{"title":"Design and Implementation of Prototype System based on Countermeasures","authors":"Fangyun Li, Zheng Zhang, Jiang Wang, Yufeng Zhao","doi":"10.1109/ICISCAE51034.2020.9236813","DOIUrl":null,"url":null,"abstract":"Traditional security systems can defend against various network attacks through firewall, intrusion detection and other technologies, but it cannot pose a threat to attackers. Aiming at the problem, the paper proposes a new security system, which can sense attack and source information by MTD (moving the target defense) technology, and use the counter technology to strike the attacker in reverse, resulting in the attacker's failure. The experimental results show that the prototype system can effectively cause the attacker to cut off the network or crash by using special countermeasures.","PeriodicalId":355473,"journal":{"name":"2020 IEEE 3rd International Conference on Information Systems and Computer Aided Education (ICISCAE)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE 3rd International Conference on Information Systems and Computer Aided Education (ICISCAE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICISCAE51034.2020.9236813","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Traditional security systems can defend against various network attacks through firewall, intrusion detection and other technologies, but it cannot pose a threat to attackers. Aiming at the problem, the paper proposes a new security system, which can sense attack and source information by MTD (moving the target defense) technology, and use the counter technology to strike the attacker in reverse, resulting in the attacker's failure. The experimental results show that the prototype system can effectively cause the attacker to cut off the network or crash by using special countermeasures.