Research on deception defense techniques based on network characteristics obfuscation

There is usually a reconnaissance stage before a network attack, the attacker obtains the key information of the target system through techniques such as traffic analysis and active scanning, to formulate a targeted network attack.Deception defense techniques based on network characteristics obfusca...

Descrición completa

Detalles Bibliográficos
Main Authors: Jinlong ZHAO, Guomin ZHANG, Changyou XING
Formato: Artigo
Idioma:English
Publicado: POSTS&TELECOM PRESS Co., LTD 2021-08-01
Series:网络与信息安全学报
Subjects:
Acceso en liña:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2021045