期刊文献+

A NEW DYNAMIC DEFENSE MODEL BASED ON ACTIVE DECEPTION

A NEW DYNAMIC DEFENSE MODEL BASED ON ACTIVE DECEPTION
下载PDF
导出
摘要 Aiming at the traditional passive deception models,this paper constructs a Decoy Platform based on Intelligent Agent(DPIA) to realize dynamic defense.The paper explores a new dynamic defense model based on active deception,introduces its architecture,and expatiates on communication methods and security guarantee in information transference.Simulation results show that the DPIA can attract hacker agility and activity,lead abnormal traffic into it,distribute a large number of attack data,and ensure real network security. Aiming at the traditional passive deception models, this paper constructs a Decoy Platform based on Intelligent Agent (DPIA) to realize dynamic defense. The paper explores a new dynamic defense model based on active deception, introduces its architecture, and expatiates on communication methods and security guarantee in information transference. Simulation results show that the DPIA can attract hacker agility and activity, lead abnormal traffic into it, distribute a large number of attack data. and ensure real network security.
出处 《Journal of Electronics(China)》 2009年第2期205-213,共9页 电子科学学刊(英文版)
基金 Supported by the National Natural Science Foundation of China (No.60572131) Innovation Fund of Technol-ogy Based Firms (No.08C26213200495) Key tech-nologies R&D Program of Jiang su Province (No.BE 2007058) College Natural Science Foundation of Ji-angsu Province (No.08KJB520005) the Scientific Research Foundation of NUPT (No.NY206050)
关键词 Network security Active deception Dynamic defense 欺骗 基础 模型 防御 南京大学 通讯
  • 相关文献

参考文献13

  • 1杨博,刘大有,杨鲲,张朝辉.移动Agent系统的主动通信机制[J].软件学报,2003,14(7):1338-1344. 被引量:5
  • 2李钢,王宇,李增智,王立.利用MOM实现移动代理基础通信机制的研究[J].小型微型计算机系统,2003,24(5):811-814. 被引量:2
  • 3吴刚,王怀民,吴泉源.一个移动智能体位置管理与可靠通信的算法[J].软件学报,2002,13(2):269-273. 被引量:21
  • 4N.Weiler.Honeypots for distributed denial-of-service attacks[].Eleventh IEEE International Workshops on Enabling Technologies:Infrastructure for Collabora- tive EnterprisesWET ICE’.2002
  • 5I.Kuwatly,M.Sraj,Z.Al Masri,H.Artail.A dynamic honeypot design for intrusion detection[].The IEEE/ACS International Conference on Pervasive Services.2004
  • 6B.Scottberg,W.Yurcik,D.Doss.Internet honeypots: protection or entrapment[].IEEE International Symposium on Technology and Society (ISTAS’).2002
  • 7R.Budiarto,A.Samsudin,W.H.Chuah,S.Noori.Honeypots:why we need a dynamics honeypots[].International Conference on Information and Com- munication Technologies: from Theory to Applica- tions.2004
  • 8Zhang Feng,Zhou Shi-jie,Qin Zhi-guang,Liu Jin-de.Honeypot: a supplemented active defense system for network security[].Proceeding of The Fourth International Conference on Parallel and Distributed Computing Applications and Technolo- gies.2003
  • 9A.L.Murphy,G.C.Roman,,G.Varghese.An exercise in formal reasoning about mobile communi- cations[].Proceedings of the th International Work- shop on Software Specification and Design.1998
  • 10M.Sato,M.Urakami,H.Matsuno.Effect of re-transmissions in mobile agent communications under unstable network conditions[].th International Con- ference on Mobile Data Management.2006

二级参考文献33

  • 1Philip A.Bernstein.Middleware:a model for distributed system services[J].Communications of The ACM.February,1996,39(2):86-98.
  • 2Mayfield J,Labrou Y,and Finin T.Evaluation of KQML as an agent communication language[A].Intelligent Agents II:Agent Theories,Architectures and Langauages[M].vo1.1037,Lecture Notes in AJ,Wooldridge M,Mueller J P and Tambe M,Eds.,Springer Verlag,1995,347-360.
  • 3Finin T,Labrou Y,and Mayfield J.KQML as an agent communieation language [A].Software agents [M].J.M.Bradshaw,Ed.,:AAAJ Press/The MIT Press,1997,291-316.
  • 4Gray R S.Agent Tcl:a transportable agent system [C].Proe.CIKM Wksp.Intelligent Info.Agents,J.Mayfield and T.Finnin,Eds.,1995,http://www.es.dartmouth.edu/agent/papers/cikm95.ps.Z.
  • 5Wong D et a1.Concordia:an infrastructure for collaborating mobile agents[A].K.Rothermel and R.Popescu-Zeletin[M].Eds.,Mobile Agents,Lecture Notes in Comp.Sci.Series,1219,Springer,1997.86-97.
  • 6Vu Anh Pham and Ahmed Karmouch.Mobile software agents:an overview[J].IEEE Comm,July 1998,26-37.
  • 7Mukherjee B, Heberlein T L, Levitt K N. Network intrusion detection. IEEE Networks, 1994, 8 (3): 26~41.
  • 8Forrest S, Hofmeyr S A, Somayaji A, et al. A ense of self for UNIX processes. Proceedings of the 1996 IEEE Symposium on Security and Privacy, 1996. 120~ 128.
  • 9Porras P A, Neumann P G. EMERALD: Event monitoring enabling responses to anomalous live disturbances. Proceeding of the Nineteenth National Computer Security Conference, 1997.
  • 10Ulf Lindqvist, Porras Phillip A. Detecting oomputer and netvork misuse through the production-based expert system toolset(P-BEST). Proc. of the IEEE Computer Society Symposium on Research in Security and Privacy, 1999. 146~161.

共引文献24

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部