面向取证的网络攻击者溯源分析技术研究综述OACSTPCD
A Survey of Forensic Network Attack Source Traceback
网络攻击者的隐藏性和匿名性使得网络攻击溯源技术充满挑战.研究综述了基于流量、场景和样本3个方面的网络攻击溯源分析技术的研究现状.首先,针对流量溯源,总结出基于日志记录、流量包标记、ICMP回溯和链路测试等方法和应用;其次,根据不同场景归纳出匿名网络攻击、僵尸网络攻击、跳板攻击、局域网攻击和高级可持续威胁攻击的溯源技术以及在实际环境中的应用和限制;最后,对于样本分析探讨了静态和动态溯源分析在恶意代码分析及攻击溯源方面的研究进展和应用场景.
The concealment and anonymity of cyber attackers pose significant challenges to the field of network attack traceback.This study provides a comprehensive overview of the current state of research on network attack traceback analysis techniques,focusing on three aspects:traffic,scenarios,and samples.Firstly,with respect to traffic traceback,the paper outlines methods and applications based on log records,packet marking,ICMP tracing,and link testing.Secondly,it categorizes traceback techniques for different scenarios,encompassinganonymous networks,zombie networks,springboards,local area networks,and advanced persistent threat attacks,as well as their applications and limitations in real-world environments.Finally,concerning sample analysis,the paper discusses the progress and application scenarios of static and dynamic traceback analysis in the context of malicious code analysis and attack tracing.
王子晨;汤艳君;潘奕扬
中国刑事警察学院公安信息技术与情报学院 沈阳 110031
计算机与自动化
网络安全追踪溯源网络欺骗恶意样本溯源匿名网络溯源
cybersecurityattributionnetwork deceptionmalicious sample traceabilityanonymous network traceability
《信息安全研究》 2024 (004)
302-310 / 9
辽宁网络安全执法协同创新中心项目(WXZX201912002);中国刑事警察学院研究生创新能力提升项目重点项目(2023YCZD06)
评论