首页 | 本学科首页   官方微博 | 高级检索  
     

入侵诱骗系统中无缝环境切换技术的研究
引用本文:夏春和 王海泉 胡恒一. 入侵诱骗系统中无缝环境切换技术的研究[J]. 科技导报(北京), 2005, 23(4): 16-19
作者姓名:夏春和 王海泉 胡恒一
作者单位:北京航空航天大学计算机学院,北京,100083;北京航空航天大学计算机学院,北京,100083;北京航空航天大学计算机学院,北京,100083
基金项目:航空基金项目(03F51060),总装备部“十五”预研资助项目(418010703)
摘    要:网络攻击的目标可以归纳为:目标端的数据资源,计算资源及连接资源。为抵御以数据资源为目标的攻击,提出一种基于入侵诱骗的网络动态防御系统,探讨了入侵诱骗系统当中的重定向技术;分析其存在的问题,提出了一种无缝重定向解决方案,包括基于socket的重定向技术和环境状态同步技术,保证了入侵诱骗系统的主动性与安全性。

关 键 词:入侵诱骗  虚拟环境  无缝环境切换  环境状态  重定向
文章编号:1000-7857(2005)04-0016-04
修稿时间:2005-03-01

RESEARCH ON SEAMLESS SWITCH ENVIRONMENT TECHNOLOGY OF INTRUSION DECEPTION
XIA Chun-he WANG Hai-quan HU Heng-yi. RESEARCH ON SEAMLESS SWITCH ENVIRONMENT TECHNOLOGY OF INTRUSION DECEPTION[J]. Science & Technology Review, 2005, 23(4): 16-19
Authors:XIA Chun-he WANG Hai-quan HU Heng-yi
Abstract:The targets of net attacks could be summed up to data resources, computational resources and connection resources. To resist net attack, which focuses on data resource, an intrusion-deception-based dynamic network defensive system was present in this paper. and redirection technology in the Intrusion Deception System were also discussed, The problems of redirection technology were analyzed and a seamless redirection solution was described, including the technology of redirection base on Socket and Environment States synchronization. The initiative and security of the Intrusion Deception System were assured.
Keywords:intrusion deception   seamless switch environment   environment states   redirection
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号