期刊文献+

面向网络欺骗防御的攻击诱捕技术研究 被引量:2

Research on Network Deception Defense Oriented Attack Trapping Technology
下载PDF
导出
摘要 作为一种主动对抗攻击者的手段,网络欺骗防御技术得到了学术界和产业界的广泛关注,其中攻击诱捕技术是网络欺骗防御的核心所在。其基本理念是通过建立虚假的网络和业务系统环境,引诱攻击者对诱捕系统发起攻击而达到监控分析攻击行为的目的。着眼于面向攻击诱捕的网络欺骗防御技术研究,讨论了攻击诱捕技术的基本概念及典型架构,并从决策控制和欺骗环境构建两个方面对攻击诱捕机制的实现机理进行了探讨。总结了攻击诱捕技术在欺骗防御场景中的作用,在此基础上从传统诱捕机制、虚拟化诱捕机制以及智能诱捕决策等方面分析了攻击诱捕技术的研究现状及关键技术,为欺骗诱捕系统的设计提供了一定的思路,总结分析了现有研究存在的问题,并展望了未来的发展方向和面临的挑战。 As a means to actively counter attackers,cyber deception defense technology has received extensive attention from academia and industry,among which how to capture attacker is the core of cyber deception defense.The basic idea is to achieve the purpose of monitoring and analyzing attacks by establishing a false network and trapping environment to lure attackers.Focusing on the research of network deception defense technology for attack trapping,the design ideas of attack trapping system are investigated,the typical architecture of attack trapping technology is analyzed,and the design of trapping system is divided into two parts:decision-making control and deception environment.Discussed the three major modules of deception environment design,and divided the development of attack trapping technology into three stages:traditional trapping,complex trapping and intelligent trapping.Combined with the development of attack trapping technology,the key technologies for the design of each module of the deception environment are discussed.Based on the existing problems in the design of trapping systems,the future development trend of attack trapping technology is analyzed.
作者 高雅卓 刘亚群 邢长友 张国敏 王秀磊 GAO Ya-zhuo;LIU Ya-qun;XING Chang-you;ZHANG Guo-min;WANG Xiu-lei(School of Command and Control Engineering,Army Engineering University of PLA,Nanjing 210007,China)
出处 《计算机技术与发展》 2022年第3期114-119,共6页 Computer Technology and Development
基金 国家自然科学基金项目(61379149,61772271) 国家博士后科学基金项目(2017M610296)。
关键词 欺骗防御 攻击诱捕 蜜罐 虚拟化 博弈论 deception defense attack trapping honeypot virtualization game theory
  • 相关文献

参考文献5

二级参考文献38

  • 1程杰仁,殷建平,刘运,钟经伟.蜜罐及蜜网技术研究进展[J].计算机研究与发展,2008,45(z1):375-378. 被引量:35
  • 2曹爱娟,刘宝旭,许榕生.网络陷阱与诱捕防御技术综述[J].计算机工程,2004,30(9):1-3. 被引量:27
  • 3冯萍慧,连一峰,戴英侠,李闻,张颖君.面向网络系统的脆弱性利用成本估算模型[J].计算机学报,2006,29(8):1375-1382. 被引量:28
  • 4方滨兴.解读信息安全创新突破点[OL].[2008-03-21].http://www.cert.org.cn/articles/news/common/2007051823317.shtml,2008. 被引量:1
  • 5Nash J.Equilibrium points in n-person games[J].Proc of the National Academy of Sciences of the United States of America,1950,36(1):48-49. 被引量:1
  • 6Lee W.Toward cost-sensitive modeling for intrusion detection and response[J].Journal of Computer Security,2002,10(1/2):5-22. 被引量:1
  • 7Wang L Y,Noel S,Jajodia S.Minimum-cost network hardening using attack graphs[J].Computer Communications,2006,29(18):3812-3824. 被引量:1
  • 8Syverson P F.A different look at secure distributed computation[C]//Proc of the 1997 IEEE Computer Security Foundations Workshop.Washington:IEEE Computer Society,1997:109-115. 被引量:1
  • 9Burke D.Towards a game theory model of information warfare[D].Montgomery,AL:Air force Institute of Technology,Air University,1999. 被引量:1
  • 10Lye Kong-wei,Wing J.Game strategies in network security.International Journal of Information Security,2005,4(1/2):71-86. 被引量:1

共引文献204

同被引文献10

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部