面向暗网抑制的普适性安全理论研究构想和成果展望

TP309.1; 近年来,匿名网络及其架构上的"暗网"因其强隐蔽、高匿名、抗追溯的特性,成为传递敏感信息、实施网络攻击及开展网络犯罪的重要工具,给国家安全和社会稳定带来严重威胁.为应对暗网治理中通信行为隐蔽难识别、网络拓扑跳变难绘制、陷阱节点部署难伪装等挑战,本文旨在研究面向暗网抑制的普适性安全理论.本研究的关键科学问题凝练为:强对抗机制下结构信息缺失的动态时变网络行为刻画与推理问题.为突破以上问题,拟从基础理论、应用技术和示范系统3个层面开展研究,实现1个框架、3个方法、1个系统等五大研究内容.具体为:一是,建立面向暗网流量差异性与行为共性的协同量化理论框架,提出异构暗网...

Full description

Saved in:
Bibliographic Details
Published in工程科学与技术 Vol. 57; no. 1; pp. 1 - 10
Main Authors 黄诚, 丁建伟, 赵佳鹏, 陈周国, 时金桥
Format Journal Article
LanguageChinese
Published 四川大学 网络空间安全学院,四川 成都 610065%中国电子科技集团公司第三十研究所,四川 成都 610093%北京邮电大学 网络空间安全学院,北京 100876 2025
Subjects
Online AccessGet full text
ISSN2096-3246
DOI10.12454/j.jsuese.202400800

Cover

Abstract TP309.1; 近年来,匿名网络及其架构上的"暗网"因其强隐蔽、高匿名、抗追溯的特性,成为传递敏感信息、实施网络攻击及开展网络犯罪的重要工具,给国家安全和社会稳定带来严重威胁.为应对暗网治理中通信行为隐蔽难识别、网络拓扑跳变难绘制、陷阱节点部署难伪装等挑战,本文旨在研究面向暗网抑制的普适性安全理论.本研究的关键科学问题凝练为:强对抗机制下结构信息缺失的动态时变网络行为刻画与推理问题.为突破以上问题,拟从基础理论、应用技术和示范系统3个层面开展研究,实现1个框架、3个方法、1个系统等五大研究内容.具体为:一是,建立面向暗网流量差异性与行为共性的协同量化理论框架,提出异构暗网普适性特征与差异化要素表征、统一安全量化、生态脆弱图构建及推理理论,解决网络结构复杂多样、通信行为动态多变的暗网可抑制性量化评估问题;二是,提出基于凸优化问题求解的流量实时轻量化识别方法,通过构建基于自身相似性关联的小流抽样模型与基于高斯核函数和多模态优化的暗网流量识别与业务分类模型,实现对暗网流量的实时、轻量化精准识别与分类;三是,提出基于行为不变性的多网络全时域连接预测与通连关系绘制方法,在统一安全量化理论的基础上,对跨位点连接进行表示,在动态网络中过滤无关连接后进行多网络全时域连接预测,并绘制通连关系,实现局部观测条件下暗网通连的多点全局关联;四是,提出基于局部观测暗网通连最优化的陷阱节点部署与溯源方法,实现部分可控节点条件下的暗网追踪溯源;五是,研发面向真实暗网场景的实时流量检测与溯源示范应用系统,并在相关执法单位进行落地应用,实现对暗网犯罪的精准治理.并且,详细阐述了协同量化理论构建、轻量化暗网流量识别、连接预测与通连关系绘制、陷阱部署与溯源机理、示范应用系统等五大任务的技术路线.通过本文的基础理论研究、技术应用和系统示范验证,推动暗网治理的理论发展,提升抑制暗网的效率,具有重要的社会与经济效益.
AbstractList TP309.1; 近年来,匿名网络及其架构上的"暗网"因其强隐蔽、高匿名、抗追溯的特性,成为传递敏感信息、实施网络攻击及开展网络犯罪的重要工具,给国家安全和社会稳定带来严重威胁.为应对暗网治理中通信行为隐蔽难识别、网络拓扑跳变难绘制、陷阱节点部署难伪装等挑战,本文旨在研究面向暗网抑制的普适性安全理论.本研究的关键科学问题凝练为:强对抗机制下结构信息缺失的动态时变网络行为刻画与推理问题.为突破以上问题,拟从基础理论、应用技术和示范系统3个层面开展研究,实现1个框架、3个方法、1个系统等五大研究内容.具体为:一是,建立面向暗网流量差异性与行为共性的协同量化理论框架,提出异构暗网普适性特征与差异化要素表征、统一安全量化、生态脆弱图构建及推理理论,解决网络结构复杂多样、通信行为动态多变的暗网可抑制性量化评估问题;二是,提出基于凸优化问题求解的流量实时轻量化识别方法,通过构建基于自身相似性关联的小流抽样模型与基于高斯核函数和多模态优化的暗网流量识别与业务分类模型,实现对暗网流量的实时、轻量化精准识别与分类;三是,提出基于行为不变性的多网络全时域连接预测与通连关系绘制方法,在统一安全量化理论的基础上,对跨位点连接进行表示,在动态网络中过滤无关连接后进行多网络全时域连接预测,并绘制通连关系,实现局部观测条件下暗网通连的多点全局关联;四是,提出基于局部观测暗网通连最优化的陷阱节点部署与溯源方法,实现部分可控节点条件下的暗网追踪溯源;五是,研发面向真实暗网场景的实时流量检测与溯源示范应用系统,并在相关执法单位进行落地应用,实现对暗网犯罪的精准治理.并且,详细阐述了协同量化理论构建、轻量化暗网流量识别、连接预测与通连关系绘制、陷阱部署与溯源机理、示范应用系统等五大任务的技术路线.通过本文的基础理论研究、技术应用和系统示范验证,推动暗网治理的理论发展,提升抑制暗网的效率,具有重要的社会与经济效益.
