检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:贾召鹏 方滨兴[1,3,4] 刘潮歌 刘奇旭 林建宝[1,2]
机构地区:[1]北京邮电大学网络空间安全学院,北京100876 [2]中国科学院信息工程研究所,北京100093 [3]广州大学网络空间先进技术研究院,广东广州510006 [4]电子科技大学广东电子信息工程研究院,广东东莞523808 [5]中国科学院大学网络空间安全学院,北京100049
出 处:《通信学报》2017年第12期128-143,共16页Journal on Communications
基 金:国家重点研发计划基金资助项目(No.2016YFB0801604);东莞市引进创新科研团队计划基金资助项目(No.201636000100038);中国科学院网络测评技术重点实验室和网络安全防护技术北京市重点实验室基金资助项目~~
摘 要:网络攻防不对称是当前网络安全面临的核心问题之一。基于欺骗的防御技术是防御方为改变这种不对称格局而引入的一种新思路,其核心思想是通过干扰攻击者的认知以促使攻击者采取有利于防御方的行动,从而记录攻击者的活动与方法、增加其实施攻击的代价、降低其攻击成功的概率。首先,对网络欺骗进行形式化定义并依据欺骗环境构建方法将其划分为4种。同时,将网络欺骗的发展历程概括为3个阶段,分析各个阶段特点。然后,提出网络欺骗的层次化模型并对已有研究成果进行介绍。最后,对网络欺骗对抗手段进行分析与总结并介绍网络欺骗技术发展趋势。The asymmetric situation of network attacks and defenses is one of the key issues of current network security. Cyber deception was a revolutionary technology introduced by defenders to alter the asymmetric situation. By thwarting an attacker's cognitive processes, defenders can mislead attackers, hence causing them to take specific actions that aid network security defenses. In this way, defenders can log attackers' behavior and method, increase cost for the attackers to launch a successful attack, as well as reduce the probability of an attacker's success. Cyber deception formally and clas- sify cyber deception into four classes was defined. Then, the cyber deceptions' development was divided into three stages, and each stage's character was decided. Next, a hierarchical model to describe the existing work was proposed. At last, in cyber deception and the development trends in this field was discussed.
分 类 号:TP393[自动化与计算机技术—计算机应用技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.38