Research on deception defense techniques based on network characteristics obfuscation
There is usually a reconnaissance stage before a network attack, the attacker obtains the key information of the target system through techniques such as traffic analysis and active scanning, to formulate a targeted network attack.Deception defense techniques based on network characteristics obfusca...
Saved in:
Main Authors: | Jinlong ZHAO, Guomin ZHANG, Changyou XING |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2021-08-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2021045 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Deception defense method against intelligent penetration attack
by: Jinyin CHEN, et al.
Published: (2022-10-01) -
Survey on cyber deception
by: Zhao-peng JIA, et al.
Published: (2017-12-01) -
Optimization mechanism of attack and defense strategy in honeypot game with evidence for deception
by: Lihua SONG, et al.
Published: (2022-11-01) -
Research on active defense based on multi-stage cyber deception game
by: Yongjin HU, et al.
Published: (2020-08-01) -
Active deception defense method based on dynamic camouflage network
by: Shuo WANG, et al.
Published: (2020-02-01)