Research on deception defense techniques based on network characteristics obfuscation

There is usually a reconnaissance stage before a network attack, the attacker obtains the key information of the target system through techniques such as traffic analysis and active scanning, to formulate a targeted network attack.Deception defense techniques based on network characteristics obfusca...

Full description

Saved in:
Bibliographic Details
Main Authors: Jinlong ZHAO, Guomin ZHANG, Changyou XING
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2021-08-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2021045
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:There is usually a reconnaissance stage before a network attack, the attacker obtains the key information of the target system through techniques such as traffic analysis and active scanning, to formulate a targeted network attack.Deception defense techniques based on network characteristics obfuscation is an effective strategy to confront network reconnaissance, which makes the attacker launch an ineffective attack by thwarting the attacker's reconnaissance stage.The technical principle of the existing obfuscation defense solutions was analyzed, the formal definition of network obfuscation was given, the existing research works were discussed from three aspects, and finally the development trend of the obfuscation deception defense technique were analyzed.
ISSN:2096-109X