Research on end hopping and spreading for active cyber defense

Inspired by the spread spectrum technology for communications,the concept of end spreading was proposed to represent a piece of information of the data transmission with a sequence of multiple end information,of which each piece of end information was irrelevant to the information it conveys.Thus th...

Full description

Saved in:
Bibliographic Details
Main Authors: Leyi SHI, Hongbin GUO, Xiao WEN, Jianlan LI, Yuwen CUI, Mengfei MA, Hui SUN
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2019-05-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2019071/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539390883495936
author Leyi SHI
Hongbin GUO
Xiao WEN
Jianlan LI
Yuwen CUI
Mengfei MA
Hui SUN
author_facet Leyi SHI
Hongbin GUO
Xiao WEN
Jianlan LI
Yuwen CUI
Mengfei MA
Hui SUN
author_sort Leyi SHI
collection DOAJ
description Inspired by the spread spectrum technology for communications,the concept of end spreading was proposed to represent a piece of information of the data transmission with a sequence of multiple end information,of which each piece of end information was irrelevant to the information it conveys.Thus the covert data transmission can be performed.Further,an active cyber defense model of end information hopping and spreading was presented,in which the hopping strategy was separated from the synchronization strategy.The synchronization was accomplished by means of end information spreading for synchronous authentication of both parties,which can solve the high-speed hopping synchronization problem with high concealment requirements.The mode of generation,transmission and authentication of the spreading sequence,and the data migration strategy in the end hopping and spreading model were described in detail,and the security performance and synchronization performance were analyzed and verified experimentally.Theoretical analysis and experimental results show that the cyber defense model of end information hopping and spreading has improved the availability and confidentiality of network services under high-speed hopping and has good anti-attack performance,which is of great significance for the proactive defense application of high intensity confrontation.
format Article
id doaj-art-ec7ec701cd0f4238998bed4f39dff962
institution Kabale University
issn 1000-436X
language zho
publishDate 2019-05-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-ec7ec701cd0f4238998bed4f39dff9622025-01-14T07:16:58ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2019-05-014012513559727144Research on end hopping and spreading for active cyber defenseLeyi SHIHongbin GUOXiao WENJianlan LIYuwen CUIMengfei MAHui SUNInspired by the spread spectrum technology for communications,the concept of end spreading was proposed to represent a piece of information of the data transmission with a sequence of multiple end information,of which each piece of end information was irrelevant to the information it conveys.Thus the covert data transmission can be performed.Further,an active cyber defense model of end information hopping and spreading was presented,in which the hopping strategy was separated from the synchronization strategy.The synchronization was accomplished by means of end information spreading for synchronous authentication of both parties,which can solve the high-speed hopping synchronization problem with high concealment requirements.The mode of generation,transmission and authentication of the spreading sequence,and the data migration strategy in the end hopping and spreading model were described in detail,and the security performance and synchronization performance were analyzed and verified experimentally.Theoretical analysis and experimental results show that the cyber defense model of end information hopping and spreading has improved the availability and confidentiality of network services under high-speed hopping and has good anti-attack performance,which is of great significance for the proactive defense application of high intensity confrontation.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2019071/end spreadingend hopping and spreadingactive network defensedata migrationhigh-speed hopping
spellingShingle Leyi SHI
Hongbin GUO
Xiao WEN
Jianlan LI
Yuwen CUI
Mengfei MA
Hui SUN
Research on end hopping and spreading for active cyber defense
Tongxin xuebao
end spreading
end hopping and spreading
active network defense
data migration
high-speed hopping
title Research on end hopping and spreading for active cyber defense
title_full Research on end hopping and spreading for active cyber defense
title_fullStr Research on end hopping and spreading for active cyber defense
title_full_unstemmed Research on end hopping and spreading for active cyber defense
title_short Research on end hopping and spreading for active cyber defense
title_sort research on end hopping and spreading for active cyber defense
topic end spreading
end hopping and spreading
active network defense
data migration
high-speed hopping
url http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2019071/
work_keys_str_mv AT leyishi researchonendhoppingandspreadingforactivecyberdefense
AT hongbinguo researchonendhoppingandspreadingforactivecyberdefense
AT xiaowen researchonendhoppingandspreadingforactivecyberdefense
AT jianlanli researchonendhoppingandspreadingforactivecyberdefense
AT yuwencui researchonendhoppingandspreadingforactivecyberdefense
AT mengfeima researchonendhoppingandspreadingforactivecyberdefense
AT huisun researchonendhoppingandspreadingforactivecyberdefense