Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

98results about How to "Achieve defense" patented technology

Defense method, device and system for DNS (Domain Name System) services

The invention provides a defense method, a defense device and a defense system for DNS (Domain Name System) services. The method comprises: monitoring a DNS data query request message flux of a DNS recursive server network gateway within unit time; judging whether the DNS data query request message flux exceeds a predetermined safety access flux threshold value or not; obtaining a proportional value between the quantity of DNS data query request messages containing top-level domain addresses and the DNS data query request message flux; in the case of judging the proportional value to exceed the predetermined value, recording the top-level domain addresses as attacked addresses; transmitting the DNS data query request messages of which the domain addresses are not the attacked addresses; judging whether second-level domain addresses of the DNS data query request messages corresponding to the attacked addresses exist in a normal domain name list or not; and performing defense processing on the DNS data query request messages of which the second-level domain name addresses do not exist in the normal domain name list. The transmission of attack messages can be effectively decreased, so that the defense of a DNS server is realized; and meanwhile, the normal DNS data query request is not affected.
Owner:BEIJING LEADSEC TECH

Annual power generation plan rolled decomposition optimization method taking balance between plan finishing rate and load rate into consideration

The invention discloses an annual power generation plan rolled decomposition optimization method taking balance between plan finishing rate and load rate into consideration; the method comprises the following steps: (1) determining a plan period and a plan parameter requiring the annual power generation plan rolled decomposition optimization; (2) establishing a security constraint machine set combined optimization model applicable to the annual power generation plan rolled decomposition; (3) using a mixed integer linear planning algorithm to calculate start and stop states, the plan load rate and the peak and valley active outputs of the machine set at each plan period; (4) implementing the security check, judging if all security constraints are satisfied; if all the security constraints are satisfied, going to step (5); if not all the security constraints are satisfied, adding a new out-of-limit element, and calculating sensitivity information of the newly added out-of-limit element, going to step (2). The disclosed method circularly optimizes and drafts the machine set start and stop plan as well as the machine set average plan load rate, drafts monthly, weekly and daily power generation amount plans of the power plant; the disclosed method ensures the execution of the annual power generation amount plant, and achieves the purpose of saving energy and reducing emission.
Owner:NARI TECH CO LTD +2

Machine learning training data poisoning attack defense method

The invention belongs to the field of information security, and particularly relates to a machine learning training data poisoning attack defense method, which is used for intelligent security and protection, training data are collected in security and protection video data, and the method comprises the following steps: obtaining prediction value distribution of a clean training data set corresponding to a training data set to be identified; inputting each piece of to-be-identified training data into the trained prediction model to obtain a prediction value; determining and identifying poisoning data based on the predicted value and the predicted value distribution so as to realize defense; generating synthetic data based on the trusted training data of the same type as the training data to be identified; training by adopting an enhanced data set consisting of the synthetic data and the trustworthy training data to obtain a prediction model; wherein the distribution of the enhanced data set is the same as that of the clean training data set, and the prediction model takes the distribution of prediction values output by the enhanced data set as the prediction value distribution. Effective protection can be provided without defining a machine learning algorithm or an attack type, and the problem of limitation on specific attacks in an existing defense method is solved.
Owner:HUAZHONG UNIV OF SCI & TECH

Intrusion detection and location method of distributed fiber optic fence based on φ-otdr

InactiveCN102280001AIntrusion detectionDefensiveBurglar alarmDistributed intrusion detectionFiber
The invention discloses a distributed optical fiber fence intrusion detection and location method based on a phi-OTDR (Optical Time Domain Reflectometer), and the method comprises the following steps of: firstly, subtracting an acquired ith signal by an acquired (i-1)th signal to obtain a preprocessing monitoring signal; secondly, carrying out at least four-layer wavelet decomposition on the preprocessing monitoring signal by adopting a plurality of wavelet functions; thirdly, judging whether actual intrusion exists according to the consistency of distribution positions of maximum-wavelet mode maximums in all scale signals; fourthly, judging that the actual intrusion exists if the distribution positions of the maximum-wavelet mode maximums in at least three scale signals are consistent; fifthly, corresponding multiplying the scale signals in which the intrusion exists and the distribution positions of the maximum-wavelet mode maximums are consistent to obtain a composite signal of which pseudo maximums are inhibited and mode maximums at a catastrophe point are enhanced, using a position corresponding to the maximum-mode maximum in the composite signal as a position of the determined intrusion point, determining the intrusion generation and the intrusion position by combining various composite signal judgment results of wavelet multi-scale analysis according to the majority voting criterion.
Owner:UNIV OF ELECTRONICS SCI & TECH OF CHINA

