Constitute the passive infrastructure in network

Only with passive technology on network security , it is impossible to build a soundly secretive application. There are many disadvantages in practice. In order to set up a more firm security network, we must take advantage of active technology. This paper presents us how to build a security network...

Full description

Saved in:
Bibliographic Details
Main Authors: YANG Shu-fan1, LI Fang-min1, ZHU Jian-qiu2, LIU Xin-fen 3
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2003-01-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/74360793/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841538952705605632
author YANG Shu-fan1
LI Fang-min1
ZHU Jian-qiu2
LIU Xin-fen 3
author_facet YANG Shu-fan1
LI Fang-min1
ZHU Jian-qiu2
LIU Xin-fen 3
author_sort YANG Shu-fan1
collection DOAJ
description Only with passive technology on network security , it is impossible to build a soundly secretive application. There are many disadvantages in practice. In order to set up a more firm security network, we must take advantage of active technology. This paper presents us how to build a security network system with active technology, make use of decoy sever to allure and track the attackers. In the procedure, a data analysis model is also brought out. It proves that the active technology is very helpful to forecast attack activities and promote network security with passive technology.
format Article
id doaj-art-2688bcd4ce0a40ac92faf9be3a7aeb3b
institution Kabale University
issn 1000-436X
language zho
publishDate 2003-01-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-2688bcd4ce0a40ac92faf9be3a7aeb3b2025-01-14T07:29:44ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2003-01-0117017574360793Constitute the passive infrastructure in networkYANG Shu-fan1LI Fang-min1ZHU Jian-qiu2LIU Xin-fen 3Only with passive technology on network security , it is impossible to build a soundly secretive application. There are many disadvantages in practice. In order to set up a more firm security network, we must take advantage of active technology. This paper presents us how to build a security network system with active technology, make use of decoy sever to allure and track the attackers. In the procedure, a data analysis model is also brought out. It proves that the active technology is very helpful to forecast attack activities and promote network security with passive technology.http://www.joconline.com.cn/zh/article/74360793/network securityactive technologydecoy serveranalysis model
spellingShingle YANG Shu-fan1
LI Fang-min1
ZHU Jian-qiu2
LIU Xin-fen 3
Constitute the passive infrastructure in network
Tongxin xuebao
network security
active technology
decoy server
analysis model
title Constitute the passive infrastructure in network
title_full Constitute the passive infrastructure in network
title_fullStr Constitute the passive infrastructure in network
title_full_unstemmed Constitute the passive infrastructure in network
title_short Constitute the passive infrastructure in network
title_sort constitute the passive infrastructure in network
topic network security
active technology
decoy server
analysis model
url http://www.joconline.com.cn/zh/article/74360793/
work_keys_str_mv AT yangshufan1 constitutethepassiveinfrastructureinnetwork
AT lifangmin1 constitutethepassiveinfrastructureinnetwork
AT zhujianqiu2 constitutethepassiveinfrastructureinnetwork
AT liuxinfen3 constitutethepassiveinfrastructureinnetwork