Anti-reconnaissance Model of Host Fingerprint Based on Virtual Node

0Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Aiming at the problem of insufficient defense ability of fingerprint detection, the anti-reconnaissance model of host fingerprint based on virtual node is proposed. The model constructs periodically reconfigurable virtual nodes, dynamically camouflages the fingerprint information of the host to deceive the detector, and redirect attack traffic targeting virtual nodes to honeypots that can capture and analyze attack behavior. Honeypot, as an active defense technology, can effectively improve the model's defense capabilities. This paper introduces probabilistic models for the defense model to provide a deeper understanding of the theoretical effect their parameters have for cybersecurity, which quantifies the impact of different parameters on the probability of attack success, such as the number of probes, number of honeypot mapping rules, the virtual node deception rate, the honeypot detection rate and allowable losses. Furthermore, our prototype system using Software Defined Network (SDN) and Data Plane Development Kit (DPDK) verifies the effectiveness of the model against reconnaissance.

Cite

CITATION STYLE

APA

Zhang, T., Lu, B., Li, D., He, K., & Zhu, Y. (2020). Anti-reconnaissance Model of Host Fingerprint Based on Virtual Node. In Journal of Physics: Conference Series (Vol. 1584). Institute of Physics Publishing. https://doi.org/10.1088/1742-6596/1584/1/012033

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free