首页 | 本学科首页   官方微博 | 高级检索  
     

隐蔽式网络攻击综述
引用本文:曹自刚,熊 刚,赵 咏,郭 莉.隐蔽式网络攻击综述[J].集成技术,2014,3(2):1-16.
作者姓名:曹自刚  熊 刚  赵 咏  郭 莉
作者单位:中国科学院信息工程研究所;北京邮电大学
基金项目:国家高技术研究发展计划(863计划)(2011AA010703);国家科技支撑计划(2012BAH46B02);中国科学院战略性先导科技专项课题(XDA06030200);国家自然科学基金项目(61070184)
摘    要:近年来,随着信息化的推进,国民经济各行各业对网络的依赖性明显增强,网络信息安全问题成为关系国家和社会安全的突出问题。受经济利益驱动,加上各国之间的博弈在网络空间的体现不断加强,具有高技术性、高隐蔽性和长期持续性的网络攻击成为当前网络安全面临的主要挑战之一。文章对这种隐蔽式网络攻击进行了介绍和描述,分析其主要特点和对当前安全体系的挑战。在此基础上综述了国内外隐蔽式网络攻击检测等方面的最新研究进展。最后,对关键技术问题进行了总结,并展望了本领域未来的研究方向。

关 键 词:隐蔽  网络攻击  高级持续性威胁  僵尸网络  威胁发现

A Survey on Evasive Network Attack
Authors:CAO Zigang  XIONG Gang  ZHAO Yong and GUO Li
Affiliation:CAO Zigang;XIONG Gang;ZHAO Yong;GUO Li;Institute of Information Engineering,Chinese Academy of Sciences;Beijing University of Posts and Telecommunications;
Abstract:In recent years, due to advances in informatization, the national economy has become more dependent on networks. As a result, the network and information security has become a prominent problem for the national security and social stability. Driven by economic interests and the game between countries reflected in the growing cyberspace confrontations, network attacks with high-tech, high concealment and long-term sustainability become one of the major challenges in the network security. In this paper, the certain kind of covert attack was referred as the evasive network attack (ENA). Firstly, the main characteristics of ENA and the challenges it brings in current security systems were analyzed, based on which the latest developments at home and abroad for ENA detection and other related studies were reviewed then. Finally, key technical issues and future research directions in this field were summarized.
Keywords:evasive  network attack  advanced persistent threat  botnet  threat discovery
本文献已被 CNKI 等数据库收录!
点击此处可从《集成技术》浏览原始摘要信息
点击此处可从《集成技术》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号