Research on deception defense techniques based on network characteristics obfuscation
There is usually a reconnaissance stage before a network attack, the attacker obtains the key information of the target system through techniques such as traffic analysis and active scanning, to formulate a targeted network attack.Deception defense techniques based on network characteristics obfusca...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2021-08-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2021045 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841529906602704896 |
---|---|
author | Jinlong ZHAO Guomin ZHANG Changyou XING |
author_facet | Jinlong ZHAO Guomin ZHANG Changyou XING |
author_sort | Jinlong ZHAO |
collection | DOAJ |
description | There is usually a reconnaissance stage before a network attack, the attacker obtains the key information of the target system through techniques such as traffic analysis and active scanning, to formulate a targeted network attack.Deception defense techniques based on network characteristics obfuscation is an effective strategy to confront network reconnaissance, which makes the attacker launch an ineffective attack by thwarting the attacker's reconnaissance stage.The technical principle of the existing obfuscation defense solutions was analyzed, the formal definition of network obfuscation was given, the existing research works were discussed from three aspects, and finally the development trend of the obfuscation deception defense technique were analyzed. |
format | Article |
id | doaj-art-a8d2f9ceb8f942c3b94eacfd32f0463a |
institution | Kabale University |
issn | 2096-109X |
language | English |
publishDate | 2021-08-01 |
publisher | POSTS&TELECOM PRESS Co., LTD |
record_format | Article |
series | 网络与信息安全学报 |
spelling | doaj-art-a8d2f9ceb8f942c3b94eacfd32f0463a2025-01-15T03:15:03ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2021-08-017425259567397Research on deception defense techniques based on network characteristics obfuscationJinlong ZHAOGuomin ZHANGChangyou XINGThere is usually a reconnaissance stage before a network attack, the attacker obtains the key information of the target system through techniques such as traffic analysis and active scanning, to formulate a targeted network attack.Deception defense techniques based on network characteristics obfuscation is an effective strategy to confront network reconnaissance, which makes the attacker launch an ineffective attack by thwarting the attacker's reconnaissance stage.The technical principle of the existing obfuscation defense solutions was analyzed, the formal definition of network obfuscation was given, the existing research works were discussed from three aspects, and finally the development trend of the obfuscation deception defense technique were analyzed.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2021045network reconnaissance protectiontopology obfuscationreconnaissance deceptiondeception defense |
spellingShingle | Jinlong ZHAO Guomin ZHANG Changyou XING Research on deception defense techniques based on network characteristics obfuscation 网络与信息安全学报 network reconnaissance protection topology obfuscation reconnaissance deception deception defense |
title | Research on deception defense techniques based on network characteristics obfuscation |
title_full | Research on deception defense techniques based on network characteristics obfuscation |
title_fullStr | Research on deception defense techniques based on network characteristics obfuscation |
title_full_unstemmed | Research on deception defense techniques based on network characteristics obfuscation |
title_short | Research on deception defense techniques based on network characteristics obfuscation |
title_sort | research on deception defense techniques based on network characteristics obfuscation |
topic | network reconnaissance protection topology obfuscation reconnaissance deception deception defense |
url | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2021045 |
work_keys_str_mv | AT jinlongzhao researchondeceptiondefensetechniquesbasedonnetworkcharacteristicsobfuscation AT guominzhang researchondeceptiondefensetechniquesbasedonnetworkcharacteristicsobfuscation AT changyouxing researchondeceptiondefensetechniquesbasedonnetworkcharacteristicsobfuscation |