首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到18条相似文献,搜索用时 468 毫秒
1.
软件定义网络(software defined network,SDN)作为一种新型网络架构,其转控分离及集中控制的架构思想为网络带来了显著的灵活性,同时为感知全局网络状态提供了便利。分布式拒绝服务攻击(distributed denial of service,DDoS)是一种典型的网络攻击方式。针对SDN网络中进行DDoS攻击检测的问题,提出了一种基于条件熵和决策树的DDoS攻击检测方法,利用条件熵判断当前网络状态,通过分析SDN中DDoS攻击特点,提取用于流量检测的6项重要特征,使用C4.5决策树算法进行网络流量分类,实现对SDN中的DDoS攻击的检测。实验表明,相比于其它研究方法,文中提出的方法不仅具有较高检测精确率和召回率,而且明显缩短了检测时间。  相似文献   

2.
参照MIT Lincoln实验室的入侵检测实验方案,建立了一个基于Linux主机的入侵检测实验环境,提出了相应的入侵特征选择方案,并应用进化神经网络检测入侵,实现了对多种攻击的实时特征抽取及检测。实验表明:系统设计合理,特征抽取及检测方法有效,能较好地检测已知和未知入侵。  相似文献   

3.
本文在介绍了SQL注入攻击的概念和步骤的基础上,提出了一种基于本体的SQL注入检测方法。通过在正常网页页面与异常网页页面(即可能存在SQL注入漏洞的页面)之间建立共识的领域本体,在二者之间进行信息比对,据此对Web页面中存在的SQL注入攻击漏洞进行检测。相关实验结果显示,该方法具备较高的检测准确率。  相似文献   

4.
信息物理系统(CPS)在原本的工控系统中加入了计算单元,使攻击者能够通过对该网络进行攻击。本文考虑攻击者通过恶意篡改信道中传输的传感器测量数据,使计算单元无法根据测量值对物理环境做出正确决策。通过改进针对CPS控制层欺骗攻击的卡尔曼滤波器算法,使改进后的算法对多种类型的欺骗攻击都有较好的检测性能,并能在一定程度上恢复被篡改的数据。本文使用改进算法对田纳西伊斯曼过程中反应釜内的压强测量值进行攻击检测,并与原算法进行比较,通过实验可以验证改进后算法对偏差型和几何型攻击的检测和恢复效果明显优于原算法。  相似文献   

5.
提出了基于虚特征分解(IED)特征、针对抖动量化(PQ)隐写术的专用隐写分析方法。利用统计学理论,分析了JPEG图像经PQ嵌入秘密信息后,其空域行和列的线性相关性降低; 并在实验结果中得到验证。采用支持向量机(SVM)作为分类器,建立了一个测试数据库;对基于IED特征隐写分析方法进行了隐藏信息检测的仿真实验。实验结果表明:该方法比其他现有的隐写分析方法更有效,对PQ隐写术检测率超过70%,且该方法具有较好的盲检测性能。  相似文献   

6.
检测血浆D-二聚体在肺栓塞诊断中的应用   总被引:5,自引:2,他引:3  
目的探讨D二聚体定量检测在肺栓塞早期诊断中的应用价值.方法回顾性分析了该院收治的75例肺栓塞、32例肺心病等患者血浆D二聚体定量检测结果,复习相关文献资料,对D二聚体在肺栓塞早期诊断中的应用进行评价.结果该实验结果表明,半定量乳胶凝集法对肺栓塞的敏感性只有53.7%,Liat-est法检测D二聚体对肺栓塞的敏感性为97%,两种方法差异显著(P<0.01).肺心病及其它血栓形成的疾病D二聚体也有较高的阳性率,因而对肺栓塞的特异性较低.结论Liatest法、酶联免疫法等敏感性较高可作为排除诊断肺栓塞的首选筛选试验,尤其是Liatest法较易推广,更适合门诊、急诊检测.  相似文献   

7.
提出了基于Gammachirp耳蜗能量谱的音频时频域特征表示方法,并在此基础上进一步构造了一种音频指纹算法。首先利用非负矩阵分解(Non-negative Matrix Factorization, NMF)提取Gammachirp耳蜗能量谱的局部特征,然后对该局部特征进行差分和量化,以提高算法的鲁棒性,并降低检索的计算复杂度。实验结果表明:在经受音频编辑软件多种攻击和实际环境中录音检索时,本文算法都具有很好的鲁棒性和识别率。  相似文献   

