Research on end hopping for active network confrontation

Motivated by frequency hopping for military communication, end hopping tactic was proposed which can mitigate those threats such as DoS and eavesdrop greatly by changing the end information of port, address, timeslot, cryptographic algorithm or even protocol pseudo-randomly during end to end transmi...

Full description

Saved in:
Bibliographic Details
Main Authors: SHI Le-yi1, 2, JIA Chun-fu2
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2008-01-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/74656066/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841537424739532800
author SHI Le-yi1
2
JIA Chun-fu2
author_facet SHI Le-yi1
2
JIA Chun-fu2
author_sort SHI Le-yi1
collection DOAJ
description Motivated by frequency hopping for military communication, end hopping tactic was proposed which can mitigate those threats such as DoS and eavesdrop greatly by changing the end information of port, address, timeslot, cryptographic algorithm or even protocol pseudo-randomly during end to end transmission. An active defense model has been established upon end hopping. Then a test-bed has been implemented through mobile agent with a successful solu- tion of synchronization and handoff. The model shows better performance in both theoretical analysis and empirical studies. The work demonstrates that end information hopping tactic is feasible and effective for active network confronta- tion.
format Article
id doaj-art-0b78ce6d0fbf49dcb7e69e887790e249
institution Kabale University
issn 1000-436X
language zho
publishDate 2008-01-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-0b78ce6d0fbf49dcb7e69e887790e2492025-01-14T08:33:32ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2008-01-0110611074656066Research on end hopping for active network confrontationSHI Le-yi12JIA Chun-fu2Motivated by frequency hopping for military communication, end hopping tactic was proposed which can mitigate those threats such as DoS and eavesdrop greatly by changing the end information of port, address, timeslot, cryptographic algorithm or even protocol pseudo-randomly during end to end transmission. An active defense model has been established upon end hopping. Then a test-bed has been implemented through mobile agent with a successful solu- tion of synchronization and handoff. The model shows better performance in both theoretical analysis and empirical studies. The work demonstrates that end information hopping tactic is feasible and effective for active network confronta- tion.http://www.joconline.com.cn/zh/article/74656066/end hoppingnetwork confrontationdenial of serviceeavesdropservice hopping
spellingShingle SHI Le-yi1
2
JIA Chun-fu2
Research on end hopping for active network confrontation
Tongxin xuebao
end hopping
network confrontation
denial of service
eavesdrop
service hopping
title Research on end hopping for active network confrontation
title_full Research on end hopping for active network confrontation
title_fullStr Research on end hopping for active network confrontation
title_full_unstemmed Research on end hopping for active network confrontation
title_short Research on end hopping for active network confrontation
title_sort research on end hopping for active network confrontation
topic end hopping
network confrontation
denial of service
eavesdrop
service hopping
url http://www.joconline.com.cn/zh/article/74656066/
work_keys_str_mv AT shileyi1 researchonendhoppingforactivenetworkconfrontation
AT 2 researchonendhoppingforactivenetworkconfrontation
AT jiachunfu2 researchonendhoppingforactivenetworkconfrontation