首页 | 官方网站   微博 | 高级检索  
     

网络拓扑结构伪装模型
引用本文:何聚厚.网络拓扑结构伪装模型[J].计算机工程,2008,34(13):139-141.
作者姓名:何聚厚
作者单位:陕西师范大学计算机学院,西安,710062
摘    要:为了隐藏真正主机在网络拓扑结构中的位置,并降低真正主机被攻击的概率,提出真正主机和伪主机交叉配置的网络拓扑结构伪装模型。为了确保攻击者主动、被动探测时伪装结果的一致性,提出网络拓扑结构伪装模板,定义当拓扑结构伪装时不同设备的角色、行为、连接关系,讨论网络拓扑结构主动、被动伪装的处理过程。实验结果表明,该伪装模型在网络拓扑结构伪装方面达到了预期的效果。

关 键 词:网络拓扑结构伪装  网络安全  伪主机
修稿时间: 

Network Topology Camouflaging Model
HE Ju-hou.Network Topology Camouflaging Model[J].Computer Engineering,2008,34(13):139-141.
Authors:HE Ju-hou
Affiliation:(School of Computer, Shaanxi Normal University, Xi’an 710062)
Abstract:In order to hide the site of real hosts in network topology map, and to decrease the possibility of the real host to be attacked, this paper presents a network topology camouflaging model that the real hosts and pseudo hosts configure alternatively, describes network topology camouflaging model: all hosts (include real hosts and pseudo hosts) have the different action according to their roles and features, and are connected with neighbors based on network topology camouflaging map, amd proposes the algorithms for active camouflaging process and passive camouflaging process. Experimental results show that the model is effective and efficient, and hides the real host very well.
Keywords:network topology camouflaging  network security  pseudo host
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《计算机工程》浏览原始摘要信息
点击此处可从《计算机工程》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号