CN107294991A - Network function system of defense and safety protecting method based on output judgement - Google Patents

Network function system of defense and safety protecting method based on output judgement Download PDF

Info

Publication number
CN107294991A
CN107294991A CN201710537460.1A CN201710537460A CN107294991A CN 107294991 A CN107294991 A CN 107294991A CN 201710537460 A CN201710537460 A CN 201710537460A CN 107294991 A CN107294991 A CN 107294991A
Authority
CN
China
Prior art keywords
function
message
network
output
external network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710537460.1A
Other languages
Chinese (zh)
Other versions
CN107294991B (en
Inventor
汤红波
游伟
赵星
王晓雷
赵宇
柏溢
黄开枝
金梁
朱可云
俞定玖
王领伟
陈云杰
秦小刚
冯莉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
PLA Information Engineering University
Original Assignee
PLA Information Engineering University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by PLA Information Engineering University filed Critical PLA Information Engineering University
Priority to CN201710537460.1A priority Critical patent/CN107294991B/en
Publication of CN107294991A publication Critical patent/CN107294991A/en
Application granted granted Critical
Publication of CN107294991B publication Critical patent/CN107294991B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0631Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention belongs to technical field of network security, more particularly to a kind of network function system of defense and safety protecting method based on output judgement, system includes:N number of function of realizing identical network function performs body, TSM Security Agent and external network;Method includes:The input message of external network is comparably sent to N number of function and performs body;Performing body to function needs the message exported to do synchronization process;The output message after synchronization will be analyzed, extract its effective output content and be compared;Receive at leastAfter individual content identical output message, the output message is forwarded to external network.The present invention performs the output message progress safety verification that body is sent to external network to function, is receiving at leastAfter individual content identical output message, the output message is just forwarded to external network, when reducing single or a small amount of function and performing body and invaded or existed leak back door, attacker's secret steals sensitive data or external network sends the success rate of attack message.

