Technique of Network Topology and OS Camouflage

Ri-gude BU,Wei-hua LI,Bo ZHANG,Ju-hou HE
DOI: https://doi.org/10.3969/j.issn.1671-654X.2005.03.035
2005-01-01
Abstract:This article introduces initiative network topology and the operating system camouflage technology based on cheating in detail.Through Linux system,kernel drive's programming hold up TCP/IP stack data packet,and rewrite header information according to operating system fingerprint storehouse and network camouflage strategy,and track record information,come true data transparent transmission.Through a mass of pseudo the IP address hide away information to flow to.Protects the important computer.At the same time traps the intruder.Discovers the intruder early.Accomplish that camouflaged mission need camouflaged the IP address management,the dynamic allocation and the micro route technology work together.
What problem does this paper attempt to address?