Dual-structural network of active defense

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Dual-Level Defense Framework for DDoS Attacked Network

DDoS has become one of the thorniest problems in the Internet, and aims to deny legitimate users of the services they should have. In this paper, we introduce novel dual level framework that consist of attack detection (D-LAD) and characterization scheme for defending against the DDoS attacks. The macroscopic level detectors (MaLAD) attempt to detect voluminous congestion inducing attacks which...

متن کامل

Dual Z-Source Network Dual-Input Dual-Output Inverter

This paper presents a modified nine switch inverter with two inputs and two Z-source networks. This inverter has two DC inputs and two AC outputs. Input DC voltages can be boosted to the required level. Amplitude, frequency and phase of AC output voltages can be controlled, independently. The proposed converter can be used in applications with two unregulated DC sources, which require feeding ...

متن کامل

a structural survey of the polish posters

تصویرسازی قابلیتهای فراوانی را دارا است

15 صفحه اول

Optimizing Active Cyber Defense

Active cyber defense is one important defensive method for combating cyber attacks. Unlike traditional defensive methods such as firewall-based filtering and anti-malware tools, active cyber defense is based on spreading “white” or “benign” worms to combat against the attackers’ malwares (i.e., malicious worms) that also spread over the network. In this paper, we initiate the study of optimal a...

متن کامل

Evolving Active Defense Strategies

Active defense is a security tool that has not received much attention in research. However, it is an important topic that needs to be discussed because although not generally accepted, is still utilized informally. The largest problem facing active defense is determining what actions to take and when to take them given the risks of the actions and the risk of the threats. In this paper, compet...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: SCIENTIA SINICA Informationis

سال: 2018

ISSN: 1674-7267

DOI: 10.1360/n112017-00171