The principle of the hacker's new attack method, Distributed Denial-of-Service (DDoS). is analyzed in this paper, and the fact that some security problems of TCP/IP protocol are utilized by DDoS is also discussed.
In the face of threatenning, numerous safe organizations and companies research and develop a lot of safe products, but the new attack method is appearing constantly, the update of the safe products can not catch up with the appearance of the question all the time, often after a certain attack has caused enormous losses , just take the remedy .
A new attacking principle is given to the newest typical MP3 embedding software MP3Stego V1 1 16 The principle is to make the embedded data invalid and keep the quality of original MP3 and its statistic distribution unaffected Any information cannot be extracted from attacked MP3 Three attacking methods are presented to attack the MP3Stego V1 1 16 The experiment results demonstrate their validity
However, merely detection can not meet the security requirement with the variety of hackers' attacking methods, response together with control after detection of intrusions becomes important approach of restricting hackers and protecting network in time.
The flaw of security in the file protocal service and three common attacking methods are described, for which, the corresponding solution is presented in this paper, where an FTP service is designed that has digital authentication, authorization and DSS,and can be easily implemented as well.
Based on an introduction of main content-based spam filtering technologies,the main attack means that the spammers use to attack content-based spam filters is analyzed,and the corresponding filtering improvement technologies are put forward.
In this paper, we propose wavelet-based denoising attack methods on image watermarking in discrete cosine transform (DCT) or discrete Fourier transform (DFT) domain or discrete wavelet transform (DWT) domain.
Again, three different attack methods are used, which proved devastating in a more homogenous Internet.
Another disadvantage is that minor variations in attack methods can often defeat such systems.
Also minor variations in attack methods can often defeat such systems.
Attackers may use one or more attack methods to achieve their different goals.
A Several methods of fast correcation attacks areanalyzed in this paper. Their disadvantages/advantages are discussed.Two improving methods of fast correlation attacks are presented in thefinal parties of the paper.
Matsumoto presented protocols to speed up secret computations with insecure auxiliary devices.The two most important protocols enable a smart card to compute the secret RSA operation faster with the help of a server that is not necessarily trusted by the card holder.It was stated that if RSA is secure,the protocols only be broken by exhaustive search in certain spaces.In this paper,we give an attack which shows that much smaller search spaces suffice.We also discuss parameter selection for these protocols.
In this paper,we use a model checker for authentication protocol,due to Marrero,Edmund,and Jha,to detect errors in the improved TMN protocol  .We show how to model the TMN protocol,by the MCJ mode,which is used to test if the intrude can successfully attack the protocol,and find out two kind of new flaws which were not found by the CSP method.Finally,we give an improved TMN protocol.