ID 原文 译文
44466 分析了主机发现、端口扫描机及指纹识别 3 种典型攻击的攻击场景及攻击面,对过程中的通信量强度进行刻画,建立了不同类别的主动防御模型。 Three typical attack scenarios and attack surfaces of host discovery, port scanner and fingerprint identification are analyzed. The traffic intensity in the process is depicted, and different types of active defense models are established.
44467 最后设计了实验环境拓扑及流程,通过对比主动防御功能启用前后结果,验证了网络特征动态隐藏在抵御外部攻击时体现的安全防护作用。 Finally, the experimental environment topology and process are designed. By comparing the results before and after the active defense function is enabled, the security protection effect of the network feature dynamic hidden in the defense against external attacks is verified.
44468 提出了一种基于分数阶离散切比雪夫变换(FrDTT,fractional discrete Tchebichef transform)的水印嵌入算法。 A watermark embedding algorithm based on fractional discrete Tchebichef transform (FrDTT) was proposed.
44469 首先将宿主图像分成不重叠的块,在每一个块上使用 FrDTT 将宿主图像变换到变换域,然后用 Arnold 方法置乱水印图像,最后采用抖动调制的方法将置乱后的水印嵌入到 FrDTT 域的宿主图像中。 Firstly, the host image was divided into non-overlapping blocks, and the host image was transformed to the transform domain using FrDTT on each block. Then, the watermark was scrambled with the Arnold transform. Lastly, the scram-bled watermark was embedded into the host image in FrDTT domain using the Dither modulation method.
44470 水印的提取过程则采用最小距离解码器的方法,提取出被嵌入的水印图像。 In the process of watermarking extraction, the method of the minimum distance decoder was employed.
44471 实验结果表明,所提算法不仅具有很好的不可感知性,而且具有良好的顽健性,能抵抗滤波、噪声、压缩等图像攻击。此外,所提算法的顽健性也优于其他一些分数阶变换域的算法。 Experimental results show that,compared with some existing classical image watermarking algorithms and fractional image watermarking algorithms,the proposed algorithm can obtain better imperceptibility as well as robustness against common image attacks such as filtering, noise, compression, and etc.
44472 网络欺骗作为主动防御的重要手段,通过干扰攻击者的认知增加攻击的不确定性,从而扭转攻击者与防御者之间的攻防不对称。 As a considerable approach in active defense, by interfering with the attacker's cognition, cyber deception in-creases the uncertainty of the attacker, reversing the asymmetry between attacker and defender.
44473 网络攻防双方的深度交互和策略选取使基于博弈论的网络欺骗成为网络欺骗主动防御的主要研究方向。 The deep interaction and strategy selection between attacker and defender make the active defense with cyber deception based on game theory be-come the focus for research.
44474 从攻防博弈的角度对典型代表性成果分类研究,提炼出网络欺骗博弈的主要思想; Firstly, from the perspective of game between attack and defense, typical research works was classified to conclude the concept of cyber deception game.
44475 提出一种网络欺骗博弈模型以解决多交互动态网络欺骗博弈的难题; Secondly, a novel cyber deception game model was introduced to solve the problem in multi-interaction dynamic cyber deception game.