光纤通信网络中链路数据篡改攻击与防御方法  被引量:8

Attack and defense of link data tamper in optical fiber communication network

在线阅读下载全文

作  者:连鸿鹏[1] 程志强[1] 余丰盈 LIAN Hongpeng;CHENG Zhiqiang;YU Fengying(Concord University College Fujian Normal University,Fuzhou 350117,China)

机构地区:[1]福建师范大学协和学院,福州350117

出  处:《激光杂志》2022年第8期125-129,共5页Laser Journal

基  金:福建省中青年教师教育科研项目(科技类)(No.JAT191121)。

摘  要:针对传统光纤网络防御方法中防御能力较低且不能有效缓解和防御恶意攻击的问题,提出一种光纤通信网络中的链路数据篡改攻击与防御方法。建立链路层中所有数据种类的检测样本集,根据破解繁琐度信号的规划原则,获取有关篡改攻击的函数转换信号,计算每个数据集间信号的关联程度,寻找与篡改攻击信号最为接近的数据,确定链路层是否遭受侵害。根据数据间双重传输规则,计算每个传输节点间欧式距离,根据距离阈值确定相应防御节点。将所有篡改攻击数据的二进制代码进行语言转换协议,并实施封包处理,使用密钥对链路数据层进行加密,完成光纤通信网络中链路数据篡改攻击与防御。实验结果表明,所提方法对光纤通信网络中链路数据篡改攻击与防御精度较高,且攻击防御节点设置误差较低。Aiming at the problem that the traditional defense methods of optical fiber network have low defense capability and can not effectively mitigate and defend against malicious attacks,this paper proposes a link data tampering attack and defense method in optical fiber communication network.The detection sample set of all kinds of data in the link layer is established.According to the planning principle of cracking the cumbersome signal,the function conversion signal about tampering attack is obtained.The correlation degree of signals between each data set is calculated,and the data closest to the tampering attack signal is found to determine whether the link layer is violated.According to the dual transmission rules between data,the Euclidean distance between each transmission node is calculated,and the corresponding defense node is determined according to the distance threshold.All the binary code of tampering attack data is converted into language protocol,and the packet is processed.The key is used to encrypt the link data layer to complete the link data tampering attack and defense in optical fiber communication network.The experimental results show that the proposed method has high precision for link data tampering attack and defense in optical fiber communication network,and the attack defense node setting error is low.

关 键 词:链路数据 繁琐度信号 篡改攻击 函数转换信号 语言转换协议 

分 类 号:TN391[电子电信—物理电子学]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象