Description

Network function system of defense and safety protecting method based on output judgement
Technical field
The present invention relates to technical field of network security, more particularly to a kind of network function system of defense based on output judgement And safety protecting method.
Background technology
Network function in cyberspace field performs the instantiation that body can be network functional entity or subnet, to reality A certain function or the combination of some functions in existing network network.
In existing network space field, network function performs body can be with main-standby mode, the load sharing side of pond group form Formula is present, but a certain specific tasks can only be undertaken by simple function execution body.It is hidden to there is many safety in individual feature execution body Suffer from, attacker can implement invasion make its can not normal work, or mistake or malicious messages are sent, or even with the function after invasion It is that springboard attacks coupled other network equipments to perform body.Simultaneously as the software and hardware that function performs body can not have been accomplished It is complete controllable, credible, there is a possibility that attacker steals function using leak or back door secret and performs internal sensitive data.These All it is the problem of must solving in cyberspace safety guarantee.
The content of the invention
The present invention is for the existing network functional entity or subnet for realizing a certain network function or the combination of some network functions There is leak back door, private data can be stolen for secret by attacker or attack external network, menace network spatial information peace Full the problem of, there is provided a kind of network function system of defense based on output judgement and safety protecting method.
The technical scheme is that:A kind of network function system of defense based on output judgement, including:It is N number of to realize phase Function with network function performs body, TSM Security Agent and external network, and function performs body and entered by TSM Security Agent with external network Row communication;
Described function performs the instantiation that body is network functional entity or subnet, is used for and external network communication;
Described TSM Security Agent is used for the input message for forwarding external network to send, and performs what body needs were exported to function Message synchronizes processing and safety verification;
Described external network is used to perform body communication with function, realizes corresponding network function;
The described network function system of defense based on output judgement, described function perform body be network functional entity or The other parts of the instantiation of subnet control section, network functional entity or subnet perform body by each function and shared.
The described network function system of defense based on output judgement, the TSM Security Agent includes:
Body is performed for encapsulating N number of function, a network functional entity or subnet is externally presented as, acts on behalf of and maintain function Perform the annexation of body and external network;
Send for receiving external network and perform the input message of body to function and it is comparably distributed to N number of function held Row body;
The message of body is performed for receiving N number of function, synchronization process is done to the message for needing to export and to extract it effectively defeated Go out content.
The described network function system of defense based on output judgement, described N number of function performs body and TSM Security Agent envelope Loaded in same physical entity or being distributed in different physical entities.
The described network function safety protecting method based on output judgement, comprises the following steps:
The input message of external network is comparably sent to N number of function and performs body;
Performing body to function needs the message exported to do synchronization process;
The output message after synchronization will be analyzed, extract its effective output content and be compared;
Receive at leastAfter individual content identical output message, the output message is forwarded to external network.
The described network function safety protecting method based on output judgement, in TSM Security Agent to the output message that receives Before being compared, in addition to:
TSM Security Agent pre-sets stand-by period window to the message for needing to export, and the defeated of body is performed with this synchronous N number of function Outbound message;
TSM Security Agent timing since being received after a certain output message first time, is rejected beyond the identical of stand-by period window Output message;
TSM Security Agent performs multiple identical output messages that body is sent to receiving same function, only retains the received One output message.
The described network function safety protecting method based on output judgement, the content that the TSM Security Agent is received is identical The number of output message be less thanWhen individual, then described TSM Security Agent gives a warning message, and to all output messages Carry out blocking processing.
The beneficial effects of the invention are as follows:1st, the network function system of defense based on output judgement that the present invention is implemented, to work( The output message progress safety verification that body is sent to external network can be performed, is being received at leastIndividual content identical output disappears After breath, the output message is just forwarded to external network, single or a small amount of function is reduced and performs body and invaded or existed and leak During the back door of hole, attacker's secret steals sensitive data or external network sends the success rate of attack message, even if N number of function is held The all leaky back door of row body, the possibility for sending identical invalid message in synchronization is very low, effectively increases system Security.
2nd, the present invention performs body using N number of function and can be integrated in same physical entity, can also be distributed in different Physical entity;TSM Security Agent and function, which perform body, simultaneously to be same physical entity, can also be individually present, and be used as raising net One external entity of independence of network security, the complexity of reduction transformation network, the flexibility with application;TSM Security Agent is only carried Effective output content of output message is taken and compares, function is simple and relatively independent, and with higher security, TSM Security Agent connects The number of the content identical output message received is less than predetermined value, then described TSM Security Agent gives a warning message, and to institute There is output message to carry out blocking processing.
Brief description of the drawings
, below will be in embodiment or description of the prior art for the technical scheme of clearer explanation the embodiment of the present application The required accompanying drawing used is briefly described, it is clear that, drawings in the following description are only some implementations of the application Example, for those of ordinary skill in the art, on the premise of not paying creative work, can also be obtained according to these accompanying drawings Obtain other accompanying drawings.
Fig. 1 is safety method schematic flow sheet of the invention;
Fig. 2 is the schematic network structure of function execution body in existing communication network;
Fig. 3 is one example of the present invention based on the network function system of defense schematic diagram for exporting judgement;
Fig. 4 is the schematic flow sheet of the safety protecting method of an example of the invention.
Embodiment
In order that those skilled in the art more fully understand the technical scheme in the application, it is real below in conjunction with the application The accompanying drawing in example is applied, the technical scheme in the embodiment of the present application is clearly and completely described, it is clear that described implementation Example only some embodiments of the present application, rather than whole embodiments.Based on the embodiment in the application, this area is common The every other embodiment that technical staff is obtained under the premise of creative work is not made, should all belong to the application protection Scope.
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in present example is carried out clear, complete Ground is described.Obviously, described embodiment is only a part of embodiment of the invention, rather than whole embodiments.Based on this hair Embodiment in bright, all other implementation that those of ordinary skill in the art are obtained under the premise of creative work is not made Example, belongs to the scope of protection of the invention.
