• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

考虑安全态势感知的窃取复杂网络攻击检测方法。

Stealing complex network attack detection method considering security situation awareness.

机构信息

State Grid Hebei Electric Power Research Institute, Shijiazhuang, Hebei, China.

出版信息

PLoS One. 2024 Mar 21;19(3):e0298555. doi: 10.1371/journal.pone.0298555. eCollection 2024.

DOI:10.1371/journal.pone.0298555
PMID:38512902
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC10956872/
Abstract

Tracking and detection have brought great challenges to network security. Therefore, this paper proposes a monitoring method of stealthy complex network attacks considering security situation awareness. By constructing a tracking model of invisible complex network attacks, public monitoring nodes are selected for monitoring. The cost of a single monitoring node is calculated by the algorithm, and the monitoring node is determined by the monitoring node algorithm, so as to reduce the resource occupancy rate of the monitoring node and improve the monitoring accuracy. The simulation results show that this method is stable in the range of 1000 to 4000 nodes, and can effectively monitor the complex network attacks of stealing secrets.

摘要

跟踪和检测给网络安全带来了巨大的挑战。因此,本文提出了一种考虑安全态势感知的隐形复杂网络攻击监测方法。通过构建隐形复杂网络攻击跟踪模型,选择公共监测节点进行监测。通过算法计算单个监测节点的成本,并通过监测节点算法确定监测节点,从而降低监测节点的资源占用率,提高监测精度。仿真结果表明,该方法在 1000 到 4000 个节点的范围内是稳定的,能够有效地监测窃取机密的复杂网络攻击。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7d9e/10956872/7b0d5d39160e/pone.0298555.g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7d9e/10956872/b02fcf329f4c/pone.0298555.g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7d9e/10956872/bf51e4598bcd/pone.0298555.g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7d9e/10956872/116eee493ef3/pone.0298555.g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7d9e/10956872/bd4eb160a519/pone.0298555.g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7d9e/10956872/3562e7725ecc/pone.0298555.g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7d9e/10956872/7b0d5d39160e/pone.0298555.g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7d9e/10956872/b02fcf329f4c/pone.0298555.g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7d9e/10956872/bf51e4598bcd/pone.0298555.g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7d9e/10956872/116eee493ef3/pone.0298555.g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7d9e/10956872/bd4eb160a519/pone.0298555.g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7d9e/10956872/3562e7725ecc/pone.0298555.g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7d9e/10956872/7b0d5d39160e/pone.0298555.g006.jpg

相似文献

1
Stealing complex network attack detection method considering security situation awareness.考虑安全态势感知的窃取复杂网络攻击检测方法。
PLoS One. 2024 Mar 21;19(3):e0298555. doi: 10.1371/journal.pone.0298555. eCollection 2024.
2
Research on Network Security Situation Awareness Based on the LSTM-DT Model.基于 LSTM-DT 模型的网络安全态势感知研究。
Sensors (Basel). 2021 Jul 13;21(14):4788. doi: 10.3390/s21144788.
3
An Integrated Intrusion Detection Model of Cluster-Based Wireless Sensor Network.一种基于簇的无线传感器网络的集成入侵检测模型。
PLoS One. 2015 Oct 8;10(10):e0139513. doi: 10.1371/journal.pone.0139513. eCollection 2015.
4
Vulnerability extraction and prediction method based on improved information gain algorithm.基于改进信息增益算法的漏洞提取与预测方法。
PLoS One. 2024 Sep 10;19(9):e0309809. doi: 10.1371/journal.pone.0309809. eCollection 2024.
5
Using trust to secure geographic and energy aware routing against multiple attacks.利用信任保障地理和能源感知路由免受多种攻击。
PLoS One. 2013 Oct 21;8(10):e77488. doi: 10.1371/journal.pone.0077488. eCollection 2013.
6
A decoy chain deployment method based on SDN and NFV against penetration attack.一种基于软件定义网络(SDN)和网络功能虚拟化(NFV)抵御渗透攻击的诱骗链部署方法。
PLoS One. 2017 Dec 7;12(12):e0189095. doi: 10.1371/journal.pone.0189095. eCollection 2017.
7
Novel Duplicate Address Detection with Hash Function.基于哈希函数的新型重复地址检测
PLoS One. 2016 Mar 18;11(3):e0151612. doi: 10.1371/journal.pone.0151612. eCollection 2016.
8
CANon: Lightweight and Practical Cyber-Attack Detection for Automotive Controller Area Networks.CANon:用于汽车控制器局域网的轻量级实用网络攻击检测
Sensors (Basel). 2022 Mar 29;22(7):2636. doi: 10.3390/s22072636.
9
A wormhole attack detection method for tactical wireless sensor networks.一种用于战术无线传感器网络的虫洞攻击检测方法。
PeerJ Comput Sci. 2023 Aug 29;9:e1449. doi: 10.7717/peerj-cs.1449. eCollection 2023.
10
Cyber-Internet Security Framework to Conquer Energy-Related Attacks on the Internet of Things with Machine Learning Techniques.网络-互联网安全框架,利用机器学习技术攻克物联网相关网络攻击。
Comput Intell Neurosci. 2022 Sep 29;2022:8803586. doi: 10.1155/2022/8803586. eCollection 2022.

引用本文的文献

1
Enhancing IoT cybersecurity through lean-based hybrid feature selection and ensemble learning: A visual analytics approach to intrusion detection.通过基于精益的混合特征选择和集成学习增强物联网网络安全:一种用于入侵检测的可视化分析方法。
PLoS One. 2025 Jul 21;20(7):e0328050. doi: 10.1371/journal.pone.0328050. eCollection 2025.

本文引用的文献

1
User-defined information sharing for team situation awareness and teamwork.用户定义的信息共享,用于团队态势感知和团队协作。
Ergonomics. 2019 Aug;62(8):1098-1112. doi: 10.1080/00140139.2019.1607910. Epub 2019 May 7.