ID |
原文 |
译文 |
45246 |
稳定场景与不稳定场景下的实验结果表明,与动态贝叶斯网络预测模型相比,所提模型具有更好的预测精确度。 |
In the stable and unstable scenarios, the experimental results show that the proposed model has better prediction accuracy than the one of dynamic Bayesian network prediction model. |
45247 |
低速率拒绝服务(LDoS, low-rate denial of service)攻击具有极强的隐蔽性,对大数据中心和云计算平台构成潜在的安全威胁。 |
Low-rate denial of service (LDoS) attack is a potential security threat to big data centers and cloud computing platforms because of its strong concealment. |
45248 |
在研究 LDoS 攻击期间网络流量变化的基础上,对数据接收端回传给发送端的 ACK 数据分组进行统计分析,揭示了其序号步长在 LDoS 攻击期间具有的波动特征。 |
Based on the analysis of network traffic during the LDoS attack, statistical analysis was given of ACK packets returned by the data receiver to the sender, and result reveals the sequence number step had the characteristics of volatility during the LDoS attack. |
45249 |
采用排列熵的方法提取该特征, |
The permutation entropy method was adopted to extract the characteristics of volatility. |
45250 |
提出了一种基于 ACK 序号步长排列熵的 LDoS 攻击检测方法。 |
Hence, an LDoS attack detection method based on ACK serial number step permutation entropy was proposed. |
45251 |
该方法通过采集发送端收到的 ACK 数据分组,对其序号进行采样并计算步长; |
The serial number was sampled and the step length was calculated through collecting the ACK that received at the end of sender. |
45252 |
再利用对时间敏感性较强的排列熵算法检测出步长突变时刻,达到检测 LDoS 攻击的目的。 |
Then, the permutation entropy algorithm with strong time-sensitive was used to detect the mutation step time, and achieve the goal of detecting LDoS attack. |
45253 |
在实际网络环境中设计和搭建了测试平台并对所提方法进行了验证, |
A test-bed was designed and built in the actual network environment for the purpose of verifying the proposed approach performance. |
45254 |
实验结果表明,所提方法具有较好的检测性能,取得了较好的检测效果。 |
Experimental results show that the proposed approach has better detection performance and has achieved better detection effect. |
45255 |
为解决系统极化码在编码过程中因分步计算造成的时延和由循环迭代“异或”计算造成的计算复杂度,提出并定义了降维裂解策略, |
In order to solve the delay caused by step-by-step calculation and the computational complexity caused by iterative “exclusive-or” computation during the encoding process, a dimensionality reduction strategy was proposed and defined. |