GA»Æ½ð¼×ADLabÁ½ÆªÂÛÎĵÇÉϹú¼Ê¶¥¼¶Ñ§ÊõÆÚ¿¯
°ä²¼¹¦·ò 2025-06-19½üÆÚ£¬GA»Æ½ð¼×ADLab×êÑÐÍŶÓÔÚÍøÂç¹¥»÷ÓëÍþв×êÑз½ÏòµÄÁ½ÆªÂÛÎİ䷢ÓÚ¹ú¼Ê¶¥¼¶Ñ§ÊõÆÚ¿¯IEEE TDSC£¨IEEE Transactions on Dependable and Secure Computing£©ºÍIEEE TON£¨IEEE/ACM Transactions on Networking£©¡£


IEEE TONºÍIEEE TDSCÊÇÖйúÍÆËã»úѧ»á(CCF)ÍÆ¼öµÄAÀàÆÚ¿¯£¬ÊÇÍÆËã»úÍøÂçÓëÐÅÏ¢°²È«×êÑÐÁìÓòÖеĶ¥¼¶ÆÚ¿¯¡£¿ÉÄÜÈëÑ¡´ËÆÚ¿¯£¬±êÖ¾Æä×êÑÐÄÜÁ¦¼°×¨Òµ¶È»ñµÃ¹ú¼ÊȨÍþѧÊõϵͳµÄ¸ß¶ÈÈϿɡ£
Õâ´Î°ä·¢µÄ×êÑгɾ;۽¹ÍøÂç·¸×ïÊг¡Öз¢ÏÖµÄÐÂÐ͹©¸øÁ´¹¥»÷´ó¾Ö£¬Ç峺½Òʾ¸ÃÀ๥»÷µÄDZÔÚÍþв£¬²¢Îª¸ÃÀ๥»÷µÄ¼ì²â¡¢×·×ÙÓë·ÀÓùÌṩÁ˹ؼü×êÑлù´¡Óëʵ¼Ê¼ÛÖµ¡£
Çø±ðÓÚ´«Í³Õë¶ÔºÏ·¨Èí¼þÉú̬µÄ¹©¸øÁ´¹¥»÷£¬ÐÂÐ͹©¸øÁ´¹¥»÷»îÔ¾ÓÚµØÏºڲúÁìÓò£¬ÆäÖ÷ÌâÌØµãÊÇÔÚ¶ñÒâÈí¼þ¿ª·¢Óë´«²¼Á´ÌõÖÐÒñ±ÎÖ²Èë¶î±í¶ñÒâ´úÂ룬ÒÔʵÏÖ¶à²ã¼¶Ï°È¾¼°½©Ê¬ÍøÂçµÄ¼±¾çÀ©´ó¡£´ËÀ๥»÷¾ß±¸Ç¿Òñ±ÎÐÔ¡¢¸ß¸´ÓÃÐÔ¡¢¿É±àÅÅÐÔÓë¿ÉÀ©´óÐÔµÈÌØµã£¬ÏÔÖø¼ÓÇ¿ÁËÆäÔÚºÚ»Ò²ú×éÖ¯ÖеĴ«²¼Ð§ÄÜÓë·ÛËéÁ¦¡£
¹¥»÷Ä£ÐÍÓëÌØµã·ÖÎö ½â¹¹ºÚ²ú¹¥»÷µÄÐÐΪÂß¼
ÔÚÂÛÎÄ¡¶An Attack Exploiting Cyber-Arm Industry¡·ÓйØ×êÑÐÖУ¬×êÑÐÍŶÓϵͳÊáÀíÍøÂç±øÆ÷²úÒµ½ü¿ö£¬¹¹½¨ÁËÃèÊö´Ë¹¥»÷¼¿Á©µÄÄ£ÐÍ¡£¸ÃÄ£Ðͽ«¹¥»÷Á´Ìõ»®·ÖΪÁù¸öÖ÷Ìâ½×¶Î£º
1¡¢Ö¸±êÑ¡ÔñÓë¹¥»÷¹æ»® (Targets and Planning)
2¡¢¹¥»÷ÔØÌåÑ¡Ôñ£¨Carrier Choosing£©
3¡¢¹¥»÷Õ½ÊõÔì¶©£¨Tactic Making£©
4¡¢´«Êäͨ·ѡÔñ£¨Conduit Selecting£©
5¡¢ÓÐÐ§ÔØºÉÓëÍøÂç±øÆ÷¿ª·¢£¨Payload and Cyber Weapon Developing£©
6¡¢´«²¼Ö´ÐÓ×¢³ÉЧÆÀ¹ÀÓëÕ½Êõ½¨¸Ä£¨Propagation, Evaluation, and Calibration£©
ÕâÒ»»®·Ö¾«×¼¿Ì»Á˹¥»÷Á´ÌõÖй¥»÷ÕßµÄÐÐΪõè¾¶Óë¾ö²ßÂß¼£¬ÓÐÖúÓÚ×êÑÐÈËÔ±ºÍ·ÀÓù·½Àí½âÆäÔË×÷»úÔì¡£