Abstract_FL Significance In recent years,anonymous networks and their underlying darknet have become vital tools for transmitting sensitive information,conducting cyberattacks,and engaging in cybercrime due to their strong concealment,high anonymity,and resistance to traceability.These char-acteristics pose serious threats to national security and social stability.This project researches a universal security theory for darknet suppression to address the challenges of darknet governance,such as difficulties in identifying concealed communication behaviors,mapping dynamic net-work topologies,and disguising trap node deployments. Progress The main content includes:1)Establishing a collaborative quantitative theoretical framework focused on darknet traffic differences and behavioral commonalities.This involves proposing heterogeneous darknet universal characteristics,differentiated element representations,uni-fied security quantification,and ecological vulnerability graph construction theories.These approaches address the challenge of quantifying darknet suppressibility,which remains complicated by diverse network structures and dynamic communication behaviors.2)Proposing a real-time lightweight traffic detection method based on solving convex optimization problems.This involves constructing a small flow sampling mod-el based on self-similarity associations and a darknet traffic identification and service classification model using Gaussian kernel functions and multimodal optimization.This method enables precise,real-time identification and classification of darknet traffic.3)Introducing a multi-net-work full-time domain connection prediction and relationship mapping method based on behavioral invariance.This approach represents cross-point connections and filters out irrelevant connections in dynamic networks to predict multi-network full-time domain connections and map rela-tionships,achieving multi-point global associations of darknet connections under local observation conditions.4)Proposing a trap node deploy-ment and tracing optimization method for darknet connections based on local observations,enabling tracking and tracing of the darknet under con-ditions of partially controllable nodes.5)Developing a real-time traffic detection and tracing demonstration system for real-world darknet scenari-os,which law enforcement agencies implement to achieve precise governance of darknet-related crimes. Conclusions and Prospects This project significantly contributes to darknet governance by developing a quantitative framework for analyzing and managing darknet traffic.The proposed real-time lightweight traffic detection method enhances law enforcement's ability to identify and clas-sify darknet activities.In addition,these methods for predicting multi-network connections and optimizing trap node deployment improve track-ing capabilities in complex environments.Future work focuses on refining these methodologies and exploring additional dimensions of darknet behavior to strengthen efforts in combating illicit online activities,generating meaningful social and economic benefits.
Author 时金桥
陈周国
赵佳鹏
黄诚
丁建伟
AuthorAffiliation 四川大学 网络空间安全学院,四川 成都 610065%中国电子科技集团公司第三十研究所,四川 成都 610093%北京邮电大学 网络空间安全学院,北京 100876
AuthorAffiliation_xml – name: 四川大学 网络空间安全学院,四川 成都 610065%中国电子科技集团公司第三十研究所,四川 成都 610093%北京邮电大学 网络空间安全学院,北京 100876
Author_FL HUANG Cheng
DING Jianwei
ZHAO Jiapeng
CHEN Zhouguo
SHI Jinqiao
Author_FL_xml – sequence: 1
  fullname: HUANG Cheng
– sequence: 2
  fullname: DING Jianwei
– sequence: 3
  fullname: ZHAO Jiapeng
– sequence: 4
  fullname: CHEN Zhouguo
– sequence: 5
  fullname: SHI Jinqiao
Author_xml – sequence: 1
  fullname: 黄诚
– sequence: 2
  fullname: 丁建伟
– sequence: 3
  fullname: 赵佳鹏
– sequence: 4
  fullname: 陈周国
– sequence: 5
  fullname: 时金桥
BookMark eNotj09LAkEcQOdgkJmfoK_Q2u83MzvNHkPsDwhd6iw7O7OSxQoNkkcpC4sOGkVkJtGluggReAj6ODub3yKhTu_2Hm-J5JJmYghZQSgh5T5fa5QatmWsKVGgHEAC5EieQiA8RrlYJEVrDxQwwZnvCz9PKrOnl7Q_cMP77HvgrgZpb5oNu-5hMuucus5rOrlMz9-y_sXP5Ct7vs3ep27cdWef6c216_XdeJR-3LnR4zJZiMMja4r_LJD9zcpeedur7m7tlDeqnkVYR09rHioTgBbGD1gMIUougAoWoJbaAEoVSYypUAYoqihGqSFAaUCgVjxkBbL65z0JkzhM6rVGs3WczIs1G-l2W9Xq0WF7fu4DAiD7BYOBaZg
ClassificationCodes TP309.1
ContentType Journal Article
Copyright Copyright © Wanfang Data Co. Ltd. All Rights Reserved.
