期刊文献+

信息隐藏技术的安全反馈模型 被引量:2

A security feedback model of information hiding technology
下载PDF
导出
摘要 为了防止内容相关型的网络入侵,从网络攻击对象的角度,利用蜜罐技术,提出了信息域自反馈网络入侵防护模型.该模型能够忽略攻击手段和方式而直接判断受到威胁的信息及所属领域,将信息根据其领域、内容等属性划分为信息域,在诱捕环境下将入侵者对信息域攻击的危害程度进行量化,获得域信息敏感度,以此作为评价数据是否需要重点防护的依据.网络场景实验表明,模型实现了对遭受网络攻击或威胁的信息及相关领域的预测,封闭数据集测试模型准确率高达96.56%,开放环境下其平均准确率为84.76%. To prevent text-related network invasion from the perspective of a network attack object by making use of honey-pot technology, an information domain self-feedback invasion prevention model was presented for contentbased network intrusion which is able to directly judge the threatened information and the corresponding field and ignore the ways and means of the network attacks. First of all, the data for the networks was divided into domains according to the fields, content, and other attributes. In the trapping environment, the damaged extent of the domain suffering from an attack by the intruder would be quantified, through which domain information sensitivity would be achieved, which would be taken as the basis for the evaluation of data protection. Through the experiments in the actual network scene, the results show this to be the successful model which forecasts the information and relative domain suffering from destruction or threat of network attacks. The model attains as high as 96.56 percent accuracy rate for the closed sets test, and the average accuracy rate is 84.76% in the open environment;information hiding technology
出处 《哈尔滨工程大学学报》 EI CAS CSCD 北大核心 2010年第11期1496-1502,共7页 Journal of Harbin Engineering University
基金 国家自然科学基金资助项目(60673131) 中央高校基础科研基金资助项目(HEUCF100602)
关键词 自反馈 防护模型 诱捕 信息域 网络入侵 信息隐藏技术 self-feedback prevention model trapping information domain network intrusion information hiding technology
  • 相关文献

参考文献5

二级参考文献53

  • 1李昆仑,黄厚宽,田盛丰,刘振鹏,刘志强.模糊多类支持向量机及其在入侵检测中的应用[J].计算机学报,2005,28(2):274-280. 被引量:49
  • 2肖云,韩崇昭,郑庆华,王清.一种基于多分类支持向量机的网络入侵检测方法[J].西安交通大学学报,2005,39(6):562-565. 被引量:13
  • 3Kreibich C,Crowcroft J.Automated NIDS signature generation using honeypots[C]. Karlsruhe,Germany:ACM SIGCOMM'03, 2003.
  • 4Urjita Thakar. Honeyanalyzer-analysis and extraction of intrusion detection pattems and signatures using honeypot[C].Proceedings of the Second International Conference on Innovations in Information Technology,2005.
  • 5Yegneswaran Vinod,Giffin Jonathon T, Jha Somesh.An architecture for generating semantics-aware signatures[C].Proceedings of USENIX Security Symposium,2005.
  • 6Budiarto R, Samsudin A,Heong C W, et al.Honeypots: Why we need a dynamics honeypots [C]. Proceedings of International Conference on Information and Communication Technologies: From Theory to Applications,2004.
  • 7Know Your Enemy:Defining virtual honeynets[EB/OL], http:// project.honeynet.org/papers/virtual/,2003-01-27.
  • 8Spitzner L.Honeypot farms[EB/OL], http://www.securityfocus. com/infocus/1720,2003-08-13.
  • 9Jiang Xuxian,Xu Dongyan, Wang Yi-Min.Collapsar: AVM-based honeyfarm and reverse honeyfarm architecture for network attack capture and detention[J].Journal of Parallel and Distributed Computing,2006,66(9): 1165-1180.
  • 10Anti-honeypot technology[J].IEEE Security and Privacy,2004,2 (1):76-79.

共引文献140

同被引文献27

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部