8.
DNA核酸疫苗诱导小鼠免疫应答的作用   总被引:1,自引:0,他引:1  
目的 研究DNA核酸疫苗诱导机体免疫应答的能力,为揭示其诱导机制奠定基础。方法 采用本室构建的单纯疱疹病毒2型(HSV-2)糖蛋白D的真核表达质粒pcDNA-gD2免疫小鼠,通过对ELISA法动态检测特异性抗体的产生及小鼠外周血Th1细胞因子IFN-γ,IL-2的水平同时进行病毒攻击实验。结果 pcDNA-gD2和HSV-2免疫组小鼠从第2周开始产生特异性抗糖蛋白D抗体,第4-5周达到高。外周血清IFN-γ,IL-2水平明显高于阴性对照组。病毒攻击实验显示2周内pcDNA-gD2和HSV-2免疫组小鼠无一只死亡,而阴性对照组小鼠全部死亡。结论 pcDNA-gD2真核表达质粒可以诱导小鼠产生特异性体液免疫和Th1型细胞免疫,并具有免疫保护作用。  相似文献   

9.
目的从华支睾吸虫成虫全长cDNA质粒文库中识别组织蛋白酶D样天冬氨酸蛋白酶基因,利用生物信息学方法预测其结构和功能特征,为进一步的实验研究提供理论指导。方法利用生物信息学网站的在线分析工具和Vector NTI suite软件包,识别华支睾吸虫组织蛋白酶D样天冬氨酸蛋白酶基因,并预测其编码蛋白质的各种结构特征与功能特征,并根据该基因构建种系分子进化树。结果BLASTx分析该基因为全长基因,该基因全长1,459bp,编码425个氨基酸,具有两个天冬氨酸蛋白酶的催化位点。SignalP分析该基因编码的蛋白质含有信号肽序列,切割位点在第17和第18个氨基酸之间,分子进化树提示其与日本血吸虫组织蛋白酶D样天冬氨酸蛋白酶亲缘关系最近。结论组织蛋白酶D属于天冬氨酸蛋白酶家族,为分泌性蛋白,与日本血吸虫同源基因一致性最高,为后续实验筛选华支睾吸虫病的诊断抗原及药物靶标提供了必要的理论依据。  相似文献   

10.
目的研究白介素2(IL-2)cDNA协同单纯疱疹病毒1型(HSV-1)gD核酸疫苗免疫对机体体液免疫和细胞免疫应答的影响,以及在HSV-1病毒角膜攻击时的保护效果.方法利用pcDNA3.1载体分别构建HSV-1糖蛋白D和IL-2的真核表达质粒pgD和pIL-2,体外鉴定其表达.动物实验分为pcDNA3.1空载体对照组、pgD单独免疫组和pgD pIL-2联合免疫组3组,具体为通过肌肉免疫接种BALB/c小鼠3次,间隔2周,每次接种质粒100μg,第3次免疫后2周,用酶联免疫吸附试验(ELISA)检测抗体滴度并做亚型分析,利用3H-TdR掺人法进行Th细胞增殖实验,ELISA试剂盒检测Th细胞分泌的IL-2、IFN-γ和IL-10水平,耳廓肿胀实验检测迟发型超敏反应(DTH)反应;HSV-1病毒角膜攻击后,裂隙灯显微镜观察角膜上皮病变.结果与pgD单独免疫组相比,pIL-2的协同免疫可以显著提高IgG2a抗体滴度、Th细胞增殖反应和DTH反应,Th细胞分泌IL-2和IFN-γ水平也显著提高,IL-10水平明显下降.在动物保护实验中,pIL-2的协同免疫明显增强了pgD疫苗在病毒攻击时对角膜的保护效果.结论IL-2 cDNA的协同免疫可以显著提高pgD核酸疫苗诱导的体液免疫和细胞免疫应答水平,增加核酸疫苗的免疫保护效果.  相似文献   

11.
Wireless Body Area Networks (WBANs) have emerged as a promising technology that has shown enormous potential in improving the quality of healthcare, and has thus found a broad range of medical applications from ubiquitous health monitoring to emergency medical response systems. The huge amount of highly sensitive data collected and generated by WBAN nodes requires an ascendable and secure storage and processing infrastructure. Given the limited resources of WBAN nodes for storage and processing, the integration of WBANs and cloud computing may provide a powerful solution. However, despite the benefits of cloud-assisted WBAN, several security issues and challenges remain. Among these, data availability is the most nagging security issue. The most serious threat to data availability is a distributed denial of service (DDoS) attack that directly affects the all-time availability of a patient’s data. The existing solutions for standalone WBANs and sensor networks are not applicable in the cloud. The purpose of this review paper is to identify the most threatening types of DDoS attacks affecting the availability of a cloud-assisted WBAN and review the state-of-the-art detection mechanisms for the identified DDoS attacks.  相似文献   

12.
为了克服通用模型控制器要求过程一阶微分模型应该有显式解的局限性,提出了一种基于神经网络的通用模型控制方法,将非线性过程模型应用逆系统的方法在控制算法中直接嵌入过程模型,从而保证通用模型控制策略的可实现性。其参考轨迹是一条典型的二阶曲线,由于径向基函数网络具有许多优点,该控制策略中的神经网络为径向基函数网络。该控制器参数具有明显的物理意义,参数整定方便。仿真实验验证了该控制策略的有效性。  相似文献   

