Research on deception defense techniques based on network characteristics obfuscation

There is usually a reconnaissance stage before a network attack, the attacker obtains the key information of the target system through techniques such as traffic analysis and active scanning, to formulate a targeted network attack.Deception defense techniques based on network characteristics obfusca...

Volledige beschrijving

Bibliografische gegevens
Hoofdauteurs: Jinlong ZHAO, Guomin ZHANG, Changyou XING
Formaat: Artikel
Taal:English
Gepubliceerd in: POSTS&TELECOM PRESS Co., LTD 2021-08-01
Reeks:网络与信息安全学报
Onderwerpen:
Online toegang:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2021045