GA»Æ½ð¼×ADLabÁ½ÆªÂÛÎĵÇÉϹú¼Ê¶¥¼¶Ñ§ÊõÆÚ¿¯

°ä²¼¹¦·ò 2025-06-19

½üÆÚ£¬GA»Æ½ð¼×ADLab×êÑÐÍŶÓÔÚÍøÂç¹¥»÷ÓëÍþв×êÑз½ÏòµÄÁ½ÆªÂÛÎİ䷢ÓÚ¹ú¼Ê¶¥¼¶Ñ§ÊõÆÚ¿¯IEEE TDSC£¨IEEE Transactions on Dependable and Secure Computing£©ºÍIEEE TON£¨IEEE/ACM Transactions on Networking£©¡£


ͼƬ1.jpg

ͼƬ2.jpg


IEEE TONºÍIEEE TDSCÊÇÖйúÍÆËã»úѧ»á(CCF)ÍÆ¼öµÄAÀàÆÚ¿¯£¬ÊÇÍÆËã»úÍøÂçÓëÐÅÏ¢°²È«×êÑÐÁìÓòÖеĶ¥¼¶ÆÚ¿¯¡£¿ÉÄÜÈëÑ¡´ËÆÚ¿¯£¬±êÖ¾Æä×êÑÐÄÜÁ¦¼°×¨Òµ¶È»ñµÃ¹ú¼ÊȨÍþѧÊõϵͳµÄ¸ß¶ÈÈϿɡ£


Õâ´Î°ä·¢µÄ×êÑгɾ;۽¹ÍøÂç·¸×ïÊг¡Öз¢ÏÖµÄÐÂÐ͹©¸øÁ´¹¥»÷´ó¾Ö£¬Ç峺½Òʾ¸ÃÀ๥»÷µÄDZÔÚÍþв£¬²¢Îª¸ÃÀ๥»÷µÄ¼ì²â¡¢×·×ÙÓë·ÀÓùÌṩÁ˹ؼü×êÑлù´¡Óëʵ¼Ê¼ÛÖµ¡£


Çø±ðÓÚ´«Í³Õë¶ÔºÏ·¨Èí¼þÉú̬µÄ¹©¸øÁ´¹¥»÷£¬ÐÂÐ͹©¸øÁ´¹¥»÷»îÔ¾ÓÚµØÏºڲúÁìÓò£¬ÆäÖ÷ÌâÌØµãÊÇÔÚ¶ñÒâÈí¼þ¿ª·¢Óë´«²¼Á´ÌõÖÐÒñ±ÎÖ²Èë¶î±í¶ñÒâ´úÂ룬ÒÔʵÏÖ¶à²ã¼¶Ï°È¾¼°½©Ê¬ÍøÂçµÄ¼±¾çÀ©´ó¡£´ËÀ๥»÷¾ß±¸Ç¿Òñ±ÎÐÔ¡¢¸ß¸´ÓÃÐÔ¡¢¿É±àÅÅÐÔÓë¿ÉÀ©´óÐÔµÈÌØµã£¬ÏÔÖø¼ÓÇ¿ÁËÆäÔÚºÚ»Ò²ú×éÖ¯ÖеĴ«²¼Ð§ÄÜÓë·ÛËéÁ¦¡£


¹¥»÷Ä£ÐÍÓëÌØµã·ÖÎö ½â¹¹ºÚ²ú¹¥»÷µÄÐÐΪÂß¼­


ÔÚÂÛÎÄ¡¶An Attack Exploiting Cyber-Arm Industry¡·ÓйØ×êÑÐÖУ¬×êÑÐÍŶÓϵͳÊáÀíÍøÂç±øÆ÷²úÒµ½ü¿ö£¬¹¹½¨ÁËÃèÊö´Ë¹¥»÷¼¿Á©µÄÄ£ÐÍ¡£¸ÃÄ£Ðͽ«¹¥»÷Á´Ìõ»®·ÖΪÁù¸öÖ÷Ìâ½×¶Î£º


1¡¢Ö¸±êÑ¡ÔñÓë¹¥»÷¹æ»® (Targets and Planning)

2¡¢¹¥»÷ÔØÌåÑ¡Ôñ£¨Carrier Choosing£©

3¡¢¹¥»÷Õ½ÊõÔì¶©£¨Tactic Making£©

4¡¢´«Êäͨ·ѡÔñ£¨Conduit Selecting£©

5¡¢ÓÐÐ§ÔØºÉÓëÍøÂç±øÆ÷¿ª·¢£¨Payload and Cyber Weapon Developing£©

6¡¢´«²¼Ö´ÐÓ×¢³ÉЧÆÀ¹ÀÓëÕ½Êõ½¨¸Ä£¨Propagation, Evaluation, and Calibration£©


ÕâÒ»»®·Ö¾«×¼¿Ì»­Á˹¥»÷Á´ÌõÖй¥»÷ÕßµÄÐÐΪõè¾¶Óë¾ö²ßÂß¼­£¬ÓÐÖúÓÚ×êÑÐÈËÔ±ºÍ·ÀÓù·½Àí½âÆäÔË×÷»úÔì¡£