Federated learning defense method based on block chain

The invention discloses a federated learning defense method based on a block chain. The method comprises the following steps: a participant establishing an intelligent contract with an authority; obtaining the model from the block chain by the participant in the book, carrying out local training, uploading the trained local model and the corresponding training time to the corresponding block node,and broadcasting the local model and the corresponding training time to the block chain; constructing a noise committee of a noise committee for each on-book participant, and adding noise to the local model of the corresponding on-book participant by using the noise committee to update the local model to obtain an updated model; constructing a verification committee for all in-book participants,verifying the prediction reliability and authenticity of each update model by using the verification committee according to the data set and the training time, and recording the update model passing the verification in a new block node; and the authority obtaining all the updated models passing the verification from the block nodes and aggregating the updated models to obtain an aggregated model,and broadcasting the aggregated model to the block chain for the next round of in-book participants to download local training.
Owner:ZHEJIANG UNIV OF TECH

Reinforcement learning-oriented data exception detection defense method

The invention discloses an abnormal data detection defense method for reinforcement learning, and the method comprises the steps: (1) building a car automatic driving environment, carrying out the reinforcement learning through employing a deep deterministic strategy gradient algorithm based on the state data provided according to the car automatic driving environment, and generating driving statedata as a training sample; (2) training a generative adversarial network composed of a generator and a discriminator by using the training sample; (3) according to the collected driving state data, generating predicted driving state data at the next moment according to the driving state data at the current moment by utilizing a trained generator; and (4) judging whether the real driving state data and the predicted driving state data at the next moment are normal or not by utilizing the trained discriminator, and when the real driving state data at the next moment are abnormal, judging that the predicted driving state data are normal, and replacing the real driving state data by utilizing the predicted driving state data.
Owner:ZHEJIANG UNIV OF TECH

Rope gripper

ActiveCN105819302AReliable and fast pinch brakingEasy to useElevatorsTransverse axisEngineering
The invention relates to a rope gripper. The rope gripper is structurally characterized in that two brake clamping blocks of which clamping surfaces are opposite to each other are arranged in a rack; at least one of the two brake clamping blocks is a movable clamping block; the back of each movable clamping block comprises an upper inclined plane and a lower inclined plane, so that the movable clamping block forms a compound wedge-shaped block formed by connecting an upper wedge-shaped body and a lower edge-shaped body; an elastic draw-off mechanism for drawing off the movable clamping blocks is arranged on the rack; upper transverse shafts and lower transverse shafts are arranged on the rack; an axial plane of each upper transverse shaft is opposite to an upper inclined plane of the back of the corresponding movable clamping block; an axial plane of each lower transverse shaft is opposite to a lower inclined plane of the back of the corresponding movable clamping block; and according to the setting positions of the upper transverse shafts and the lower transverse shafts, the movable clamping blocks can generate translation towards the direction of the clamping surface in the upward or downward moving process, so that a rope passing through a rope channel is clamped and stopped. The rope gripper disclosed by the invention serves as a safety brake; and a car or a hoisted heavy object can be immediately gripped by the rope gripper no matter upward heading or downward rolling, thereby preventing malignant consequence caused by unforeseen circumstances.
Owner:SHIJIAZHUANG WULON BRAKE

Signal identification attack defense method based on generative adversarial network

