期刊文献+

一种对抗网络侦察的自适应欺骗防御机制 被引量:1

Self-adaptive Deception Defense Mechanism Against Network Reconnaissance
下载PDF
导出
摘要 静态配置的网络主机信息在面对攻击者侦察时易于暴露,进而带来了严重的安全隐患。主机地址跳变及部署虚假节点等欺骗方法能够扰乱攻击者对网络的认知,增加其网络侦察的难度。但如何高效地利用这些手段来对抗攻击者的侦察行为仍存在诸多困难。为此,在对攻防双方行为进行建模描述的基础上,提出了一种高效的自适应欺骗防御机制(Self-adaptive Deception Method,SADM)来应对网络侦察。SADM结合网络侦察过程中攻防双方多阶段持续对抗的特点,以资源约束下防御方的综合收益最大化为目标进行建模,并在此基础上通过启发式方法进行自适应防御决策,以快速应对攻击者的多样化扫描行为。仿真实验结果表明,SADM能够有效延缓攻击者的探测速度,在保证防护效果的同时降低部署欺骗场景的代价。 The statically configured network host information is easy to be exposed in the face of network reconnaissance,which brings serious security risks.Deception methods such as host address mutation and deployment of fake nodes can disrupt attac-ker’s awareness of the network and increase the difficulty of reconnaissance.However,there are still many challenges in using these methods to counter attacker’s reconnaissance behavior effectively.For this reason,by modeling the behaviors of both attaker and defender,an efficient self-adaptive deception defense mechanism SADM(Self-adaptive Deception Method)is proposed.SADM considers the characteristics of the multi-stage continuous confrontation between attacker and defender in the network reconnaissance process,modeling with the goal of maximizing the defender’s accumulative payoffs under cost constraints,and then makes adaptive defense decisions through heuristic methods,to respond quickly to attacker's diverse scanning behavior.The simulation experiment results show that SADM can effectively delay the attacker's detection speed and reduce the cost of deploying deception scenarios while ensuring the defense effect.
作者 赵金龙 张国敏 邢长友 宋丽华 宗祎本 ZHAO Jin-long;ZHANG Guo-min;XING Chang-you;SONG Li-hua;ZONG Yi-ben(Command&Control Engineering College,Army Engineering University of PLA,Nanjing 210007,China;Unit 61789 of PLA,Shanghai 200000,China)
出处 《计算机科学》 CSCD 北大核心 2020年第12期304-310,共7页 Computer Science
基金 国家自然科学基金(61379149,61772271) 国家博士后科学基金项目(2017M610286)。
关键词 网络侦察 欺骗防御 扫描攻击 软件定义网络 Network reconnaissance Deception defense Scanning attack Software-defined network
  • 相关文献

参考文献1

二级参考文献6

  • 1李胜利,王杰,韩宗芬,陶智飞.一种新的蠕虫检测和控制方法[J].华中科技大学学报(自然科学版),2007,35(3):38-41. 被引量:2
  • 2S. Staniford, D. Moore, V. Paxson, and N. Weaver. The top speed of flash worms[J]. In Proc. ACM CCS WORM, Oct. 2004. 被引量:1
  • 3BERK V H, GRAY R S, BAKOS G. Using sensor networks and data fusion for early detection of active worms [A]. Proceedings of the SPIEeroSense[C]. 2003. 92-104. 被引量:1
  • 4S. Bhatkar, D. DuVarney, and R. Sekar. Address obfuscation: An efficient approach to combat a broad range of memory error exploits. In Proceedings of the 12th USENIX Security Symposium, 105 - 120, Aug. 2003. 被引量:1
  • 5N. Weaver, S. Staniford, and V. Paxson. Very Fast Containment of Scanning Worms. In Proceedings of the 13th USENIX Security Symposium, 29 - 44, Aug. 2004. 被引量:1
  • 6王道俊,王海峰.基于人工免疫的蠕虫防御系统研究与设计[J].微计算机信息,2007,23(02X):61-62. 被引量:4

共引文献2

同被引文献2

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部