您的位置: 专家智库 > >

国家科技支撑计划(2012BAH38B02)

作品数:3 被引量:3H指数:1
相关作者:吴潇程工韩挺杨义先辛阳更多>>
相关机构:国家互联网应急中心北京安码科技有限公司北京邮电大学更多>>
发文基金:国家自然科学基金国家科技支撑计划更多>>
相关领域:自动化与计算机技术电子电信更多>>

文献类型

  • 3篇中文期刊文章

领域

  • 2篇自动化与计算...
  • 1篇电子电信

主题

  • 1篇信任模型
  • 1篇相关函数
  • 1篇邻接
  • 1篇路由
  • 1篇路由节点
  • 1篇路由算法
  • 1篇安全路由
  • 1篇安全路由算法
  • 1篇MULTIP...
  • 1篇OSPF协议
  • 1篇ROUTIN...
  • 1篇THEORY
  • 1篇ALGORI...
  • 1篇BASED_...
  • 1篇CORREL...
  • 1篇TEMPOR...

机构

  • 1篇北京邮电大学
  • 1篇国家互联网应...
  • 1篇灾备技术国家...
  • 1篇北京安码科技...

作者

  • 1篇罗守山
  • 1篇辛阳
  • 1篇杨义先
  • 1篇韩挺
  • 1篇程工
  • 1篇吴潇

传媒

  • 1篇通信学报
  • 1篇The Jo...
  • 1篇High T...

年份

  • 3篇2013
3 条 记 录,以下是 1-3
排序方式:
Trust routing algorithm based on multiple decision factor theory in OSPF protocol
2013年
This paper presents a novel trust model based on multiple decision factor theory (MDFT) and a trust routing algorithm based on MDFT to exactly evaluate routing node trust and establish a trustworthy routing path. MDFT integrates four dimensional trust decision factors including behavior, state, recommend and node liveness to realize an exactly finer-grained trust evaluation. On the basis of MDFT, a trust routing algorithm is presented and validated in open shortest path first (OSPF) protocol. Simulation resuRs show that the algorithm can reflect the routing node trust accurately and has better dynamic response ability. Under the circumstance of existing deceptive nodes, the algorithm has better anti-deception performance and higher attack node detection rate than conventional algorithm.
HAN TingLUO Shou-shanZHU Hong-liangXIN Yang
Defeating constraint based program analysis with temporal correlation function
2013年
Constraint based program analysis is widely used in program validation,program vulnerability analysis,etc.This paper proposes a temporal correlation function to protect programs from analysis.The temporal correlation function can be applied to resist against both static and dynamic function summary and concolic testing.What's more,the temporal correlation function can produce different outputs even with same input.This feature can be used to damage the premise of function summary as well as prevent concolic testing process to run the new branch with new input.Experiment results show that this method can reduce efficiency and path coverage of concolic testing,while greatly increasing the difficulty of constraint based program analysis.
安靖Fan WenqingYang Yixian
关键词:相关函数
基于动态邻接信任模型的安全路由算法研究被引量:3
2013年
对现有路由节点信任相关问题进行了研究,综合路由节点的状态和行为因素提出了一种路由节点动态邻接信任模型。在此模型基础上提出了一种基于动态邻接信任熵的安全路由算法,并在现有OSPF路由协议中对该路由算法进行了验证。仿真结果表明提出的动态邻接信任模型能够准确地反映路由节点状态改变和恶意攻击,具有良好的动态响应能力,提出的安全路由算法能有效地保证路由节点的行为及状态可信并且具有良好的抗攻击性能。
韩挺罗守山辛阳杨义先程工吴潇
关键词:安全路由算法OSPF协议
共1页<1>
聚类工具0