Core Technologies Analysis for End-Hopping System

Article Preview

Abstract:

End-hopping is a technique proposed in the study of active defense in network security. In this paper, core technology analysis is made to the conception of “End-hopping” based on the previous research of our group. And the formal description is put forward. Methods are discussed and comparative analysis is made to implement End-hopping for active defense.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

3046-3049

Citation:

Online since:

October 2011

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] L. Shi, C. Jia, S. Lü, Z. Liu, in Intelligence and Security Informatics, Springer-Verlag, 2007, 295.

Google Scholar

[2] J. Mirkovic, P. Reiher, ACM SIGCOMM Computer Communication Review 2004, 34, 39.

Google Scholar

[3] R. L. Peterson, R. E. Ziemer, D. E. Borth, Introduction to spread-spectrum communications, Prentice Hall, (1995).

Google Scholar

[4] H. Lee, V. Thing, Port hopping for resilient networks, presented at IEEE 60th Vehicular Technology Conference, (2004).

DOI: 10.1109/vetecf.2004.1404672

Google Scholar

[5] M. Atighetchi, P. Pal, F. Webber, C. Jones, Adaptive use of network-centric mechanisms in cyber-defense, (2003).

DOI: 10.1109/nca.2003.1201154

Google Scholar

[6] M. Atighetchi, P. P. Pal, C. C. Jones, P. Rubel, R. E. Schantz, J. P. Loyall, J. A. Zinky, Building auto-adaptive distributed applications: The quo-apod experience, (2003).

DOI: 10.1109/icdcsw.2003.1203540

Google Scholar

[7] C. Zhao, C. Jia, K. Lin, in 2010 First ACIS International Symposium on Cryptography, and Network Security, Data Mining and Knowledge Discovery, E-Commerce and Its Applications, and Embedded Systems, IEEE Computer Society, Yanshan university 2011, 4.

DOI: 10.1109/cdee.2010.59

Google Scholar