Cargando…

A decoy chain deployment method based on SDN and NFV against penetration attack

Penetration attacks are one of the most serious network security threats. However, existing network defense technologies do not have the ability to entirely block the penetration behavior of intruders. Therefore, the network needs additional defenses. In this paper, a decoy chain deployment (DCD) me...

Descripción completa

Detalles Bibliográficos
Autores principales: Zhao, Qi, Zhang, Chuanhao, Zhao, Zheng
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Public Library of Science 2017
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5720676/
https://www.ncbi.nlm.nih.gov/pubmed/29216257
http://dx.doi.org/10.1371/journal.pone.0189095