Netinfo Security ›› 2024, Vol. 24 ›› Issue (10): 1484-1492.doi: 10.3969/j.issn.1671-1122.2024.10.002

Previous Articles     Next Articles

Review of Encrypted Network Traffic Anonymity and Systemic Defense Tactics

WANG Qiang1,2, LIU Yizhi3, LI Tao3,4, HE Xiaochuan5,6()   

  1. 1. Institute of Information Enginering, Chinese Academy of Sciences, Beijing 100093, China
    2. School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China
    3. School of Cyber Science and Engineering, Southeast University, Nanjing 210000, China
    4. Purple Mountain Laboratories, Nanjing 210000, China
    5. Qi’anxin Technology Group Co., Ltd., Beijing 100044, China
    6. China Electronics Corporation CyberSecurity Research Institute, Beijing 100088, China
  • Received:2024-06-15 Online:2024-10-10 Published:2024-09-27

Abstract:

Advanced persistent threat (APT) attacks with complex organization, efficient planning and clear directivity are one of the main threats facing our country, and the trend of covert action and regular attack of APT organizations is becoming more and more obvious. In recent years, it has become more and more difficult for our country to master the main APT activities, which is not unrelated to the fact that APT organizations disappear their attacks into normal information services and network activities, and hide their attack traffic in normal communication traffic. The state in which this kind of highly concealed attack behavior is concealed is called dense state. How to detect dense state behavior and implement system confrontation is one of the bottleneck problems to be solved in the current cyber space defense. From the perspective of clarifying the mechanism of traffic transmission hiding technology for advanced attack activities in cyberspace, this paper puts forward a research framework and countermeasure capability evaluation index system of traffic dense disappearing countermeasure based on two dimensions of anonymous communication link construction and traffic characteristic behavior detection, and comprehensively expounds the relevant research progress, research methods and solutions in recent years. In order to explore the new development direction of dense state countermeasure capability in cyberspace.

Key words: encrypted anonymity, network traffic obfuscation, systemic defense tactics

CLC Number: