CN114745128B - 一种面向网络终端设备的信任估值方法及装置 - Google Patents
一种面向网络终端设备的信任估值方法及装置 Download PDFInfo
- Publication number
- CN114745128B CN114745128B CN202210309072.9A CN202210309072A CN114745128B CN 114745128 B CN114745128 B CN 114745128B CN 202210309072 A CN202210309072 A CN 202210309072A CN 114745128 B CN114745128 B CN 114745128B
- Authority
- CN
- China
- Prior art keywords
- trust
- sdp
- ratio
- evaluation
- forwarding
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
- H04L9/3265—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate chains, trees or paths; Hierarchical trust model
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
Claims (6)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210309072.9A CN114745128B (zh) | 2022-03-28 | 2022-03-28 | 一种面向网络终端设备的信任估值方法及装置 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210309072.9A CN114745128B (zh) | 2022-03-28 | 2022-03-28 | 一种面向网络终端设备的信任估值方法及装置 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114745128A CN114745128A (zh) | 2022-07-12 |
CN114745128B true CN114745128B (zh) | 2023-07-07 |
Family
ID=82276767
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210309072.9A Active CN114745128B (zh) | 2022-03-28 | 2022-03-28 | 一种面向网络终端设备的信任估值方法及装置 |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114745128B (zh) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117640223A (zh) * | 2023-12-06 | 2024-03-01 | 河海大学 | 电力物联网设备信任度动态评估方法、系统、设备和介质 |
CN118432956B (zh) * | 2024-07-05 | 2024-09-10 | 国网浙江省电力有限公司杭州供电公司 | 一种电力终端综合访问控制方法、系统、设备及存储介质 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7933985B2 (en) * | 2004-08-13 | 2011-04-26 | Sipera Systems, Inc. | System and method for detecting and preventing denial of service attacks in a communications system |
CA3043187A1 (en) * | 2019-05-14 | 2020-11-14 | Ahmed Refaey Hussein | Perimeters oriented virtualized software defined machine learning security |
KR20210026710A (ko) * | 2019-09-02 | 2021-03-10 | 한국과학기술원 | 공공 IoT용 신뢰-인식 역할-기반 액세스 제어 시스템 |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1665238B (zh) * | 2004-03-04 | 2010-04-21 | 华为技术有限公司 | 下一代网络的组网系统 |
MY184704A (en) * | 2014-09-26 | 2021-04-18 | Mimos Berhad | A system and method for authenticating a user based on user behaviour and environmental factors |
CA3093869C (en) * | 2018-03-16 | 2023-09-19 | Wire Swiss Gmbh | Trust extension in a secure communication framework |
US11734458B2 (en) * | 2019-02-26 | 2023-08-22 | Intel Corporation | Extensible layered trusted computing base for computing devices |
CN110830467A (zh) * | 2019-11-04 | 2020-02-21 | 中国人民解放军战略支援部队信息工程大学 | 基于模糊预测的网络可疑资产识别方法 |
CN114039750B (zh) * | 2021-10-26 | 2023-11-10 | 中电鸿信信息科技有限公司 | 一种保护sdp控制器的实现方法 |
-
2022
- 2022-03-28 CN CN202210309072.9A patent/CN114745128B/zh active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7933985B2 (en) * | 2004-08-13 | 2011-04-26 | Sipera Systems, Inc. | System and method for detecting and preventing denial of service attacks in a communications system |
CA3043187A1 (en) * | 2019-05-14 | 2020-11-14 | Ahmed Refaey Hussein | Perimeters oriented virtualized software defined machine learning security |
KR20210026710A (ko) * | 2019-09-02 | 2021-03-10 | 한국과학기술원 | 공공 IoT용 신뢰-인식 역할-기반 액세스 제어 시스템 |
Also Published As
Publication number | Publication date |
---|---|
CN114745128A (zh) | 2022-07-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN114745128B (zh) | 一种面向网络终端设备的信任估值方法及装置 | |
Özçelik et al. | Deceiving entropy based DoS detection | |
CN103152345A (zh) | 一种攻防博弈的网络安全最优攻防决策方法 | |
CN107317801A (zh) | 非完全可信用户协作无匿名区域的位置隐私保护方法 | |
Benarfa et al. | ChoKIFA+: an early detection and mitigation approach against interest flooding attacks in NDN | |
CN106850583B (zh) | 一种基于效用的分布式协作频谱感知攻击防御方法 | |
Zhi et al. | A reputation value-based early detection mechanism against the consumer-provider collusive attack in information-centric iot | |
Hu et al. | I-hmm-based multidimensional network security risk assessment | |
CN116170806B (zh) | 一种智能电网lwm2m协议安全访问控制方法及系统 | |
Xie et al. | Detecting latent attack behavior from aggregated Web traffic | |
Zhang et al. | Optimal energy allocation based on SINR under DoS attack | |
Yuan et al. | On MMD-based secure fusion strategy for robust cooperative spectrum sensing | |
Chang et al. | Sybil defenses in mobile social networks | |
Heydari et al. | Known unknowns: Indeterminacy in authentication in IoT | |
Ning et al. | Defense against advanced persistent threats in smart grids: A reinforcement learning approach | |
Zhang et al. | ADMBIFA: accurate detection and mitigation of blended interest flooding attacks in NDNs | |
Stachtiari et al. | Probabilistic model checking of CAPTCHA admission control for DoS resistant anti-SPIT protection | |
Umeda et al. | Interest flow control method based on user reputation and content name prefixes in named data networking | |
Bai et al. | Reputation-based Beta reputation system against SSDF attack in cognitive radio networks | |
CN102833107A (zh) | 安全准入方法及系统 | |
Sivaraman et al. | A defense mechanism against timing attacks on user privacy in ICN | |
CN103618730A (zh) | 一种基于积分策略的网站ddos攻击防御系统及方法 | |
Xie et al. | Attack resilience of cache replacement policies: A study based on TTL approximation | |
CN101969405A (zh) | 一种p2p环境下基于可信度的安全路由方法 | |
CN113032782B (zh) | 一种病毒传播抑制方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CP03 | Change of name, title or address | ||
CP03 | Change of name, title or address |
Address after: 450000 Science Avenue 62, Zhengzhou High-tech Zone, Henan Province Patentee after: Information Engineering University of the Chinese People's Liberation Army Cyberspace Force Country or region after: China Patentee after: Purple Mountain Laboratories Address before: No. 62 Science Avenue, High tech Zone, Zhengzhou City, Henan Province Patentee before: Information Engineering University of Strategic Support Force,PLA Country or region before: China Patentee before: Purple Mountain Laboratories |
|
CP03 | Change of name, title or address | ||
CP03 | Change of name, title or address |
Address after: No. 62 Science Avenue, High tech Zone, Zhengzhou City, Henan Province Patentee after: Information Engineering University of Strategic Support Force,PLA Country or region after: China Patentee after: Zijinshan Laboratory Address before: No. 62 Science Avenue, High tech Zone, Zhengzhou City, Henan Province Patentee before: Information Engineering University of Strategic Support Force,PLA Country or region before: China Patentee before: Purple Mountain Laboratories |