Research on end hopping and spreading for active cyber defense
Inspired by the spread spectrum technology for communications,the concept of end spreading was proposed to represent a piece of information of the data transmission with a sequence of multiple end information,of which each piece of end information was irrelevant to the information it conveys.Thus th...
Saved in:
Main Authors: | , , , , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2019-05-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2019071/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841539390883495936 |
---|---|
author | Leyi SHI Hongbin GUO Xiao WEN Jianlan LI Yuwen CUI Mengfei MA Hui SUN |
author_facet | Leyi SHI Hongbin GUO Xiao WEN Jianlan LI Yuwen CUI Mengfei MA Hui SUN |
author_sort | Leyi SHI |
collection | DOAJ |
description | Inspired by the spread spectrum technology for communications,the concept of end spreading was proposed to represent a piece of information of the data transmission with a sequence of multiple end information,of which each piece of end information was irrelevant to the information it conveys.Thus the covert data transmission can be performed.Further,an active cyber defense model of end information hopping and spreading was presented,in which the hopping strategy was separated from the synchronization strategy.The synchronization was accomplished by means of end information spreading for synchronous authentication of both parties,which can solve the high-speed hopping synchronization problem with high concealment requirements.The mode of generation,transmission and authentication of the spreading sequence,and the data migration strategy in the end hopping and spreading model were described in detail,and the security performance and synchronization performance were analyzed and verified experimentally.Theoretical analysis and experimental results show that the cyber defense model of end information hopping and spreading has improved the availability and confidentiality of network services under high-speed hopping and has good anti-attack performance,which is of great significance for the proactive defense application of high intensity confrontation. |
format | Article |
id | doaj-art-ec7ec701cd0f4238998bed4f39dff962 |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2019-05-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-ec7ec701cd0f4238998bed4f39dff9622025-01-14T07:16:58ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2019-05-014012513559727144Research on end hopping and spreading for active cyber defenseLeyi SHIHongbin GUOXiao WENJianlan LIYuwen CUIMengfei MAHui SUNInspired by the spread spectrum technology for communications,the concept of end spreading was proposed to represent a piece of information of the data transmission with a sequence of multiple end information,of which each piece of end information was irrelevant to the information it conveys.Thus the covert data transmission can be performed.Further,an active cyber defense model of end information hopping and spreading was presented,in which the hopping strategy was separated from the synchronization strategy.The synchronization was accomplished by means of end information spreading for synchronous authentication of both parties,which can solve the high-speed hopping synchronization problem with high concealment requirements.The mode of generation,transmission and authentication of the spreading sequence,and the data migration strategy in the end hopping and spreading model were described in detail,and the security performance and synchronization performance were analyzed and verified experimentally.Theoretical analysis and experimental results show that the cyber defense model of end information hopping and spreading has improved the availability and confidentiality of network services under high-speed hopping and has good anti-attack performance,which is of great significance for the proactive defense application of high intensity confrontation.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2019071/end spreadingend hopping and spreadingactive network defensedata migrationhigh-speed hopping |
spellingShingle | Leyi SHI Hongbin GUO Xiao WEN Jianlan LI Yuwen CUI Mengfei MA Hui SUN Research on end hopping and spreading for active cyber defense Tongxin xuebao end spreading end hopping and spreading active network defense data migration high-speed hopping |
title | Research on end hopping and spreading for active cyber defense |
title_full | Research on end hopping and spreading for active cyber defense |
title_fullStr | Research on end hopping and spreading for active cyber defense |
title_full_unstemmed | Research on end hopping and spreading for active cyber defense |
title_short | Research on end hopping and spreading for active cyber defense |
title_sort | research on end hopping and spreading for active cyber defense |
topic | end spreading end hopping and spreading active network defense data migration high-speed hopping |
url | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2019071/ |
work_keys_str_mv | AT leyishi researchonendhoppingandspreadingforactivecyberdefense AT hongbinguo researchonendhoppingandspreadingforactivecyberdefense AT xiaowen researchonendhoppingandspreadingforactivecyberdefense AT jianlanli researchonendhoppingandspreadingforactivecyberdefense AT yuwencui researchonendhoppingandspreadingforactivecyberdefense AT mengfeima researchonendhoppingandspreadingforactivecyberdefense AT huisun researchonendhoppingandspreadingforactivecyberdefense |