期刊文献+

网络伪装模型研究 被引量:3

Study of network camouflaging model
下载PDF
导出
摘要 基于主动、被动探测攻击目标并分析其数据报的网络特征值,可以得出攻击目标的操作系统类型等重要信息,进而得出与之相关的系统漏洞,为入侵和攻击提供重要依据。提出的网络伪装模型中,通过对数据报报头网络特征值进行被动、主动伪装,可以有效防御针对网络特征值的主动、被动探测,实现隐藏攻击目标的真正网络特征信息,进而避免基于系统漏洞的攻击入侵。基于该模型实现的原型系统实验表明,该伪装模型能够很好地隐藏网络特征值。 By analyzing the networking character values actively and passively,attacker can get a lot of information about target host,such as the type of operating system.And follow these information,they can guess the system vulnerability.So these transparent values are very useful for the successful attack and intrusion process.In order to resolve above problems,this paper presents the network camouflaging model,which is based on the principle of camouflaging.Active camouflaging for network session is used to defeat the passive sniffle and detection,and passive camouflaging is used to defeat the active detection.As a result,the real network character values are hided and the camouflaged values are presented for the attacker.The experiment shows that the real networking character values are hided successfully.
作者 何聚厚
出处 《计算机工程与应用》 CSCD 北大核心 2008年第3期10-13,共4页 Computer Engineering and Applications
基金 国家自然科学基金(the National Natural Science Foundation of China under Grant No.60503008)
关键词 网络伪装 网络特征值 网络探测 network camouflaging networking character value network detection
  • 相关文献

参考文献11

  • 1Yong G,Xin W F,Wei Z,et al.NetCamo:camouflaging network traffic for Qos-guaranteed mission critical applications[J].IEEE Transactions on Systems,2001,31(4):253-265.
  • 2Laskin N.Fractional levy motion and its application to network traffic modeling[J].Computer Networks,2002,40:363-375.
  • 3Veysset F,Courtay O,Heen O.New tool and technique for remote operating system fingerprinting[EB/OL].(2002-04).http://www.syssecurity.com/htm/projects/x.html.
  • 4Zalewski M.P0f:Passive OS fingerprinting tool[EB/OL].[2007-04].http://lcamtuf.coredump.cx/pOf.shtml.
  • 5Theilmann W,Rothermel K.Dynamic distance maps of the Internet[C]//Proc of IEEE Infocom Conference,2000:275-284.
  • 6CNCERT/CC2006年网络安全工作报告[EB/OL].(2006).http://www.cert.org.cn/articles/ docs/common/20070215 23 214.shtml.
  • 7Stefan Katzenbeisser Fabien A P.信息隐藏技术[M].吴秋新,译.北京:人民邮电出版社,2001.
  • 8Spitzner L.Honeypots:definitions and value of honeypots[EB/OL].(2005-05).http://www.spitzner.net/honeypots.html.
  • 9Cheops-ng[EB/OL].[2007-04].http://cheops-ng.sourceforge.net/.
  • 10Fyodor.Remote OS detection via TCP/IP Stack FingerPrinting[EB/OL].(2001-08).http://www.insecure.org/nmap/nmap-fingerprinting-article.html.

同被引文献63

引证文献3

二级引证文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部