Security

A Security Transfer Model Based on Active Defense Strategy

Free registration required

Executive Summary

This paper proposes a security transfer model founded on the active defense strategy. In the unit of security domains of dynamic overlaying routers, this model defines the intelligent agent/management of network element together with the self-similar, hierarchical and distributed management structure. Furthermore, the authors use deceptive packets so that the attackers can not trace back to the encrypted data packets. Finally, according to the digested information from data packets, this model is capable of detecting attacks and tracing back to the attackers immediately.

  • Format: PDF
  • Size: 394.27 KB