A decoy chain deployment method based on SDN and NFV against penetration attack.

Penetration attacks are one of the most serious network security threats. However, existing network defense technologies do not have the ability to entirely block the penetration behavior of intruders. Therefore, the network needs additional defenses. In this paper, a decoy chain deployment (DCD) me...

Full description

Bibliographic Details
Main Authors: Qi Zhao, Chuanhao Zhang, Zheng Zhao
Format: Article
Language:English
Published: Public Library of Science (PLoS) 2017-01-01
Series:PLoS ONE
Online Access:http://europepmc.org/articles/PMC5720676?pdf=render