期刊文献+

部分连通网络流量伪装模型研究 被引量:2

Study of the Partially Connected Network Traffic Camouflage Model
下载PDF
导出
摘要 针对部分连通的网络提出了一种伪装网络流量的模型 ,并对该模型进行伪装网络流量的实现过程进行了详细的讨论 .另外 ,对由于伪装网络流量带来的费用开销作了定性的分析 .研究表明 ,该模型能够有效地伪装部分连通网络的网络流量 。 One model of camouflage network traffic is proposed for partially connected network in this paper. And the further details of implementation of the camouflage network traffic regarding this model are discussed. In addition, the overhead due to camouflage network traffic is analyzed in a quantitative way. It is recognized that this model can efficiently camouflage the traffic of partially connected network, thus generally prevent attacks which are made by hacker by means of analysis of network traffic.
出处 《小型微型计算机系统》 CSCD 北大核心 2004年第4期503-505,共3页 Journal of Chinese Computer Systems
基金 国家自然科学基金重大项目 ( 90 10 40 2 8)资助
关键词 部分连通网络 流量伪装 流量矩阵 重路由 垃圾包填充 partially connected network network traffic camouflage traffic matrix rerouting traffic padding
  • 相关文献

参考文献5

  • 1[1]Newman-Wolf R E, Venkatraman B R. High level prevention of traffic analysis[C].Seventh Annual Computer Security and Application Conference,San Antonio,Texas,Dec. 2-6.1991.
  • 2[2]Newman-Wolf R E, Venkatraman B R. Performance analysis of a method for high level prevention of traffic analysis[C]. 8th Annual Computer Security and Applications Conference,San Antonio,Texas,Nov. 30-Dec. 4,1992.
  • 3[3]Newman-Wolf R E, Venkatraman B R. Performance analysis of a method for high level prevention of traffic analysis using measurements from a campus network[J]. Tenth Annual Computer Security and Application Conference,Orlando,Florida,Dec. 5-9,1994.
  • 4[4]Voydock, Victor L, Kent S T. Security mechanisms in high-level network protocals[J]. ACM Computing Surveys, June 1983, 15(2): 135~171.
  • 5[5]Yong Guan,Cheng-zhi Li,Dong Xuan,Riccardo Bettai, Wei Zhao. Preventing traffic analysis for real-time communication networks[C]. in MilCom'99, Oct. 1999.

同被引文献7

  • 1Newman-wolf R E. Venkatraman B R. High Level Prevention of Traffic Analysis[C]//Proc. of the 7th Annual Computer Security and Application Conference. San Antonio, Texas: [s. n.]. 1991.
  • 2Newman-wolf R E, Venkatraman B R. Performance Analysis of a Method for High Level Prevention of Traffic Analysis[C]//Proc. of the 8th Annual Computer Security and Applications Conference. San Antonio, Texas: [s. n.]. 1992.
  • 3Newman-wolf R E, Venkatraman B R. Performance Analysis of a Method for High Level Prevention of Traffic Analysis Using Measurements from a Campus Network[C]//Proc. of the 10th Annual Computer Security and Application Conference. Orlando, Florida: [s. n.]. 1994.
  • 4Guan Yong, Fu Xinwen, Xuan Dong, et al. Netcamo: Camouflaging Network Traffic for QoS-guaranteed Critical Application[J]. IEEE Trans. on Systems, Man, and Cybernetics, 2001, 31 (4): 253-265.
  • 5吴振强,杨波.基于葱头路由技术和MPLS的隐匿通信模型[J].西安电子科技大学学报,2002,29(4):513-517. 被引量:11
  • 6王伟平,陈建二,王建新,眭鸿飞.基于组群的有限路长匿名通信协议[J].计算机研究与发展,2003,40(4):609-614. 被引量:20
  • 7王伟平,陈建二,陈松乔,王建新.匿名通信中短距离优先分组重路由方法的研究[J].软件学报,2004,15(4):561-570. 被引量:17

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部