期刊文献+

伪装欺骗技术在网络攻防中的应用与实践 被引量:2

The application and practice of camouflage deception technology in network attack and defense
在线阅读 下载PDF
导出
摘要 [目的/意义]当前,全社会数字化转型加速,在复杂的国际态势下,我国在网络空间的安全威胁日益增长.面对精心准备的网络攻击者,防守方处于"攻防不对称"的劣势.伪装欺骗技术的引入,可以在网络攻防对抗中获取主动性,为防护体系增加主动对抗能力.[方法/过程]分析了网络攻防不对称的问题,介绍了伪装欺骗技术的核心技术和实现效果,并以攻防演练场景分析其具体实现方法和成效.[结果/结论]旨在提升防守方的主动对抗和防御能力,为防守方构建"战时"防御体系提供技术支撑,为安全运营提供切实保障. [Purpose/Significance]At present,the Digital transformation of the whole society is accelerating.Under the complex international situation,China's security threats in cyberspace are growing day by day.Faced with carefully prepared cyber attackers,the defensive side is at a natural disadvantage of"asymmetric attack and defense".The introduction of camouflage and deception technology can gain initiative in network attack and defense confrontation,increasing the ability of active confrontation for the protection system.[Method/Process]This article analyzes the problem of network attack and defense asymmetry,introduces the core technology and implementation effects of camouflage deception technology,and analyzes its specific implementation methods and effects through attack and defense exercise scenarios.[Results/Conclusion]In order to enhance the active confrontation and defense capabilities of the defense team,provide technical support for the defense team to build a"wartime"defense system,and provide practical guarantees for safe operation.
作者 余慧英 高川 贾悦霖 Yu Huiying;Gao Chuan;Jia Yuelin(Beijing Chaitin Future Technology Co.,Ltd.,Beijing 100083)
出处 《网络空间安全》 2023年第4期118-122,共5页 Cyberspace Security
关键词 网络安全 攻防对抗 攻防不对称 伪装欺骗 攻击诱捕 cyber security offensive and defensive confrontation,offense and defense asymmetry disguise attack trap
作者简介 余慧英(1979-),女,汉族,江西教育学院,本科,北京长亭未来科技有限公司,工程师,主要研究方向和关注领域:网络安全、云安全和物联网安全;高川(1988-),男,回族,河北工业大学,本科,北京长亭未来科技有限公司,工程师,主要研究方向和关注领域:网络安全和安全架构;贾悦霖(1987-),男,汉族,中国民航大学,硕士,北京长亭未来科技有限公司,工程师,主要研究方向和关注领域:网络安全和欺骗防御。
  • 相关文献

参考文献8

二级参考文献45

  • 1刘蓬,张培仁.用DDK开发WDM驱动程序[J].计算机应用,2003,23(z2):248-250. 被引量:3
  • 2程杰仁,殷建平,刘运,钟经伟.蜜罐及蜜网技术研究进展[J].计算机研究与发展,2008,45(z1):375-378. 被引量:36
  • 3曹爱娟,刘宝旭,许榕生.网络陷阱与诱捕防御技术综述[J].计算机工程,2004,30(9):1-3. 被引量:27
  • 4McAfee Threats Report. Fourth Quarter [R/OL]. [-2011-12-20]. http://www, mcafee, com/us/resources/reports/rp- quarterly-threat-q4-2010, pdf.
  • 5Azab A M, Ning P, Sezer E C, et al. HIMA: A Hypervisor-based Integrity Measurement Agent [C]//Proc of the 25th Annual Computer Security Applications Conference. Honolulu: IEEE, 2009: 461-470.
  • 6Garfinkel T, Rosenblum M. A Virtual Machine Introspection Based Architecture for Intrusion Detection[C]//Proc of Network and Distributed Systems Security Symposium. San Diego: ISOC, 2003: 191-206.
  • 7Payne B D, de Carbone M, Lee W K. Secure and Flexible Monitoring of Virtual Machines [C]//Proc of the 23re Annual Computer Security APplications Conference. Miami Beach: IEEE, 2007: 385-397.
  • 8Payne B D, de Carhone M, Sharif M, et al. Lares: An Architecture for Secure Active Monitoring Using Virtualization [C]//Proc of the 29th IEEE SympoSium on Security and Privacy. Oakland: IEEE, 2008: 233-247.
  • 9Dolan-Gavitt B, Leek T, Zhivich M, et al. Virtuoso: Narrowing the Semantic Gap in Virtual Machine Introspection [C]//Proc of the 32na IEEE Symposium on Security and Privacy. Berkeley: IEEE, 2011: 297-312.
  • 10Dolan-Gavitt B, Payne B D, Lee W K. Leveraging Forensic Tools for Virtual Machine Introspection [R]. Atlanta: Technical Report. Georgia Institute of Technology, GT-CS-11-05, 2011.

共引文献96

同被引文献5

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部