• DocumentCode
    2198601
  • Title

    A Network Boundary Gap Technique Scheme Based on Dual Unilateral Path

  • Author

    Wang, Biao ; Tang, Sanping ; Zhang, Shitao ; Zhao, Wen

  • Author_Institution
    Dept. of Inf. Sci. & Technol., Univ. of Int. Relations, Beijing, China
  • Volume
    2
  • fYear
    2011
  • fDate
    14-15 May 2011
  • Firstpage
    235
  • Lastpage
    238
  • Abstract
    The traditional network boundary gap technique which can´t ensure the confidentiality of information absolutely when interact the information was analyzed. This paper prompts a new technical absolution: A dual unilateral path of information interacting scheme based on unilateral transferring technique by means of partition of information flows. On one hand, this new scheme can confront the connection oriented attacks including the Trojan horse based on TCP and UDP effectively without depending on the current Trojan horse detection technology absolutely, On the other hand, the scheme can confront the data oriented attacks, that is to say, it can protect the confidentiality of the inner system data from destroying by the Trojan horse which was embedded into the inner system through other ways.
  • Keywords
    computer network security; invasive software; transport protocols; TCP; Trojan horse; UDP; connection oriented attack; data oriented attack; dual unilateral path; information flow; information interacting scheme; network boundary gap technique; unilateral transferring technique; Extranets; Fires; Internet; Presses; Servers; Trojan horses; confidentiality; connection oriented attacks; data oriented attacks; unilateral transmission;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Network Computing and Information Security (NCIS), 2011 International Conference on
  • Conference_Location
    Guilin
  • Print_ISBN
    978-1-61284-347-6
  • Type

    conf

  • DOI
    10.1109/NCIS.2011.144
  • Filename
    5948827