期刊文献+

基于协同地址碰撞的隐蔽认证方法

Cooperative Address Knocking Based Covert Authentication
下载PDF
导出
摘要 云计算的兴起不可避免地带来了一些安全问题,服务资源的非授权访问就是其中的一个重要威胁。对此,基于IPv6地址的新特性,提出一种协同地址碰撞技术,即待认证节点通过多个协同节点的配合,向关键主机所在网络发送在IP地址接口标识部分隐含认证秘密的数据包,以实现对节点的隐蔽认证。理论和实验分析结果表明,该方案可有效提高网络的安全性。 With the development of cloud computing, it is inevitable that many security problems arise. Unauthorized service access is one of the most important threats. Based on the new features of IPv6 address, we proposed a new net- work security technique called cooperative address knocking, which can be seen as an undeteetable authentication. It is a form of host-to-host communication which relies on deliberate communication attempts from some cooperative nodes. These connection attempts are monitored by a daemon which interprets the interface identifier of destination IP addres- ses as information. The theoretical and empirical analysis demonstrate that CAKCA scheme can effectively conduct un- detectable authentication and prevent the exposure of existence of the important host. The theoretical analysis and simu- lation results show that the proposed scheme can effectively improve the level of network security.
出处 《计算机科学》 CSCD 北大核心 2016年第9期175-179,共5页 Computer Science
关键词 云计算 IPV6 地址碰撞 通信认证 Cloud computing, IPv6, Address knocking, Communication authentication
  • 相关文献

参考文献12

  • 1俞能海,郝卓,徐甲甲,张卫明,张驰.云安全研究进展综述[J].电子学报,2013,41(2):371-381. 被引量:111
  • 2Reeja S L. Role Based Access Control mechanism in cloud com- puting using cooperative secondary antuorization recucling methd[J]. International Journal of Emerging Technology and Advanced Engineering, 2012,2 (10) : 444-450.
  • 3Rodas O, Morales G, Alvarez J. A reliable and scalable classifica- tion-based hybrid IPS[C]//IEEE 29th International Conferenceon Advanced Information Networking and Applications Work- shops (WAINA). Gwangiu : IEEE, 2015 : 599-604.
  • 4Barham P, Hand S, Isaacs R, et al. Techniques for lightweight concealment and authentication in IP networks: Technical Re- port IRB -TR-02-009[R]. Berkeley: Intel Research, 2002.
  • 5Ali F H M, Yunos R, Alias M A M. Simple port knocking method: against TCP replay attack and port scanning[C]//International Conference on Cyber Security, Cyber Warfare and Digital Foren- sic (CyberSec). Kuala Lumpur: IEEE, 2012 : 247-252.
  • 6Mehran P,Reza E A, Laleh B. SPKT: Secure port knock-tunne- ling, an enhanced port security authentication mechanism[C]// IEEE Symposium on Computers& Informatics (ISCI). Malay- sia: IEEE, 2012 : 145-149.
  • 7Srivastava V, Keshri A K, Roy A D, et al. Advanced port knoc- king authentication scheme with QRC using AES[C]//Proceed- ing of Trends in Networks and Communications. Chennai: Springer, 2011 : 159-163.
  • 8Sahu P, Singh M, Kulhare D. Implementation of modified hybrid port knocking (MHPK) with strong authentication[J].Journal of Commerce and Management Thought, 2013,4(2) : 490-504.
  • 9Hadi A H, A1-Bahadili H. A Hybrid Port-knocking technique for host authentication[M]///Simulation in Computer Network De- sign and Modeling: Use and Analysis. 2012:336.
  • 10Liew J H, Lee S, Ong I, et al. One-time knocking framework using SPA and IPsec[C]//Proceeding of 2nd International Con- ference on Education Technology and Computer. 2010: v5-209- v5-213.

二级参考文献4

共引文献110

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部