《国防科技》编辑部       温馨提示:建议您使用Firefox、Chrome、IE最新版本、360极速等浏览器,若您的浏览器版本过低,可能会影响部分功能正常使用。
网络攻击螺旋模型构建及运用研究
作者:
作者单位:

作者简介:

通讯作者:

中图分类号:

基金项目:


Research on the construction and application of network attack spiral model
Author:
Affiliation:

Fund Project:

  • 摘要
  • |
  • 图/表
  • |
  • 访问统计
  • |
  • 参考文献
  • |
  • 相似文献
  • |
  • 引证文献
  • |
  • 资源附件
  • |
  • 文章评论
    摘要:

    网络攻击模型是实施网络攻击的基本遵循依据,本文分析了经典网络攻击链模型存在的适用性不足、全面性欠缺、整体性不够三个主要问题,构建了更适合描述APT攻击的网络攻击螺旋模型。该模型将网络攻击活动描述为侦察、武器化、渗透与破坏、横向移动、撤出以及评估与改进6个阶段,并设置为螺旋循环式结构,通过对攻击链模型的优化与重构,使模型层次更加分明,任务更加明确,功能更加完备。在此基础上,对模型中各阶段行动应当完成的攻击任务和采取的攻击方式进行了梳理,运用统一建模语言从静态和动态两个方面对网络攻击螺旋模型在APT攻击中的运用方式进行了形式化描述,梳理了该模型的运用原则和特性,对分析识别APT攻击行为并采取针对性防御措施阻断攻击链具有一定借鉴意义。

    Abstract:

    The network attack model is the basic principle of the network attack operation. This paper analyzes the main problems of the classic network attack chain model in three aspects: the lack of applicability, the lack of comprehensiveness and the lack of integrity, and constructs a spiral model of network attack which is more suitable for cyberspace operations. The model describes the network attack action as six stages: reconnaissance, weaponization, penetration and destruction, lateral movement, withdrawal, assessment and improvement, and is set up as a spiral cycle structure. Through the optimization and reconstruction of the attack chain model, the model has clearer hierarchy, clearer tasks and more complete functions. On this basis, this paper combs the attack tasks and attack methods that should be completed in each stage of the action in the model, uses unified modeling language to formally describe the application of network attack spiral model in APT attack activities from both static and dynamic aspects, combs the application principles and characteristics of the model, and takes countermeasures to analyze and identify apt attack behaviors. It can be used as a reference for targeted defense measures to block the attack chain.

    参考文献
    相似文献
    引证文献
引用本文

陈栋伟,杨 林,李 光.网络攻击螺旋模型构建及运用研究[J].国防科技,2021,42(2):84-91;CHEN Dongwei, YANG Lin, LI Guang. Research on the construction and application of network attack spiral model[J]. National Defense Technology,2021,42(2):84-91

复制
分享
文章指标
  • 点击次数:
  • 下载次数:
  • HTML阅读次数:
  • 引用次数:
历史
  • 收稿日期:
  • 最后修改日期:
  • 录用日期:
  • 在线发布日期: 2021-05-10
  • 出版日期:

关于我们

友情链接

微信公众号二维码

手机版网站二维码