首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
网络安全漏洞扫描与脆弱性分析研究   总被引:1,自引:0,他引:1  
网络安全漏洞扫描与脆弱性分析是进行系统安全评估的基础和信息安全保障体系中的必要组成部分。首先介绍了网络安全漏洞的风险分级;然后分析和讨论了漏洞扫描的基本原理和过程及漏洞扫描技术,包括端口扫描技术和漏洞检测技术;并在此基础上提出了一种可以提高扫描效率和扫描效果的"逐级判断"扫描策略;最后,作为对网络漏洞扫描技术的补充,简要介绍和讨论了系统脆弱性分析技术。  相似文献   

2.
In the summer of 2000, the National Safe Skies Alliance awarded a project to the Applied Visualization Center at the University of Tennessee to develop a 3D computer tool to assist the US Federal Aviation Administration security group, now the Transportation Security Administration, in evaluating new equipment and procedures to improve airport checkpoint security. At the time of this writing, numerous detection equipment models, three specific airports, and a placement and passenger flow simulation tool for airport security planners have been developed. Similar tools have been constructed for simulating cargo/baggage inspection and other airport security operations. An extension of the original effort to consolidate the tools is currently underway.  相似文献   

3.
基于危险模式的无线传感器网络IDS模型   总被引:1,自引:0,他引:1  
网络安全是无线传感器网络需要解决的重要问题之一,构建基于传感器网络的入侵检测系统是其中重要的技术.简要阐述了基于人工免疫模型及危险模式的入侵检测系统的机理,提出了一种基于危险模式理论的无线传感器网络的入侵检测系统体系结构,并对该模型的特点进行了分析,为进一步深入的研究提出了设想.  相似文献   

4.
复合材料在生产和制造过程中难免会存在缺陷和损伤,严重影响着航空安全。敲击检测是最简单、运用最广泛的无损检测方法,然而其向智能化方向发展过程中出现了诸多问题。对复合材料结构特性、缺陷和损伤、安全性、敲击检测原理、敲击锤设计、信号处理单元、数据库搭建和智能检测算法进行了深入研究,提出了敲击检测标准流程和规范、数据库搭建方法、以及智能聚类检测算法,在此基础上开发了智能敲击检测系统。  相似文献   

5.
Security requirements and capabilities have changed dramatically over the past fifty years. Personal identification and detection of illegal substances including explosives have come to the forefront. With the proliferation of computers the security of information has also become a major concern. Substantial advances have been made over the last three decades in entry control, counter-terrorism, cryptology and airport protection. The utilization of technology has become an irreversible trend. Electronic devices and systems are capable of automatically and tirelessly monitoring and reporting breaches of security. For example, airport security began with physical protection of the facility with fences and area surveillance. The most recent concern is detecting explosives in both checked and early-on baggage, Other techniques relate to monitoring passengers for weapons as they transit the terminal building, especially crowds gathered at the metal detectors and X-ray machines. The application of electronics has produced reliability improvements and cost savings in systems that protect against unauthorized entry and numerous other threats. PCs have become the heart of security command and control systems. Most PC platforms rely on the proven software stability of Windows NT and present data in human-friendly, graphic format. It is expected that in the near future security monitoring will be consolidated in a central location, possibly to be integrated with other command and control functions  相似文献   

6.
衬层与药柱脱粘严重影响固体火箭发动机的结构完整性和工作安全性,该缺陷的可靠检测至关重要。文章综述了固体火箭发动机高能X射线检测技术现状。基于射线照相检测和工业CT检测手段,评述了固体火箭发动机衬层与药柱脱粘的图像分析和缺陷评判技术。针对该类缺陷,提出了综合应用射线照相技术和工业CT技术进行印证检测的方法,评判结果表明能够满足缺陷检测的可靠性与准确性要求。  相似文献   

7.
Southwest Microwave, Inc. (SMI) introduced the world's first commercially viable bistatic microwave intrusion detection sensor in 1971. Bistatic microwave has become the paradigm for high security perimeters, and SMI products have become industry standards. With the introduction of the Intrepid Digital Microwave, SMI brings the latest in Digital Signal Processing (DSP) and power and data networking to this proven sensor technology  相似文献   

