defense technology
Recently Published Documents


TOTAL DOCUMENTS

156
(FIVE YEARS 45)

H-INDEX

8
(FIVE YEARS 1)

IARJSET ◽  
2021 ◽  
Vol 8 (9) ◽  
Author(s):  
Dr. Harpreet Kaur Sethi ◽  
Ashish Bajpai
Keyword(s):  

2021 ◽  
Author(s):  
Jiang Wang ◽  
Zheng Zhang ◽  
Bolin Ma ◽  
Yuan Yao ◽  
Xinsheng Ji

Author(s):  
Tao Luo ◽  
LiangMin Wang ◽  
ShangNan Yin ◽  
Hao Shentu ◽  
Hui Zhao

AbstractEdge computing has developed rapidly in recent years due to its advantages of low bandwidth overhead and low delay, but it also brings challenges in data security and privacy. Website fingerprinting (WF) is a passive traffic analysis attack that threatens website privacy which poses a great threat to user’s privacy and web security. It collects network packets generated while a user accesses website, and then uses a series of techniques to discover patterns of network packets to infer the type of website user accesses. Many anonymous networks such as Tor can meet the need of hide identity from users in network activities, but they are also threatened by WF attacks. In this paper, we propose a website fingerprinting obfuscation method against intelligent fingerprinting attacks, called Random Bidirectional Padding (RBP). It is a novel website fingerprinting defense technology based on time sampling and random bidirectional packets padding, which can covert the real packets distribution to destroy the Inter-Arrival Time (IAT) features in the traffic sequence and increase the difference between the datasets with random bidirectional virtual packets padding. We evaluate the defense against state-of-the-art website fingerprinting attacks in real scenarios, and show its effectiveness.


2021 ◽  
pp. 162-200
Author(s):  
Michael E. O’Hanlon

This chapter delves much deeper into three areas — nuclear weapons, space and satellites, and missile defense. It argues that these are among the subjects in military technology that are both simple enough to be accessible to the generalist, and important and enduring enough that they can be expected to remain relevant for policymakers well into the future. The chapter also discusses the significance of space and its purposes for military activities, noting the basic principles of the national security space subject are grounded in immutable principles of physics. It examines the approach used in the study which suggests a methodology for diving deeper into other key areas of defense technology. Ultimately, the chapter contends that constructing adequate defenses, stable military balances of power, and robust means of national protection is fated to be a very difficult undertaking. To put it bluntly, two opposing countries or blocs of nations with roughly comparable military capabilities are generally not inherently safe from each other.


2021 ◽  
pp. 134-161
Author(s):  
Michael E. O’Hanlon

This chapter examines various areas of defense technology, with a philosophy that might be described as “physics for poets.” The chapter provides information on the contemporary state of technology and projections for the future. It reviews broad trends across many areas of military technology, including cyber and artificial intelligence, as well as robotics, directed energy, and stealth. With a goal of making these important subjects accessible to a general audience, it suggests methods by which nonspecialists can make inroads into understanding them. The chapter surveys a wide range of military technologies, with a particular eye toward assessing whether collectively they can be used to revolutionize warfare in the coming years and decades. Ultimately, the chapter's category-by-category examination of military technology employs the same basic framework in the 2000 Technological Change and the Future of Warfare. The core of that book was an analysis of ongoing and likely future developments in various categories of military-related technologies.


Mathematics ◽  
2021 ◽  
Vol 9 (8) ◽  
pp. 805
Author(s):  
Leyi Shi ◽  
Xiran Wang ◽  
Huiwen Hou

Honeypot has been regarded as an active defense technology that can deceive attackers by simulating real systems. However, honeypot is actually a static network trap with fixed disposition, which is easily identified by anti-honeypot technology. Thus, honeypot is a “passive” active defense technology. Dynamic honeypot makes up for the shortcomings of honeypot, which dynamically adjusts defense strategies with the attack of hackers. Therefore, the confrontation between defenders and attackers is a strategic game. This paper focuses on the non-cooperative evolutionary game mechanism of bounded rationality, aiming to improve the security of the array honeypot system through the evolutionarily stable strategies derived from the evolutionary game model. First, we construct a three-party evolutionary game model of array honeypot, which is composed of defenders, attackers and legitimate users. Secondly, we formally describe the strategies and revenues of players in the game, and build the three-party game payoff matrices. Then the evolutionarily stable strategy is obtained by analyzing the Replicator Dynamics of various parties. In addition, we discuss the equilibrium condition to get the influence of the number of servers N on the stability of strategy evolution. MATLAB and Gambit simulation experiment results show that deduced evolutionarily stable strategies are valid in resisting attackers.


Sign in / Sign up

Export Citation Format

Share Document