Research on deception defense techniques based on network characteristics obfuscation

There is usually a reconnaissance stage before a network attack, the attacker obtains the key information of the target system through techniques such as traffic analysis and active scanning, to formulate a targeted network attack.Deception defense techniques based on network characteristics obfusca...

全面介绍

书目详细资料
Main Authors: Jinlong ZHAO, Guomin ZHANG, Changyou XING
格式: 文件
语言:English
出版: POSTS&TELECOM PRESS Co., LTD 2021-08-01
丛编:网络与信息安全学报
主题:
在线阅读:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2021045