Moving target defense against network eavesdropping attack using POF
Eavesdropping attack hereby was the major attack for traditional network communication.As this kind of attacks was stealthy and untraceable,it was barely detectable for those feature detection or static configuration based passive defense approaches.Since existing encryption or dynamic address metho...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2018-02-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018025/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841539428548345856 |
---|---|
author | Duohe MA Qiong LI Dongdai LIN |
author_facet | Duohe MA Qiong LI Dongdai LIN |
author_sort | Duohe MA |
collection | DOAJ |
description | Eavesdropping attack hereby was the major attack for traditional network communication.As this kind of attacks was stealthy and untraceable,it was barely detectable for those feature detection or static configuration based passive defense approaches.Since existing encryption or dynamic address methods could only confuse part of fields of network protocols,they couldn’t form a comprehensive protection.Therefore a moving target defense method by utilizing the protocol customization ability of protocol-oblivious forwarding (POF) was proposed,through private protocol packet randomization strategy and randomly drop deception-packets on dynamic paths strategy.It could greatly increase the difficulty of implementing network eavesdropping attack and protect the privacy of the network communication process.Experiments and compare studies show its efficiency. |
format | Article |
id | doaj-art-6dcde056d34b4972b03db84613d20eb3 |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2018-02-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-6dcde056d34b4972b03db84613d20eb32025-01-14T07:14:16ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2018-02-0139738759716545Moving target defense against network eavesdropping attack using POFDuohe MAQiong LIDongdai LINEavesdropping attack hereby was the major attack for traditional network communication.As this kind of attacks was stealthy and untraceable,it was barely detectable for those feature detection or static configuration based passive defense approaches.Since existing encryption or dynamic address methods could only confuse part of fields of network protocols,they couldn’t form a comprehensive protection.Therefore a moving target defense method by utilizing the protocol customization ability of protocol-oblivious forwarding (POF) was proposed,through private protocol packet randomization strategy and randomly drop deception-packets on dynamic paths strategy.It could greatly increase the difficulty of implementing network eavesdropping attack and protect the privacy of the network communication process.Experiments and compare studies show its efficiency.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018025/moving target defenseeavesdropping attackprotocol randomizationcyber space deception |
spellingShingle | Duohe MA Qiong LI Dongdai LIN Moving target defense against network eavesdropping attack using POF Tongxin xuebao moving target defense eavesdropping attack protocol randomization cyber space deception |
title | Moving target defense against network eavesdropping attack using POF |
title_full | Moving target defense against network eavesdropping attack using POF |
title_fullStr | Moving target defense against network eavesdropping attack using POF |
title_full_unstemmed | Moving target defense against network eavesdropping attack using POF |
title_short | Moving target defense against network eavesdropping attack using POF |
title_sort | moving target defense against network eavesdropping attack using pof |
topic | moving target defense eavesdropping attack protocol randomization cyber space deception |
url | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018025/ |
work_keys_str_mv | AT duohema movingtargetdefenseagainstnetworkeavesdroppingattackusingpof AT qiongli movingtargetdefenseagainstnetworkeavesdroppingattackusingpof AT dongdailin movingtargetdefenseagainstnetworkeavesdroppingattackusingpof |