首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
Subject: Dip10mas — N0 0ne is TuCned D0wn 7698325Impg0ve your 1ife, with incrxasing y0ur eErning p0wJr fr0m a dip1oma within days from a n0n-accredited univeisity based on life expvrience.Ca11 anytLme inc1uding ho1idays and SunYays1-425 — 871 — 2013C0nfideGtia1ity asTured  相似文献   

2.
垃圾邮件的入侵与防范   总被引:1,自引:0,他引:1  
随着网络技术的迅猛发展,垃圾邮件日益猖獗。为了有效地对垃圾邮件加以打击和防范,该文简单阐述了垃圾邮件的定义和历史,并详细介绍了邮件用户日常应采取的措施。  相似文献   

3.
为了进一步提高检测的精确性,在研究僵尸主机的行为特点以及僵尸网络命令与控制信道的特性后,提出了一种基于终端系统行为和网络行为的混合式僵尸主机检测算法,并对现有的僵尸网络行为稳定性衡量方法进行了改进.在此基础上,设计实现了一个僵尸主机检测原型系统--BotScout.评估结果表明了算法的有效性.  相似文献   

4.
Watts  Phil 《ITNOW》2006,48(1):6-8
  相似文献   

5.
针对移动僵尸网络日益活跃的现状,提出一种基于人工免疫的僵尸短信入侵检测模型。该模型包含两个核心模块,短信过滤模块提取短信号码与黑名单信息相匹配初步过滤垃圾短信和广告;短信识别免疫模块量化短信的签名信息生成抗原,采用实值否定选择算法生成抗体,通过抗原与抗体的亲密程度识别僵尸短信,最后根据用户反馈结果更新抗体。实验结果表明:该模型具有较高的检测率,证明了其可行性。  相似文献   

6.
7.
8.
9.
10.
A note on the spread of worms in scale-free networks.   总被引:2,自引:0,他引:2  
This paper considers the spread of worms in computer networks using insights from epidemiology and percolation theory. We provide three new results. The first result refines previous work showing that epidemics occur in scale-free graphs more easily because of their structure. We argue, using recent results from random graph theory that for scaling factors between 0 and approximately 3.4875, any computer worm infection of a scale-free network will become an epidemic. Our second result uses this insight to provide a mathematical explanation for the empirical results of Chen and Carley, who demonstrate that the Countermeasure Competing strategy can be more effective for immunizing networks to viruses or worms than traditional approaches. Our third result uses random graph theory to contradict the current supposition that, for very large networks, monocultures are necessarily more susceptible than diverse networks to worm infections.  相似文献   

11.
12.
13.
The Decision Systems Group is pursuing a vision in which every available medical resource can be brought together at the point of need. The DSG focuses on the components and tools in specific areas as well as on the models, approaches, and infrastructure that make this type of integration possible. Its academic mission is to train individuals with dual expertise: those who understand and appreciate the issues involved in developing and validating a method or technique, plus the issues of deployment, operation, and interaction in practical environments. Ultimately, the application of this vision can only serve to enhance the current level of healthcare.  相似文献   

14.
15.
当前垃圾邮件过滤技术主要采用基于内容和规则的过滤方式,对于这种过滤方式必须具有大规模的样本知识库才能提高邮件过滤的正确性。然而当前邮件样本知识库存在内容单一、实时性差、覆盖范围有限的特点,本文针对现有知识库不足提出了一种新型的基于蜜罐系统的垃圾邮件采集技术,通过在蜜罐环境中,配置开放转发邮件服务器、开放代理服务器实现垃圾邮件的有效采集,最后,在实验环境中对该采集系统进行了测试。  相似文献   

16.
计算机蠕虫病毒的分析及防御技术   总被引:4,自引:0,他引:4  
本文着重分析了计算机蠕虫病毒的发病机制、危害以及最常见的防御技术,最后提出网络安全管理的几点建议。  相似文献   

17.
Active worms propagate across networks by employing the various target discovery techniques. The significance of target discovery techniques in shaping a worm’s propagation characteristics is derived from the life cycle of a worm. The various target discovery techniques that could be employed by active worms are discussed. It is anticipated that future active worms would employ multiple target discovery techniques simultaneously to greatly accelerate their propagation. To accelerate a worm’s propagation, the slow start phase in the worm’s propagation must be shortened by letting the worm infect the first certain percentage of susceptible hosts as soon as possible. Strategies that future active worms might employ to shorten the slow start phase in their propagation are studied. Their respective cost-effectiveness is assessed. A novel active defense mechanism is proposed, which could be an emerging solution to the active worm problem. Our major contributions in this article are first, we found the combination of target discovery techniques that can best accelerate the propagation of active worms; second, we proposed several strategies to shorten a worm’s slow start phase in its propagation and found the cost-effective hit-list size and average size of internally generated target lists; third, we proposed a novel active defense mechanism and evaluated its effectiveness; and fourth, we proposed three novel discrete time deterministic propagation models of active worms.  相似文献   

18.
区块链是一项规则与技术完美结合的生态系统创新,解决了保全证据遇到的一些根本问题。论文着重阐述区块链存证的原理和实现,介绍了哈希算法的基本概念、特征和示例,并注重运行原理和程序实现,同时介绍了MD5为代表的哈希散列算法如何应运于区块链存证的错误检查和完整性校验,随后还介绍了根据信息内容实现垃圾信息的识别和防治。哈希表寻址也是非常重要的哈希应用,通过使用哈希表可以明显地提升特定数据库的检索效率,这一点很有代表性,因为检索寻址是很多计算机系统的基础和底层。  相似文献   

19.
Spam and other related online threats are a real concern to all Internet users as they can lead to online fraud involving counterfeit websites, the theft of personal data such as credit card information, personal information through illicit access to computer systems and false or misleading representations in the market place. These are not imaginary threats but are supported by empirical evidence. This wastes time to users opening spam with misleading subject lines, wastes Internet resources trying to block it, consumes storage and bandwidth, and costs money in fighting it. E-commerce cannot flourish in an uncertain environment where security of personal data is not guaranteed. With the aim of boosting confidence in online commerce and protecting the interests of consumers, governments have introduced anti-spam legislation to protect consumers and businesses. This legislation has introduced different parameters. However, legislation alone cannot prevent spam. It is to be combined with technological measures. There is no separate legislation in India to deal with this problem. This paper analyses technological solutions and legal measures in the light of trans-national developments to provide background for any judicial decision making or legislative policy in India.  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号