2020
DOI: 10.3233/jifs-189287
|View full text |Cite
|
Sign up to set email alerts
|

Network security model based on active defense and passive defense hybrid strategy

Abstract: To build a network security system combining active defense and passive defense during covid-19, we need to break the original Castle type passive defense concept and build a reliable, controllable, flexible and active network environment to find defense points. The key is that the system should be able to actively predict and control our defenses. Any scheme cannot achieve absolute safety, only to minimize the probability of safety accidents, through various measures to assess and predict the possible points … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(7 citation statements)
references
References 13 publications
0
7
0
Order By: Relevance
“…Deception based information security is a promising solution to enhance established defense mechanisms in network security [20]. A new model of computer network security, combining active and passive defense systems, has been proposed to improve security defense efficiency [21].…”
Section: Related Workmentioning
confidence: 99%
“…Deception based information security is a promising solution to enhance established defense mechanisms in network security [20]. A new model of computer network security, combining active and passive defense systems, has been proposed to improve security defense efficiency [21].…”
Section: Related Workmentioning
confidence: 99%
“…Reference 21 proposed a network attack behavior classification model, which can more effectively and comprehensively assess the overall situation of cyberspace security. Zhao et al 22 described common passive and active defense techniques, and builded a network security system combining active defense and passive defense. Akashe et al 23 presented a new network‐based active defense technique that utilizes real‐time attack detection and builds network spoofing.…”
Section: Related Workmentioning
confidence: 99%
“…The data collection and processing system functions in this configuration and completes the required duties. The user's activities, working patterns, browsing habits, and the amount of time and resources he has invested are evaluated and netted under this section of the Honeypot system to determine whether the individual is an intruder or a potential user [24]. To complete the aforementioned duties, a specific unit of the operating environment is needed.…”
Section: Data Capturing and Processing System (Dcps)mentioning
confidence: 99%