8.
基于状态检测的防火墙系统研究   总被引:4,自引:0,他引:4  
重点讨论了基于状态检测防火墙系统的模型。通过对包过滤机制加入状态检测模块,将状态信息的保留机制与过滤机制结合起来,应用状态迁移分析技术设计状态检测模块,使系统对IP包的转发效率有了较大的提高,并且对于包过滤模型中存在的先天性安全漏洞做了较为完善的弥补。  相似文献   

9.
随着无人化智能移动装备在工业、交通等安全敏感领域的普及应用,民用导航定位系统中的定位安全问题日益突出。位置认证是对终端的物理位置声明进行认证的过程,是导航定位安全技术的重要组成部分。基于第五代(5G)移动通信网络的通导融合位置认证系统具有覆盖范围广、认证精度高、用户容量大、建设运维成本低等多重优势。本文首先介绍了多基站位置认证系统的检测判决原理,提出了漏检平均距离的定义作为位置认证系统精度的量化评价指标。在此基础上,通过数值仿真分析了信号带宽、基站同步误差、信噪比对位置认证系统精度的影响,并利用5G信道模型评估了典型场景下的位置认证系统的性能。结果表明,在具备3个以上的视距基站时,基于5G的通导融合位置认证系统可以实现米级的位置认证精度。  相似文献   

10.
随着无人化智能移动装备在工业、交通等安全敏感领域的普及应用,民用导航定位系统中的定位安全问题日益突出。位置认证是对终端的物理位置声明进行认证的过程,是导航定位安全技术的重要组成部分。基于第五代(5G)移动通信网络的通导融合位置认证系统具有覆盖范围广、认证精度高、用户容量大、建设运维成本低等多重优势。本文首先介绍了多基站位置认证系统的检测判决原理,提出了漏检平均距离的定义作为位置认证系统精度的量化评价指标。在此基础上,通过数值仿真分析了信号带宽、基站同步误差、信噪比对位置认证系统精度的影响,并利用5G信道模型评估了典型场景下的位置认证系统的性能。结果表明,在具备3个以上的视距基站时,基于5G的通导融合位置认证系统可以实现米级的位置认证精度。  相似文献   

11.
The latest generation of computer vision technology is revolutionizing concepts, applications, and products in video surveillance and CCTV. This is of prime relevance to security for large outdoor facilities such as commercial airfields, refineries, power plants, and office/industrial campuses. Most airfields, for example, have open (unfenced) perimeters, high volume heterogeneous traffic, are easily accessed on foot or by water, and exist in areas where regulations providing a safety buffer are difficult to legislate or enforce. And all airfields require 24/7 outdoor monitoring - snow, fog, rain, or shine. Likewise, most high-value facilities appealing to criminals and terrorists are in close proximity to public areas (roads, residences, city, etc.). The appeal of automated real-time surveillance is obvious $maximizing efficiency and effectiveness of security personnel and resources while increasing the probability of preventing a serious security breach. Computer vision based solutions have the potential for very discriminating detection and very low false alarms. The bottom line is that applied computer vision has the potential for the greatest return on investment (ROI), both short-term and long-term.  相似文献   

12.
旅客行李隐藏爆炸物CT检测是机场安检的重要部分,图像重建是CT检测技术的重要环节,但实际中往往得不到完全的投影数据。针对不完全投影数据或数据量较少情况的重建问题,提出将神经网络算法应用于图像重建,并利用完全投影条件下FBP算法的重建结果作为网络的目标输出进行权值学习,从而降低网络结构和训练的复杂性。对该算法进行计算机模拟仿真试验,试验结果表明,该算法能有效地完成不完全投影数据的图像重建,且重建图像质量较高。  相似文献   

13.
分析了数字媒体的内容管理和版权保护、家庭中网络设备和信息家电本身的安全机制、以及实现整个家庭网络的安全机制等家庭网络中安全涉及的主要方面.还考虑在实际的家庭网络环境中,根据用户的安全需求提供了不同层次和级别的安全策略:信息家电间无安全机制;信息家电间具有基本身份认证及消息认证机制;信息家电间具有完善的身份认证、消息传输加密及消息认证或消息签名机制.最后,分析了IPv6在家庭网络安全中的应用.  相似文献   

