期刊文献+

基于消息篡改的端信息跳变技术 被引量:9

End hopping based on message tampering
下载PDF
导出
摘要 研究了端信息跳变技术在应用中存在的理论和技术问题,提出了基于消息篡改的跳变技术,并在此基础上建立了跳变栈模型,分别给出了跳变栈模型3种实现方案的工作原理及其优缺点分析。通过实验验证了基于消息篡改的端信息跳变技术的应用价值。 The main theoretical and technical problems were studied in the application of end hopping, and the idea of message tampering was proposed and the model of end hopping stack was built upon it. Three feasible implementations for the end hopping and discuss their advantages and disadvantages were respectively provided. And the experiment re- sult shows the potential application of the message tampering and the end hopping stack model in practice.
作者 林楷 贾春福
出处 《通信学报》 EI CSCD 北大核心 2013年第12期142-148,共7页 Journal on Communications
基金 国家自然科学基金资助项目(60973141,61272423) 国家重点基础研究发展计划(“973”计划)基金资助项目(2013CB834204) 高等学校博士学科点专项科研基金资助项目(20100031110030)~~
关键词 网络安全 拒绝服务攻击 端信息跳变技术 数据消息篡改 network security denial of service attack end hopping technology message tampering
  • 相关文献

参考文献3

二级参考文献31

  • 1林楷,贾春福,翁臣.端信息跳变中的分布式时间戳同步技术(英文)[J].China Communications,2011,8(4):164-169. 被引量:9
  • 2钟婷,刘勇,李志军,秦志光.基于网络处理器的IPv4/IPv6综合防火墙体系结构研究[J].通信学报,2006,27(2):142-146. 被引量:2
  • 3李树军.基于协议转变的拒绝服务攻击技术的研究[J].计算机应用,2006,26(10):2323-2325. 被引量:4
  • 4LEE H, THING V. Port hopping for resilient networks[A]. Conf 60th IEEE Vehicular Technology[C]. 2004.3291-3295.
  • 5BADISHIY G. HERZBERG A, KEIDAR I, et al. Keeping denial-of-service attackers in the dark[A]. Int Symp Distributed Computing (DISC)[C]. Springer-Vedag, 2005.18-31.
  • 6SIFALAKIS M, SCHMID S, HUTCHISON D. Network address hopping: a mechanism to enhance data protection for packet communications[A]. ICC 2005[C]. 2005.1518 - 1523.
  • 7BBN Technologies. Applications that participate in their own defense[EB/OL].http://apod.bbn.com. 2002.
  • 8ATIGHETCHI M, PAL P, WEBBER E et al. Adaptive use of net- work-centric mechanisms in cyber-defense[A]. Proc 6th IEEE Int Syrup Object-Oriented Real-Tune Distributed Computing [C]. 2003. 183-192.
  • 9FERRARI L. The aglets-2.0.2 user's manual[EB/OL], http://aglets. sourceforge.net. 2004.
  • 10PING W, LEI W, RYAN C. Honeypot detection in advanced botnet attacks[J]. International Journal of Information and Computer Security, 2010, 4(1): 30-51.

共引文献51

同被引文献46

  • 1林楷,贾春福,翁臣.端信息跳变中的分布式时间戳同步技术(英文)[J].China Communications,2011,8(4):164-169. 被引量:9
  • 2贾春福,林楷,鲁凯.基于端信息跳变DoS攻击防护机制中的插件策略[J].通信学报,2009,30(S1):114-118. 被引量:10
  • 3李树军.基于协议转变的拒绝服务攻击技术的研究[J].计算机应用,2006,26(10):2323-2325. 被引量:4
  • 4Jajodia S, Ghosh A K, Swarup V, et al. Moving target defense:creating asymmetric uncertainty for cyber threats[M] . New York:Springer-Verlag, 2011.
  • 5Atighetchi M, Pal P, Webber F, et al. Adaptive use of network-centric mechanisms in cyber-defense[C] //Proc of the 2nd IEEE International Symposium on Network Computing and Applications. [S. l.] :IEEE Press, 2003:179-188.
  • 6Dean M, Lowry J, Fink R, et al. Dynamic approaches to thwart adversary intelligence gathering[C] //Proc of DARPA Information Survivability Conference & Exposition II. [S. 1.] :IEEE Press, 2001:176-185.
  • 7Dunlop M, Groat S, Urbanski W, et al. MT6D:a moving target IPv6 defense[C] //Proc of Military Communications Conference. [S. l.] :IEEE Press, 2011:1321-1326.
  • 8Wang Huangxin, Jia Quan, Fleck D, et al. A moving target DDoS defense mechanism[J] . Computer Communications, 2014, 46(6):10-21.
  • 9Peng Wei, Li Feng, Zou Xukai. Moving target defense for cloud infrastructures:lessons from botnets[M] //High Performance Cloud Auditing and Applications. New York:Springer, 2014:35-64.
  • 10石乐义,贾春福,吕述望.基于端信息跳变的主动网络防护研究[J].通信学报,2008,29(2):106-110. 被引量:45

引证文献9

二级引证文献38

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部