Font Size: a A A

Research On Hybrid Of End Hopping And Spreading For Active Cyber Defense

Posted on:2018-08-02Degree:MasterType:Thesis
Country:ChinaCandidate:X WenFull Text:PDF
GTID:2428330596468733Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
It's convenient for our daily life with the rapid development of computer networks.But the ensuing of cyber-attacks bring significant challenges owing to the growth of networks.The passive and static methods in the traditional defensive break the balance of network confrontation,leaving defenders at a severe disadvantage.Active cyber defense,as a prospective technology,can take defending measures before hacking and change unfavorable status of defenders.End hopping is a novel active cyber defense which overcomes the static disadvantages of traditional defensive by using dynamic methods.It will not only be in a position to puzzle the hackers through changing the end information constantly,but also achieve the concealment of communication simultaneously,thereby greatly increasing the cost of attack.We have done a lot of research on the key issues involved in the end hopping.Inspired by hopping and spreading in military communication,we come up with a hybrid method of end hopping and spreading for active cyber defense,which is designed to solve the problems of synchronization in end hopping.Firstly,two definitions are given including end spreading,hybrid of end hopping and spreading.A model using hybrid of end hopping and spreading is designed and implemented.The client launches synchronous authentication to the end hopping server by end spreading sequence.There is no need to know the current end information of the server in significant interval because the end hopping strategy is separated from the synchronization strategy.So that the hopping slot makes no influence to synchronization performance.Therefore,the model applies to the high speed hopping with tiny slot time.In addition,for the related issues about how to create,transfer and authenticate the end spreading sequence,we also come up with some methods and implement them through programming,including a method to hide the end spreading sequence by using the source port.An authentication algorithm is also mentioned through using matrix transpose multiplication and so on.All these methods not only ensure the accuracy of synchronous authentication,but also improve the certification efficiency and security.Finally,the availability and security of the model are confirmed after the theoretical analysis and empirical studies.The result reflects that the hybrid of end hopping and spreading model is suitable for synchronous authentication under high speed hopping.It has strong anti attack ability and can realize active cyber defense effectively.
Keywords/Search Tags:Active cyber defense, End hopping, End spreading, Hybrid of end hopping and spreading, Hopping synchronization technology, Covert communication
PDF Full Text Request
Related items