• DocumentCode
    2194458
  • Title

    Research on Active Controllable Defense Model Based on Zero-PDR Model

  • Author

    Wu, Kehe ; Zhang, Tong ; Chen, Fei

  • Author_Institution
    Dept. of Comput. Sci. & Technol., North China Electr. Power Univ., Beijing, China
  • fYear
    2010
  • fDate
    2-4 April 2010
  • Firstpage
    572
  • Lastpage
    575
  • Abstract
    In the face of more and more complex and unpredictable network security threats, although an increasing number of security products have been deployed in personal computers, application servers and networks, we are still in a passive embarrassment. How to detect and response to network security threats immediately before threats occur or reach the target system is a key issue to solve current security threats. Based on further study of classical PDR protection model and analysis of current network security threats, idea of solving network information security problems is changed from passive protection to the active controllable defense, and Zero-PDR model based on Trojan attack characteristic is proposed. Active Controllable Defense model based on Zero-PDR model is further proposed, which can avoid Trojan attack and the first time attack effectively.
  • Keywords
    invasive software; Trojan attack; active controllable defense model; application servers; classical PDR protection model; network information security problem solving; personal computers; unpredictable network security threat analysis; zero-PDR model; Application software; Computer science; Computer security; Computer viruses; Data security; Databases; Humans; Information security; Power system security; Protection; Active Controllable Defense; Network Information Security; PDR Model; Zero-PDR Model;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Intelligent Information Technology and Security Informatics (IITSI), 2010 Third International Symposium on
  • Conference_Location
    Jinggangshan
  • Print_ISBN
    978-1-4244-6730-3
  • Electronic_ISBN
    978-1-4244-6743-3
  • Type

    conf

  • DOI
    10.1109/IITSI.2010.140
  • Filename
    5453691