Research on deception defense techniques based on network characteristics obfuscation
There is usually a reconnaissance stage before a network attack, the attacker obtains the key information of the target system through techniques such as traffic analysis and active scanning, to formulate a targeted network attack.Deception defense techniques based on network characteristics obfusca...
Saved in:
| Main Authors: | Jinlong ZHAO, Guomin ZHANG, Changyou XING |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
POSTS&TELECOM PRESS Co., LTD
2021-08-01
|
| Series: | 网络与信息安全学报 |
| Subjects: | |
| Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2021045 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Debates on the Use of Deception in Psychology Research
by: Ayşe Tuna
Published: (2023-12-01) -
Survey on cyber deception
by: Zhao-peng JIA, et al.
Published: (2017-12-01) -
Optimization mechanism of attack and defense strategy in honeypot game with evidence for deception
by: Lihua SONG, et al.
Published: (2022-11-01) -
Self-Deception in Psychology and Ethics with an Emphasis on the Views of Ayatollah Javadi Amoli
by: mahdi alizadeh, et al.
Published: (2017-08-01) -
Advancing Cybersecurity with Honeypots and Deception Strategies
by: Zlatan Morić, et al.
Published: (2025-01-01)