Author Login Editor-in-Chief Peer Review Editor Work Office Work

Computer Engineering ›› 2008, Vol. 34 ›› Issue (13): 139-141. doi: 10.3969/j.issn.1000-3428.2008.13.050

• Security Technology • Previous Articles     Next Articles

Network Topology Camouflaging Model

HE Ju-hou   

  1. (School of Computer, Shaanxi Normal University, Xi’an 710062)
  • Received:1900-01-01 Revised:1900-01-01 Online:2008-07-05 Published:2008-07-05

网络拓扑结构伪装模型

何聚厚   

  1. (陕西师范大学计算机学院,西安 710062)

Abstract: In order to hide the site of real hosts in network topology map, and to decrease the possibility of the real host to be attacked, this paper presents a network topology camouflaging model that the real hosts and pseudo hosts configure alternatively, describes network topology camouflaging model: all hosts (include real hosts and pseudo hosts) have the different action according to their roles and features, and are connected with neighbors based on network topology camouflaging map, amd proposes the algorithms for active camouflaging process and passive camouflaging process. Experimental results show that the model is effective and efficient, and hides the real host very well.

Key words: network topology camouflaging, network security, pseudo host

摘要: 为了隐藏真正主机在网络拓扑结构中的位置,并降低真正主机被攻击的概率,提出真正主机和伪主机交叉配置的网络拓扑结构伪装模型。为了确保攻击者主动、被动探测时伪装结果的一致性,提出网络拓扑结构伪装模板,定义当拓扑结构伪装时不同设备的角色、行为、连接关系,讨论网络拓扑结构主动、被动伪装的处理过程。实验结果表明,该伪装模型在网络拓扑结构伪装方面达到了预期的效果。

关键词: 网络拓扑结构伪装, 网络安全, 伪主机

CLC Number: