Constitute the passive infrastructure in network
Only with passive technology on network security , it is impossible to build a soundly secretive application. There are many disadvantages in practice. In order to set up a more firm security network, we must take advantage of active technology. This paper presents us how to build a security network...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2003-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/74360793/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841538952705605632 |
---|---|
author | YANG Shu-fan1 LI Fang-min1 ZHU Jian-qiu2 LIU Xin-fen 3 |
author_facet | YANG Shu-fan1 LI Fang-min1 ZHU Jian-qiu2 LIU Xin-fen 3 |
author_sort | YANG Shu-fan1 |
collection | DOAJ |
description | Only with passive technology on network security , it is impossible to build a soundly secretive application. There are many disadvantages in practice. In order to set up a more firm security network, we must take advantage of active technology. This paper presents us how to build a security network system with active technology, make use of decoy sever to allure and track the attackers. In the procedure, a data analysis model is also brought out. It proves that the active technology is very helpful to forecast attack activities and promote network security with passive technology. |
format | Article |
id | doaj-art-2688bcd4ce0a40ac92faf9be3a7aeb3b |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2003-01-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-2688bcd4ce0a40ac92faf9be3a7aeb3b2025-01-14T07:29:44ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2003-01-0117017574360793Constitute the passive infrastructure in networkYANG Shu-fan1LI Fang-min1ZHU Jian-qiu2LIU Xin-fen 3Only with passive technology on network security , it is impossible to build a soundly secretive application. There are many disadvantages in practice. In order to set up a more firm security network, we must take advantage of active technology. This paper presents us how to build a security network system with active technology, make use of decoy sever to allure and track the attackers. In the procedure, a data analysis model is also brought out. It proves that the active technology is very helpful to forecast attack activities and promote network security with passive technology.http://www.joconline.com.cn/zh/article/74360793/network securityactive technologydecoy serveranalysis model |
spellingShingle | YANG Shu-fan1 LI Fang-min1 ZHU Jian-qiu2 LIU Xin-fen 3 Constitute the passive infrastructure in network Tongxin xuebao network security active technology decoy server analysis model |
title | Constitute the passive infrastructure in network |
title_full | Constitute the passive infrastructure in network |
title_fullStr | Constitute the passive infrastructure in network |
title_full_unstemmed | Constitute the passive infrastructure in network |
title_short | Constitute the passive infrastructure in network |
title_sort | constitute the passive infrastructure in network |
topic | network security active technology decoy server analysis model |
url | http://www.joconline.com.cn/zh/article/74360793/ |
work_keys_str_mv | AT yangshufan1 constitutethepassiveinfrastructureinnetwork AT lifangmin1 constitutethepassiveinfrastructureinnetwork AT zhujianqiu2 constitutethepassiveinfrastructureinnetwork AT liuxinfen3 constitutethepassiveinfrastructureinnetwork |