首页 | 官方网站   微博 | 高级检索  
     

基于主动防御策略的安全传输模型
引用本文:胡汉平,郑映,孔涛,侯成帅. 基于主动防御策略的安全传输模型[J]. 华中科技大学学报(自然科学版), 2005, 33(4): 34-37
作者姓名:胡汉平  郑映  孔涛  侯成帅
作者单位:华中科技大学,图像识别与人工智能研究所,湖北,武汉,430074;中国船舶重工集团公司,第七○九研究所,湖北,武汉,430074
基金项目:国家自然科学基金重大研究计划资助项目(90104029).
摘    要:提出了一种基于主动防御策略的安全传输模型.在该模型中,以动态覆盖路由器所支撑的安全域为基本单元,定义了智能代理/管理网元及其具有自相似性的多级、分布式管理的体系结构;引入了诱骗报文,使攻击者无法跟踪到发送的真实加密数据报文;根据检测报文的摘要信息,及时地发现攻击并对其进行有效的跟踪定位,并对支撑安全域的覆盖路由器进行动态管理.该模型不仅提高了网络数据传输的安全性,而且增加了网络管理的有效性,分级、分布式的管理模式使得各层管理可根据实际中不同的需求选择适合本层的路由管理策略,增加了管理的灵活性,提高了路由器的转发效率.

关 键 词:安全传输模型  主动防御  摘要信息  路由控制  诱骗报文  分级管理
文章编号:1671-4512(2005)04-0034-04
修稿时间:2004-07-23

Security transfer model based on active defense strategy
Hu Hanping,Zheng Ying,Kong Tao,Hou Chengshuai. Security transfer model based on active defense strategy[J]. JOURNAL OF HUAZHONG UNIVERSITY OF SCIENCE AND TECHNOLOGY.NATURE SCIENCE, 2005, 33(4): 34-37
Authors:Hu Hanping  Zheng Ying  Kong Tao  Hou Chengshuai
Affiliation:Hu Hanping Zheng Ying Kong Tao Hou Chengshuai Hu Hanping Prof., Institue for Pattern Recognition & AI,Huazhong Univ. of Sci. & Tech.,Wuhan 430074,China.
Abstract:This paper proposed a security transfer model on the basis of the active defense strategy. In the unit of security domains mainly made up of dynamic overlaying routers, the intelligent agent/management of network element together with the self-similar hierarchical and distributed management structure were defined in the model. Deceptive packets were used so that the attackers could not trance the encrypted data packets. According to the digested information from data packets, this model is capable of detecting attacks and tracing back to the attackers immediately. In the meantime, the overlaying routers in the security domain are dynamically administrated. The model not only improves the security of data transfer on the Web, but also enhances the effectiveness of the network management and switching efficiency of routers as well, and in virtue of the hierarchical and distributed management pattern makes it feasible that every layer can choose specifically routing strategy which fits itself independently according to various demand, this model advances the flexility of management furthermore.
Keywords:security transfer model  active defense  digested information  routing control  deceptive packets  hierarchical management
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号