,it is impossible to implement all these approaches simultaneously due to the resource limitation.Thus,the selection of an optimal defense strategy based on MTD has become the focus of research.In general,the confrontation of two players in the security domain is viewed as a stochastic game,and the reward matrices are known to both players.However,in a real security confrontation,this scenario represents an incomplete information game.Each player can only observe the actions performed by the opponent,and the observed actions are not completely accurate.To accurately describe the attacker’s reward function to reach the Nash equilibrium,this work simulated and updated the strategy selection distribution of the attacker by observing and investigating the strategy selection history of the attacker.Next,the possible rewards of the attacker in each confrontation via the observation matrix were corrected.On this basis,the Nash-Q learning algorithm with reward quantification was proposed to select the optimal strategy.Moreover,the performances of the Minimax-Q learning algorithm and Naive-Q learning algorithm were compared and analyzed in the MTD environment.Finally,the experimental results showed that the strategy selection algorithm can enable defenders to select a more reasonable defensive strategy and achieve the maximum possible reward. 展开更多
关键词 Moving target defense Nash-Q learning algorithm optimal strategy selection incomplete information game web service
在线阅读 下载PDF
A Novel Provable Data Possession Scheme Based on Geographic Location Attribute
2
作者 Yaxing Zha shoushan luo +1 位作者 Jianchao Bian Wei Li 《China Communications》 SCIE CSCD 2016年第9期139-150,共12页
Increment of mobile cloud video motivates mobile users to utilize cloud storage service to address their demands, cloud storage provider always furnish a location-independent platform for managing user's data. Howeve... Increment of mobile cloud video motivates mobile users to utilize cloud storage service to address their demands, cloud storage provider always furnish a location-independent platform for managing user's data. However, mobile users wonder if their cloud video data leakage or dynamic migration to illegal service providers. In this paper, we design a novel provable data possession protocol based on data geographic location attribute, which allows data owner to auditing the integrity of their video data, which put forward an ideal choice for remote data possession checking in the mobile cloud storage. In our proposed scheme, we check out whether the video data dynamic migrate to an unspecified location (such as: overseas) by adding data geographic location attribute tag into provable data possession protocol. Moreover, we make sure the security of our proposed scheme under the Computational Diffic-Hellman assumption. The analysis and experiment results demonstrate that our proposed scheme is provably secure and efficient. 展开更多
关键词 cloud storage security provable data possession geographic location security boundary CDH assumption
在线阅读 下载PDF
Secure and Trusted Interoperability Scheme of Heterogeneous Blockchains Platform in IoT Networks
3
作者 Xiao Liu Mingyuan Li +1 位作者 Haipeng Peng shoushan luo 《China Communications》 SCIE CSCD 2023年第11期225-241,共17页
With the rapid development of the Internet of Things(IoT),there is an increasing need for interac-tion between different networks.In order to improve the level of interconnection,especially the interoper-ability of us... With the rapid development of the Internet of Things(IoT),there is an increasing need for interac-tion between different networks.In order to improve the level of interconnection,especially the interoper-ability of users/devices between different nodes is very important.In the IoT heterogeneous blockchain sce-nario,how to ensure the legitimacy of the chain and how to confirm the identity of cross-chain informa-tion users/devices become the key issues to be solved for blockchain interoperability.In this paper,we pro-pose a secure and trusted interoperability mechanism for IoT based on heterogeneous chains to improve the security of blockchain interoperability.In this mecha-nism,a primary sidechain architecture supporting au-thentication at both ends of the heterogeneous chain is designed.In addition,a distributed gateway archi-tecture is proposed for cross-chain authentication and protocol conversion.The security and performance analysis shows that our scheme is feasible and effec-tive in improving the security of cross-chain opera-tions in IoT. 展开更多
关键词 AUTHENTICATION blockchain Interoperabil-ity heterogeneous chain IOT
在线阅读 下载PDF
Audio steganalysis in DCT domain
4
作者 Min LEI Yu YANG +1 位作者 Xinxin NIU shoushan luo 《Frontiers of Electrical and Electronic Engineering in China》 CSCD 2010年第2期203-206,共4页
A sort of audio watermarking algorithm in discrete cosine transform(DCT)domain can embed secret information through modification of the distinction between positive and negative direct current(DC)coefficients.Such an ... A sort of audio watermarking algorithm in discrete cosine transform(DCT)domain can embed secret information through modification of the distinction between positive and negative direct current(DC)coefficients.Such an algorithm achieves a good balance between robustness and imperceptibility.This paper points out that steganographic methods change statistical characteristics of DC coefficients.It also states that the difference between positive and negative DC coefficients can detect whether an audio has hidden information or not.Experiment results justify that the algorithm accuracy is 79%. 展开更多
关键词 STEGANOGRAPHY STEGANALYSIS AUDIO discrete cosine transform(DCT)
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部