信息安全研究 ›› 2025, Vol. 11 ›› Issue (4): 296-.

• 学术论文 •    下一篇

网络拓扑混淆技术综述

黄春娇1张宇1,2史建焘1朱国普1


  

  1. 1(哈尔滨工业大学网络空间安全学院哈尔滨150001)
    2(鹏城实验室广东深圳518055)
  • 出版日期:2025-04-30 发布日期:2025-04-30
  • 通讯作者: 黄春娇 硕士.主要研究方向为网络空间抗测绘. huangchunjiao@stu.hit.edu.cn
  • 作者简介:黄春娇 硕士.主要研究方向为网络空间抗测绘. huangchunjiao@stu.hit.edu.cn 张宇 博士,教授,博士生导师.主要研究方向为互联网安全、互联网体系、互联网测量. yuzhang@hit.edu.cn 史建焘 博士,副教授.主要研究方向为数据安全、分布式系统安全. shijiantao@hit.edu.cn 朱国普 博士,教授,博士生导师.主要研究方向为多媒体取证与安全、网络测绘. guopu.zhu@hit.edu.cn

A Survey of Network Topology Obfuscation Techniques

Huang Chunjiao1, Zhang Yu1,2, Shi Jiantao1, and Zhu Guopu1   

  1. 1(School of Cyberspace Science, Harbin Institute of Technology, Harbin 150001)
    2(Peng Cheng Laboratory, Shenzhen, Guangdong 518055)
  • Online:2025-04-30 Published:2025-04-30

摘要: 链路洪泛攻击是一种利用网络拓扑发现的新型分布式拒绝服务攻击.网络拓扑混淆是一种有效对抗该攻击的防御措施,旨在攻击发生前提供主动保护.相关研究在近10年来不断取得进展,针对不同场景提出了各种拓扑混淆解决方案.全面回顾了这些技术.首先,概述了网络拓扑发现中的基本原理和拓扑泄露风险;其次,定义了网络拓扑混淆并提出了一个主动防御模型,然后将技术分为数据包修改、诱饵陷阱、路由变异和度量伪造方案;最后,对当前主流的混淆技术进行了综合比较.

关键词: 链路洪泛攻击, 网络拓扑混淆, 主动防御, 欺骗防御, 拓扑泄露风险

Abstract: LinkFlooding Attack (LFA) is a novel distributed denialofservice (DDoS) attack that exploits network topology detection. Network Topology Obfuscation serves as an effective deceptive defense mechanism against this attack, aiming to provide proactive protection before an attack occurs. Over the past decade, relevant research has continuously made progress, proposing corresponding obfuscation solutions for different scenarios and objectives. This paper comprehensively reviews the network topology obfuscation techniques. First, it combines the basic principles and classifications of network topology discovery to point out the risks of topology leakage in current network topology discovery. Next, it formally defines network topology obfuscation design and presents a proactive defense model. Then, based on the obfuscation concept, the technologies are divided into packet modification, decoy traps, routing mutation, and metric forgery schemes, and proposes a set of metrics to comprehensively compare the current mainstream network topology obfuscation techniques.

Key words: linkflooding attack, network topology obfuscation, active defense, deceptive defense, topology leakage risks

中图分类号: