Moving target defense against network eavesdropping attack using POF

Eavesdropping attack hereby was the major attack for traditional network communication.As this kind of attacks was stealthy and untraceable,it was barely detectable for those feature detection or static configuration based passive defense approaches.Since existing encryption or dynamic address metho...

Full description

Saved in:
Bibliographic Details
Main Authors: Duohe MA, Qiong LI, Dongdai LIN
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2018-02-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018025/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539428548345856
author Duohe MA
Qiong LI
Dongdai LIN
author_facet Duohe MA
Qiong LI
Dongdai LIN
author_sort Duohe MA
collection DOAJ
description Eavesdropping attack hereby was the major attack for traditional network communication.As this kind of attacks was stealthy and untraceable,it was barely detectable for those feature detection or static configuration based passive defense approaches.Since existing encryption or dynamic address methods could only confuse part of fields of network protocols,they couldn’t form a comprehensive protection.Therefore a moving target defense method by utilizing the protocol customization ability of protocol-oblivious forwarding (POF) was proposed,through private protocol packet randomization strategy and randomly drop deception-packets on dynamic paths strategy.It could greatly increase the difficulty of implementing network eavesdropping attack and protect the privacy of the network communication process.Experiments and compare studies show its efficiency.
format Article
id doaj-art-6dcde056d34b4972b03db84613d20eb3
institution Kabale University
issn 1000-436X
language zho
publishDate 2018-02-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-6dcde056d34b4972b03db84613d20eb32025-01-14T07:14:16ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2018-02-0139738759716545Moving target defense against network eavesdropping attack using POFDuohe MAQiong LIDongdai LINEavesdropping attack hereby was the major attack for traditional network communication.As this kind of attacks was stealthy and untraceable,it was barely detectable for those feature detection or static configuration based passive defense approaches.Since existing encryption or dynamic address methods could only confuse part of fields of network protocols,they couldn’t form a comprehensive protection.Therefore a moving target defense method by utilizing the protocol customization ability of protocol-oblivious forwarding (POF) was proposed,through private protocol packet randomization strategy and randomly drop deception-packets on dynamic paths strategy.It could greatly increase the difficulty of implementing network eavesdropping attack and protect the privacy of the network communication process.Experiments and compare studies show its efficiency.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018025/moving target defenseeavesdropping attackprotocol randomizationcyber space deception
spellingShingle Duohe MA
Qiong LI
Dongdai LIN
Moving target defense against network eavesdropping attack using POF
Tongxin xuebao
moving target defense
eavesdropping attack
protocol randomization
cyber space deception
title Moving target defense against network eavesdropping attack using POF
title_full Moving target defense against network eavesdropping attack using POF
title_fullStr Moving target defense against network eavesdropping attack using POF
title_full_unstemmed Moving target defense against network eavesdropping attack using POF
title_short Moving target defense against network eavesdropping attack using POF
title_sort moving target defense against network eavesdropping attack using pof
topic moving target defense
eavesdropping attack
protocol randomization
cyber space deception
url http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018025/
work_keys_str_mv AT duohema movingtargetdefenseagainstnetworkeavesdroppingattackusingpof
AT qiongli movingtargetdefenseagainstnetworkeavesdroppingattackusingpof
AT dongdailin movingtargetdefenseagainstnetworkeavesdroppingattackusingpof