通信学报 ›› 2017, Vol. 38 ›› Issue (12): 128-143.doi: 10.11959/j.issn.1000-436x.2017281

• 综述 • 上一篇    下一篇

网络欺骗技术综述

贾召鹏1,2,方滨兴1,3,4,刘潮歌2,5,刘奇旭2,5,林建宝1,2   

  1. 1 北京邮电大学网络空间安全学院,北京 100876
    2 中国科学院信息工程研究所,北京 100093
    3 广州大学网络空间先进技术研究院,广东 广州 510006
    4 电子科技大学广东电子信息工程研究院,广东 东莞 523808
    5 中国科学院大学网络空间安全学院,北京 100049
  • 修回日期:2017-08-16 出版日期:2017-12-01 发布日期:2018-01-19
  • 作者简介:贾召鹏(1988-),男,河北邢台人,北京邮电大学博士生,主要研究方向为网络安全、网络欺骗。|方滨兴(1960-),男,江西万年人,中国工程院院士,广州大学教授,主要研究方向为计算机体系结构、计算机网络与信息安全。|刘潮歌(1986-),男,吉林长春人,中国科学院信息工程研究所助理研究员、博士生,主要研究方向为Web安全、网络欺骗、追踪溯源。|刘奇旭(1984-),男,江苏徐州人,博士,中国科学院信息工程研究所副研究员,中国科学院大学副教授,主要研究方向为网络攻防技术、网络安全评测。|林建宝(1992-),男,山东威海人,北京邮电大学硕士生,主要研究方向为网络安全、网络欺骗。
  • 基金资助:
    国家重点研发计划基金资助项目(2016YFB0801604);东莞市引进创新科研团队计划基金资助项目(201636000100038);中国科学院网络测评技术重点实验室和网络安全防护技术北京市重点实验室基金资助项目

Survey on cyber deception

Zhao-peng JIA1,2,Bin-xing FANG1,3,4,Chao-ge LIU2,5,Qi-xu LIU2,5,Jian-bao LIN1,2   

  1. 1 School of Cyberspace Security,Beijing University of Posts and Telecommunications,Beijing 100876,China
    2 Institute of Information Engineering,Chinese Academy of Sciences,Beijing 100093,China
    3 Cyberspace Institute of Advanced Technology,Guangdong University,Guangzhou 510006,China
    4 Institute of Electronic and Information Engineering of UESTC in Guangdong,Dongguan 523808,China
    5 School of Cyber Security,University of Chinese Academy of Sciences,Beijing 100049,China
  • Revised:2017-08-16 Online:2017-12-01 Published:2018-01-19
  • Supported by:
    The National Key Research and Development Program of China(2016YFB0801604);Dongguan Innovative Research Team Program(201636000100038);Key Laboratory of Network Assessment Technology at Chinese Academy of Sciences and Beijing Key Laboratory of Network Security and Protection Technology

摘要:

网络攻防不对称是当前网络安全面临的核心问题之一。基于欺骗的防御技术是防御方为改变这种不对称格局而引入的一种新思路,其核心思想是通过干扰攻击者的认知以促使攻击者采取有利于防御方的行动,从而记录攻击者的活动与方法、增加其实施攻击的代价、降低其攻击成功的概率。首先,对网络欺骗进行形式化定义并依据欺骗环境构建方法将其划分为4种。同时,将网络欺骗的发展历程概括为3个阶段,分析各个阶段特点。然后,提出网络欺骗的层次化模型并对已有研究成果进行介绍。最后,对网络欺骗对抗手段进行分析与总结并介绍网络欺骗技术发展趋势。

关键词: 网络欺骗, 认知, 攻击, 防御

Abstract:

The asymmetric situation of network attacks and defenses is one of the key issues of current network security.Cyber deception was a revolutionary technology introduced by defenders to alter the asymmetric situation.By thwarting an attacker's cognitive processes,defenders can mislead attackers,hence causing them to take specific actions that aid network security defenses.In this way,defenders can log attackers'behavior and method,increase cost for the attackers to launch a successful attack,as well as reduce the probability of an attacker's success.Cyber deception formally and classify cyber deception into four classes was defined.Then,the cyber deceptions’development was divided into three stages,and each stage’s character was decided.Next,a hierarchical model to describe the existing work was proposed.At last,the countermeasures in cyber deception and the development trends in this field was discussed.

Key words: cyber deception, cognitive process, attack, defense

中图分类号: 

No Suggested Reading articles found!