Key technologies of new malicious code developments and defensive measures in communication networks

来源 :The Journal of China Universities of Posts and Telecommunica | 被引量 : 0次 | 上传用户:fzy321
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
This article is focused on analyzing the key technologies of new malicious code and corresponding defensive measures in the large-scale communication networks. Based on description of the concepts and development of the malicious code,the article introduces the anti-analysis technology,splitting and inserting technology,hiding technology,polymorph virus technology,and auto production technology of the malicious code trends with intelligence,diversity and integration. Following that,it summarizes the security vulnerabilities of communication networks from four related layers aspects,according to the mechanisms of malicious code in the communication networks. Finally,it proposes rapid response disposition of malicious code attacks from four correlated steps:building up the network node monitoring system,suspicious code feature automation analysis and extraction,rapid active malicious code response technique for unknown malicious code,and malicious code attack immunity technique. As a result,it actively defenses against the unknown malicious code attacks and enhances the security performance of communication networks. This article is focused on analyzing the key technologies of new malicious code and corresponding defensive measures in the large-scale communication networks. Based on description of the concepts and development of the malicious code, the article introduces the anti-analysis technology, splitting and inserting technology, hiding technology, polymorph virus technology, and auto production technology of the malicious code trends with intelligence, diversity and integration. Following that, it summarizes the security vulnerabilities of communication networks from four related layers aspects, according to the mechanisms of malicious code in the communication networks. Finally, it proposes rapid response disposition of malicious code attacks from four correlated steps: building up the network node monitoring system, suspicious code feature automation analysis and extraction, rapid active malicious code response technique for unknown malicious code, and malicious code attack immunity technique. As a res ult, it actively defenses against the unknown malicious code attacks and enhances the security performance of communication networks.
其他文献
近年来,由驾驶员疲劳状态引发的交通事故居高不下,因此如何对驾驶员的疲劳状态进行实时监控,成为交通安全领域关注的焦点。本文首先分析了国外在驾驶疲劳状态检测技术方面的研究
本文在简述GIS在交通中应用的基础上,对水上交通GIS信息进行了分类,给出了水上交通GIS的系统功能设计和技术架构。
统一信用代码问题是建设我国道路运输行业信用体系必须解决的实践问题,本文在充分借鉴国内外相关成果的基础上,特别针对道路运输行业的两类受信主体——从业业户和从业人员的特
伟大的社会主义革命和社会主义建设日益蓬勃发展,“要演革命戏,先做革命人”已成为我国广大戏剧工作者的共同要求。戏剧工作者和剧团的革命化,是建设我国社会主义戏剧的根本
论文介绍了基于卡尔曼滤波理论的短时段交通量预测模型,并利用该模型与传统的时间序列模型针对高速公路所采集的数据进行了仿真预测比较。预测结果表明卡尔曼滤波预测方法较传
在现代物流中,货物配送是实现物流优化中需要考虑的许多问题的核心。研究货物配送流程能大大节约能源,提高了车辆的运输效率,而且作为市场运行机制的一个重要环节发挥着越来越大
车牌的准确定位是车牌识别的第一步,直接关系到系统的识别速度和识别精度,是整个系统的核心技术,也是难点所在。目前大部分算法是先提取车辆图像的边缘,然后结合车辆牌照的几何特
请下载后查看,本文暂不支持在线获取查看简介。 Please download to view, this article does not support online access to view profile.
车头时距分布在交通工程理论和实践中应用广泛。根据实际数据,本文研究了快速路入口匝道上游单向双车道断面的车头时距分布。研究结果表明:同一断面在不同速度下车头时距分布存
消防车辆的行程时间直接影响救援的质量。应用Neuroshell2软件中的ward网络,根据实际调查数据,建立了消防车辆行程时间计算模型,求取了影响因素对行程时间的影响重要度因子。为