Skip navigation
  • 中文
  • English

DSpace CRIS

  • DSpace logo
  • Home
  • Research Outputs
  • Researchers
  • Organizations
  • Projects
  • Explore by
    • Research Outputs
    • Researchers
    • Organizations
    • Projects
  • Communities & Collections
  • SDGs
  • Sign in
  • 中文
  • English
  1. National Taiwan Ocean University Research Hub

Research on the Application of Stealth Reconnaissance Techniques for the Network and System Intelligence Gathering in a Protected Domain

View Statistics Email Alert RSS Feed

  • Information

Details

Project title
Research on the Application of Stealth Reconnaissance Techniques for the Network and System Intelligence Gathering in a Protected Domain
Code/計畫編號
NSC95-2623-7019-002-D
Translated Name/計畫中文名
隱匿偵蒐技術於網路情資蒐集運用之研究
 
Project Coordinator/計畫主持人
Pei-Yih Ting
Funding Organization/主管機關
National Science and Technology Council
 
Department/Unit
Department of Computer Science and Engineering
Website
https://www.grb.gov.tw/search/planDetail?id=1176109
Year
2006
 
Start date/計畫起
01-01-2006
Expected Completion/計畫迄
31-12-2006
 
Bugetid/研究經費
444千元
 
ResearchField/研究領域
電子電機工程
資訊科學--軟體
 

Description

Abstract
本計劃中由網路技術層面探討各種隱匿的網路情資蒐集技術,藉由完整的實驗 設計,詳細地評估各種掃描技術對於不同網路堆疊實作的效果,探討防火牆封 包過濾裝置對這些掃描技巧所造成的限制,瞭解入侵偵測系統對於個別掃描技 術的反應;本計劃中也將製作網路工具程式,處理底層封包的傳送與接收;並 嘗試整合各種有效的隱匿掃描技術、建立分散式聯合掃描的網路攻擊模型,實 作各個攻擊點間祕密溝通的管道,實作分散式聯合隱匿掃描之工具雛型。這個 計畫的研究成果除了可以由反向促使系統安全機制不斷加強之外,主要可直接 應用於軍事用途進行網路情資蒐集,在資訊戰爭中主動出擊。In this project, various stealth network intelligence-gathering techniques are studied from the technical aspect of network technologies. Through the thorough design of experiments, the effects of various stealth scanning and probing methods versus different implementations of network protocol stacks are evaluated. The limitations incurred by the packet filtering devices like firewalls or border routers will be studied against each scanning method. The responses of an intrusion detection system upon the scanning events will be carefully compared. In order to process directly low level packets directly, it is necessary to design some network tool programs. Besides, this project will integrate various effective stealth scanning techniques into a distributed coordinated scanning attack model and build up a prototype tool for this task. The results of this research are mainly used in the military application to actively collect the enemy’s computer and network information. As a by-product, the research on various scanning methods and possibly improvements on these methods force the development of more secure network infrastructure.
 
Keyword(s)
隱匿掃描技術
網路情資蒐集
stealth scanning
network intelligence gathering
 
Explore by
  • Communities & Collections
  • Research Outputs
  • Researchers
  • Organizations
  • Projects
Build with DSpace-CRIS - Extension maintained and optimized by Logo 4SCIENCE Feedback