通信学报 ›› 2013, Vol. 34 ›› Issue (12): 142-148.doi: 10.3969/j.issn.1000-436X.2013.12.016

• 技术报告 • 上一篇    下一篇

基于消息篡改的端信息跳变技术

林楷,贾春福   

  1. 南开大学 计算机与控制工程学院,天津 300071
  • 出版日期:2013-12-25 发布日期:2017-07-05
  • 基金资助:
    国家自然科学基金资助项目;国家自然科学基金资助项目;国家重点基础研究发展计划(“973”计划)基金资助项目;高等学校博士学科点专项科研基金资助项目

End hopping based on message tampering

Kai LIN,Chun-fu JIA   

  1. College of Computer & Control Engineering,Nankai University,Tianjin 300071,China
  • Online:2013-12-25 Published:2017-07-05
  • Supported by:
    The National Natural Science Foundation of China;The National Natural Science Foundation of China;The National Bas ic Research Program of China (973 Program);The Specialized Research Fund for the Doctoral Program of Higher Education of China

摘要:

研究了端信息跳变技术在应用中存在的理论和技术问题,提出了基于消息篡改的跳变技术,并在此基础上建立了跳变栈模型,分别给出了跳变栈模型3种实现方案的工作原理及其优缺点分析。通过实验验证了基于消息篡改的端信息跳变技术的应用价值。

关键词: 网络安全, 拒绝服务攻击, 端信息跳变技术, 数据消息篡改

Abstract:

The main theoretical and technical problems were studied in the application of end hopping,and the idea of message tampering was proposed and the model of end hopping stack was built upon it.Three feasible implementations for the end hopping and discuss their advantages and disadvantages were respectively provided.And the experiment re-sult shows the potential application of the message tampering and the end hopping stack model in practice.

Key words: network security, denial of service attack, end hopping technology, message tampering

No Suggested Reading articles found!