通信学报 ›› 2019, Vol. 40 ›› Issue (5): 125-135.doi: 10.11959/j.issn.1000-436x.2019071

• 学术论文 • 上一篇    下一篇

端信息跳扩混合的主动网络防御技术研究

石乐义,郭宏彬,温晓,李剑蓝,崔玉文,马猛飞,孙慧   

  1. 中国石油大学(华东)计算机与通信工程学院,山东 青岛 266580
  • 修回日期:2019-01-21 出版日期:2019-05-25 发布日期:2019-05-30
  • 作者简介:石乐义(1975– ),男,山东临朐人,博士,中国石油大学(华东)教授、硕士生导师,主要研究方向为网络安全、博弈理论和移动计算。|郭宏彬(1992– ),男,山东潍坊人,中国石油大学(华东)硕士生,主要研究方向为网络安全、网络对抗。|温晓(1992– ),女,山东聊城人,中国石油大学(华东)硕士生,主要研究方向为网络安全、网络对抗。|李剑蓝(1993– ),男,江西婺源人,中国石油大学(华东)硕士生,主要研究方向为网络安全、深度学习。|崔玉文(1992– ),男,山东济宁人,中国石油大学(华东)硕士生,主要研究方向为网络安全、隐蔽通信。|马猛飞(1993– ),男,河南禹州人,中国石油大学(华东)硕士生,主要研究方向为网络安全、网络对抗。|孙慧(1991– ),女,山东滕州人,中国石油大学(华东)硕士生,主要研究方向为网络安全、主动网络防御。
  • 基金资助:
    国家自然科学基金资助项目(61772551)

Research on end hopping and spreading for active cyber defense

Leyi SHI,Hongbin GUO,Xiao WEN,Jianlan LI,Yuwen CUI,Mengfei MA,Hui SUN   

  1. College of Computer and Communication Engineering,China University of Petroleum,Qingdao 266580,China
  • Revised:2019-01-21 Online:2019-05-25 Published:2019-05-30
  • Supported by:
    The National Natural Science Foundation of China(61772551)

摘要:

受扩频通信技术启发,提出了端信息扩展的概念,利用多项端信息组成的序列来表示一条信息,使通信端信息与所传递信息无关,实现了端信息高隐蔽传输。进一步提出了端信息跳扩混合主动网络防御技术,将端信息跳变策略与同步策略分离,通过端信息扩展机制实现跳变通信双方的同步认证,解决了高隐蔽性要求下的高速跳变同步问题。详细讨论了端信息跳扩混合主动网络防御技术中扩展序列的生成、传输、同步认证方式和数据迁移策略,并对所提模型的安全性能和同步性能进行理论分析与实验验证。理论分析与实验结果表明,端信息跳扩混合主动网络防御技术提升了高速跳变下网络服务的可用性和隐蔽性,对于高强度对抗要求的主动网络防护应用具有重要意义。

关键词: 端信息扩展, 端信息跳扩混合, 主动网络防御, 数据迁移, 高速跳变

Abstract:

Inspired by the spread spectrum technology for communications,the concept of end spreading was proposed to represent a piece of information of the data transmission with a sequence of multiple end information,of which each piece of end information was irrelevant to the information it conveys.Thus the covert data transmission can be performed.Further,an active cyber defense model of end information hopping and spreading was presented,in which the hopping strategy was separated from the synchronization strategy.The synchronization was accomplished by means of end information spreading for synchronous authentication of both parties,which can solve the high-speed hopping synchronization problem with high concealment requirements.The mode of generation,transmission and authentication of the spreading sequence,and the data migration strategy in the end hopping and spreading model were described in detail,and the security performance and synchronization performance were analyzed and verified experimentally.Theoretical analysis and experimental results show that the cyber defense model of end information hopping and spreading has improved the availability and confidentiality of network services under high-speed hopping and has good anti-attack performance,which is of great significance for the proactive defense application of high intensity confrontation.

Key words: end spreading, end hopping and spreading, active network defense, data migration, high-speed hopping

中图分类号: 

No Suggested Reading articles found!