Network hiding method for computer and network hiding system based on method

A computer and network technology, applied in the field of network stealth method and network stealth system based on this method, can solve the problems of increasing the difficulty of attacker penetration or virus infection, difficulty of attacker discovery and utilization, loss of effectiveness, etc., to increase network Effects of complexity, increased network complexity, and increased difficulty

Inactive Publication Date: 2013-09-18
XIDIAN UNIV
View PDF4 Cites 39 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For unknown security holes, it is difficult to be discovered and exploited because the attacker cannot detect and exploit them.
For malicious viruses, because of their invisi

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network hiding method for computer and network hiding system based on method
  • Network hiding method for computer and network hiding system based on method
  • Network hiding method for computer and network hiding system based on method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0037]A computer network stealth method, the network stealth method includes adopting a passive processing strategy and an active processing strategy for detection data packets, the passive processing strategy includes judging the legality of data packets entering and leaving the computer, and detecting illegal The data traffic adopts the processing method of not accepting, not responding, not handing over to the normal protocol stack and writing bad records; the active processing strategy includes the following three methods: S1. When it is judged that the detection behavior is in progress, reply false information To confuse the explorer and increase the difficulty of attack; S2, forge false data traffic and network behavior of the real host, and disturb the sniffing behavior; S3, use the IP address of the real host as a jump element, and dynamically an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network hiding method for a computer and a network hiding system based on the method. In the network hiding method, a passive processing strategy and an active processing strategy are adopted. The active processing strategy comprises the following steps of S1, when a detection behavior is ongoing according to judgment, replying false information to confuse a detector and increase the attacking difficulty; S2, faking false data traffic and a real host network behavior, and disturbing a sniffing behavior; and S3, dynamically and randomly jumping to hide a real host by taking the IP (Internet Protocol) address of the real host as a jumping element. In the network hiding system, four layers of network hiding models, including an access behavior control module, a dynamic multi-address module, a traffic confusing module and a protocol stack fingerprint confusing module are adopted. Due to the adoption of the method and system, unknown security problems can be blocked in advance, the occurrence of malicious network behaviors is blocked at a source, and advance protection is truly realized; due to the hiding characteristic, the aim of nipping in the bud can be fulfilled in the system; and the computer security is well ensured.

Description

technical field [0001] The invention relates to the technical field of computer security communication, in particular to a computer network stealth method and a network stealth system based on the method. Background technique [0002] Since mankind entered the information age, computer technology and computer networks have developed at an unimaginable speed. While providing network convenience, the safe transmission of information is particularly important, but at the same time, endless network security issues are always bothering us. For the existing protective measures: firewalls, anti-virus software, traffic monitoring, intrusion detection, etc. all have some common or unique defects. Firewalls cannot flexibly carry out active defense, and rely on a large number of filtering rules added by administrators; Anti-virus software cannot detect and kill new and changing viruses, and can only perform remedial work after the virus is infected; traffic monitoring or intrusion det...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/12
Inventor 崔艳鹏胡建伟
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products