基于網(wǎng)絡流水印的跨域協(xié)同追蹤技術(shù)研究
發(fā)布時間:2018-02-06 02:43
本文關(guān)鍵詞: 網(wǎng)絡安全 入侵追蹤 跨域協(xié)同入侵追蹤 網(wǎng)絡流水印 時隙質(zhì)心 出處:《南京理工大學》2017年碩士論文 論文類型:學位論文
【摘要】:隨著Internet的迅猛發(fā)展,網(wǎng)絡規(guī)模不斷擴大,各類應用日益廣泛。計算機網(wǎng)絡在規(guī)模日益擴大的同時,面臨的安全態(tài)勢卻并不樂觀。網(wǎng)絡安全事件頻發(fā)不僅擾亂正常的網(wǎng)絡秩序還造成巨大的經(jīng)濟損失。入侵追蹤技術(shù)用于在網(wǎng)絡中自動發(fā)現(xiàn)攻擊者的真實位置,不僅能夠及時發(fā)現(xiàn)入侵報文在網(wǎng)絡中傳輸?shù)穆窂?為入侵檢測事件處理、入侵響應提供必要的決策依據(jù),還能對攻擊者產(chǎn)生強大的威懾作用,有效地減少入侵行為的發(fā)生。然而,現(xiàn)有的網(wǎng)絡代理、NAT、IP隧道技術(shù)和迅速發(fā)展的匿名通信系統(tǒng)為攻擊者隱藏真實IP提供便利。此外,攻擊者通過攻破若干中間系統(tǒng)構(gòu)成"跳板"鏈,實施跨多自治域的隱秘入侵攻擊,增加入侵追蹤的難度。論文對入侵追蹤現(xiàn)狀和常用入侵追蹤技術(shù)進行總結(jié)分析。針對現(xiàn)有入侵追蹤技術(shù)無法實現(xiàn)自治域間高效協(xié)同入侵追蹤的問題,提出跨域協(xié)同入侵追蹤框架的設計規(guī)范,研究高效、安全的跨域協(xié)同入侵追蹤框架,在不干涉自治域的操作邊界、防止域內(nèi)敏感信息泄漏的同時,實現(xiàn)高效安全的跨域協(xié)同入侵追蹤。為提高跨域協(xié)同入侵追蹤框架的域內(nèi)追蹤能力,論文對網(wǎng)絡流水印技術(shù)進行深入研究。針對現(xiàn)有基于時隙質(zhì)心流水印技術(shù)易受多流攻擊威脅的問題,論文提出一種基于時隙直方圖規(guī)定化的時隙質(zhì)心水印方法,提升現(xiàn)有技術(shù)對多流攻擊的抵抗能力并減少水印檢測端的時空開銷。針對現(xiàn)有時隙質(zhì)心水印技術(shù)的適用性不足的問題,論文提出一種基于時隙均衡化預處理的時隙質(zhì)心水印方法,增強水印載體的穩(wěn)定性,提升水印技術(shù)的魯棒性和自適應性。與現(xiàn)有網(wǎng)絡流水印技術(shù)相比,論文提出的兩種方法具有更好的隱秘性、健壯性和自適應能力。
[Abstract]:With the rapid development of Internet, the scale of network is expanding, and all kinds of applications are more and more widely. However, the security situation is not optimistic. The frequent occurrence of network security events not only disturbs the normal network order but also causes huge economic losses. Intrusion tracking technology is used to automatically find the real location of attackers in the network. It can not only find the path of intrusion message transmission in time, provide the necessary decision basis for intrusion detection event processing and intrusion response, but also produce a powerful deterrent to the attacker. However, the existing network agent NATT IP tunneling technology and the rapid development of anonymous communication system provide convenience for attackers to hide real IP. By breaking through a number of intermediate systems to form a "springboard" chain, attackers carry out secret intrusion attacks across multiple autonomous domains. This paper summarizes and analyzes the current situation of intrusion tracking and the commonly used intrusion tracking technology. Aiming at the problem that the existing intrusion tracking technology can not achieve efficient cooperative intrusion tracking among autonomous domains. This paper proposes a design specification for cross-domain collaborative intrusion tracking framework, and studies an efficient and secure cross-domain cooperative intrusion tracking framework, which can not interfere with the operational boundaries of autonomous domains and prevent sensitive information leakage in the domain. In order to improve the intra-domain tracking capability of the cross-domain cooperative intrusion tracking framework, the efficient and secure cross-domain cooperative intrusion tracking is realized. Aiming at the problem that the existing time slot center income printing technology is vulnerable to multi-stream attacks, this paper proposes a slot centroid watermarking method based on slot histogram specification. To improve the resistance of the existing techniques to multi-stream attacks and reduce the space-time overhead of watermark detection, aiming at the lack of applicability of the existing time-slot centroid watermarking technology. In this paper, a time-slot centroid watermarking method based on slot equalization preprocessing is proposed to enhance the stability of watermark carrier, enhance the robustness and self-adaptability of watermarking technology, and compare with the existing network income printing technology. The two methods proposed in this paper have better stealthy, robustness and adaptive ability.
【學位授予單位】:南京理工大學
【學位級別】:碩士
【學位授予年份】:2017
【分類號】:TP393.08
【參考文獻】
相關(guān)期刊論文 前4條
1 傅,
本文編號:1493382
本文鏈接:http://sikaile.net/guanlilunwen/ydhl/1493382.html
最近更新
教材專著