期刊文献+

基于端信息自适应跳变的主动网络防御模型 被引量:14

A Proactive Network Defense Model Based on Selfadaptive End Hopping
在线阅读 下载PDF
导出
摘要 端信息跳变是目前主动网络防御领域的研究热点之一。该文构建了固定策略下的定时隙端信息跳变模型,分析了固定跳变周期引起的防御收益下降和跳变边界数据包丢失造成的服务损失问题。提出了基于非广延熵和Sibson熵融合的实时网络异常度量算法,在此基础上设计了端信息跳变周期和跳变空间自调整策略,构建了主动网络防御模型,提高了防御收益。给出了基于网络时延预测的跳变周期拉伸策略,保证了跳变边界的服务质量。理论分析与仿真实验结果表明了所提模型在网络防御中的有效性和良好的服务性。 End hopping technology is one of the hot research domains in the field of proactive network defense. An end hopping model based on fixed time slot under the fixed policy is established. The defense gains decline caused by fixed hopping period and the service loss caused by data packet loss on hopping boundary are analyzed. The real-time network anomaly assessment algorithm based on the fusion of nonextensive entropy and Sibson entropy is proposed. Then, the selfadaptive end hopping period and space policy based on the proposed algorithm are designed and the proactive network defense model is constructed which improves the defense gains. Furthermore, Hopping period stretching policy based on network delay prediction is proposed to ensure the service quality on hopping boundary. Theoretical analysis and simulation results show the effectiveness and good service of the proposed model in network defense.
出处 《电子与信息学报》 EI CSCD 北大核心 2015年第11期2642-2649,共8页 Journal of Electronics & Information Technology
基金 国家863计划项目(2012AA012704) 郑州市科技领军人才项目(131PLJR644)~~
关键词 主动网络防御 端信息跳变 自适应调整 Proactive network defense End hopping Selfadaptive adjustment
作者简介 刘江:男,1988年生,博士生,研究方向为网络动态目标防御、安全策略管理.通信作者:刘江liujiang2333@163.com 张红旗:男,1962年生,教授,博士生导师,研究方向为网络信息安全、安全管理. 代向东:男,1977年生,硕士,讲师,研究方向为网络安全策略管理. 王义功:男,1987年生,硕士,讲师,研究方向为网络安全策略管理.
  • 相关文献

参考文献17

  • 1Zhuang R, DeLoach S A, and Ou X. Towards a theory of moving target defense[C]. Proceedings of the First ACM Workshop on Moving Target Defense, Scottsdale, Arizona, 2014: 31-40.
  • 2Jajodia S and Sun K. MTD 2014: first ACM workshop on moving target defense[C]. Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, Arizona, 2014: 1550--1551.
  • 3Xu Jun, Guo Pin-yao, .Zhao Ming-yi, et al.. Comparing different moving target defense techniques[C]. Proceedings of the 2014 ACM SICSAC Conference on Computer and Communications Security, Scottsdale, Arizona, 2014: 97-107.
  • 4Wang H, Jia Q, Fleck D, et al.. A moving target DDoS defense mechanism[J]. Computer Communications, 2014, 46(3): 10-21.
  • 5Lee H C J and Thing V L L. Port hopping for resilient networks[C]. Proceedings of the 60th IEEE Vehicular Technology Conference, Washington, 2004: 3291-3295.
  • 6Atighetchi M, Pal P, Webber F, et al.. Adaptive use of network-centric mechanisms in cyber-defense[C]. Proceedings of the 6th IEEE International Symposium on Object-Oriented Real-Time Distributed Computing, Hokkaido, 2003: 183-192.
  • 7Sifalakis M, Schmid S, and Hutchison D. Network address hopping: a mechmlism to enhance data protection for packet communications[C]. 2005 IEEE International Conference on Communications, Seoul~ 2005: 1518-1523.
  • 8Antonatos S, Akritidis P, Markatos E P, et al.. Defending against hitlist worms using network address space randomization[J]. Computer Networks, 2007, 51(12): 3471-3490.
  • 9Badishi G, Herzberg A, and Keidar I. Keeping denial-of-service attackers in the dark[J]. IEEE Transactions on Dependable and Secure Computing, 2007, 4(3): 191-204.
  • 10Dunlop M, Groat S, Urbanski W, et al.. Mt6d: a moving target IPv6 defense[C]. The 2011 Military Communications Conference, Baltimore, Maryland, 2011: 1321-1326.

二级参考文献19

  • 1林楷,贾春福,翁臣.Distributed Timestamp Synchronization for End Hopping[J].China Communications,2011,8(4):164-169. 被引量:9
  • 2钟婷,刘勇,李志军,秦志光.基于网络处理器的IPv4/IPv6综合防火墙体系结构研究[J].通信学报,2006,27(2):142-146. 被引量:2
  • 3李树军.基于协议转变的拒绝服务攻击技术的研究[J].计算机应用,2006,26(10):2323-2325. 被引量:4
  • 4LEE H, THING V. Port hopping for resilient networks[A]. Conf 60th IEEE Vehicular Technology[C]. 2004.3291-3295.
  • 5BADISHIY G. HERZBERG A, KEIDAR I, et al. Keeping denial-of-service attackers in the dark[A]. Int Symp Distributed Computing (DISC)[C]. Springer-Vedag, 2005.18-31.
  • 6SIFALAKIS M, SCHMID S, HUTCHISON D. Network address hopping: a mechanism to enhance data protection for packet communications[A]. ICC 2005[C]. 2005.1518 - 1523.
  • 7BBN Technologies. Applications that participate in their own defense[EB/OL].http://apod.bbn.com. 2002.
  • 8ATIGHETCHI M, PAL P, WEBBER E et al. Adaptive use of net- work-centric mechanisms in cyber-defense[A]. Proc 6th IEEE Int Syrup Object-Oriented Real-Tune Distributed Computing [C]. 2003. 183-192.
  • 9FERRARI L. The aglets-2.0.2 user's manual[EB/OL], http://aglets. sourceforge.net. 2004.
  • 10PING W, LEI W, RYAN C. Honeypot detection in advanced botnet attacks[J]. International Journal of Information and Computer Security, 2010, 4(1): 30-51.

共引文献48

同被引文献93

引证文献14

二级引证文献30

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部