期刊文献+

基于场景应用欺骗防御技术扩大风险感知面的方法研究

Research on the Method of Expanding Risk Perception by Applying Deception Defense Technology Based on Scenario
下载PDF
导出
摘要 欺骗防御是利用攻击混淆诱导和观察攻击行为的主动式防御手段。通过诱骗攻击者暴露攻击轨迹,在诱捕环境中优化防护措施。随着攻击手段的多样化和高频化,基于场景欺骗防御技术已成为重点研究内容。通过多样化技术扩大攻击感知面,如中继、攻击引流、智能蜜网等,阐述了实际场景防御的优势,提高了安全运营和攻防对抗能力,保障企业的核心业务系统和数据安全。 Deception defense is an active defense method that utilizes attack confusion to induce and observe attack behavior.By enticing attackers to expose attack trajectories and optimizing protective measures in the decoy environment.With the diversification and high-frequency of attack methods,scene based deception defense technology has become a key research topic.By diversifying technologies to expand attack perception,such as relay,attack diversion,intelligent honeynet,etc.,the advantages of actual scenario defense were elaborated,improving security operation and attack defense adversarial capabilities,and ensuring the security of enterprise core business systems and data.
作者 刘洋 樊荣 胡永鑫 LIU Yang;FAN Rong;HU Yongxin(Jiangxi Province Network Security Research Institute,Nanchang Jiangxi 330000,China)
出处 《信息与电脑》 2023年第10期215-217,共3页 Information & Computer
关键词 欺骗防御 主动防御 扩大感知面 deception defense active defense expanding perception surface
  • 相关文献

参考文献4

二级参考文献49

  • 1赵伟锋,曾启铭.一种了解黑客的有效手段——蜜罐(Honeypot)[J].计算机应用,2003,23(z1):259-261. 被引量:27
  • 2熊华、郭世泽等,网络安全-取证与蜜罐,人民邮电出版社,2003年.97-136.
  • 3Kreibich C,Crowcroft J.Automated NIDS signature generation using honeypots[C]. Karlsruhe,Germany:ACM SIGCOMM'03, 2003.
  • 4Urjita Thakar. Honeyanalyzer-analysis and extraction of intrusion detection pattems and signatures using honeypot[C].Proceedings of the Second International Conference on Innovations in Information Technology,2005.
  • 5Yegneswaran Vinod,Giffin Jonathon T, Jha Somesh.An architecture for generating semantics-aware signatures[C].Proceedings of USENIX Security Symposium,2005.
  • 6Budiarto R, Samsudin A,Heong C W, et al.Honeypots: Why we need a dynamics honeypots [C]. Proceedings of International Conference on Information and Communication Technologies: From Theory to Applications,2004.
  • 7Know Your Enemy:Defining virtual honeynets[EB/OL], http:// project.honeynet.org/papers/virtual/,2003-01-27.
  • 8Spitzner L.Honeypot farms[EB/OL], http://www.securityfocus. com/infocus/1720,2003-08-13.
  • 9Jiang Xuxian,Xu Dongyan, Wang Yi-Min.Collapsar: AVM-based honeyfarm and reverse honeyfarm architecture for network attack capture and detention[J].Journal of Parallel and Distributed Computing,2006,66(9): 1165-1180.
  • 10Anti-honeypot technology[J].IEEE Security and Privacy,2004,2 (1):76-79.

共引文献58

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部