共查询到20条相似文献,搜索用时 0 毫秒
1.
Marcus J. Ranum 《Network Security》2003,2003(11):10-13
Subject: Dip10mas — N0 0ne is TuCned D0wn 7698325Impg0ve your 1ife, with incrxasing y0ur eErning p0wJr fr0m a dip1oma within days from a n0n-accredited univeisity based on life expvrience.Ca11 anytLme inc1uding ho1idays and SunYays1-425 — 871 — 2013C0nfideGtia1ity asTured 相似文献
2.
垃圾邮件的入侵与防范 总被引:1,自引:0,他引:1
随着网络技术的迅猛发展,垃圾邮件日益猖獗。为了有效地对垃圾邮件加以打击和防范,该文简单阐述了垃圾邮件的定义和历史,并详细介绍了邮件用户日常应采取的措施。 相似文献
3.
4.
5.
针对移动僵尸网络日益活跃的现状,提出一种基于人工免疫的僵尸短信入侵检测模型。该模型包含两个核心模块,短信过滤模块提取短信号码与黑名单信息相匹配初步过滤垃圾短信和广告;短信识别免疫模块量化短信的签名信息生成抗原,采用实值否定选择算法生成抗体,通过抗原与抗体的亲密程度识别僵尸短信,最后根据用户反馈结果更新抗体。实验结果表明:该模型具有较高的检测率,证明了其可行性。 相似文献
6.
7.
8.
9.
10.
A note on the spread of worms in scale-free networks. 总被引:2,自引:0,他引:2
Christopher Griffin Richard Brooks 《IEEE transactions on systems, man, and cybernetics. Part B, Cybernetics》2006,36(1):198-202
This paper considers the spread of worms in computer networks using insights from epidemiology and percolation theory. We provide three new results. The first result refines previous work showing that epidemics occur in scale-free graphs more easily because of their structure. We argue, using recent results from random graph theory that for scaling factors between 0 and approximately 3.4875, any computer worm infection of a scale-free network will become an epidemic. Our second result uses this insight to provide a mathematical explanation for the empirical results of Chen and Carley, who demonstrate that the Countermeasure Competing strategy can be more effective for immunizing networks to viruses or worms than traditional approaches. Our third result uses random graph theory to contradict the current supposition that, for very large networks, monocultures are necessarily more susceptible than diverse networks to worm infections. 相似文献
11.
12.
13.
R A Greenes A Boxwala L Ohno-Machado 《M.D. computing : computers in medical practice》1999,16(4):23-27
The Decision Systems Group is pursuing a vision in which every available medical resource can be brought together at the point of need. The DSG focuses on the components and tools in specific areas as well as on the models, approaches, and infrastructure that make this type of integration possible. Its academic mission is to train individuals with dual expertise: those who understand and appreciate the issues involved in developing and validating a method or technique, plus the issues of deployment, operation, and interaction in practical environments. Ultimately, the application of this vision can only serve to enhance the current level of healthcare. 相似文献
14.
15.
宋士超 《网络安全技术与应用》2012,(8):25-27
当前垃圾邮件过滤技术主要采用基于内容和规则的过滤方式,对于这种过滤方式必须具有大规模的样本知识库才能提高邮件过滤的正确性。然而当前邮件样本知识库存在内容单一、实时性差、覆盖范围有限的特点,本文针对现有知识库不足提出了一种新型的基于蜜罐系统的垃圾邮件采集技术,通过在蜜罐环境中,配置开放转发邮件服务器、开放代理服务器实现垃圾邮件的有效采集,最后,在实验环境中对该采集系统进行了测试。 相似文献
16.
17.
Active worms propagate across networks by employing the various target discovery techniques. The significance of target discovery
techniques in shaping a worm’s propagation characteristics is derived from the life cycle of a worm. The various target discovery
techniques that could be employed by active worms are discussed. It is anticipated that future active worms would employ multiple
target discovery techniques simultaneously to greatly accelerate their propagation. To accelerate a worm’s propagation, the
slow start phase in the worm’s propagation must be shortened by letting the worm infect the first certain percentage of susceptible
hosts as soon as possible. Strategies that future active worms might employ to shorten the slow start phase in their propagation
are studied. Their respective cost-effectiveness is assessed. A novel active defense mechanism is proposed, which could be
an emerging solution to the active worm problem. Our major contributions in this article are first, we found the combination
of target discovery techniques that can best accelerate the propagation of active worms; second, we proposed several strategies
to shorten a worm’s slow start phase in its propagation and found the cost-effective hit-list size and average size of internally
generated target lists; third, we proposed a novel active defense mechanism and evaluated its effectiveness; and fourth, we
proposed three novel discrete time deterministic propagation models of active worms. 相似文献
18.
19.
Spam and other related online threats are a real concern to all Internet users as they can lead to online fraud involving counterfeit websites, the theft of personal data such as credit card information, personal information through illicit access to computer systems and false or misleading representations in the market place. These are not imaginary threats but are supported by empirical evidence. This wastes time to users opening spam with misleading subject lines, wastes Internet resources trying to block it, consumes storage and bandwidth, and costs money in fighting it. E-commerce cannot flourish in an uncertain environment where security of personal data is not guaranteed. With the aim of boosting confidence in online commerce and protecting the interests of consumers, governments have introduced anti-spam legislation to protect consumers and businesses. This legislation has introduced different parameters. However, legislation alone cannot prevent spam. It is to be combined with technological measures. There is no separate legislation in India to deal with this problem. This paper analyses technological solutions and legal measures in the light of trans-national developments to provide background for any judicial decision making or legislative policy in India. 相似文献