Present example is when external network is performed when body sends input message to function, it is necessary to will be inputted by TSM Security Agent Message is comparably forwarded to N number of function and performs body.When function is performed when body external network sends output message, it is necessary to via peace Full Proxy carries out safety verification, and external network can be just forwarded to by being verified as safe output message, and otherwise TSM Security Agent is sent Alarm and blocking output message.Safety verification sets corresponding stand-by period window first, and only the output message in time window is done Synchronization process, and a piece of news for the repetition message that same function execution body is sent only is chosen as judgement foundation.Then, carry Take effective output content that message is received in time window.Finally, security verified using majority decision mechanism, most straightforward procedure is Contrast whether at least N number of function performs the output message of body transmissionIt is individual identical.The method provided by the invention, work( Body can be performed by after attack invasion, attacker is difficult to steal the sensitive number that function performs body by preset leak back door secret According to, it is also difficult to malice output message is sent to the external network communicated with, so as to improve the security of whole network.
Embodiment 1, with reference to Fig. 3, the network function system of defense based on output judgement of one embodiment of the present of invention Structural representation.As shown in figure 3, the network function system of defense based on output judgement of present example includes:
N number of function performs body 31, TSM Security Agent 32 and external network 33;
Function, which performs body 31, to be used for and external network communication, realizes corresponding network function;
TSM Security Agent 32 is used for the input message for forwarding external network to send, and the message that body needs to export is performed to function Processing and safety verification are synchronized, is being received at leastAfter individual content identical output message, the output is disappeared Breath is forwarded to purpose external network 33;
External network 33 is used to perform body communication with function, realizes corresponding network function;
Wherein, N is the integer more than or equal to 3,ForInteger part.
It will be appreciated that no matter how tight the safeguard procedures of the network equipment are, it can not all ensure being perfectly safe for equipment, and Because equipment can not accomplish complete controllable, credible in itself, it is impossible to exclude the possibility that its software and hardware system has leak or back door Property.Function in current network performs dignity and faces a variety of security threats, and a class is leak backdoor attack, and attacker is held using function The leak of row body itself, back door secret steal its sensitive data;Another kind of is Network Intrusion, and attacker's intrusion function performs body Afterwards, malice output message is sent as springboard external network, endangers network security.
The network function system of defense based on output judgement that the present invention is implemented, performs body to function and is sent to external network Output message carries out safety verification, is receiving at leastAfter individual content identical output message, just by the output message External network is forwarded to, when reducing single or a small amount of function and performing body and invaded or existed leak back door, attacker's secret is stolen Sensitive data or external network is taken to send the success rate of attack message, even if N number of function performs all leaky back door of body, same The possibility that one moment sent identical invalid message is very low, effectively increases the security of system.
In actual applications, N number of function performs body and can be integrated in same physical entity, can also be distributed in different Physical entity;It is same physical entity that TSM Security Agent and function, which perform body, simultaneously, can also be individually present, and is pacified as network is improved One external entity of independence of full property, the complexity of reduction transformation network, the flexibility with application.Meanwhile, implementing In, function performs the instantiation that body can be network function control section, the other parts such as forwarding, the storage of network function by Each function performs body and shared.
It should be noted that in order to take into account the cost of implementation and security that function performs body, practical situation is N etc. In 3.Function performs the more of body setting, and the network equipment is safer, but the larger cost of implementation of needs and overhead, to same The performance of step processing and TSM Security Agent is also a challenge.Following examples are illustrated so that N is equal to 3 as an example, when function is performed When the quantity of body is more than 3, scheme is similar.
Embodiment 2, with reference to Fig. 4, Fig. 4 is the network function security protection based on output judgement of one embodiment of the invention The schematic flow sheet of method.As shown in figure 4, the safety protecting method of the embodiment of the present invention based on it is above-mentioned based on output judgement Network function system of defense, including:
S41:When TSM Security Agent receives first output message that function execution body external network is sent, set and wait Time window simultaneously starts timing;
S42:The TSM Security Agent receives N number of function and performs body output message transmitted in time window, and extracts it Effectively output content is compared;
S43:The TSM Security Agent is received at leastAfter individual content identical output message, the identical is exported Message is sent to external network;
Illustrated exemplified by there are 3 functions to perform body in network, input is sent when the network equipment performs body to function During message, input message is sent to N number of function and performs the external general agency of body --- and in TSM Security Agent, TSM Security Agent will be inputted Message is comparably forwarded to this 3 functions and performs body;When function, which performs body, is sent out output message, TSM Security Agent is being received After the message that output is needed to first, corresponding stand-by period window is set, if only received in the time window first Individual output message, then directly abandon and send alarm;If receiving 2 or 3 effectively output content identical output messages, The output message is sent to external network.If the output message received is different from, the transmission of output message is blocked simultaneously Send alarm.
If being less than it is understood that TSM Security Agent receives identical output message numberIndividual, functions are held Row body receives Network Intrusion or software and hardware system has leak back door, should block the output message that this all participation are compared simultaneously Send security alarm.
Further, in order to strengthen the security of means of defence, the output message received is carried out in the TSM Security Agent Before comparing, methods described also includes:
TSM Security Agent pre-sets stand-by period window to the message for needing to export, and body is performed with this synchronous N number of function Output message;
TSM Security Agent timing since being received after a certain output message first time, the phase beyond stand-by period window is not received Same output message;
If TSM Security Agent receives same function and performs multiple identical output messages that body is sent, only retain the received One output message.
Due to message package encapsulate otherness, and different soft and hard part function perform body realize consolidated network function to The output message gone out also likely to be present difference, and contrast of the embodiment of the present invention is not whole output message, but parsing output disappears Cease the effective output content obtained, i.e., significant content really related to network function in output message.
The embodiment of the present invention carries out effective protection to the network function in network so that network functional entity or subnet without By by Network Intrusion, virus attack, illegal control, man-in-the-middle attack or in the case of there is preset leak back door, all It is difficult to cause harm to network or steal sensitive data.The a certain function of attacker's successful attack performs body or a few functions perform body Can not all serious influence be caused to the network functional entity or subnet protected.
The foregoing description of the disclosed embodiments, is that professional and technical personnel in the field can realize or using the present invention. A variety of modifications to these embodiments will be apparent for those skilled in the art.It is as defined herein General Principle can be realized in the case where not departing from the spirit or scope of the embodiment of the present invention in other examples.Therefore, originally Inventive embodiments are not intended to be limited to the embodiments shown herein, and are to fit to and principles disclosed herein and new The consistent most wide scope of clever feature.

