Font Size: a A A

Research On Flow Fingerprint Mechanism For Endogenous Security Network

Posted on:2022-05-09Degree:MasterType:Thesis
Country:ChinaCandidate:W C ZhangFull Text:PDF
GTID:2518306341451584Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
The research of endogenous security network mainly focuses on the endogenous security capabilities in terms of secure protocol,authentic identity,controllable behavior and trusted data.Compared with the traditional security mechanisms that are based on prior knowledge,endogenous security network emphasizes that the security should be born with the network,and it aims to design and realize the active defense capabilities that are independent of the prior knowledge of attack.This paper focuses on the perspective of trusted data,and researches the network flow fingerprint mechanism which can actively embed the security elements in network traffic with the objectives to provide the active network flow analysis ability and realize the network endogenous security.The main work of this paper includes:(1)To solve the theoretical modeling of flow fingerprint,this paper proposes a multiple redundant flow fingerprint model based on time interval,and designs the redundant coding mechanism and the embedding and extraction mechanism,and analyses the detection success rate and the impacts of malicious interference,which lays a theoretical foundation for the application of flow fingerprint.(2)To realize flow fingerprint and improve the system performance,this paper designs and develops a multiple redundant flow fingerprint prototype,and realizes flow fingerprint coding,decoding,embedding and extraction modules at the system kernel level which improves the flow fingerprint embedding accuracy and speed,and builds a test-bed to test its functions and performance.(3)To demonstrate the application and deployment of flow fingerprint,this paper constructs a flow fingerprint based identity cheating defense system,and uses flow fingerprint based identity authentication at the level of network traffic behavior to resist man-in-the-middle attack,and expands the application scenario of flow fingerprint.The results of above theoretical analysis,system development and application test show that the flow fingerprint mechanism can actively embed security elements at the network traffic level,and resist potential security attacks effectively,and provide endogenous security protection capabilities.
Keywords/Search Tags:endogenous security, flow fingerprint, multiple redundant coding
PDF Full Text Request
Related items