Research on deception defense techniques based on network characteristics obfuscation

There is usually a reconnaissance stage before a network attack, the attacker obtains the key information of the target system through techniques such as traffic analysis and active scanning, to formulate a targeted network attack.Deception defense techniques based on network characteristics obfusca...

Full description

Saved in:
Bibliographic Details
Main Authors: Jinlong ZHAO, Guomin ZHANG, Changyou XING
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2021-08-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2021045
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841529906602704896
author Jinlong ZHAO
Guomin ZHANG
Changyou XING
author_facet Jinlong ZHAO
Guomin ZHANG
Changyou XING
author_sort Jinlong ZHAO
collection DOAJ
description There is usually a reconnaissance stage before a network attack, the attacker obtains the key information of the target system through techniques such as traffic analysis and active scanning, to formulate a targeted network attack.Deception defense techniques based on network characteristics obfuscation is an effective strategy to confront network reconnaissance, which makes the attacker launch an ineffective attack by thwarting the attacker's reconnaissance stage.The technical principle of the existing obfuscation defense solutions was analyzed, the formal definition of network obfuscation was given, the existing research works were discussed from three aspects, and finally the development trend of the obfuscation deception defense technique were analyzed.
format Article
id doaj-art-a8d2f9ceb8f942c3b94eacfd32f0463a
institution Kabale University
issn 2096-109X
language English
publishDate 2021-08-01
publisher POSTS&TELECOM PRESS Co., LTD
record_format Article
series 网络与信息安全学报
spelling doaj-art-a8d2f9ceb8f942c3b94eacfd32f0463a2025-01-15T03:15:03ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2021-08-017425259567397Research on deception defense techniques based on network characteristics obfuscationJinlong ZHAOGuomin ZHANGChangyou XINGThere is usually a reconnaissance stage before a network attack, the attacker obtains the key information of the target system through techniques such as traffic analysis and active scanning, to formulate a targeted network attack.Deception defense techniques based on network characteristics obfuscation is an effective strategy to confront network reconnaissance, which makes the attacker launch an ineffective attack by thwarting the attacker's reconnaissance stage.The technical principle of the existing obfuscation defense solutions was analyzed, the formal definition of network obfuscation was given, the existing research works were discussed from three aspects, and finally the development trend of the obfuscation deception defense technique were analyzed.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2021045network reconnaissance protectiontopology obfuscationreconnaissance deceptiondeception defense
spellingShingle Jinlong ZHAO
Guomin ZHANG
Changyou XING
Research on deception defense techniques based on network characteristics obfuscation
网络与信息安全学报
network reconnaissance protection
topology obfuscation
reconnaissance deception
deception defense
title Research on deception defense techniques based on network characteristics obfuscation
title_full Research on deception defense techniques based on network characteristics obfuscation
title_fullStr Research on deception defense techniques based on network characteristics obfuscation
title_full_unstemmed Research on deception defense techniques based on network characteristics obfuscation
title_short Research on deception defense techniques based on network characteristics obfuscation
title_sort research on deception defense techniques based on network characteristics obfuscation
topic network reconnaissance protection
topology obfuscation
reconnaissance deception
deception defense
url http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2021045
work_keys_str_mv AT jinlongzhao researchondeceptiondefensetechniquesbasedonnetworkcharacteristicsobfuscation
AT guominzhang researchondeceptiondefensetechniquesbasedonnetworkcharacteristicsobfuscation
AT changyouxing researchondeceptiondefensetechniquesbasedonnetworkcharacteristicsobfuscation