信息网络安全 ›› 2024, Vol. 24 ›› Issue (10): 1484-1492.doi: 10.3969/j.issn.1671-1122.2024.10.002

• 入选论文 • 上一篇    下一篇

网络流量密态匿迹与体系对抗综述

王强1,2, 刘奕智3, 李涛3,4, 贺小川5,6()   

  1. 1.中国科学院信息工程研究所,北京 100093
    2.中国科学院大学网络空间安全学院,北京 100049
    3.东南大学网络空间安全学院,南京 210000
    4.网络通信与安全紫金山实验室,南京 210000
    5.奇安信科技集团股份有限公司,北京 100044
    6.中国电子网络空间安全研究院,北京 100088
  • 收稿日期:2024-06-15 出版日期:2024-10-10 发布日期:2024-09-27
  • 通讯作者: 贺小川, hexiaochuan@qianxin.com
  • 作者简介:王强(1997—),男,江苏,博士研究生,主要研究方向为网络流量分析|刘奕智(2000—),男,江苏,硕士研究生,主要研究方向为网络流量对抗|李涛(1984—),男,江苏,副教授,博士,主要研究方向为信息系统安全、内生安全、可信计算|贺小川(1977—),男,安徽,正高级工程师,博士,主要研究方向为网络攻防体系对抗
  • 基金资助:
    国家重点研发计划(2021YFB3101400)

Review of Encrypted Network Traffic Anonymity and Systemic Defense Tactics

WANG Qiang1,2, LIU Yizhi3, LI Tao3,4, HE Xiaochuan5,6()   

  1. 1. Institute of Information Enginering, Chinese Academy of Sciences, Beijing 100093, China
    2. School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China
    3. School of Cyber Science and Engineering, Southeast University, Nanjing 210000, China
    4. Purple Mountain Laboratories, Nanjing 210000, China
    5. Qi’anxin Technology Group Co., Ltd., Beijing 100044, China
    6. China Electronics Corporation CyberSecurity Research Institute, Beijing 100088, China
  • Received:2024-06-15 Online:2024-10-10 Published:2024-09-27

摘要:

组织性复杂、计划性高效和指向性明确的高级持续性威胁(APT)攻击是我国面临的主要威胁之一,APT组织的行动隐匿化、攻击常态化趋势愈加明显。近年来,我国掌握主要的APT活动越来越困难,与APT组织将攻击行为匿迹于正常信息服务和网络活动中,以及将攻击流量藏匿于正常通信流量中不无关系。这种高隐蔽攻击行为隐匿后所处的状态,称之为密态。如何检测发现密态行为并实施体系对抗,是当前网络空间防御要解决的瓶颈性难题之一。文章从澄清网络空间高级攻击活动的流量传输隐匿技术机理角度出发,围绕匿名通信链路构建和流量特征行为检测两个维度,提出流量密态匿迹对抗的研究框架和对抗能力评估指标体系,全面阐述近年来相关研究工作进展、研究方法及解决方案,以期探索网络空间密态对抗能力新的发展方向。

关键词: 密态匿迹, 流量混淆, 体系对抗

Abstract:

Advanced persistent threat (APT) attacks with complex organization, efficient planning and clear directivity are one of the main threats facing our country, and the trend of covert action and regular attack of APT organizations is becoming more and more obvious. In recent years, it has become more and more difficult for our country to master the main APT activities, which is not unrelated to the fact that APT organizations disappear their attacks into normal information services and network activities, and hide their attack traffic in normal communication traffic. The state in which this kind of highly concealed attack behavior is concealed is called dense state. How to detect dense state behavior and implement system confrontation is one of the bottleneck problems to be solved in the current cyber space defense. From the perspective of clarifying the mechanism of traffic transmission hiding technology for advanced attack activities in cyberspace, this paper puts forward a research framework and countermeasure capability evaluation index system of traffic dense disappearing countermeasure based on two dimensions of anonymous communication link construction and traffic characteristic behavior detection, and comprehensively expounds the relevant research progress, research methods and solutions in recent years. In order to explore the new development direction of dense state countermeasure capability in cyberspace.

Key words: encrypted anonymity, network traffic obfuscation, systemic defense tactics

中图分类号: