Research on end hopping for active network confrontation
Motivated by frequency hopping for military communication, end hopping tactic was proposed which can mitigate those threats such as DoS and eavesdrop greatly by changing the end information of port, address, timeslot, cryptographic algorithm or even protocol pseudo-randomly during end to end transmi...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2008-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/74656066/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841537424739532800 |
---|---|
author | SHI Le-yi1 2 JIA Chun-fu2 |
author_facet | SHI Le-yi1 2 JIA Chun-fu2 |
author_sort | SHI Le-yi1 |
collection | DOAJ |
description | Motivated by frequency hopping for military communication, end hopping tactic was proposed which can mitigate those threats such as DoS and eavesdrop greatly by changing the end information of port, address, timeslot, cryptographic algorithm or even protocol pseudo-randomly during end to end transmission. An active defense model has been established upon end hopping. Then a test-bed has been implemented through mobile agent with a successful solu- tion of synchronization and handoff. The model shows better performance in both theoretical analysis and empirical studies. The work demonstrates that end information hopping tactic is feasible and effective for active network confronta- tion. |
format | Article |
id | doaj-art-0b78ce6d0fbf49dcb7e69e887790e249 |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2008-01-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-0b78ce6d0fbf49dcb7e69e887790e2492025-01-14T08:33:32ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2008-01-0110611074656066Research on end hopping for active network confrontationSHI Le-yi12JIA Chun-fu2Motivated by frequency hopping for military communication, end hopping tactic was proposed which can mitigate those threats such as DoS and eavesdrop greatly by changing the end information of port, address, timeslot, cryptographic algorithm or even protocol pseudo-randomly during end to end transmission. An active defense model has been established upon end hopping. Then a test-bed has been implemented through mobile agent with a successful solu- tion of synchronization and handoff. The model shows better performance in both theoretical analysis and empirical studies. The work demonstrates that end information hopping tactic is feasible and effective for active network confronta- tion.http://www.joconline.com.cn/zh/article/74656066/end hoppingnetwork confrontationdenial of serviceeavesdropservice hopping |
spellingShingle | SHI Le-yi1 2 JIA Chun-fu2 Research on end hopping for active network confrontation Tongxin xuebao end hopping network confrontation denial of service eavesdrop service hopping |
title | Research on end hopping for active network confrontation |
title_full | Research on end hopping for active network confrontation |
title_fullStr | Research on end hopping for active network confrontation |
title_full_unstemmed | Research on end hopping for active network confrontation |
title_short | Research on end hopping for active network confrontation |
title_sort | research on end hopping for active network confrontation |
topic | end hopping network confrontation denial of service eavesdrop service hopping |
url | http://www.joconline.com.cn/zh/article/74656066/ |
work_keys_str_mv | AT shileyi1 researchonendhoppingforactivenetworkconfrontation AT 2 researchonendhoppingforactivenetworkconfrontation AT jiachunfu2 researchonendhoppingforactivenetworkconfrontation |