Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

73 results about "Multiple attack" patented technology

Video copy detection method based on multi-feature Hash

The invention discloses a video copy detection method based on multi-feature Hash, which mainly solves the problem that detection efficiency and detection accuracy cannot be effectively balanced in the exiting video copy detection algorithm. The video copy detection method based on multi-feature Hash comprises the following realization steps of: (1) extracting the pyramid histogram of oriented gradients (PHOG) of a key frame as the global feature of the key frame; (2) extracting a weighted contrast histogram based on scale invariant feature transform (SIFT) of the key frame as the local feature of the key frame; (3) establishing a target function by a similarity-preserving multi-feature Hash learning SPM2H algorithm, and obtaining L Hash functions by optimization solution; (4) mapping the key frame of a database video and the key frame of an inquired video into an L-dimensional Hash code by virtue of the L Hash functions; (5) judging whether the inquired video is the copied video or not through feature matching. The video copy detection method based on multi-feature Hash disclosed by the invention is good in robustness for multiple attacks, and capable of being used for copyright protection, copy control and data mining for digital videos on the Internet.
Owner:XIDIAN UNIV

Method and system for simulating a hacking attack on a network

The present invention describes a method for simulating a hacking attack on a Network, wherein the Network comprises at least one of a plurality of data processing units (DPUs), a plurality of users and a plurality of communication links, to assess vulnerabilities of the Network. The method includes receiving one or more scan parameters for the Network. Further, the method includes creating at least one master agent by a system to gather information about the Network, wherein the information pertains to critical and non-critical information about the Network. The method includes creating an Information Model and then incrementally updating the Information Model during the hacking attack. The Information Model is the abstract representation of information collected by the system. Furthermore, the method includes generating a Multiple Attack Vector (MAV) graph based on one or more scan parameters and the Information Model. MAV has the ability to combine plurality of low and medium severity vulnerabilities associated with the data processing units (DPUs), users and communication links, correlate vulnerabilities in combination with Information Model and generate high severity attack paths that can lead to compromise of the Network. Moreover, the method includes launching one or more attacks based on the MAV graph to compromise the Network. The method further includes installing atleast one slave agent on the compromised Network to perform the one or more attacks in a distributed manner. Moreover, the method includes performing a multi stage attack by using the at least one slave agent and the at least one master agent by repeating above steps. Finally, the method includes generating a report by the scan controller, wherein the report contains details about the compromisedNetwork and the vulnerabilities of the Network.
Owner:IVIZ TECHNO SOLUTIONS PVT

Device and method for testing structural fatigue of H-shaped vertical shaft wind turbine blade

ActiveCN104792516ATo reverse the realizationEvaluate fatigue structural performanceMachine part testingFatigue loadingStructural fatigue
The invention relates to a device and a method for testing the structural fatigue of an H-shaped vertical shaft wind turbine blade. The device comprises a support base component, a distribution beam, a loading hoop, a support connecting rod and an eccentric motor, wherein the distribution beam, the loading hoop and the support connecting rod are connected together by using bolts so as to form a whole load distribution system, so that the fatigue load which acts in an upper and lower reciprocation manner can be effectively conducted. When the device is used for experiment, the fatigue bending moment distribution of the blade under various working conditions can be simulated by adjusting the length L of the distribution beam and the position B of the loading hoop, and the fatigue stress state of the blade in axial torsion and multiple attack angles can be simulated by adjusting the structural modes of the support base component and the loading hoop; the strain distribution of the blade under the fatigue loaded condition can be measured, and furthermore, the fatigue structural property of the blade can be evaluated; by only exerting one external fatigue load to the device, combined fatigue loading modes such as bending, torsion and multiple attack angles of the blade can be achieved, and the device is simple and convenient to operate, accurate and reliable in result and relatively high in universality.
Owner:INST OF ENGINEERING THERMOPHYSICS - CHINESE ACAD OF SCI

Power network vulnerability evaluation method based on multiple attack strategies

