检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:贾佳 俞赛赛 谢国贞 程洋 JIA Jia;YU Sai-sai;XIE Guo-zhen;CHENG Yang(The 15^(th)Research Institute of CETC,Beijing 100083,China)
机构地区:[1]中国电子科技集团公司第十五研究所,北京100083
出 处:《中国电子科学研究院学报》2023年第8期750-754,共5页Journal of China Academy of Electronics and Information Technology
摘 要:用户上网时会在登录网站留下浏览、搜索、下载等行为痕迹,可能会造成用户身份、住址、职业、爱好、社交关系等个人信息泄露。文中提出了一种匿名网络与协议伪装相结合的隐蔽网络构建方法,在用户和目标网络之间构建中转网络,通过链路动态跳变和链路地址加密,隐藏用户真实地址,并在中转网络入口代理处采用动态协议伪装机制,防止用户访问路径被拦截和深度内容解析导致的信息泄露。通过上网行为碎片化、通信内容隐藏化,可扰乱网络行为主体信息,有效避免用户网络行为收集和特征画像导致的信息泄露和精准攻击问题。Network users will leave traces of browsing,searching,downloading,and other behaviors when logging in to the website,and personal information such as user identity,address,occupation,hobbies,social relationships,etc.will be leaked.This paper proposes an invisible network construction method that combines anonymous network and protocol mimicry.It constructs a transit network between the user and the target network,to hide the user's real address through dynamic link hopping and link address encryption.Moreover,it adopts a dynamic protocol mimicry mechanism at the gateway agent of the transit network,to prevent information leakage caused by intercepting user access paths and deep content parsing.By fragmented online behavior and hidden communication content,the information of network behavior subjects can be disrupted,effectively avoiding information leakage and precision attacks caused by user network behavior collection and feature profiling.
分 类 号:TP393.0[自动化与计算机技术—计算机应用技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:18.217.178.138