期刊文献+

欺骗防御技术发展及其大语言模型应用探索

Development of Deception Defense Technology and Exploration of Its Large Language Model Applications
下载PDF
导出
摘要 欺骗防御作为主动防御中最具发展前景的技术,帮助防御者面对高隐蔽未知威胁化被动为主动,打破攻守间天然存在的不平衡局面.面对潜在的威胁场景,如何利用欺骗防御技术有效地帮助防御者做到预知威胁、感知威胁、诱捕威胁,均为目前需要解决的关键问题.博弈理论与攻击图模型在主动防御策略制定、潜在风险分析等方面提供了有力支撑,总结回顾了近年来二者在欺骗防御中的相关工作.随着大模型技术的快速发展,大模型与网络安全领域的结合也愈加紧密,通过对传统欺骗防御技术的回顾,提出了一种基于大模型的智能化外网蜜点生成技术,实验分析验证了外网蜜点捕获网络威胁的有效性,与传统Web蜜罐相比较,在仿真性、稳定性与灵活性等方面均有所提升.为增强蜜点间协同合作、提升对攻击威胁的探查与感知能力,提出蜜阵的概念.针对如何利用蜜点和蜜阵技术,对构建集威胁预测、威胁感知和威胁诱捕为一体的主动防御机制进行了展望. Deception defense,as the most promising technology in proactive defense,aids defenders in facing highly covert and unknown threats,turning passivity into proactivity,and breaking the inherent imbalance between offense and defense.In the face of potential threat scenarios,how to effectively use deception defense technology to help defenders anticipate threats,perceive threats,and entrap threats,is a key issue that currently need to be addressed.Game theory and attack graph models provide strong support in formulating active defense strategies and analyzing potential risks.We summarize and review the recent work of both in the realm of deception defense.With the rapid development of large language model technology and its increasingly close integration with the field of cybersecurity,we review traditional deception defense technology and propose a large language model-based intelligent external network HoneyPoint generation technique.Experimental analysis validates the effectiveness of external network HoneyPoint in capturing network threats,showing improvements over traditional Web honeypots in aspects like simulation,stability,and flexibility.To enhance the collaborative cooperation between HoneyPoints and improve the capabilities for threatening exploration and perception,the concept of Honey-Landscape is introduced.We provide an outlook on how to utilize HoneyPoint and Honey-Landscape technologies to construct an integrated active defense mechanism that includes threat prediction,threat perception,and threat entrapment.
作者 王瑞 阳长江 邓向东 刘园 田志宏 Wang Rui;Yang Changjiang;Deng Xiangdong;Liu Yuan;Tian Zhihong(Cyberspace Institute of Advanced Technology,Guangzhou University,Guangzhou 510799)
出处 《计算机研究与发展》 EI CSCD 北大核心 2024年第5期1230-1249,共20页 Journal of Computer Research and Development
基金 国家自然科学基金项目(U20B2046) 国家重点研发计划项目(2021YFB2012402) 广东省高校珠江学者资助计划(2019)。
关键词 欺骗防御 大语言模型 攻击图 博弈论 蜜点 蜜阵 deception defense large language model attack graph game theory HoneyPoint Honey-Landscape
  • 相关文献

参考文献9

二级参考文献83

  • 1程杰仁,殷建平,刘运,钟经伟.蜜罐及蜜网技术研究进展[J].计算机研究与发展,2008,45(z1):375-378. 被引量:35
  • 2曹爱娟,刘宝旭,许榕生.网络陷阱与诱捕防御技术综述[J].计算机工程,2004,30(9):1-3. 被引量:27
  • 3冯萍慧,连一峰,戴英侠,鲍旭华.基于可靠性理论的分布式系统脆弱性模型[J].软件学报,2006,17(7):1633-1640. 被引量:30
  • 4冯萍慧,连一峰,戴英侠,李闻,张颖君.面向网络系统的脆弱性利用成本估算模型[J].计算机学报,2006,29(8):1375-1382. 被引量:28
  • 5方滨兴.解读信息安全创新突破点[OL].[2008-03-21].http://www.cert.org.cn/articles/news/common/2007051823317.shtml,2008.
  • 6Nash J.Equilibrium points in n-person games[J].Proc of the National Academy of Sciences of the United States of America,1950,36(1):48-49.
  • 7Lee W.Toward cost-sensitive modeling for intrusion detection and response[J].Journal of Computer Security,2002,10(1/2):5-22.
  • 8Wang L Y,Noel S,Jajodia S.Minimum-cost network hardening using attack graphs[J].Computer Communications,2006,29(18):3812-3824.
  • 9Syverson P F.A different look at secure distributed computation[C]//Proc of the 1997 IEEE Computer Security Foundations Workshop.Washington:IEEE Computer Society,1997:109-115.
  • 10Burke D.Towards a game theory model of information warfare[D].Montgomery,AL:Air force Institute of Technology,Air University,1999.

共引文献247

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部