A defense method based on generative adversarial network attacks comprises the following steps: 1) establishing an appropriate generative adversarial network structure GAN by using a long short term memory (LSTM) network; 2) pre-training a discrimination model in the structure; 3) according to the loss function of the generator G, training the generator G by taking the number of iterations as a limit and the convergence loss function as a purpose; 4) according to the loss function of the generator D, training the generator D by taking the number of iterations as a limit and the convergence loss function as a purpose; (5) repeating the steps (3) to (4), optimizing a generator and a discriminator in the generative adversarial network in turn, obtaining a better network structure by taking the number of iterations as an upper limit, and completing the generation of an optimal adversarial sample; 6) observing indexes of the adversarial samples and generating a large number of adversarial samples of different types of signals, and 7) adding some screened adversarial samples into a model training stage to achieve a defense effect on signal boundary exploration attacks.
Owner:ZHEJIANG UNIV OF TECH

Network layer mobile target defense method and system based on OpenFlow

The invention provides a network layer mobile target defense method and system based on OpenFlow. The method comprises steps of address acquisition, construction of initial data packet header information, first IP jump, first port jump, second port jump, second IP jump and destination node communication. The method is advantaged in that upper-layer opacity protection can be achieved without third-party software, that is, modifying an upper-layer application is not needed, and the information sent from a node is always in the movement and change state, and thereby attack of an attacker is effectively avoided.
Owner:ZHEJIANG JIESHANG ARTIFICIAL INTELLIGENCE RES & DEV CO LTD

A LDoS attack detection method in SDN environment

The invention relates to an LDoS attack detection method under an SDN environment, comprising the following steps: positioning an exchange suspected to be attacked according to a difference Del between an incoming data packet and an outgoing data packet in a unit time of each exchange in an SDN network; Aiming at the switch suspected to be attacked, locating the incoming port of the attack trafficthrough the traffic statistics of each port, For each stream flowing into the port, counting the traffic information separately, and locating the source Mac and destination Mac information of the attack stream, so as to find the attack stream.
Owner:TIANJIN UNIV

Anti-chopping shield with W-shaped shield body

The invention discloses an anti-chopping shield with a W-shaped shield body. The anti-chopping shield comprises the shield body, handheld handles, a protective pad, and elbow locking and fixing devices, wherein the shield body comprises a shield body front surface and a shield body back surface; the protective pad is connected with the shield body back surface; each handheld handle and the corresponding elbow locking and fixing device penetrate through the protective pad and are connected with the shield body; the shield body front surface comprises shield ridges, shield front surfaces, shield lateral surfaces and a shield bottom; the shield ridges transversely extend to the shield bottom to form the shield front surfaces, and height gradually decreases when the shield ridges transversely extend; the shield ridges extend along the direction of the shield body back surface to form the shield lateral surfaces; the shield ridges, the shield front surfaces and the shield lateral surfaces are in symmetrical arrangement along the axis of the shield bottom, and are integrated into the W-shaped shield body front surface; and an anti-chopping bar is arranged on the surface of each shield ridge. The shield can be used for defending against the attack of liquid, thrown objects, cutters and the like, and has offending and defending functions.
Owner:BENGBU ZHIDA TECH CONSULTING CO LTD

Data processing method and device, server and user terminal

The invention provides a data processing method and device, a server and a user terminal, and belongs to the field of computer technology. The data processing method comprises the following steps that: a server generates response data according to a data request sent by a client; the server generates check information according to the data request, the response data and a key; and the server sendsthe response data and the check information to the client, so that the client judges whether the response data are hijacked or not according to the check information in order to prevent the hijackedresponse data from affecting the user experience.
Owner:ALIBABA (CHINA) CO LTD

Suspicious process processing method and device, storage medium and electronic equipment

The invention provides a suspicious process processing method and device, a storage medium and electronic equipment, relates to the technical field of data security, and aims to effectively detect attack behaviors of ransomware. The suspicious process processing method comprises the following steps: monitoring processes running in a terminal system; in response to monitoring that the operation corresponding to the process meets the preset condition, determining that the process is a suspicious process, and suspending the suspicious process; sending the information of the suspicious process to a server to request the server to judge whether the suspicious process has a secret stealing behavior or not, and obtaining a judgment result; obtaining the judgment result sent by the server; and processing the suspicious process according to the judgment result. The method provided by the embodiment of the invention are suitable for detecting the attack behavior of the ransomware.
Owner:HARBIN ANTIY TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products