| 注册
首页|期刊导航|信息安全研究|网络拓扑混淆技术综述

网络拓扑混淆技术综述

黄春娇 张宇 史建焘 朱国普

信息安全研究2025,Vol.11Issue(4):296-303,8.
信息安全研究2025,Vol.11Issue(4):296-303,8.DOI:10.12379/j.issn.2096-1057.2025.04.01

网络拓扑混淆技术综述

A Survey of Network Topology Obfuscation Techniques

黄春娇 1张宇 2史建焘 1朱国普1

作者信息

  • 1. 哈尔滨工业大学网络空间安全学院 哈尔滨 150001
  • 2. 哈尔滨工业大学网络空间安全学院 哈尔滨 150001||鹏城实验室 广东 深圳 518055
  • 折叠

摘要

Abstract

Link-Flooding Attack(LFA)is a novel distributed denial-of-service(DDoS)attack that exploits network topology detection.Network Topology Obfuscation serves as an effective deceptive defense mechanism against this attack,aiming to provide proactive protection before an attack occurs.Over the past decade,relevant research has continuously made progress,proposing corresponding obfuscation solutions for different scenarios and objectives.This paper comprehensively reviews the network topology obfuscation techniques.First,it combines the basic principles and classifications of network topology discovery to point out the risks of topology leakage in current network topology discovery.Next,it formally defines network topology obfuscation design and presents a proactive defense model.Then,based on the obfuscation concept,the technologies are divided into packet modification,decoy traps,routing mutation,and metric forgery schemes,and proposes a set of metrics to comprehensively compare the current mainstream network topology obfuscation techniques.

关键词

链路洪泛攻击/网络拓扑混淆/主动防御/欺骗防御/拓扑泄露风险

Key words

link-flooding attack/network topology obfuscation/active defense/deceptive defense/topology leakage risks

分类

计算机与自动化

引用本文复制引用

黄春娇,张宇,史建焘,朱国普..网络拓扑混淆技术综述[J].信息安全研究,2025,11(4):296-303,8.

基金项目

国家重点研发计划项目(2022YFB3102903) (2022YFB3102903)

信息安全研究

OA北大核心

2096-1057

访问量4
|
下载量0
段落导航相关论文