首页> 外文期刊>International Journal of Computer Network and Information Security >The Method of Hidden Terminal Transmission of Network Attack Signatures
【24h】

The Method of Hidden Terminal Transmission of Network Attack Signatures

机译:网络攻击签名的隐藏终端传输方法

获取原文
           

摘要

This article is proposes a new approach to the transmission of signatures of network attacks onto a remote Internet resource. The problem is that the known protocols that are used for transfer data and control actions from an administrative resource to a network agents are poorly protected. Even in case of use of cryptographic mechanisms for organization of secure connections, it is possible to form behavioral patterns of interactions such as "administrative resource - network agents." Such templates allow to predict the actions taken in accordance with the security policy in order to maintain the required level of functionality of a remote Internet resource. Thus, it is necessary to develop a new protocol for the transfer of designated information, based on information technology, which level out the existence of opportunities for the formation of behavioral patterns of network interactions. As such technology, it is proposed to use a set of means of network interaction and some methods of hidden (steganographic) data transmission in information and telecommunication networks.
机译:本文提出了一种将网络攻击的签名传输到远程Internet资源上的新方法。问题在于,用于从管理资源向网络代理传输数据和控制动作的已知协议的保护不佳。即使在使用密码机制来组织安全连接的情况下,也有可能形成交互的行为模式,例如“管理资源-网络代理”。这样的模板允许预测根据安全策略采取的操作,以便维持远程Internet资源所需的功能级别。因此,有必要基于信息技术开发一种用于指定信息传输的新协议,该协议可以消除形成网络交互行为模式的机会。作为这样的技术,提出了在信息和电信网络中使用一组网络交互手段和一些隐藏(密文)数据传输的方法。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号