Paper
20 October 2023 Design of covert network active defense system based on attack behavior detection
Fangfang Dang, Lijing Yan, Shuai Li, Yifan Song
Author Affiliations +
Proceedings Volume 12814, Third International Conference on Green Communication, Network, and Internet of Things (CNIoT 2023); 128141J (2023) https://doi.org/10.1117/12.3010653
Event: Third International Conference on Green Communication, Network, and Internet of Things (CNIoT 2023), 2023, Chongqing, China
Abstract
In order to overcome the problems of low accuracy and poor stability of attack behavior detection in traditional active defense system, a new covert network active defense system based on attack behavior detection is proposed and designed in this paper. In terms of hardware, the overall architecture of the active defense system, network communication protocol and attack behavior data capture module are designed. In terms of software, information entropy combined with mutation detection is used to accurately detect the network attack behavior. The experimental results show that compared with the traditional defense system, the designed system can accurately detect the attack behavior in the network, and the detection accuracy is more than 98%; and the operation stability of the system has been effectively improved. Therefore, it shows that the designed system has strong practical application performance.
(2023) Published by SPIE. Downloading of the abstract is permitted for personal use only.
Fangfang Dang, Lijing Yan, Shuai Li, and Yifan Song "Design of covert network active defense system based on attack behavior detection", Proc. SPIE 12814, Third International Conference on Green Communication, Network, and Internet of Things (CNIoT 2023), 128141J (20 October 2023); https://doi.org/10.1117/12.3010653
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Defense systems

Network security

Defense and security

Network architectures

Design and modelling

Information security

Telecommunications

Back to Top