Dear Editor,This letter studies the problem of stealthy attacks targeting stochastic event-based estimation,alongside proposing measures for their mitigation.A general attack framework is introduced,and the correspond...Dear Editor,This letter studies the problem of stealthy attacks targeting stochastic event-based estimation,alongside proposing measures for their mitigation.A general attack framework is introduced,and the corresponding stealthiness condition is analyzed.To enhance system security,we advocate for a single-dimensional encryption method,showing that securing a singular data element is sufficient to shield the system from the perils of stealthy attacks.展开更多
The distributed denial of service (DDoS) attack is one of the dangers in intrusion modes. It's difficult to defense and can cause serious damage to the system. Based on a careful study of the attack principles and...The distributed denial of service (DDoS) attack is one of the dangers in intrusion modes. It's difficult to defense and can cause serious damage to the system. Based on a careful study of the attack principles and characteristics, an object-oriented formalized description is presented, which contains a three-level framework and offers full specifications of all kinds of DDoS modes and their features and the relations between one another. Its greatest merit lies in that it contributes to analyzing, checking and judging DDoS. Now this formalized description has been used in a special IDS and it works very effectively.(展开更多
在数字化转型背景下,网络攻击呈现全生命周期演进特征,高级持续性威胁、供应链攻击等新型攻击手段持续迭代,传统碎片化防御模式难以形成有效对抗。文章以MITRE技术和知识(Adversarial Tactics,Techniques,and Common Knowledge,ATT&...在数字化转型背景下,网络攻击呈现全生命周期演进特征,高级持续性威胁、供应链攻击等新型攻击手段持续迭代,传统碎片化防御模式难以形成有效对抗。文章以MITRE技术和知识(Adversarial Tactics,Techniques,and Common Knowledge,ATT&CK)框架为核心,深度拆解其14大核心战术的攻击技术与防御要点,构建覆盖攻击全流程的“三层四维”攻击链防御蓝图。该蓝图整合边界、内网、数据三层防护与预防、检测、响应、溯源四大维度能力,形成体系化闭环防御体系。经2025年攻防演习实战验证,基于该蓝图的防御系统可将威胁检测率从60%提升至95%,攻击处置时间缩短85%,有效填补无文件攻击、域名系统(Domain Name System,DNS)隧道通信等传统防御盲区,为关键信息系统安全防护提供了可落地的技术方案与实践参考,对提升网络安全主动防御能力具有重要价值。展开更多
基金supported by the National Natural Science Foundation of China(62303353,62273030,62573320)。
文摘Dear Editor,This letter studies the problem of stealthy attacks targeting stochastic event-based estimation,alongside proposing measures for their mitigation.A general attack framework is introduced,and the corresponding stealthiness condition is analyzed.To enhance system security,we advocate for a single-dimensional encryption method,showing that securing a singular data element is sufficient to shield the system from the perils of stealthy attacks.
文摘The distributed denial of service (DDoS) attack is one of the dangers in intrusion modes. It's difficult to defense and can cause serious damage to the system. Based on a careful study of the attack principles and characteristics, an object-oriented formalized description is presented, which contains a three-level framework and offers full specifications of all kinds of DDoS modes and their features and the relations between one another. Its greatest merit lies in that it contributes to analyzing, checking and judging DDoS. Now this formalized description has been used in a special IDS and it works very effectively.(
文摘在数字化转型背景下,网络攻击呈现全生命周期演进特征,高级持续性威胁、供应链攻击等新型攻击手段持续迭代,传统碎片化防御模式难以形成有效对抗。文章以MITRE技术和知识(Adversarial Tactics,Techniques,and Common Knowledge,ATT&CK)框架为核心,深度拆解其14大核心战术的攻击技术与防御要点,构建覆盖攻击全流程的“三层四维”攻击链防御蓝图。该蓝图整合边界、内网、数据三层防护与预防、检测、响应、溯源四大维度能力,形成体系化闭环防御体系。经2025年攻防演习实战验证,基于该蓝图的防御系统可将威胁检测率从60%提升至95%,攻击处置时间缩短85%,有效填补无文件攻击、域名系统(Domain Name System,DNS)隧道通信等传统防御盲区,为关键信息系统安全防护提供了可落地的技术方案与实践参考,对提升网络安全主动防御能力具有重要价值。