期刊文献+

人工智能生成内容技术赋能下的集群式信息攻防研究综述

Review of Cluster-Based Information Offense and Defense Research Empowered by AIGC Technology
下载PDF
导出
摘要 [目的/意义]厘清国外集群式信息安全领域研究的整体态势、研究趋势和研究热点,为信息安全治理提供参考。[方法/过程]基于国外学者已发表的相关文献,梳理此领域的相关研究并对其进行分析和分类。[结果/结论]研究总结了集群式信息攻击的概念,并将其具体表现特征概括为信息成簇存在、信息真假混淆和信息主题积聚三种主要形式;研究探讨了人工智能生成内容(AIGC)技术应用于集群式信息攻击后的新的表现形式,如集群式深度伪造、集群式自然语言伪造以及集群式情感煽动,这些新形式的网络信息攻击手段更具针对性和破坏性,对现有的信息安全防御体系提出了更大的挑战;归纳了AIGC技术应用于集群式攻击的检测与防护策略,分析了当前集群式信息安全问题的治理痛点,并提出了未来研究的方向。 [Purpose/significance]In order to clarify the overall situation,research trend and research hotspots in the field of cluster information security abroad.[Method/process]Based on the relevant literature published by foreign scholars,this study sorted out,analyzed,and classified the relevant research in this field.[Result/conclusion]The research summarized the concept of cluster information attack.It summarizes these as three main forms:information cluster,confusion between true and false infor-mation and information subject accumulation.Then,the study further explores the new forms of artificial intelligence-generated con-tent(AIGC)technology applied to cluster-based information attacks,such as cluster-based deep forgeries,natural language fabri-cations,and emotional demagoguery,which are more targeted and destructive,posing a higher challenge to the existing informa-tion security defense system.Finally,this paper summarizes the detection and protection strategy of AIGC technology applied to cluster attacks,analyzes the current management pain points of cluster information security problems,and proposes future research trends.
作者 苏君华 宋雯琪 Su Junhua;Song Wenqi(School of Cultural Heritage and Information Management,Shanghai University,Shanghai 200444;Research Center of Information Resources Exploitation and Utilization,Shanghai University,Shanghai 200444)
出处 《情报理论与实践》 北大核心 2024年第9期9-21,共13页 Information Studies:Theory & Application
基金 国家社会科学基金项目“国家大数据战略背景下档案数据质量优化控制研究”的成果,项目编号:21BTQ016。
关键词 人工智能生成内容 集群式信息 信息安全 信息伪造 系统威胁 防御策略 AIGC clustered information information security information falsification system threat defensive strategy
  • 相关文献

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部