期刊文献+

网络欺骗在网络安全中作用的分析 被引量:4

Analysis of the effect of deceptive techniques in networks
下载PDF
导出
摘要 论述了网络欺骗技术在网络安全领域的重要性,以及把网络欺骗与防火墙、IDS结合起来保护网络的基本思想.将网络攻击归纳为两种攻击模型,在此基础上,分别从对攻击的预防、检测和响应三个方面讨论了不同网络欺骗技术的作用.提出了网络欺骗效果的评价指标和攻击者系统接触时间的概念,并进行了试验和分析. Deceptive technique in network plays an important role in network security fields. This technique is especially effective in network defending because it is combined with firewall and IDS. Various network intrusions were divided into two models. For each model, discuss the effect of various network deceptive techniques on prevention, detection and response. The standards of evaluating the effect of a network deception system were explored and analysed standards based on the simple deducing and experiment. A new useful concept, system interactive time, was also defined.
出处 《华中科技大学学报(自然科学版)》 EI CAS CSCD 北大核心 2005年第5期29-32,共4页 Journal of Huazhong University of Science and Technology(Natural Science Edition)
基金 国家网络与信息安全技术发展计划资助项目(2004研1971021)
关键词 网络安全 网络欺骗 攻击者系统接触时间 network security network deception attacker system inter-active time
  • 相关文献

参考文献5

  • 1Hspitzner L. Honeypots: tracking hackers[M]. Boston: Addison Wesley, 2002.
  • 2钟力.网络欺骗安全防护技术[J].军事通信技术,2001,22(1):36-39. 被引量:1
  • 3Cohen F. A mathematical structure of simple defensive network deceptions[J]. Computers and Security 2000, 19(6): 52-52.
  • 4Bruce S. Secrets and Lies[M]. New York: John Wiley and Sons, Inc, 2000..
  • 5Cohen F, Koike D. Leading Attackers Through Attack Graphs with Deceptions[J]. Computers and Security, 2003, 22(5): 402-411.

二级参考文献3

  • 1CohenF.A note on the role of deception in information protection[EB/OL ][].heep:∥ www all net.2000
  • 2CohenF.Deception and perception management in cyber-terrorism[].heep:∥ www all net.2000
  • 3Cohen F.A mathematical structure of simple defensivenetwork deceptions[].Computers and Security.2000

同被引文献21

引证文献4

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部