Research on deception defense techniques based on network characteristics obfuscation

There is usually a reconnaissance stage before a network attack, the attacker obtains the key information of the target system through techniques such as traffic analysis and active scanning, to formulate a targeted network attack.Deception defense techniques based on network characteristics obfusca...

Full description

Saved in:
Bibliographic Details
Main Authors: Jinlong ZHAO, Guomin ZHANG, Changyou XING
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2021-08-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2021045
Tags: Add Tag
No Tags, Be the first to tag this record!