DocumentCode
2198601
Title
A Network Boundary Gap Technique Scheme Based on Dual Unilateral Path
Author
Wang, Biao ; Tang, Sanping ; Zhang, Shitao ; Zhao, Wen
Author_Institution
Dept. of Inf. Sci. & Technol., Univ. of Int. Relations, Beijing, China
Volume
2
fYear
2011
fDate
14-15 May 2011
Firstpage
235
Lastpage
238
Abstract
The traditional network boundary gap technique which can´t ensure the confidentiality of information absolutely when interact the information was analyzed. This paper prompts a new technical absolution: A dual unilateral path of information interacting scheme based on unilateral transferring technique by means of partition of information flows. On one hand, this new scheme can confront the connection oriented attacks including the Trojan horse based on TCP and UDP effectively without depending on the current Trojan horse detection technology absolutely, On the other hand, the scheme can confront the data oriented attacks, that is to say, it can protect the confidentiality of the inner system data from destroying by the Trojan horse which was embedded into the inner system through other ways.
Keywords
computer network security; invasive software; transport protocols; TCP; Trojan horse; UDP; connection oriented attack; data oriented attack; dual unilateral path; information flow; information interacting scheme; network boundary gap technique; unilateral transferring technique; Extranets; Fires; Internet; Presses; Servers; Trojan horses; confidentiality; connection oriented attacks; data oriented attacks; unilateral transmission;
fLanguage
English
Publisher
ieee
Conference_Titel
Network Computing and Information Security (NCIS), 2011 International Conference on
Conference_Location
Guilin
Print_ISBN
978-1-61284-347-6
Type
conf
DOI
10.1109/NCIS.2011.144
Filename
5948827
Link To Document