ͼƬ3.png

¹¥»÷Ä£Ð͵IJ½Öè


×êÑÐͬʱÌá³öÁË´ËÀ๥»÷µÄÁùÏî¹Ø¼üÌØµã£º


1¡¢µÍͶÈë¸ß»Ø±¨£¨Low Investment with High Return£©

2¡¢¸ß¶ÈÒñ±ÎÐÔ£¨Cunning Concealment£©

3¡¢¶ÔÍøÂç±øÆ÷²úÒµÁ´µÄÉî¶ÈÒÀÀµÓëÀûÓã¨Utilization of Cyber-arms Business Chain£©

4¡¢³ÖÐøÐÔÓë¸ß¶ÈÍþвÐÔ£¨Constant and Serious Threats£©

5¡¢¶àÑù»¯µÄ´«²¼õè¾¶£¨Diversified Propagation£©

6¡¢¼±¾çÇÒ¿í·ºµÄÀ©É¢ÄÜÁ¦£¨Rapid and Extensive Diffusion£©


ÕâÐ©ÌØµã½ÒʾÁ˸ÃÀ๥»÷±»ºÚ¿Í¿í·ºÑ¡È¡µÄÔ­Òò£¬Ò²Í¹ÏÔÁ˰²È«×êÑÐÉçÇøØ½Ðè¹Ø×¢ÆäÍþвµÄ½ôÆÈÐÔ¡£


ͼƬ4.png

¹¥»÷´«²¼³¡¾°


´«²¼Ä£Ð͹¹½¨ÓëÑéÖ¤ ´ÓÀíÂÛ½¨Ä£µ½ÊµÖ¤ÑéÖ¤


ÔÚÂÛÎÄ¡¶Your Botnet Is His Botnet? A Deep Dive Into the Supply Chain Attack Against Cyber-Arm Industry¡·ÓйØ×êÑÐÖУ¬×êÑÐÍŶÓÊÜKermack-McKendrick´«²¼Ä£ÐÍÔÚÍøÂ簲ȫÀûÓÃµÄÆô·¢£¬³õ´ÎÌá³öÁ˺ÏÓÃÓÚ´ËÀ๥»÷µÄ·Ö½×¶Î´«²¼ÊýѧģÐÍ¡£


×êÑÐÍŶÓÀûÓÃPoissonËæ»ú¹ý³Ì¶Ô¹¥»÷ÕßÔÚµØÏÂÊг¡Ê¹ÓõĶñÒâÔØÌå´«²¼ÐÐΪ½øÐн¨Ä££¬Í¨¹ý¶È¶Îº¯Êý¾«È·¿Ì»­·ÖÆç½×¶ÎµÄ¹¥»÷¶¯Ì¬£¬²¢½áºÏµØÏÂÊг¡µÄ¶¯Ì¬±ä¶¯µ÷ÕûÄ£ÐÍ£¬¹¹½¨ÁËϰȾ¹æÄ£Ô¤²â»úÔ죬ʵÏÖÁ˶ÔDZÔÚÍþвÀ©É¢Ë®Æ½µÄÁ¿»¯ÆÀ¹À£¬Îª¹¥»÷Ç÷ÏòÑÐÅÐÌṩÁËÀíÂÛÖ§³Ö¡£


ͼƬ5.png


ΪÑé֤ģÐÍÓÐЧÐÔÓëºÏÓÃÐÔ£¬×êÑÐÈËÔ±×ÛºÏÑ¡È¡ÍøÂçÁ÷Á¿·ÖÎö¡¢¶ñÒâ´úÂëÄæÏò¹¤³Ì¡¢Ï°È¾Á´³Á½¨ÓëÑù±¾ÀàËÆÐÔ·ÖÎöµÈ¼¼Êõ¼¿Á©£¬¶ÔÊýÍò·ÝÕæÊµ¶ñÒâÑù±¾½øÐÐʵ֤·ÖÎö¡£½áºÏÕæÊµ°¸Àý·¢ÏÖ£¬¸Ã¹¥»÷ÔÚ¶à¸öÑù±¾ÈºÌåÖгöÏָ߶ÈÉ¢²¼ÐÔ¡¢Ä£¿é»¯Ó븴ÓÃÐÔ£¬Æä´«²¼Á´ÓµÓÐÏÔÖøµÄϵͳÐԺ͹æÄ£ÐÔÌØµã¡£


ͼƬ6.png

ͼƬ7.png

¹¥»÷Á´³Á¹¹


Õâ´Î°ä·¢µÄÁ½Ïî×êÑнÒʾÁËÐÂÐ͹©¸øÁ´¹¥»÷µÄ¸ßЧ´«²¼ÓëÍøÂç±øÆ÷µØÏ²úÒµÁ´¡°µÍ¼¼ÊõÃż÷¡¢¸ßÊг¡³ÉÊì¶È¡±¸öÐÔÖ®¼äµÄÉî²ã¹ØÁª£¬·´Ó³³öµ±Ç°ÍøÂç·¸×ïÉú̬Öй¥»÷ÕßÐÐΪÓëÉú̬ÑÝ»¯µÄ»¥¶¯Âß¼­£¬ÎªºóÐøÍøÂç¹¥»÷±øÆ÷µØÏ²úÒµÁ´×êÑе춨Á˼áʵµÄÀíÂÛ»ù´¡ºÍ²½ÖèÖ§³Ö¡£


½«À´£¬GA»Æ½ð¼×³ÖÐøÉî¸ûÍøÂç°²È«Ç°ÑØ¼¼Êõ×êÑУ¬ÒÔ´´ÐÂÍ»ÆÆÇý¶¯Ö÷Ìâ¼¼ÊõÉý¼¶£¬ÎªÓû§Ìṩ¸üרҵµÄ°²È«½â¾ö¹æ»®£¬½øÒ»²½ÌáÉý¹ú¶ÈµÄÍøÂ簲ȫˮƽ¡£


ÂÛÎÄÁ´½Ó£º

1¡¢¡¶An Attack Exploiting Cyber-Arm Industry¡·£ºhttps://ieeexplore.ieee.org/document/10664640

2¡¢¡¶Your Botnet Is His Botnet? A Deep Dive Into the Supply Chain Attack Against Cyber-Arm Industry¡·£ºhttps://ieeexplore.ieee.org/document/11029499