Copyright_xml – notice: Copyright © Wanfang Data Co. Ltd. All Rights Reserved.
DBID 2B.
4A8
92I
93N
PSX
TCJ
DOI 10.12454/j.jsuese.202400800
DatabaseName Wanfang Data Journals - Hong Kong
WANFANG Data Centre
Wanfang Data Journals
万方数据期刊 - 香港版
China Online Journals (COJ)
China Online Journals (COJ)
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
DocumentTitle_FL Towards a Universal Security Framework for Darknet Suppression:Conceptual Foundations and Future Prospects
EndPage 10
ExternalDocumentID scdxxb_gckx202501001
GrantInformation_xml – fundername: 国家重点研发计划
  funderid: (2023YFB3106600)
GroupedDBID -0C
-SC
-S~
2B.
2RA
4A8
5VR
92I
92M
93N
9D9
9DC
AFUIB
ALMA_UNASSIGNED_HOLDINGS
CAJEC
CQIGP
GROUPED_DOAJ
PB1
PB9
PSX
Q--
R-C
RT3
T8S
TCJ
U1F
U5C
ID FETCH-LOGICAL-s1071-dd4abe90d6e593f0a1846026391d8de018bc81f26be021bcf18d0918e061db4a3
ISSN 2096-3246
IngestDate Thu May 29 03:53:57 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 1
Keywords trap node deployment
流量检测
traffic detection
behavior recognition
security quantification
行为识别
安全量化
陷阱节点部署
暗网治理
darknet governance
Language Chinese
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-s1071-dd4abe90d6e593f0a1846026391d8de018bc81f26be021bcf18d0918e061db4a3
PageCount 10
ParticipantIDs wanfang_journals_scdxxb_gckx202501001
PublicationCentury 2000
PublicationDate 2025
PublicationDateYYYYMMDD 2025-01-01
PublicationDate_xml – year: 2025
  text: 2025
PublicationDecade 2020
PublicationTitle 工程科学与技术
PublicationTitle_FL Advanced Engineering Sciences
PublicationYear 2025
Publisher 四川大学 网络空间安全学院,四川 成都 610065%中国电子科技集团公司第三十研究所,四川 成都 610093%北京邮电大学 网络空间安全学院,北京 100876
Publisher_xml – name: 四川大学 网络空间安全学院,四川 成都 610065%中国电子科技集团公司第三十研究所,四川 成都 610093%北京邮电大学 网络空间安全学院,北京 100876
SSID ssib036435565
ssib050593459
ssib041261190
ssib030194745
ssib051371919
ssj0003313526
ssib027967859
Score 2.4076817
Snippet TP309.1; 近年来,匿名网络及其架构上的"暗网"因其强隐蔽、高匿名、抗追溯的特性,成为传递敏感信息、实施网络攻击及开展网络犯罪的重要工具,给国家安全和社会稳定带来严重威...
