首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 703 毫秒
1.
基于IPSec的下一代高性能安全处理器的体系结构   总被引:1,自引:0,他引:1       下载免费PDF全文
IPSec是目前适合所有Internet通信的惟一一种安全技术。通过分析IPSec的处理过程,指出网络安全处理器的使用是IPSec协议高效实现的关键,并详细介绍了目前典型安全处理器的结构和应用。由于目前的网络安全处理器无法满足OC 48及其以上速率接口的处理要求,对下一代高速网络安全处理器的体系结构进行了分析和预测。  相似文献   

2.
针对W indows2000下自带的IPSec与L inux的IPSec相互通讯比较困难的问题,对L inux IPSec、ND IS网络驱动程序以及WDM设备驱动程序进行了研究,在W indows平台下设计并实现了一个基于中间层驱动程序的IP-Sec,它能与L inux IPSec通讯。中间层驱动程序对过往的数据包进行加密或者解密操作是通过WDM设备驱动程序与上层应用程序的通讯机制,以此来实现应用层与内核的双向通讯,即应用层向内核传递密钥及其他配置信息,内核向上层应用程序提供底层的配置信息。此外,在L inux IPSec源代码的基础上增加了安全审计功能,具体测试结果表明,这个系统可以与L inux IPSec通信。  相似文献   

3.
基于小波分析的油料信息安全传输平台框架研究   总被引:2,自引:2,他引:0  
通过对IPSec实现VPN隧道这种网络安全技术和基于小波分析的信息图像伪装算法的深入研究,将这两种技术有机结合,在应用层对信息进行伪装,在网络层实现VPN 隧道传输,并据此构建一个可解决公用的信道上述问题的信息安全传输平台模型,从而为军队油料信息安全传输提供一种较好的解决方法。  相似文献   

4.
无人机集群应急通信系统面临的最大挑战为集群网络拓扑的快速变化,因此,高效的自组网路由协议是保证无人机集群应急通信系统具有稳定链接性能的基础,同时也是该领域的研究热点。分析了现有无人机自组网路由协议不能完全适用于无人机集群应急通信系统的机理,采用MAC层和网络层联合设计思想,提出了一种基于簇结构和强化学习的分簇路由协议,簇内设计了基于簇结构的先应式路由协议,簇间则采用基于位置和链路质量Q学习的自适应路由协议,从而减小了路由维护开销、缩短了端到端时延,提高了转发成功率。仿真结果表明,在实现高效分簇的基础上,所研究的分簇路由协议可满足无人机集群应急通信系统的高动态、低时延和高可靠的要求,具有一定的实际应用前景。  相似文献   

5.
协议的聚类是协议分析中一个重要的环节,为实现对未知二进制协议高效聚类,提出了一种基于K-means聚类和AGNES的未知二进制协议聚类方法。在对获取的二进制协议比特流进行数据预处理的基础上,先采用K-means算法对比特流数据进行初步聚类,再通过误差平方和、Calinski-Harabasz分数值和轮廓系数确定k值,最后选择AGNES算法将未知二进制协议比特流划分为不同的二进制协议子集。方法有效结合了K-means和AGNES算法的特点,降低了时间复杂度的同时提高了聚类的精确度。对实验数据集的测试结果验证了所提方法的有效性,较为准确地确定了k值,聚类精确度达到了98%。  相似文献   

6.
流媒体的RTP传输与QoS管理策略研究   总被引:1,自引:0,他引:1  
应用RTP协议进行传输和实现QoS管理是当前数据传输方面的热点问题,通过分析RTP协议的结构和原理,提出了一种RTP的传输模型,实现了数据流的RTP传输,同时就RTCP协议(RTP协议的传输控制部分)对QoS的管理策略进行了理论探讨.  相似文献   

7.
文章提出了一种Windows下高效网络协议分析软件的实现方法,从改造开源网络协议分析软件wireshark入手,将捕获的数据包写入共享内存,然后基于MFC编程从共享内存将数据包取出并进行重组、过滤和分析处理,实现了软交换系统中各设备实体间SIP协议数据的实时动态图形显示,最后对软件进行了验证测试。对于软交换系统中SIP信令分析具有实际应用价值,对于类似网络协议分析软件的开发具有一定的借鉴意义。  相似文献   

8.
王乐  赵刚  孙伟龙 《火力与指挥控制》2021,46(1):172-176,181
针对传统数据采集传输系统普遍存在的传输速率低,硬件无法升级,实时性和通用性不足等问题,结合航空电子系统的通信需求,提出了一种基于以太网的航空电子环境数据协议的设计方法.该方法是在FPGA平台端系统中实现,具备并发执行能力,考虑了错误检测机制,以确保在终端系统中接收到数据的完整性.此外,利用XILINX Spartan 6的板卡开发了协议中所需的硬件板块,并进行了FPGA端系统测试,测试表明这是一个高效经济的方法.  相似文献   

9.
首先介绍 P_MUL组播协议,给出了P_MUL组播实现的一个具体例子;总结了3G HF网络的主要协议,分析了网络支持 P_MUL组播协议需要满足的条件;在此基础上,给出一种通过在 3G HF原有协议族上增加一个组播数据链路协议从而支持 P_MUL在 3G HF网络中应用的方法;最后,指出在 3G HF网络中实现组播业务需要进一步解决的问题.  相似文献   

10.
李亮  孔祥营 《指挥控制与仿真》2009,31(2):116-118,122
针对嵌入式浏览器信息传输的安全性问题和嵌入式软件的特点,介绍了SSL协议,提出了一种在嵌入式浏览器中实现对SSL协议支持的方法.通过分析影响SSL协议客户端性能的因素,对SSL的实现过程进行了适当的优化,使用会话恢复机制、只对服务器进行验证的简单握手模式、减少TCP调用次数和优化对批量数据加密算法等方法,实现了嵌入式浏览器对SSL协议的支持;并介绍了方法在嵌入式浏览器JARI_Browser中的实现过程.实际的应用验证了该方法的可行性和正确性.  相似文献   

11.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

12.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

13.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

14.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

15.
16.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   

17.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

18.
装备的RMS是装备的重要设计参数,是影响战备完好和保障能力的关键因素.引入GTST-DMLD作为主要建模工具,建立起装备系统的RMS描述模型,以ESD为补充和扩展,对维修过程进行建模.并以GTST-DMLD-ESD模型作为装备RMS仿真的核心,对装备RMS仿真模型的总体框架进行了研究,并对各模块进行了较为详细的探讨.  相似文献   

19.
20.
ABSTRACT

What was the scope of the Bosnian jihadi participation in the war in Syria? Did the Bosnian volunteers tend to join one particular faction? Why did the Bosnian youngsters decide to join the holy war in the Levant? Was this an organized and hierarchical process or was this a grassroots movement? Last, were all the Salafis in Bosnia supportive of this dynamic or did this process cause internal frictions? These are some of the questions that this research will try to answer.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号