Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Method of Constructing Stealth Network

A network and network entropy technology, applied in the Internet field, can solve problems such as inability to resist security threats, achieve high resistance to detection and attack, and improve security

Active Publication Date: 2022-02-01
孙红波
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, a private network with physical isolation cannot defend against security threats from within

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Method of Constructing Stealth Network
  • A Method of Constructing Stealth Network
  • A Method of Constructing Stealth Network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0051] The network stealth claimed in the present invention refers to the realization of basic network services centered on hidden data communication and hidden resource sharing in the form of hidden channels, hidden information, hidden information sources and hidden information sinks. Hiding means that the exact information (including status, content, orientation, etc.) of an object (such as channel, information, source and destina...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for constructing a stealth network. By constructing the basic framework of the stealth network; determining the resource type, component node type, environment adaptive characteristics and topology structure of the stealth network to realize the network stealth of the physical layer; establishing an autonomous and controllable hidden protocol stack, which defines the protocol The layered structure of the stack, the key protocols of each layer, and the functions of each key protocol realize the network stealth of the logical layer; and according to the preset information transmission method, the hidden information transmission and hidden resource sharing are realized, and the stealth in the information transmission is realized. This method can build a stealth network based on the existing Internet, and realize data concealment communication and resource concealment sharing based on the existing Internet; furthermore, using the stealth network to build a private network can greatly improve the security of the private network, and the stealth The network is highly resistant to detection and attack.

Description

technical field [0001] The invention relates to the technical field of the Internet, and relates to a method for constructing a stealth network. Background technique [0002] Complex information systems are fragile, because it is difficult to confirm that there are no loopholes and no backdoors, and its static and similarity provide attackers with many conveniences, and there are uncertain threats in cyberspace "unknown threats". [0003] The existing cyberspace defense system is a defense based on known feature perception, and defends against attacks such as unknown vulnerability backdoors or virus Trojan horses, and these attacks are currently the biggest security threats in cyberspace. [0004] At present, the widely used private network mainly adopts passive defense methods of physical isolation and encrypted transmission of information for security protection. The private network is undoubtedly the biggest target of the enemy's detection and attack. It is very difficul...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L41/12H04L41/0823H04L41/14H04L67/56H04L69/30H04L9/40
CPCH04L41/12H04L63/0428H04L63/16H04L63/20H04L41/0823H04L41/145H04L69/30H04L67/56
Inventor 孙红波
Owner 孙红波
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products