A Security Transfer Model Based on Active Defense Strategy
Author(s) -
Ying Zheng
Publication year - 2010
Publication title -
communications and network
Language(s) - English
Resource type - Journals
eISSN - 1949-2421
pISSN - 1947-3826
DOI - 10.4236/cn.2010.23027
Subject(s) - computer science , network packet , computer network , tracing , overlay network , overlay , encryption , computer security , network security , transfer (computing) , trace (psycholinguistics) , the internet , world wide web , operating system , linguistics , philosophy
This paper proposes a security transfer model founded on the active defense strategy. In the unit of security domains of dynamic overlaying routers, this model defines the intelligent agent/ management of network element together with the self-similar, hierarchical and distributed management structure. Furthermore, we use deceptive packets so that the attackers can not trace back to the encrypted data packets. Finally, according to the digested information from data packets, this model is capable of detecting attacks and tracing back to the attackers immediately. In the meantime, the overlaying routers in the security domain are dynamically administered. In summary, this model not only improves the se-curity of data transfer on the web, but also enhances the effectiveness of the network management and switching efficiency of routers as well
Accelerating Research
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom
Address
John Eccles HouseRobert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom