Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

33results about How to "Effective defense against attacks" patented technology

Multi-model cooperative defense method facing deep learning antagonism attack

A multi-model cooperative defense method facing deep learning antagonism attack comprises the following steps of: 1) performing unified modeling based on a gradient attack to provide a [Rho]-loss model; 2) according to design of a unified model, for an countering attack of a target model fpre(x), according to a generation result of a countering sample, classifying a basic expression form of an attack into two classes; 3) analyzing the parameters of the model, performing parameter optimization of the [Rho]-loss model and search step length optimization of a disturbance solution model for the countering sample; and 4) for the mystique of a black box attack, designing an experiment based on an adaboost concept, generating a plurality of different types of substitution models, used to achievethe same task, for integration, designing a multi-model cooperative defense method with high defense capability through an attack training generator of an integration model with high defense capability, and providing multi-model cooperative detection attack with weight optimal distribution. The multi-model cooperative defense method is high in safety and can effectively defense the attack of a deep learning model for the antagonism attack.
Owner:ZHEJIANG UNIV OF TECH

Netfilter-based address and port hopping communication implementation method

The invention provides a netfilter-based address and port hopping communication implementation method, which comprises the steps of 1) initially deploying; 2) configuring the hopping parameters of a server, generating a hopping key, storing the hopping key, and distributing the hopping parameters to an authentication and distribution agent by means of the server; 3) acquiring the hopping parameters of the server by means of a client after the authentication process of the client by an authentication and distribution center; 4) synchronizing the clocks of the client, the server and an address hopping gateway, calculating the current hopping address and the current hopping port of the server, and modifying addresses and ports corresponding to data messages sent and received by a local computer so as to realize the communication; 5) receiving communication messages received by the address hopping gateway from the client and the server, and acquiring the hopping address of the server by an address hopping engine according to the above address hopping parameters, and modifying addresses corresponding to the above messages to complete the message forwarding process; 6) realizing the port hopping function through a port hopping engine by the server, modifying ports corresponding to the messages of an importer/exporter to complete the communication. The method is simple in principle, easy to realize and popularize, and good in safety.
Owner:NAT UNIV OF DEFENSE TECH

Living body detection method, device and equipment and storage medium

The invention discloses a living body detection method, device and equipment and a storage medium, and belongs to the technical field of computers. According to the embodiment of the invention, the face areas in the color image and the infrared image of the target are respectively detected through the two cascaded branches in the detection model; whether the target is a living body or not is determined by integrating the detection results of the two images; on one hand, a face region in a color image is detected; according to the method, black-and-white printing and infrared printing images can be effectively defended, detection of a face area in the infrared image is combined, attacks of screen images and color printing images can be effectively defended, and therefore the comprehensive defense effect is achieved, the defense effect is good, practicability is good, and the accuracy of the detection result is good. And on the other hand, different requirements of the two images on theenvironment information are considered in the comprehensive process, and the weight of the two images during combination is determined according to the environment information of the target, so that the accuracy of the detection result obtained by weighting is better, and the defense effect is better.
Owner:TENCENT TECH (SHENZHEN) CO LTD

Driven malware defence method and device

The invention discloses a driven malware defense method and a device; the method comprises the following steps: according to import table information of a driver, replacing function address information related to a system function needing monitoring with address information of a security software monitoring function; using the security software monitoring function to monitor executing action of the driver and send alarm information when the executing action is abnormal. The device comprises a replacement processing module and a monitoring processing module; according to the import table information of the driver, the replacement processing module is used for replacing the function address information related to the system function needing monitoring with the address information of the security software monitoring function; the monitoring processing module is used for using the security software monitoring function replaced by the replacement processing module to monitor the executing action of the driver and sending the alarm information when the executing action is abnormal. The invention has the characteristics of intellectuality, safe and reliable defense performance, unlikeliness of being restored, no influence on the system performance and the like while effectively carrying out defense on the driven malware.
Owner:北京东方微点信息技术有限责任公司