14.
无人机以其独特优势在侦察探测和武装打击等领域得到广泛应用,并在世界范围内多处战场上大放异彩。然而,针对无人机的干扰、诱骗和捕获问题不断发生,反无人机作战越来越成为各国军事研究热点。从无人机光学、热能散射、雷达反射、电磁信号、磁场和声学等目标特征分析了探测侦收技术,针对无人机测控和导航链路方面研究了干扰压制技术,并分析了对无人机的主要诱骗捕获方式。在此基础上,在探测侦收、干扰压制和诱骗捕获3个方面对无人机抗干扰防诱骗主要手段进行了技术分析,并提出了加强中远程空空中继链路、自主导航技术、智能化以及信息安全一体化设计研究等发展建议。  相似文献   

15.
计算机网络安全及安全审计技术研究   总被引:5,自引:0,他引:5  
通过对计算机安全和安全审计问题的简要分析,并结合网络系统的特点,力图较系统深入地探讨计算机网络安全及其审计技术;在此基础上,提出了一个网络安全审计模型。  相似文献   

16.
基于CPCI总线架构的航天器测试设备可以实现模块化、集成化和通用化设计,有利于测试系统的再次开发、直接沿用以及后续维护.某型号的综合电子和控制分系统地面测试设备采用基于CPCI总线的架构,使用VxWorks操作系统作为核心调度,采取模块化FPGA开发接口和特定功能.提出以监听任务、功能模块、板卡运行时间为检测手段,实现了对系统测试设备故障的诊断,尤其是反作用轮转速模块,软件能自主进行故障处理.在分系统及整星测试的使用过程中,此方法有效提高了设备的可靠度,提高了对星上产品的安全保护,保证整星大型试验的连续可靠运行.此方法对于其他地面测试设备的故障诊断具有一定的借鉴作用.  相似文献   

17.
On measurement of operational security   总被引:1,自引:0,他引:1  
Ideally, a measure of the security of a system should capture quantitatively the intuitive notion of “the ability of the system to resist attack.” That is, it should be operational, reflecting the degree to which the system can be expected to remain free of security breaches under particular conditions of operation (including attack). Instead, current security levels at best merely reflect the extensiveness of safeguards introduced during the design and development of a system. Whilst we might expect a system developed to a higher level than another to exhibit “more secure behavior” in operation, this cannot be guaranteed; more particularly, we cannot infer what the actual security behavior will be from knowledge of such a level. In the paper we discuss similarities between reliability and security with the intention of working toward measures of “operational security” similar to those that we have for reliability of systems. Very informally, these measures could involve expressions such as the rate of occurrence of security breaches, or the probability that a specified “mission” can be accomplished without a security breach. This new approach is based on the analogy between system failure and security breach, but it raises several issues which invite empirical investigation. We briefly describe a pilot experiment that we have conducted to judge the feasibility of collecting data to examine these issues  相似文献   

18.
某型飞机横向操纵系统的飞行安全评估及改进措施   总被引:1,自引:0,他引:1  
在对某型飞机横向操纵系统分析基础上,列举出危害飞行安全的典型故障;针对该典型故障,进行了飞行安全评估;计算发现,飞行安全风险概率达不到安全标准。因此,提出了改进措施,建立了增设故障检测装置后的飞行安全评估模型.最后讨论了故障检测装置的可靠性对系统的影响。  相似文献   

19.
近年来,卫星导航系统在军事监测、精细农业、交通监控、资源勘探、灾害评估等领域得到了广泛应用,但由于卫星导航信号结构公开且到达地面时强度微弱,卫星导航系统极易受到各种各样的干扰,其中欺骗式干扰因具有较强的隐蔽性,对卫星导航系统构成巨大的安全威胁。传统的欺骗式干扰检测方法大多采用单一参数进行检测,具有一定局限性。考虑到欺骗干扰源在欺骗过程中会引起一系列参数变化,构造了一个多参数输入的卫星导航欺骗式干扰检测模型,即将多个特征参数作为极限学习机(ELM)的输入,并通过训练和学习将真实信号与欺骗信号区分开,从而实现欺骗式干扰检测。同时,利用粒子群优化(PSO)算法优化ELM中的输入权值矩阵和隐层偏置,改善由于网络参数随机生成导致分类精度低的问题。仿真实验证明了该方法在卫星导航欺骗干扰检测方面的可行性和有效性。  相似文献   

20.
为满足雷达装备不断增长的保障需求,研制了一套便携式雷达装备检测系统,该检测系统的核心组成部分是超宽带雷达信号模拟器。模拟器采用低频段基带信号与高频段本振信号2次混频来模拟产生0.05~16 GHz范围内多种体制的雷达信号,最后完成了电路实现,经过信号测试各项指标均达到设计要求。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号