Font Size: a A A

Network Camouflage Technology Based On Network Processor

Posted on:2010-07-06Degree:MasterType:Thesis
Country:ChinaCandidate:C P HuFull Text:PDF
GTID:2178360278465634Subject:Cryptography
Abstract/Summary:PDF Full Text Request
At present, there are some widely used technologies for the protection of information security, such as firewall, anti-virus technology, intrusion detection, virtual private network and honeypot/honeynet. Honeypot/honeynet is a kind of active defense technology, while the beginner of the "Heoneynet Project", Lance Spitzner has given a definition to this technology. A honeypot is an information system resource whose value lies in unauthorized or illicit use of that resource. And honeynet is a system composed by several honeypots to trace hackers.The traditional honeynet technology has done well in operating system camouflage, but it is limited by hardware when processing the network camouflage. We use network processor which is good at processing network data packets to act as the gateway of a honeynet, to increase the ability of network camouflage.This article analyses the characters of a real computer network topology and performance, and build up a network camouflage system based on network processor. The first chapter introduces several key technology used in network camouflage: high-speed routing algorithm, routing protocol, network performance camouflage, network device operating system camouflage; and implements some experiments to validate these technologies.The third chapter discusses the choice and implementation of different routing algorithms according to the hardware of different network processor board. The forth chapter discusses some key technologies of implementing OSPF protocol on network processor, including LSA database, area, interface state machine and neighbor state machine. The fifth chapter introduces some current QoS architectures and gives an implementation of RED algorithm on network processor. The sixth chapter introduces some methods to detect remote operating system and the data packets used in detection, and discusses how to perform a network device operating system camouflage. The end of chapter six is an experiment to validate those technologies referred above.
Keywords/Search Tags:network processor, routing algorithm, routing protocol, network device operating system
PDF Full Text Request
Related items