Claims (7)

1. a kind of network function system of defense based on output judgement, it is characterised in that including:It is N number of to realize identical network function Function perform body, TSM Security Agent and external network, function performs body and communicated by TSM Security Agent with external network;
Described function performs the instantiation that body is network functional entity or subnet, is used for and external network communication;Described peace Full Proxy is used for the input message for forwarding external network to send, and performing body to function needs the message exported to synchronize processing And safety verification;
Described external network is used to perform body communication with function, realizes corresponding network function.
2. the network function system of defense according to claim 1 based on output judgement, it is characterised in that:Described function The instantiation that body is network functional entity or subnet control section is performed, the other parts of network functional entity or subnet are by each work( Body can be performed to share.
3. the network function system of defense according to claim 1 based on output judgement, it is characterised in that the safe generation Reason includes:
Body is performed for encapsulating N number of function, a network functional entity or subnet is externally presented as, acts on behalf of and maintain function to perform The annexation of body and external network;
Send to perform the input message of body to function and it is comparably distributed to N number of function for receiving external network and perform Body;
The message of body is performed for receiving N number of function, synchronization process is done to the message for needing to export and extracted in its effective output Hold.
4. the network function system of defense according to claim 1 based on output judgement, it is characterised in that:Described is N number of Function performs body and TSM Security Agent is packaged in same physical entity or is distributed in different physical entities.
5. a kind of network function safety protecting method based on output judgement based on described in claim 1-4, it is characterised in that Comprise the following steps:
The input message of external network is comparably sent to N number of function and performs body;
Performing body to function needs the message exported to do synchronization process;
The output message after synchronization will be analyzed, extract its effective output content and be compared;
Receive at leastAfter individual content identical output message, the output message is forwarded to external network.
6. the network function safety protecting method according to claim 5 based on output judgement, it is characterised in that in safety Before the output message that proxy interfaces are received is compared, in addition to:
TSM Security Agent pre-sets stand-by period window to the message for needing to export, and is disappeared with the output that this synchronous N number of function performs body Breath;
TSM Security Agent timing since being received after a certain output message first time, rejection is defeated beyond the identical of stand-by period window Outbound message;
TSM Security Agent performs multiple identical output messages that body is sent to receiving same function, only retains first received Output message.
7. the network function safety protecting method according to claim 5 based on output judgement, it is characterised in that:The peace The number for the content identical output message that Full Proxy is received is less thanWhen individual, then described TSM Security Agent gives a warning Message, and blocking processing is carried out to all output messages.
CN201710537460.1A 2017-07-04 2017-07-04 Network function defense system based on output judgment and safety protection method Active CN107294991B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710537460.1A CN107294991B (en) 2017-07-04 2017-07-04 Network function defense system based on output judgment and safety protection method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710537460.1A CN107294991B (en) 2017-07-04 2017-07-04 Network function defense system based on output judgment and safety protection method

Publications (2)

Publication Number Publication Date
CN107294991A true CN107294991A (en) 2017-10-24
CN107294991B CN107294991B (en) 2020-03-31

Family

ID=60098661

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710537460.1A Active CN107294991B (en) 2017-07-04 2017-07-04 Network function defense system based on output judgment and safety protection method

Country Status (1)

Country Link
CN (1) CN107294991B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110445803A (en) * 2019-08-21 2019-11-12 之江实验室 A kind of traffic smoothing moving method of isomery cloud platform
CN110545268A (en) * 2019-08-21 2019-12-06 之江实验室 multidimensional mimicry voting method based on process elements
CN111585952A (en) * 2020-03-23 2020-08-25 浙江大学 Solution method for coping with virtual host layer attack by Web application on cloud

