DocumentCode :
2198601
Title :
A Network Boundary Gap Technique Scheme Based on Dual Unilateral Path
Author :
Wang, Biao ; Tang, Sanping ; Zhang, Shitao ; Zhao, Wen
Author_Institution :
Dept. of Inf. Sci. & Technol., Univ. of Int. Relations, Beijing, China
Volume :
2
fYear :
2011
fDate :
14-15 May 2011
Firstpage :
235
Lastpage :
238
Abstract :
The traditional network boundary gap technique which can´t ensure the confidentiality of information absolutely when interact the information was analyzed. This paper prompts a new technical absolution: A dual unilateral path of information interacting scheme based on unilateral transferring technique by means of partition of information flows. On one hand, this new scheme can confront the connection oriented attacks including the Trojan horse based on TCP and UDP effectively without depending on the current Trojan horse detection technology absolutely, On the other hand, the scheme can confront the data oriented attacks, that is to say, it can protect the confidentiality of the inner system data from destroying by the Trojan horse which was embedded into the inner system through other ways.
Keywords :
computer network security; invasive software; transport protocols; TCP; Trojan horse; UDP; connection oriented attack; data oriented attack; dual unilateral path; information flow; information interacting scheme; network boundary gap technique; unilateral transferring technique; Extranets; Fires; Internet; Presses; Servers; Trojan horses; confidentiality; connection oriented attacks; data oriented attacks; unilateral transmission;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Network Computing and Information Security (NCIS), 2011 International Conference on
Conference_Location :
Guilin
Print_ISBN :
978-1-61284-347-6
Type :
conf
DOI :
10.1109/NCIS.2011.144
Filename :
5948827
Link To Document :
بازگشت