SourceID wanfang
SourceType Aggregation Database
StartPage 1
Title 面向暗网抑制的普适性安全理论研究构想和成果展望
URI https://d.wanfangdata.com.cn/periodical/scdxxb-gckx202501001
Volume 57
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAON
  databaseName: DOAJ (selected full-text)
  issn: 2096-3246
  databaseCode: DOA
  dateStart: 20220101
  customDbUrl:
  isFulltext: true
  dateEnd: 99991231
  titleUrlDefault: https://www.doaj.org/
  omitProxy: true
  ssIdentifier: ssj0003313526
  providerName: Directory of Open Access Journals
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Pa9RAFA-1vXgRRcX_9OCclmhmMpPMHJPdlOLBUwu9lU0yW1FYwbZQeipapYqHVhSx1iJe1EtBhB4EP85m7bfwvZd0N6V7aAVhWYY3M2_e773XnffSyRvHuW390Bqb-W6QBcqVuQjdVGepmwtjddsEIkup2uf9YHpW3ptTc2MT12qnlpaX0jvZ6sj3Sv7FqkADu-Jbsqew7IApEKAN9oVvsDB8n8jGLDHMtFgkWKKY8ZjhLAmYiZgJWRKyuFVRdEQNxbRmcYBdMEZLGmxYlCAf7TEtaLDHohAHA10bmgVtTbNgDEzX2BVHSIlgUUkNQ5yBYVJx1j6LfRJMMN0kikYO5RjTxK6YM6OI0mQmrgfK1AtsFTHXTMfUCCsgEaCG5SSLoSupMGqvYhUNjisjsjgmiUDqKcA97CknEzsYgniAAnLUJoO6FH6wp0VwgB3o6gh_UCEgQ6Cc9AQNYNeqP08p37om36_64VMiBPshHnmodATWqFkvROFQW6WOI1oRiHKUiQaKIanAL0Tz-HqNmi0MmanVgPAWokQmVKWWqDXAQYaXpAVij9MGlhjo3eBgdA6aVXokCkXr6ynkibOaRCk1XwreIhOM8iRNTnkaBFiyjMQEf8M_AYn6wgUN-jb6eR3Kf1X5UQkanIoyDnddATm9C1lGUA8RyhrqR34Ky_2e1wLH8nj2sZBESCUpJnmIt2liZV48tq09bxiBDc7FLmb5yko6v5A9WkHX9LBA2hlnQuCzxtrjItgrRWggzBymIrBPG1m7ucKHTEOp4QkGyUXA-fA_4gqv8qzVkVLcD7mpSjtiFOv7HK_OwLs5DzVSFW1DQHePw6G3HruddnehFqDPnHfOVZn1ZFT-TF5wxlYfXHSSg09feptbxfb7_u-t4tVWb2O_v71efNg7WHtarH3t7b3sPf_W33zxZ-9X__Pb_vf9Yne9ePaz9-Z1sbFZ7O70frwrdj5ecmankpnmtFvdHOMucsiZ3DyX7dQaLw8swOx4bQ5plicgG-O5zq3HdZpp3hFBaiHHSbMO1zkkTtpCdpOnsu1fdsa7j7v2ijPJLYwMlMTYRtqOMdZ6ChQDoRLWblRXHVbBnq92hsX5UWa8dsJx152z2C6f8t5wxpeeLNubkPcspbfIAf4CRTHyzQ
linkProvider Directory of Open Access Journals
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=%E9%9D%A2%E5%90%91%E6%9A%97%E7%BD%91%E6%8A%91%E5%88%B6%E7%9A%84%E6%99%AE%E9%80%82%E6%80%A7%E5%AE%89%E5%85%A8%E7%90%86%E8%AE%BA%E7%A0%94%E7%A9%B6%E6%9E%84%E6%83%B3%E5%92%8C%E6%88%90%E6%9E%9C%E5%B1%95%E6%9C%9B&rft.jtitle=%E5%B7%A5%E7%A8%8B%E7%A7%91%E5%AD%A6%E4%B8%8E%E6%8A%80%E6%9C%AF&rft.au=%E9%BB%84%E8%AF%9A&rft.au=%E4%B8%81%E5%BB%BA%E4%BC%9F&rft.au=%E8%B5%B5%E4%BD%B3%E9%B9%8F&rft.au=%E9%99%88%E5%91%A8%E5%9B%BD&rft.date=2025&rft.pub=%E5%9B%9B%E5%B7%9D%E5%A4%A7%E5%AD%A6+%E7%BD%91%E7%BB%9C%E7%A9%BA%E9%97%B4%E5%AE%89%E5%85%A8%E5%AD%A6%E9%99%A2%2C%E5%9B%9B%E5%B7%9D+%E6%88%90%E9%83%BD+610065%25%E4%B8%AD%E5%9B%BD%E7%94%B5%E5%AD%90%E7%A7%91%E6%8A%80%E9%9B%86%E5%9B%A2%E5%85%AC%E5%8F%B8%E7%AC%AC%E4%B8%89%E5%8D%81%E7%A0%94%E7%A9%B6%E6%89%80%2C%E5%9B%9B%E5%B7%9D+%E6%88%90%E9%83%BD+610093%25%E5%8C%97%E4%BA%AC%E9%82%AE%E7%94%B5%E5%A4%A7%E5%AD%A6+%E7%BD%91%E7%BB%9C%E7%A9%BA%E9%97%B4%E5%AE%89%E5%85%A8%E5%AD%A6%E9%99%A2%2C%E5%8C%97%E4%BA%AC+100876&rft.issn=2096-3246&rft.volume=57&rft.issue=1&rft.spage=1&rft.epage=10&rft_id=info:doi/10.12454%2Fj.jsuese.202400800&rft.externalDocID=scdxxb_gckx202501001
thumbnail_s http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=http%3A%2F%2Fwww.wanfangdata.com.cn%2Fimages%2FPeriodicalImages%2Fscdxxb-gckx%2Fscdxxb-gckx.jpg