Array honey pot cooperative control method based on block chain

The invention relates to an array honey pot cooperative control method based on a block chain. The method comprises the following steps: constructing a private chain by using an Ethereum platform, andrealizing de-centralized cooperative operation thought of a honey pot host cluster through a mining way; constructing a topological structure consistent with the Ethereum platform starting from a P2Pnetworking model, and realizing the communication through web3J. Each host in the array executes the mining, the host acquiring an accounting charging right can holds the post of a honey pot serviceconversion task at one periodic time, conversion information is sent through an encryption mechanism, and other host receives and executes the corresponding conversion instruction. Furthermore, external port request access data is stored in the block chain by using the tamper resistance of the block chain information, thereby obtaining the digital evidence for implementing the attack by an attacker. Through the method disclosed by the invention, the cooperative operation of the array honey pot host cluster is guaranteed, thereby trapping the attacker by using the true-false service in dynamicconversion, and the network security active defense aim is realized.
Owner:CHINA UNIV OF PETROLEUM (EAST CHINA)

Identification authentication method based on N-dimension sphere

The invention discloses an identity authentication method based on an N-dimensional spherical surface, which comprises: an authentication server receives registration and identity authentication of users after being initialized; when a new user registers, the user calculates a vector by a safe one-way function according to passwords selected and submits the vector to the authentication server; the authentication server specifies an IDg for the user as the identification of the identity of the user; the authentication server combines a self secrete vector with the vector submitted by the user to determine the N-dimensional spherical surface; the authentication server randomly selects a plurality of different points on the N-dimensional spherical surface to form an encrypted file which is sent to the user through a safe channel; when the user requires identity authentication, the passwords and the encrypted file containing identity identification are utilized to calculate; the result of calculation is sent to the authentication server; and the authentication server checks and determines whether to accept the identity of the user after calculation. The method can effectively reduce the stored information and calculation load of the authentication server and prevent imitating the authentication server.
Owner:SOUTH CHINA UNIV OF TECH

Low-orbit satellite security authentication method based on spatial channel characteristics

The invention relates to the technical field of spatial information, and discloses a low-orbit satellite security authentication method based on spatial channel characteristics. The method comprises a three-layer SDN distributed control structure consisting of a ground control center, a GEO satellite controller and an MEO satellite controller. In the whole authentication process, key agreement contains timestamp information, so that the freshness of the message is ensured. After the timestamp T is acquired, whether the timestamp T is within an allowable time range delta T is detected, if the timestamp T is valid, the acquired secret key is fresh, replay attacks can be effectively resisted, symmetric secret keys generated in the subsequent authentication process are iteratively generated based on the initial KEYab, and the shared secret key needs to be updated again every time a session is ended. The new secret key is based on the Hash operation of the channel characteristic value and the message and has randomness, so that even if an attacker obtains the current shared secret key, a subsequent new secret key cannot be generated, and the independence of the authentication process is guaranteed.
Owner:南京审计大学金审学院

A method of identity authentication based on n-dimensional sphere

An identity authentication method based on N-dimensional sphere is provided by the present invention. An authentication server accepts a user registration and an identity verification after initialization; when a new user registers, the user computes a vector via a security one-way function according to a password selected by himself and submits it to the authentication server, the authentication server appoints an IDg as an identifier of the user identity for the user; the authentication server determines a N-dimensional sphere by combining its own secret vectors and the vector submitted by the user; the authentication server selects several different points on the N-dimensional sphere randomly, forms an encrypted file with them and sends it to the user via a security channel; when requiring for identity authentication, the user performs computation by using his own password and the encrypted file containing the identity authentication identifier, and transmits the result to the authentication server. After performing computation, the authentication server verifies and determines whether the user identity should be accepted. The present invention can reduce the storing information and the calculation amount of the authentication server efficiently, and can prevent fake authentication servers.
Owner:SOUTH CHINA UNIV OF TECH

An authentication method for network signaling between quantum secure network devices

