期刊文献+

基于深度欺骗策略的网络积极防御系统的设计与实现

Design and implementation of a network active defense system based on deception in depth
下载PDF
导出
摘要 为解决网络欺骗的安全性、欺骗性和交互性问题,提出了一个基于深度欺骗策略的五重欺骗与控制架构,在此基础上,建立了可实际应用的网络积极防御系统.该系统将防护、欺骗、监视、控制与审计整合为一体,在安全的条件下,通过网络服务欺骗、安全漏洞伪造、操作行为控制、文件系统欺骗和信息欺骗,实现了对整个网络入侵过程的欺骗与控制.其完整的欺骗与控制框架不仅仅针对某一攻击过程,还确保了系统不会轻易被识别,使欺骗程度和安全性大大提高. In order to solve the security, deception and interaction problems in network deception, a fivefold deception and control architecture based on defense in depth policy was proposed. According to the architecture, a network active defense system which integrates defense, deception, monitor, control and audit was implemented. Under the condition of security, it can deceive and control a whole network intrusion activity with network service simulation, vulnerability forgery, operation control, file system bam and information bam. The fivefold deception and control architecture does not only aim at a certain attack, but also insures the system can not be easily recognized and obviously promotes the level of deception and security.
作者 姚兰 钟力
出处 《高技术通讯》 CAS CSCD 北大核心 2007年第8期798-802,共5页 Chinese High Technology Letters
基金 863计划(2003AA146010)资助项目.
关键词 深度欺骗 积极防御 网络服务仿真 安全漏洞伪造 操作行为控制 deception in depth, active defense, network service simulation, vulnerability forgery, operation control
  • 相关文献

参考文献7

  • 1Cohen F.A note on the role of deception in information protection.Computer and security,1998,17:483-506.
  • 2Honeynet Project.Know your enemy:GenⅡ Honeynets.Http://project.honeynet.org/papers gen2/index.html:The Honeynet Projet,2003.
  • 3柳亚鑫,吴智发,诸葛建伟.基于Vmware的第三代虚拟Honeynet部署以及攻击实例分析.http://www.icst.pku.edu.cn/honeynetweb/honeynetcn/TechnicalReports.htm:北京大学计算机科学技术研究所,2005.
  • 4Recourse Technologies Inc.Mantrap:A secure deception system.http://www.recourse.com/:Symantec Corporation,2001.
  • 5Cohen F,Lambert D,Preston C,et al.A framework for deception.http://www.all.net/journal/deception/Framework/Framework.html:Fred Cohen and Associates,2001.
  • 6Anderson R H,Brackney R,Bozek T.Advanced network defense research.http://www.rand.org/pubs/confproceedings/2005/CF159.pdf:the RAND Corporation,2000.
  • 7Spitzner L.Honeypots:Tracking Hackers.Boston:Addison-Wesley,2003.73-166.

共引文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部