¹¥»÷Ä£Ð͵IJ½Öè
×êÑÐͬʱÌá³öÁË´ËÀ๥»÷µÄÁùÏî¹Ø¼üÌØµã£º
1¡¢µÍͶÈë¸ß»Ø±¨£¨Low Investment with High Return£©
2¡¢¸ß¶ÈÒñ±ÎÐÔ£¨Cunning Concealment£©
3¡¢¶ÔÍøÂç±øÆ÷²úÒµÁ´µÄÉî¶ÈÒÀÀµÓëÀûÓã¨Utilization of Cyber-arms Business Chain£©
4¡¢³ÖÐøÐÔÓë¸ß¶ÈÍþвÐÔ£¨Constant and Serious Threats£©
5¡¢¶àÑù»¯µÄ´«²¼õè¾¶£¨Diversified Propagation£©
6¡¢¼±¾çÇÒ¿í·ºµÄÀ©É¢ÄÜÁ¦£¨Rapid and Extensive Diffusion£©
ÕâÐ©ÌØµã½ÒʾÁ˸ÃÀ๥»÷±»ºÚ¿Í¿í·ºÑ¡È¡µÄÔÒò£¬Ò²Í¹ÏÔÁ˰²È«×êÑÐÉçÇøØ½Ðè¹Ø×¢ÆäÍþвµÄ½ôÆÈÐÔ¡£

¹¥»÷´«²¼³¡¾°
´«²¼Ä£Ð͹¹½¨ÓëÑéÖ¤ ´ÓÀíÂÛ½¨Ä£µ½ÊµÖ¤ÑéÖ¤
ÔÚÂÛÎÄ¡¶Your Botnet Is His Botnet? A Deep Dive Into the Supply Chain Attack Against Cyber-Arm Industry¡·ÓйØ×êÑÐÖУ¬×êÑÐÍŶÓÊÜKermack-McKendrick´«²¼Ä£ÐÍÔÚÍøÂ簲ȫÀûÓÃµÄÆô·¢£¬³õ´ÎÌá³öÁ˺ÏÓÃÓÚ´ËÀ๥»÷µÄ·Ö½×¶Î´«²¼ÊýѧģÐÍ¡£
×êÑÐÍŶÓÀûÓÃPoissonËæ»ú¹ý³Ì¶Ô¹¥»÷ÕßÔÚµØÏÂÊг¡Ê¹ÓõĶñÒâÔØÌå´«²¼ÐÐΪ½øÐн¨Ä££¬Í¨¹ý¶È¶Îº¯Êý¾«È·¿Ì»·ÖÆç½×¶ÎµÄ¹¥»÷¶¯Ì¬£¬²¢½áºÏµØÏÂÊг¡µÄ¶¯Ì¬±ä¶¯µ÷ÕûÄ£ÐÍ£¬¹¹½¨ÁËϰȾ¹æÄ£Ô¤²â»úÔ죬ʵÏÖÁ˶ÔDZÔÚÍþвÀ©É¢Ë®Æ½µÄÁ¿»¯ÆÀ¹À£¬Îª¹¥»÷Ç÷ÏòÑÐÅÐÌṩÁËÀíÂÛÖ§³Ö¡£

ΪÑé֤ģÐÍÓÐЧÐÔÓëºÏÓÃÐÔ£¬×êÑÐÈËÔ±×ÛºÏÑ¡È¡ÍøÂçÁ÷Á¿·ÖÎö¡¢¶ñÒâ´úÂëÄæÏò¹¤³Ì¡¢Ï°È¾Á´³Á½¨ÓëÑù±¾ÀàËÆÐÔ·ÖÎöµÈ¼¼Êõ¼¿Á©£¬¶ÔÊýÍò·ÝÕæÊµ¶ñÒâÑù±¾½øÐÐʵ֤·ÖÎö¡£½áºÏÕæÊµ°¸Àý·¢ÏÖ£¬¸Ã¹¥»÷ÔÚ¶à¸öÑù±¾ÈºÌåÖгöÏָ߶ÈÉ¢²¼ÐÔ¡¢Ä£¿é»¯Ó븴ÓÃÐÔ£¬Æä´«²¼Á´ÓµÓÐÏÔÖøµÄϵͳÐԺ͹æÄ£ÐÔÌØµã¡£


¹¥»÷Á´³Á¹¹
Õâ´Î°ä·¢µÄÁ½Ïî×êÑнÒʾÁËÐÂÐ͹©¸øÁ´¹¥»÷µÄ¸ßЧ´«²¼ÓëÍøÂç±øÆ÷µØÏ²úÒµÁ´¡°µÍ¼¼ÊõÃż÷¡¢¸ßÊг¡³ÉÊì¶È¡±¸öÐÔÖ®¼äµÄÉî²ã¹ØÁª£¬·´Ó³³öµ±Ç°ÍøÂç·¸×ïÉú̬Öй¥»÷ÕßÐÐΪÓëÉú̬ÑÝ»¯µÄ»¥¶¯Âß¼£¬ÎªºóÐøÍøÂç¹¥»÷±øÆ÷µØÏ²úÒµÁ´×êÑе춨Á˼áʵµÄÀíÂÛ»ù´¡ºÍ²½ÖèÖ§³Ö¡£
½«À´£¬GA»Æ½ð¼×³ÖÐøÉî¸ûÍøÂç°²È«Ç°ÑØ¼¼Êõ×êÑУ¬ÒÔ´´ÐÂÍ»ÆÆÇý¶¯Ö÷Ìâ¼¼ÊõÉý¼¶£¬ÎªÓû§Ìṩ¸üרҵµÄ°²È«½â¾ö¹æ»®£¬½øÒ»²½ÌáÉý¹ú¶ÈµÄÍøÂ簲ȫˮƽ¡£
ÂÛÎÄÁ´½Ó£º
1¡¢¡¶An Attack Exploiting Cyber-Arm Industry¡·£ºhttps://ieeexplore.ieee.org/document/10664640
2¡¢¡¶Your Botnet Is His Botnet? A Deep Dive Into the Supply Chain Attack Against Cyber-Arm Industry¡·£ºhttps://ieeexplore.ieee.org/document/11029499


¾©¹«Íø°²±¸11010802024551ºÅ