首页 | 本学科首页   官方微博 | 高级检索  
     

网络伪装模型研究
引用本文:何聚厚.网络伪装模型研究[J].计算机工程与应用,2008,44(3):10-13.
作者姓名:何聚厚
作者单位:陕西师范大学 计算机科学学院,西安 710062
摘    要:基于主动、被动探测攻击目标并分析其数据报的网络特征值,可以得出攻击目标的操作系统类型等重要信息,进而得出与之相关的系统漏洞,为入侵和攻击提供重要依据。提出的网络伪装模型中,通过对数据报报头网络特征值进行被动、主动伪装,可以有效防御针对网络特征值的主动、被动探测,实现隐藏攻击目标的真正网络特征信息,进而避免基于系统漏洞的攻击入侵。基于该模型实现的原型系统实验表明,该伪装模型能够很好地隐藏网络特征值。

关 键 词:网络伪装  网络特征值  网络探测  
文章编号:1002-8331(2008)03-0010-04
修稿时间:2007年8月1日

Study of network camouflaging model
HE Ju-hou.Study of network camouflaging model[J].Computer Engineering and Applications,2008,44(3):10-13.
Authors:HE Ju-hou
Affiliation:School of Computer Science,Shaanxi Normal University,Xi’an 710062,China
Abstract:By analyzing the networking character values actively and passively,attacker can get a lot of information about target host,such as the type of operating system.And follow these information,they can guess the system vulnerability.So these transparent values are very useful for the successful attack and intrusion process.In order to resolve above problems,this paper presents the network camouflaging model,which is based on the principle of camouflaging.Active camouflaging for network session is used to defeat the passive sniffle and detection,and passive camouflaging is used to defeat the active detection.As a result,the real network character values are hided and the camouflaged values are presented for the attacker.The experiment shows that the real networking character values are hided successfully.
Keywords:network camouflaging  networking character value  network detection
本文献已被 CNKI 万方数据 等数据库收录!
点击此处可从《计算机工程与应用》浏览原始摘要信息
点击此处可从《计算机工程与应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号