网络欺骗技术综述  被引量:43

Survey on cyber deception

在线阅读下载全文

作  者:贾召鹏 方滨兴[1,3,4] 刘潮歌 刘奇旭 林建宝[1,2] 

机构地区:[1]北京邮电大学网络空间安全学院,北京100876 [2]中国科学院信息工程研究所,北京100093 [3]广州大学网络空间先进技术研究院,广东广州510006 [4]电子科技大学广东电子信息工程研究院,广东东莞523808 [5]中国科学院大学网络空间安全学院,北京100049

出  处:《通信学报》2017年第12期128-143,共16页Journal on Communications

基  金:国家重点研发计划基金资助项目(No.2016YFB0801604);东莞市引进创新科研团队计划基金资助项目(No.201636000100038);中国科学院网络测评技术重点实验室和网络安全防护技术北京市重点实验室基金资助项目~~

摘  要:网络攻防不对称是当前网络安全面临的核心问题之一。基于欺骗的防御技术是防御方为改变这种不对称格局而引入的一种新思路,其核心思想是通过干扰攻击者的认知以促使攻击者采取有利于防御方的行动,从而记录攻击者的活动与方法、增加其实施攻击的代价、降低其攻击成功的概率。首先,对网络欺骗进行形式化定义并依据欺骗环境构建方法将其划分为4种。同时,将网络欺骗的发展历程概括为3个阶段,分析各个阶段特点。然后,提出网络欺骗的层次化模型并对已有研究成果进行介绍。最后,对网络欺骗对抗手段进行分析与总结并介绍网络欺骗技术发展趋势。The asymmetric situation of network attacks and defenses is one of the key issues of current network security. Cyber deception was a revolutionary technology introduced by defenders to alter the asymmetric situation. By thwarting an attacker's cognitive processes, defenders can mislead attackers, hence causing them to take specific actions that aid network security defenses. In this way, defenders can log attackers' behavior and method, increase cost for the attackers to launch a successful attack, as well as reduce the probability of an attacker's success. Cyber deception formally and clas- sify cyber deception into four classes was defined. Then, the cyber deceptions' development was divided into three stages, and each stage's character was decided. Next, a hierarchical model to describe the existing work was proposed. At last, in cyber deception and the development trends in this field was discussed.

关 键 词:网络欺骗 认知 攻击 防御 

分 类 号:TP393[自动化与计算机技术—计算机应用技术]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象