检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:曹自刚[1,2] 熊刚[1] 赵咏[1] 郭莉[1]
机构地区:[1]中国科学院信息工程研究所,北京100190 [2]北京邮电大学,北京100876
出 处:《集成技术》2014年第2期1-16,共16页Journal of Integration Technology
基 金:国家高技术研究发展计划(863计划)(2011AA010703);国家科技支撑计划(2012BAH46B02);中国科学院战略性先导科技专项课题(XDA06030200);国家自然科学基金项目(61070184)
摘 要:近年来,随着信息化的推进,国民经济各行各业对网络的依赖性明显增强,网络信息安全问题成为关系国家和社会安全的突出问题。受经济利益驱动,加上各国之间的博弈在网络空间的体现不断加强,具有高技术性、高隐蔽性和长期持续性的网络攻击成为当前网络安全面临的主要挑战之一。文章对这种隐蔽式网络攻击进行了介绍和描述,分析其主要特点和对当前安全体系的挑战。在此基础上综述了国内外隐蔽式网络攻击检测等方面的最新研究进展。最后,对关键技术问题进行了总结,并展望了本领域未来的研究方向。In recent years, due to advances in informatization, the national economy has become more dependent on networks. As a result, the network and information security has become a prominent problem for the national security and social stability. Driven by economic interests and the game between countries reflected in the growing cyberspace confrontations, network attacks with high-tech, high concealment and long-term sustainability become one of the major challenges in the network security. In this paper, the certain kind of covert attack was referred as the evasive network attack (ENA). Firstly, the main characteristics of ENA and the challenges it brings in current security systems were analyzed, based on which the latest developments at home and abroad for ENA detection and other related studies were reviewed then. Finally, key technical issues and future research directions in this field were summarized.
关 键 词:隐蔽 网络攻击 高级持续性威胁 僵尸网络 威胁发现
分 类 号:TP393.081[自动化与计算机技术—计算机应用技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.249