The invention discloses an authentication method for network signaling between quantum safety network equipment. The authentication method includes the following steps: creating synchronous signaling key stores used for signaling authentication for both sides between the communicated network equipment, wherein the synchronous signaling key stores are divided into an encrypting signaling key store and a decrypting signaling key store, and setting a read indicator and a write indicator for each signaling key store; a sending end calculating related hash operation message authentication codes H of keys based on key data and a read indicator offset address of the encrypting signaling key store of the sending end, and sending a corresponding signaling data packet to a receiving end; the receiving end receiving the signaling data packet, acquiring a read indicator offset address in the signaling data packet, and judging whether the key data of the read indicator offset address of the decrypting signaling key store of the receiving end is already used or not; and if the key data is not used, calculating H and verifying the content of the signaling data packet. The authentication method for the network signaling between the quantum safety network equipment has the advantages that the authentication is fast, and the method has a certain preventive effect on distributed denial of service (DDoS) attacks, can achieve true one-time-one-key encrypting authentication and is absolutely safe theoretically.
Owner:SHANDONG INST OF QUANTUM SCI & TECH +2

A realization method of address and port hopping communication based on netfilter

The invention provides a netfilter-based address and port hopping communication implementation method, which comprises the steps of 1) initially deploying; 2) configuring the hopping parameters of a server, generating a hopping key, storing the hopping key, and distributing the hopping parameters to an authentication and distribution agent by means of the server; 3) acquiring the hopping parameters of the server by means of a client after the authentication process of the client by an authentication and distribution center; 4) synchronizing the clocks of the client, the server and an address hopping gateway, calculating the current hopping address and the current hopping port of the server, and modifying addresses and ports corresponding to data messages sent and received by a local computer so as to realize the communication; 5) receiving communication messages received by the address hopping gateway from the client and the server, and acquiring the hopping address of the server by an address hopping engine according to the above address hopping parameters, and modifying addresses corresponding to the above messages to complete the message forwarding process; 6) realizing the port hopping function through a port hopping engine by the server, modifying ports corresponding to the messages of an importer / exporter to complete the communication. The method is simple in principle, easy to realize and popularize, and good in safety.
Owner:NAT UNIV OF DEFENSE TECH

Low altitude node identity authentication and privacy protection method based on hash chain

The present invention discloses a low-altitude node identity authentication and privacy protection method based on a Hash chain. The method comprises the steps of: when a vehicle node enters a space-air-ground integral network at the first time, taking unique and undeniable wireless signal fingerprints which cannot be cloned as identity features of the vehicle node, and creating a Hash block for the vehicle node while performing identity registration of the vehicle node by an authentication center; when communication of the vehicle node is performed in an area, performing identity authentication based on block content by a management node; in order to protect the identity privacy, employing a pseudonym generated by the management node to perform communication by the vehicle node; and recording key motions or information of different nodes at different time in the area by the management node, and recording the key motions or the information of the vehicle node itself at different areasat different time by the vehicle node. The method can effectively defense various attacks such as the sybil attack, the denial of service attack and the replay attack. Besides, the data safety of thenetwork is guaranteed, namely, the confidentiality, integrity, availability and non-repudiation of the data in the network.
Owner:XIAMEN UNIV

A collaborative control method for array honeypots based on blockchain

The invention relates to an array honey pot cooperative control method based on a block chain. The method comprises the following steps: constructing a private chain by using an Ethereum platform, andrealizing de-centralized cooperative operation thought of a honey pot host cluster through a mining way; constructing a topological structure consistent with the Ethereum platform starting from a P2Pnetworking model, and realizing the communication through web3J. Each host in the array executes the mining, the host acquiring an accounting charging right can holds the post of a honey pot serviceconversion task at one periodic time, conversion information is sent through an encryption mechanism, and other host receives and executes the corresponding conversion instruction. Furthermore, external port request access data is stored in the block chain by using the tamper resistance of the block chain information, thereby obtaining the digital evidence for implementing the attack by an attacker. Through the method disclosed by the invention, the cooperative operation of the array honey pot host cluster is guaranteed, thereby trapping the attacker by using the true-false service in dynamicconversion, and the network security active defense aim is realized.
Owner:CHINA UNIV OF PETROLEUM (EAST CHINA)
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products