Font Size: a A A

A Secure End-system Based On Proactive Defense Strategy

Posted on:2006-05-17Degree:MasterType:Thesis
Country:ChinaCandidate:X LiangFull Text:PDF
GTID:2178360182469178Subject:Pattern Recognition and Intelligent Systems
Abstract/Summary:PDF Full Text Request
Due to the facts that networks works in an open environment, and meanwhile is threatened by boundlessly and random attacks, traditional defending system, based on the security of static border and data encryption, could not tackle with complex situation and various networks attacks, Thus building up a secure end-system is put in a urgent need. Most of existing theories concentrate on the robustness of physical connection or low protocol, with little improvements on system architecture and implementation. This paper puts forward a secure end-system based on the proactive strategy. To access in security, a compound of technologies is used to make sure that security data is sent in random way that could hardly be tracked down by the counterpart, which includes self-regression forecast method, fuzzy C-mean Clustering algorithm, data encryption and pseudo-random sequence generator; A deceiving-packet mechanism is introduced to cut down the probability of interception and decryption. A self-adaptive load-balancing algorithm based on random switch mechanism is devised, to make real-time allocation of system resources with a comparative low cost. To lower the time expense in packet switching, the optimization design of the switching matrix is made; A multi-accessing mechanism on the base of connection-split is put forward, with a extended instruction set of the Socks V protocols, which make sure smooth switch and secure connection of different agents. Conventionally, the research of security detection didn't take into consideration of the interaction between attacker and defender, nor the cost of any security measures, making it unable to response promptly and to achieve overall optimization. Based on the game-theoretical method, this paper defines a dynamical detection game model, which utilities the characteristic of network attack and defense, and also take advantage of the asymmetry of information occupation; besides, after studying the psychology of network attacker and defender, a new method and model is given on the research of real-time security detection; to make a elaborate calculation on the overall expense, a risk evaluation method and risk management model is given. In all, the emulation and experiment results show that the design of secure end-system meets the requirements both on the factor of security and effectiveness.
Keywords/Search Tags:Information security, Proactive defense, Secure end-system, Security detection, Game theory
PDF Full Text Request
Related items