期刊文献+

主动网络拓扑结构和操作系统伪装技术

Technique of Network Topology and OS Camouflage
下载PDF
导出
摘要 详细介绍了一种新的基于欺骗的主动网络拓扑结构和操作系统伪装技术。通过linux系统内核驱动编程,拦截TCP/IP协议栈的数据包,根据操作系统的指纹库和网络伪装的策略改写报头信息,并跟踪会话信息,实现数据透明传输。通过大量伪装IP地址隐藏信息流向,保护重要主机;同时诱骗入侵者,及早发现入侵者。完成该伪装还需要伪装IP地址管理、动态地址分配和微路由技术的分工合作。 This article introduces initiative network topology and the operating system camouflage technology based on cheating in detail. Through Linux system , kernel drive's programming hold up TCP/IP stack data packet ,and rewrite header information according to operating system fingerprint storehouse and network camouflage strategy ,and track record information, come true data transparent transmission. Through a mass of pseudo the IP address hide away information to flow to . Protects the important computer . At the same time traps the intruder. Discovers the intruder early. Accomplish that camouflaged mission need camouflaged the IP address management, the dynamic allocation and the micro route technology work together.
出处 《航空计算技术》 2005年第3期124-127,共4页 Aeronautical Computing Technique
基金 国家"863"计划资助项目(2003AA142060) 西北工业大学研究生创业种子基金资助项目(Z20040054)
关键词 网络安全 网络伪装 网络欺骗 操作系统伪装 网络拓扑结构伪装 network security network - mask network - cheat operating system camouflage network topology camouflage
  • 相关文献

参考文献7

二级参考文献21

  • 1Donn B Parker 刘希良等(译).反计算机犯罪[M].北京:电子工业出版社,1999..
  • 2Derek Atkins 严伟等(译).Internet专业参考手册[M].北京:机械工业出版社,1998..
  • 3[1]Harrison A. The Denial-of-service Attack Aftermath. http://www.cnn. com/2000/TECH/computing /02/14/dos.aftermath.idg, 2000
  • 4[2]Power R. 2001 CSI/FBI Computer Crime and Security Survey. Technical Report, Computer Security Institute, 2001
  • 5[3]Stein L D, Stewart J N. The World Wide Web Security FAQ-Version 3.1.2. http://www.w3.org/Security/Faq/, 2002-02
  • 6[4]Paxson V. An Analysis of Using Reflectors for Distributed Denial-of- Service Attacks. Computer Communication Review, 2001,31(3)
  • 7[5]Cisco Systems, Inc. Cisco Security Advisory: 7xx Router Password Buffer Overflow. http://www.cisco.com/warp/public/770/pwbuf-pub. shtml, 1998-07
  • 8[6]Huegen C A. The Latest in Denial of Service Attacks: Smurfing Des- cription and Information to Minimize Effects. White Paper, 2000-02
  • 9[7]CERT Coordination Center. CA-1999-17: Denial of Service Tools.http: //www.cert.org/advisories/CA-2000-01.html.
  • 10[8]Cisco Systems Inc.. Defining Strategies to Protect Against TCP SYN Denial of Service Attacks. Http://www.cisco.com/warp/public/707/4. Html, 1999-07

共引文献109

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部