Active defense method for network trick and counter attack

An active defense and anti-attack technology, applied in data exchange networks, digital transmission systems, electrical components, etc., can solve problems such as interception and tampering, and achieve the effect of ensuring dynamics and reducing the probability of real data being attacked

Inactive Publication Date: 2013-12-18
HUAZHONG UNIV OF SCI & TECH
View PDF3 Cites 35 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These active defense methods are to protect the host system from being attacked, and the data will also be intercepted and tampered with during transmission.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Active defense method for network trick and counter attack
  • Active defense method for network trick and counter attack
  • Active defense method for network trick and counter attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The specific implementation manners of the present invention will be described in further detail below in conjunction with the accompanying drawings. It should be noted here that the descriptions of these embodiments are used to help understand the present invention, but are not intended to limit the present invention. In addition, the technical features involved in the various embodiments of the present invention described below can be combined with each other as long as they do not constitute a conflict with each other.

[0021] A network communication system includes a sender, an intermediate node, a network administrator, and a receiver. Both the sender and the receiver set up multiple nodes in the network to send and receive data, and each design an address port hopping server to dynamically select nodes for communication; intermediate nodes perform datagram checksums during communication Forwarding; network administrators monitor the security status of the entire...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an active defense method for a network trick and a counter attack. The method comprises the following steps that two communication sides set a plurality of host computers for data sending and receiving, and one host computer is dynamically and randomly selected as a communication host computer through an address and port hopping server; a sender selects one or more transmission links to send a trick message to detect the safety and the channel quality of the transmission links, wherein if the links are safe, true data with the counter attack are constructed and sent, and meanwhile the sender continues to send the trick message to detect the links; an intermediate node takes in charge of detecting and feeding the safety situation of the transmission links back to a network administrator; the network administrator updates a transmission path according to the safety situation of the node and takes the defensive measure. The active defense method can effectively prevent and detect common safety attack in the network communication and carry out certain counter attack on an attacker.

Description

technical field [0001] The invention relates to the field of communication network security defense, in particular to an active defense method for network deception and anti-attack. Background technique [0002] In recent years, with the development of communication network technology, various types of network applications have emerged as the times require, and governments and individuals are increasingly dependent on the network. At the same time, there is a steady stream of attacks against the network. Despite the various methods and tools used to secure network communications, the number of successful attacks continues to rise. From the initial port scanning attack, buffer overflow attack, to the current Distributed Denial of Service attack (Distributed Denial of Service), network monitoring and man-in-the-middle attack, new attack means and methods emerge in an endless stream, ever-changing. [0003] Traditional network security protection systems, such as firewalls an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/24H04L12/26
Inventor 胡汉平王文龙熊伟刘翔丁才华王祖喜
Owner HUAZHONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products