作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2008, Vol. 34 ›› Issue (13): 139-141. doi: 10.3969/j.issn.1000-3428.2008.13.050

• 安全技术 • 上一篇    下一篇

网络拓扑结构伪装模型

何聚厚   

  1. (陕西师范大学计算机学院,西安 710062)
  • 收稿日期:1900-01-01 修回日期:1900-01-01 出版日期:2008-07-05 发布日期:2008-07-05

Network Topology Camouflaging Model

HE Ju-hou   

  1. (School of Computer, Shaanxi Normal University, Xi’an 710062)
  • Received:1900-01-01 Revised:1900-01-01 Online:2008-07-05 Published:2008-07-05

摘要: 为了隐藏真正主机在网络拓扑结构中的位置,并降低真正主机被攻击的概率,提出真正主机和伪主机交叉配置的网络拓扑结构伪装模型。为了确保攻击者主动、被动探测时伪装结果的一致性,提出网络拓扑结构伪装模板,定义当拓扑结构伪装时不同设备的角色、行为、连接关系,讨论网络拓扑结构主动、被动伪装的处理过程。实验结果表明,该伪装模型在网络拓扑结构伪装方面达到了预期的效果。

关键词: 网络拓扑结构伪装, 网络安全, 伪主机

Abstract: In order to hide the site of real hosts in network topology map, and to decrease the possibility of the real host to be attacked, this paper presents a network topology camouflaging model that the real hosts and pseudo hosts configure alternatively, describes network topology camouflaging model: all hosts (include real hosts and pseudo hosts) have the different action according to their roles and features, and are connected with neighbors based on network topology camouflaging map, amd proposes the algorithms for active camouflaging process and passive camouflaging process. Experimental results show that the model is effective and efficient, and hides the real host very well.

Key words: network topology camouflaging, network security, pseudo host

中图分类号: