期刊文献+

基于动态伪装技术的网络安全防御系统研究 被引量:8

Research on network security defense system based on dynamic camouflage technology
下载PDF
导出
摘要 伴随着物联网、云计算、大数据、移动互联、人工智能等新技术的迅猛发展,随之而来的安全问题也更加严重,越来越多的未知攻击和未知漏洞使得传统的网络安全防御手段难以适应。基于动态伪装技术的网络安全防御系统原理是通过动态变化的漏洞、缺陷和后门的种类、数量和系统特征等元素构建系统外在特征不确定性的假象,从而实现隐蔽真实的信息系统漏洞、缺陷和后门的目的。 With the rapid development of Internet of Things,cloud computing,big data,mobile Internet,artificial intelligence and other new technologies,the following security problems are more serious.More and more unknown attacks and vulnerabilities make the traditional network security defense methods difficult to adapt.The principle of network security defense system based on dynamic camouflage technology is to construct the false appearance of the uncertainty of the external characteristics of the system by dynamically changing the types,quantity and characteristics of loopholes,defects and backdoors,so as to achieve the purpose of concealing the real loopholes,defects and backdoors of the information system.
作者 丁朝晖 张伟 杨国玉 Ding Zhaohui;Zhang Wei;Yang Guoyu(China Datang Corporation Science and Technology Research Institute,Beijing 100043,China)
出处 《电子技术应用》 2022年第1期129-132,共4页 Application of Electronic Technique
关键词 动态伪装技术 安全防御系统 网络安全 dynamic camouflage technology security defense system network security
  • 相关文献

参考文献11

二级参考文献83

  • 1李之棠,徐晓丹.动态蜜罐技术分析与设计[J].华中科技大学学报(自然科学版),2005,33(2):86-88. 被引量:19
  • 2Defeat internet censorship: Overview of advanced technologies and products[J].White Paper,Global Internet Freedom Consortium,2007,12:1-22.
  • 3WUSTROW E,WOLCHOK S,GOLDBERG I,et al.Telex:anticensorship in the network infrastructure[C].In Proceedings of the 20th USENIX Security Symposium,2011:30-45.
  • 4MOGHADDAM H.SkypeMorph: Protocol obfuscation for tor bridges[C],In CCS,2012:92-108.
  • 5WEINBERG Z,WANG J,YEGNESWARAN V,et al.StegoTorus : A camou- flage proxy for the tor anonymity system[C].ACM Conference on Computer and Communications Security,2012:109-120.
  • 6WANG Q,GONG X,NGUYEN G,et al.CensorSpoof- er: asymmetric communication using IP spoofing for censorship-resistant web browsing[C].ACM Conference on Computer and Communications Security,2012:121-132.
  • 7KEVIN D P,SCOTTE C,THOMAS R,et al.Protocol misidentication made easy with format-transforming encryption [C].ACM Conference on Computer and Communications Security,2013:61-72.
  • 8The bridge of obfsproxy [EB/OL].[2016-03-01].https ://blog,torproject.org/blog/obfsproxy-next-step-censor-ship-arms-race.
  • 9SMITS R,JAIN D,PIDCOCK S,et al.BridgeSPAimproving tor bridges with single packet authoriztion[J].ACM workshop on Privacy in the Electronic Society,2011:93-102.
  • 10DYER K P,COULL S E,SHRIMPTON T.Marionette: a programmable network traffic obfuscation sys-tem[C].Usenix Conference on Security Symposium,2015:367-382.

共引文献60

同被引文献75

引证文献8

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部