scholarly journals An Algorithm of Tracking and Controlling Network Attack Node based on Adaptive Neural Networks

In order to obtain certain and comprehensive information for formulating network attack strategy, a complex network attack method is proposed in this paper. The attackers’ income, loss, cost and encountered risk in network attack are analyzed and index system is established to evaluate attack effect of network node with dynamic Bayesian network. This method can overcome defects of static evaluation which is relied on single index of network topology. Simulation experiment shows that this method combines more nodes and observation during the attack. It can avoid the gap between actual attack effect and theoretical expectation when attack is implemented by relying on static evaluation. In the meanwhile, it is more accurate in attack precision and of high attack efficiency

2017 ◽  
Vol 13 (03) ◽  
pp. 174
Author(s):  
Haishan Zhang ◽  
Xinchun Wang ◽  
Chenghui Jia

<span style="font-family: 'Times New Roman',serif; font-size: 12pt; mso-fareast-font-family: SimSun; mso-fareast-theme-font: minor-fareast; mso-ansi-language: EN-US; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA;">The injection attack of false data is a common attack form in wireless sensor network. This attack form achieves the purpose of consuming limited network resources and severely threatens the safety of wireless sensor network through consistent sending false data. This paper proposes a type of false data filtering strategy based on neighbor node monitoring. The idea of this strategy is to enable each node to store the neighbor node's information within the two-hop range. In the meantime, the data package determines whether the upstream node is original node or data forwarding intermediate node through whether ACK package is remitted by the upstream node to avoid the impersonation of wireless sensor network node by malicious node. The false data package of malicious node will be filtered within one hop. The simulation experiment verifies the filtering performance and anti-capture performance of this strategy, thus guaranteeing the safety of wireless sensor network.</span>


2017 ◽  
Vol 13 (08) ◽  
pp. 163 ◽  
Author(s):  
Liang Ge ◽  
Qin Wang ◽  
Pan Hu ◽  
Ze Hu ◽  
JunBi Liao

<p class="0abstract"><span lang="EN-US">Incidents could not always be avoided, resulting in significant losses for the state property and people's safety. Effective monitoring of incidents is becoming more and more important. Wireless sensor networks (WSNs) are widely used in environmental monitoring. On the basis of the existing wireless sensor network node deployment model, a network node deployment model was proposed, which was used in the monitoring of unexpected accidents. The model area was divided into the core area and the evacuation area, and different monitoring nodes deployment plans were applied in different areas. The simulation experiment is carried out by MATLAB, and the simulation results of the node coverage are obtained. Results show that the model for the practical application of the node deployment provides an effective deployment plan, as well as offers a strong basis for real-time monitoring and post-accident emergency evacuation.</span></p>


Entropy ◽  
2020 ◽  
Vol 22 (3) ◽  
pp. 364
Author(s):  
Pingchuan Tang ◽  
Chuancheng Song ◽  
Weiwei Ding ◽  
Junkai Ma ◽  
Jun Dong ◽  
...  

To describe both the global and local characteristics of a network more comprehensively, we propose the weighted K-order propagation number (WKPN) algorithm to extract the disease propagation based on the network topology to evaluate the node importance. Each node is set as the source of infection, and the total number of infected nodes is defined as the K-order propagation number after experiencing the propagation time K. The simulation of the symmetric network with bridge nodes indicated that the WKPN algorithm was more effective for evaluation of the algorithm features. A deliberate attack strategy, which indicated an attack on the network according to the node importance from high to low, was employed to evaluate the WKPN algorithm in real networks. Compared with the other methods tested, the results demonstrate the applicability and advancement that a lower number of nodes, with a higher importance calculated by the K-order propagation number algorithm, has to achieve full damage to the network structure.


Author(s):  
U. Gross ◽  
P. Hagemann

By addition of analytical equipment, scanning transmission accessories and data processing equipment the basic transmission electron microscope (TEM) has evolved into a comprehensive information gathering system. This extension has led to increased complexity of the instrument as compared with the straightforward imaging microscope, since in general new information capacity has required the addition of new control hardware. The increased operational complexity is reflected in a proliferation of knobs and buttons.In the conventional electron microscope design the operating panel of the instrument has distinct control elements to alter optical conditions of the microscope column in different modes. As a consequence a multiplicity of control functions has been inevitable. Examples of this are the three pairs of focus and magnification controls needed for TEM imaging, diffraction patterns, and STEM images.


Author(s):  
Nathan Walter ◽  
Yariv Tsfati

Abstract. This study examines the effect of interactivity on the attribution of responsibility for the character’s actions in a violent video game. Through an experiment, we tested the hypothesis that identification with the main character in Grand Theft Auto IV mediates the effect of interactivity on attributions of responsibility for the main character’s antisocial behavior. Using the framework of the fundamental attribution error, we demonstrated that those who actually played the game, as opposed to those who simply watched someone else playing it, identified with the main character. In accordance with the theoretical expectation, those who played the game and came to identify with the main character attributed the responsibility for his actions to external factors such as “living in a violent society.” By contrast, those who did not interact with the game attributed responsibility for the character’s actions to his personality traits. These findings could be viewed as contrasting with psychological research suggesting that respondents should have distanced themselves from the violent protagonist rather than identifying with him, and with Iyengar’s (1991) expectation that more personalized episodic framing would be associated with attributing responsibility to the protagonist.


Sign in / Sign up

Export Citation Format

Share Document