计算机科学 ›› 2025, Vol. 52 ›› Issue (6A): 240900110-6.doi: 10.11896/jsjkx.240900110
朱柯达, 蔡瑞杰, 刘胜利
ZHU Keda, CAI Ruijie, LIU Shengli
摘要: 网络攻击者所用链路包含暗网、跳板等多个节点,将攻击路径变得复杂和难以预测,使得全链条溯源存在困难,导致大规模网络流量检测的效果较不稳定。为此,提出一种基于时间式网络流水印技术的大规模网络防御算法,利用时间间隔将大规模网络数据流进行分组,减少因单一参数异常而引发的误报。通过卷积编码和流量调制后实现该数据流时间式水印注入,使得水印信息在面对网络流量波动时仍能保持一定的稳定性,增强了水印的鲁棒性。通过比较时间式网络多流联合质心熵,快速识别出含有水印的标记流。实验表明,该算法受抖动影响较小,能够确保水印注入,实现对大规模网络攻击的防御。
中图分类号:
[1]ZHAO N,SU J S,ZHAO B K,et al.A Survey on Hidden Servi-ce Location Technologies in Anonymous Communication System [J].Chinese Journal of Computers,2022,45(2):393-411. [2]MA X G,LI T Y,LIU F L,et al.Robust network flow watermarking algorithm based on dynamic interval compression [J].Application Research of Computers,2023,40(10):3144-3148,3154. [3]ZHANG L C,KONG Y Z,GUO Y,et al.Survey on networkflow watermarking;model,interferences,applications,technologies and security [J].IET Communications,2018,12(14):1639-1648. [4]CHEN Q,SHEN T,LI P F,et al.Optical watermarking reconstruction method based on FC-DenseNets-BC neural network [J].Optical Technique,2021,47(2):223-230. [5]MELLIMI S,RAJPUT V,ANSARI I A,et al.A fast and efficient image watermarking scheme based on deep neural network[J].Pattern Recognition Letters,2021,151:222-228. [6]ZHENG G,HU D H,GE H,et al.End-to-end image steganography and watermarking driven by generative adversarial networks[J].Journal of Image and Graphics,2021,26(10):2485-2502. [7]WANG F.Simulation of Network Big Data Lossless Encryption Algorithm Based on Two-Way Defense[J].Computer Simulation,2021,38(10):316-319. [8]ZHANG L,LUO J Z,YANG M,et al.Interval Centroid Based Flow Watermarking Technique for Anonymous Communication Traceback [J].Journal of Software,2011,22(10):2358-2371. [9]LI Q K,LIU G J,LIU W W,et al.Detecting Network Watermark Through Multi-flow Joint Entropy of Centroid [J].Journal of Chinese Computer Systems,2017,38(11):2443-2447. [10]ZHANG Y J,CHEN K,ZHOU G,et al.Research Progress of Neural Networks Watermarking Technology[J].Journal of Computer Research and Development,2021,58(5):964-976. [11]XIA D X,WANG L N,SONG Y F,et al.Review of Deep Neural Network Model Digital Watermarking Technology [J].Science Technology and Engineering,2023,23(5):1799-1811. [12]YANG A S,WANG L,CAO Y J,et al.Neural network model integrity verification algorithm based on reversible watermark [J].Computer Engineering and Design,2024,45(2):383-389. [13]LIU Y L,HE H J,CHEN F,et al.Traceable DNN Model Protection Based on Watermark Neural Network [J].Journal of Applied Sciences,2023,41(2):183-196. [14]TAO J,ZHU Z C,WANG Z Y,et al.A Feature Watermarking Generation and Embedding Scheme for IPv6 Network [J].Journal of Computer Research and Development,2021,58(11):2400-2415. [15]ZHAO X Q,SUN L,WANG Y J,et al.Covert Channel Construction Method based on IPv6 Protocol [J].Communications Technology,2021,54(1):158-163. [16]WU Q,LI Y H,ZHU Q L.HMM-Viterbi Based Network Resource Data Processing Method and Its Application [J].Mobile Communications,2022,46(2):89-94. [17]FENG L,ZHU R J,WU H Z,et al.Survey of Neural Network Watermarking[J].Journal of Applied Sciences,2021,39(6):881-892. [18]WANG X C,ZHANG L,YU Y Q,et al.Robust image watermarking network algorithm based on effective neural architecture search [J].Journal of Zhejiang University(Science Edition),2021,48(3):261-269. [19]DI Y L,ZHANG Y Z,WANG T Q,et al.Low Distortion Watermark Scheme Based on Redistributable Anticollusion Coding [J].Journal of Data Acquisition and Processing,2023,38(2):413-425. [20]SONG Y,SHEN Q J,YANG H S.Reversible Database Watermarking Scheme Based on Cuckoo Algorithm [J].Computer Applications and Software,2021,38(12):304-313. |
|