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130215264A1 (en) * 2010-07-08 2013-08-22 The Regents Of The University Of California End-to-end visual recognition system and methods
CN104766025A (en) * 2015-03-23 2015-07-08 中国人民解放军信息工程大学 Mimicry tamper-proof method of distributed file system
CN104994104A (en) * 2015-07-06 2015-10-21 浙江大学 Server fingerprint mimicry and sensitive information mimicry method based on WEB security gateway
CN105610813A (en) * 2015-12-28 2016-05-25 中国人民解放军信息工程大学 Mobile communication inter-network honeypot system and method
CN105791279A (en) * 2016-02-29 2016-07-20 中国人民解放军信息工程大学 Mimic SDN controller construction method
CN106411937A (en) * 2016-11-15 2017-02-15 中国人民解放军信息工程大学 Mimicry defense architecture based zero-day attack detection, analysis and response system and method thereof

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130215264A1 (en) * 2010-07-08 2013-08-22 The Regents Of The University Of California End-to-end visual recognition system and methods
CN104766025A (en) * 2015-03-23 2015-07-08 中国人民解放军信息工程大学 Mimicry tamper-proof method of distributed file system
CN104994104A (en) * 2015-07-06 2015-10-21 浙江大学 Server fingerprint mimicry and sensitive information mimicry method based on WEB security gateway
CN105610813A (en) * 2015-12-28 2016-05-25 中国人民解放军信息工程大学 Mobile communication inter-network honeypot system and method
CN105791279A (en) * 2016-02-29 2016-07-20 中国人民解放军信息工程大学 Mimic SDN controller construction method
CN106411937A (en) * 2016-11-15 2017-02-15 中国人民解放军信息工程大学 Mimicry defense architecture based zero-day attack detection, analysis and response system and method thereof

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
邬江兴: "《网络空间拟态防御研究》", 《信息安全学报》 *
郭威等: "《基于自动机理论的网络攻防模型与安全性能分析》", 《信息安全学报》 *
陈静: "《基于拟态安全防御的LDoS攻击防御研究》", 《福建电脑》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110445803A (en) * 2019-08-21 2019-11-12 之江实验室 A kind of traffic smoothing moving method of isomery cloud platform
CN110545268A (en) * 2019-08-21 2019-12-06 之江实验室 multidimensional mimicry voting method based on process elements
CN111585952A (en) * 2020-03-23 2020-08-25 浙江大学 Solution method for coping with virtual host layer attack by Web application on cloud

Also Published As

Publication number Publication date
CN107294991B (en) 2020-03-31

Similar Documents

Publication Publication Date Title
Wang et al. Security issues and challenges for cyber physical system
Pournaghshband et al. Securing legacy mobile medical devices
CN100464548C (en) System and method for blocking worm attack
CN107294991A (en) Network function system of defense and safety protecting method based on output judgement
CN104994094B (en) Virtual platform safety protecting method based on virtual switch, device and system
Saeed et al. Ransomware: A framework for security challenges in internet of things
CN105610837A (en) Method and system for identity authentication between master station and slave station in SCADA (Supervisory Control and Data Acquisition) system
CN102882859B (en) A kind of safety protecting method based on public network data transmission information system
Kamal et al. Cybersecurity issues and challenges during COVID-19 pandemic
Murthy et al. Firewalls for security in wireless networks
CN102098313A (en) Waterproof wall system and authentication method thereof
Benoit et al. Mobile terminal security
Abdolmaleky et al. A strengthened version of a hash-based rfid server-less security scheme
CN112087294B (en) Portable safety computer system based on secret hash label protection
CN112448916B (en) Privacy protection method for preventing GAN model attack and protecting CDL training information
CN106790028A (en) A kind of prison and the data transmission method and system of bank's intranet and extranet security isolation
CN113630381A (en) Distributed and artificial intelligence-based duplex energized network attack and defense method and system
Singh et al. A hybrid model for cyberspace security
CN106162053A (en) Video monitoring equipment and networking client thereof
Veríssimo et al. Fundamental security concepts
Yang et al. Computer network attack and defense technology
Purohit et al. Cyber Threats in Internet of Thing systems and Impact reduction
CN107819787A (en) One kind prevents LAN computer illegal external connection system and method
CN109922045B (en) Control method of information processing device
Humayed Securing CAN-based cyber-physical systems

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant