作者: Craig A. Schultz , Yadong Zhang , Johnson L. Wu , Eric Winsborrow , Steven M. Silva
DOI:
关键词: Distributed computing 、 Network simulation 、 Host (network) 、 Virtual machine 、 Shadow (psychology) 、 Software-defined networking 、 Obfuscation 、 Engineering 、 Intelligent computer network 、 System administrator
摘要: A shadow network, which can be a virtual reproduction of real, physical, base computer is described. Shadow networks duplicate the topology, services, host, and network traffic using hosts, are low interaction, minimal-resource-using host emulators. The connected to through switches, etc. in order form large obfuscated network. When hacker probes into emulator, more resource-intensive machine swapped take its place. connection attempted from emulator physical computer, step place software defined networking (SDN) prevent collisions between duplicated IP addresses. Replicating within introduces problems for hackers allows system administrator easier ways identify intrusions.