Accès libre

Research on the traceability of attack teams based on offensive and defensive confrontation

, , , ,  et   
05 nov. 2024
À propos de cet article

Citez
Télécharger la couverture

This paper explores how attack teams effectively counter trace-back efforts to safeguard their anonymity and security in network attack and defense confrontations. As network attacks become more prevalent and complex, attackers constantly use more covert and sophisticated methods to conduct attacks, making tracking and tracing a critical challenge in cybersecurity. The paper begins by evaluating joint attack trace-back techniques and methods, which include those based on network traffic analysis, malicious code analysis, and log auditing. Simulated experiments in natural network environments validate the effectiveness and feasibility of the proposed strategies. The research findings demonstrate that anti-tracing strategies based on offensive confrontation can effectively enhance the anonymity of attack teams and their ability to withstand trace-back attacks, offering new insights and methods for cybersecurity defense.