13.
无线网络应用是大型医院提高医院管理水平、提高工作效率、改善服务质量的有力工具,然而在无线网络设计过程中,存在网络安全、信号干扰和快速无缝漫游三个难点问题需要解决.根据计算机网络理论知识和实践,对三个难点问题提出了相应的对策,为后续研究提供借鉴作用.  相似文献   

14.
The aim of this study is to determine lipid peroxidation and antioxidant enzyme levels in spleen and testis tissues of guinea pigs which were exposed to different intensities and periods of DC (direct current) and AC (alternating current) electric fields. The experimental results are applied to neural networks as learning data and the training of the feed forward neural network is realized. At the end of this training; without applying electric field to the tissues, the determination of the effects of the electric field on tissues by using computer is predicted by the neural network. After the experiments, the prediction of the neural network is averagely 99%. An erratum to this article is available at .  相似文献   

15.
径向基人工神经网络在宫颈细胞图像识别中的应用   总被引:3,自引:0,他引:3  
目的:探讨径向基(RBF)人工神经网络在宫颈细胞图像识别中的应用。方法:提取宫颈细胞和细胞核的15个形态学特征参数及12个色度学特征参数,对700个宫颈细胞按正常、低度鳞状上皮内病变(LSIL)、高度鳞状上皮内病变(HSIL)、宫颈癌进行分类识别。利用软件STATISTICA7.0建立网络模型并训练,用VC++.NET语言调用网络。结果:RBF网络对训练集的拟合度为97.3%,对测试集的分类准确率为95.4%。在测试集中,正常细胞的识别率为96%,LSIL细胞识别率为94%,HSIL细胞识别率为100%,癌细胞识别率为88%。RBF网络输入参数的敏感度排序与细胞病理学特征基本一致。结论:RBF人工神经网络可以很好的对宫颈细胞特别是HSIL细胞进行分类识别。  相似文献   

16.
针对工业控制领域中非线性系统采用传统的控制方法不能达到满意的控制效果,提出一种基于P ID神经网络的控制方案,以对其进行辨识和控制。将P ID神经网络引入控制系统中,既具有常规P ID控制结构简单、参数物理意义明确等优点,同时又具有神经网络的并行结构和学习记忆功能及非线性映射能力。仿真结果表明:该控制系统响应速度快、超调量小、稳态精度高,能够快速跟踪系统输出并进行有效控制,且具有一定的自适应性和鲁棒性,满足实时控制的要求。  相似文献   

17.
Wireless medical sensor networks (WMSN) comprise of distributed sensors, which can sense human physiological signs and monitor the health condition of the patient. It is observed that providing privacy to the patient’s data is an important issue and can be challenging. The information passing is done via the public channel in WMSN. Thus, the patient, sensitive information can be obtained by eavesdropping or by unauthorized use of handheld devices which the health professionals use in monitoring the patient. Therefore, there is an essential need of restricting the unauthorized access to the patient’s medical information. Hence, the efficient authentication scheme for the healthcare applications is needed to preserve the privacy of the patients’ vital signs. To ensure secure and authorized communication in WMSN, we design a symmetric key based authentication protocol for WMSN environment. The proposed protocol uses only computationally efficient operations to achieve lightweight attribute. We analyze the security of the proposed protocol. We use a formal security proof algorithm to show the scheme security against known attacks. We also use the Automated Validation of Internet Security Protocols and Applications (AVISPA) simulator to show protocol secure against man-in-the-middle attack and replay attack. Additionally, we adopt an informal analysis to discuss the key attributes of the proposed scheme. From the formal proof of security, we can see that an attacker has a negligible probability of breaking the protocol security. AVISPA simulator also demonstrates the proposed scheme security against active attacks, namely, man-in-the-middle attack and replay attack. Additionally, through the comparison of computational efficiency and security attributes with several recent results, proposed scheme seems to be battered.  相似文献   

18.
Wireless body area network (WBANs) is composed of sensors that collect and transmit a person’s physiological data to health-care providers in real-time. In order to guarantee security of this data over open networks, a secure data transmission mechanism between WBAN and application provider’s servers is of necessity. Modified medical data does not provide a true reflection of an individuals state of health and its subsequent use for diagnosis could lead to an irreversible medical condition. In this paper, we propose a lightweight certificateless signcryption scheme for secure transmission of data between WBAN and servers. Our proposed scheme not only provides confidentiality of data and authentication in a single logical step, it is lightweight and resistant to key escrow attacks. We further provide security proof that our scheme provides indistinguishability against adaptive chosen ciphertext attack and unforgeability against adaptive chosen message attack in random oracle model. Compared with two other Diffie-Hellman based signcryption schemes proposed by Barbosa and Farshim (BF) and another by Yin and Liang (YL), our scheme consumes 46 % and 8 % less energy during signcryption than BF and YL scheme respectively.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号