The invention discloses a power system vulnerability evaluation method based on multiple attack strategies. The method comprises the following steps: 1) constructing a power grid model; 2) evaluatingthe importance of nodes in the network from four aspects of node degree, betweenness, local centrality and node fault loss, and completing the formulation of an attack strategy according to the importance of the network nodes; 3) establishing a betweenness virtual flow model to simulate a cascade fault propagation process in a power system; and 4) establishing a vulnerability index based on the betweenness virtual flow model, simulating a network attack by adopting a plurality of attack strategies, and evaluating the vulnerability of the IEEE300 power system network according to the change ofthe vulnerability index. Aiming at the vulnerability of the power network under the condition of various attack strategies, the betweenness virtual flow model and the various attack strategies are established to analyze the performance change of the power grid under the cascade failure. The importance of nodes in a power network can be identified, and decision support is provided for maintenance work of power system managers and power system fault prevention of designers.
Owner:XUZHOU NORMAL UNIVERSITY

Power network vulnerability evaluation method based on multiple attack strategies

The invention discloses a power system vulnerability evaluation method based on multiple attack strategies. The method comprises the following steps: 1) constructing a power grid model; 2) evaluatingthe importance of nodes in the network from four aspects of node degree, betweenness, local centrality and node fault loss, and completing the formulation of an attack strategy according to the importance of the network nodes. 3) establishing a betweenness virtual flow model to simulate a cascade fault propagation process in the power system. and 4) establishing a vulnerability index based on thebetweenness virtual flow model, simulating a network attack by adopting a plurality of attack strategies, and evaluating the vulnerability of the IEEE300 power system network according to the change of the vulnerability index. Aiming at the vulnerability of the power network under the condition of various attack strategies, the betweenness virtual flow model and the various attack strategies are established to analyze the performance change of the power grid under the cascade failure. The importance of nodes in a power network can be identified, and decision support is provided for maintenancework of power system managers and power system fault prevention of designers.
Owner:XUZHOU NORMAL UNIVERSITY

Industrial control system information security attack risk assessment method and system

The invention provides an industrial control system information security attack risk assessment method and system, and relates to the technical field of industrial control system risk assessment. Physical entity information and operation information of an industrial control system are obtained and a control system model is established according to the information; constructing a digital twinborn model according to the control system model; determining digital twin data according to the operation information of the industrial control system; training a digital twinning model according to the digital twinning data to obtain an industrial control simulation system; then acquiring and respectively operating the industrial control simulation system according to various attack information to obtain various attack simulation results; then, according to the multiple attack simulation results, a simulation risk value is obtained through calculation according to a preset information security attack risk calculation formula; and finally determining a risk assessment level according to the simulated risk value. The risk assessment is obtained by integrating various attacks and then performing assessment, so that the accuracy of the risk assessment is improved.
Owner:方圆标志认证集团浙江有限公司

Vector space data digital fingerprint method based on GD-PBIBD coding

The invention discloses a vector space data digital fingerprint method based on GD-PBIBD coding. The method comprises the following steps: constructing a fingerprint code by using GD-PBIBD with limited conditions, scrambling the fingerprint sequence to be embedded by using Logistic mapping; extracting feature points of vector space data through a D-P algorithm, performing DFT on the feature pointsto obtain a phase coefficient and an amplitude coefficient, then applying a QIM method to embed a fingerprint into the amplitude coefficient of a DFT domain, and finally applying inverse DFT to obtain the vector space data containing the fingerprint. The colluder can be tracked according to the Hamming distance between the suspicious data fingerprint and the original data fingerprint. The methodis simple in coding construction, can accommodate more users compared with a BIBD code under the condition that the code length is fixed, and is high in coding efficiency. Robustness to single-user fingerprint attacks and multiple attacks is good, and the problem of data copyright recognition can be solved. Multi-user minimum value and maximum and minimum value attacks can also be resisted, all traitors can be tracked, and a basis is provided for vector space data traitor tracking.
Owner:LANZHOU JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products