ÍòÀû¹ú¼Ê¹ÙÍøADLabÁ½ÆªÂÛÎĵÇÉϹú¼Ê¶¥¼¶Ñ§ÊõÆÚ¿¯

Ðû²¼Ê±¼ä 2025-06-19

½üÆÚ£¬£¬£¬£¬£¬£¬£¬ÍòÀû¹ú¼Ê¹ÙÍøADLabÑо¿ÍŶÓÔÚÍøÂç¹¥»÷ÓëÍþвÑо¿Æ«ÏòµÄÁ½ÆªÂÛÎĽÒÏþÓÚ¹ú¼Ê¶¥¼¶Ñ§ÊõÆÚ¿¯IEEE TDSC£¨IEEE Transactions on Dependable and Secure Computing£©ºÍIEEE TON£¨IEEE/ACM Transactions on Networking£©¡£¡£¡£¡£¡£¡£¡£¡£


ͼƬ1.jpg

ͼƬ2.jpg


IEEE TONºÍIEEE TDSCÊÇÖйúÅÌËã»úѧ»á(CCF)ÍÆ¼öµÄAÀàÆÚ¿¯£¬£¬£¬£¬£¬£¬£¬ÊÇÅÌËã»úÍøÂçÓëÐÅÏ¢Çå¾²Ñо¿ÁìÓòÖеĶ¥¼¶ÆÚ¿¯¡£¡£¡£¡£¡£¡£¡£¡£Äܹ»ÈëÑ¡´ËÆÚ¿¯£¬£¬£¬£¬£¬£¬£¬±ê¼ÇÆäÑо¿ÄÜÁ¦¼°×¨Òµ¶È»ñµÃ¹ú¼ÊȨÍþѧÊõϵͳµÄ¸ß¶ÈÈϿɡ£¡£¡£¡£¡£¡£¡£¡£


´Ë´Î½ÒÏþµÄÑо¿Ð§¹û¾Û½¹ÍøÂç·¸·¨Êг¡Öз¢Ã÷µÄÐÂÐ͹©Ó¦Á´¹¥»÷ÐÎʽ£¬£¬£¬£¬£¬£¬£¬ÇåÎúÕ¹ÏÖ¸ÃÀ๥»÷µÄDZÔÚÍþв£¬£¬£¬£¬£¬£¬£¬²¢Îª¸ÃÀ๥»÷µÄ¼ì²â¡¢×·×ÙÓë·ÀÓùÌṩÁËÒªº¦Ñо¿»ù´¡Óëʵ¼ù¼ÛÖµ¡£¡£¡£¡£¡£¡£¡£¡£


Çø±ðÓڹŰåÕë¶ÔÕýµ±Èí¼þÉú̬µÄ¹©Ó¦Á´¹¥»÷£¬£¬£¬£¬£¬£¬£¬ÐÂÐ͹©Ó¦Á´¹¥»÷»îÔ¾ÓÚµØÏºڲúÁìÓò£¬£¬£¬£¬£¬£¬£¬Æä½¹µãÌØÕ÷ÊÇÔÚ¶ñÒâÈí¼þ¿ª·¢ÓëÈö²¥Á´ÌõÖÐÒþ²ØÖ²ÈëÌØÊâ¶ñÒâ´úÂ룬£¬£¬£¬£¬£¬£¬ÒÔʵÏÖ¶à²ã¼¶Ñ¬È¾¼°½©Ê¬ÍøÂçµÄ¿ìËÙÀ©Õ¹¡£¡£¡£¡£¡£¡£¡£¡£´ËÀ๥»÷¾ß±¸Ç¿Òþ²ØÐÔ¡¢¸ß¸´ÓÃÐÔ¡¢¿É±àÅÅÐÔÓë¿ÉÀ©Õ¹ÐÔµÈÌØµã£¬£¬£¬£¬£¬£¬£¬ÏÔÖøÔöÇ¿ÁËÆäÔÚºÚ»Ò²ú×éÖ¯ÖеÄÈö²¥Ð§ÂÊÓëÆÆËðÁ¦¡£¡£¡£¡£¡£¡£¡£¡£


¹¥»÷Ä£×ÓÓëÌØÕ÷ÆÊÎö ½â¹¹ºÚ²ú¹¥»÷µÄÐÐΪÂß¼­


ÔÚÂÛÎÄ¡¶An Attack Exploiting Cyber-Arm Industry¡·Ïà¹ØÑо¿ÖУ¬£¬£¬£¬£¬£¬£¬Ñо¿ÍŶÓϵͳÊáÀíÍøÂçÎäÆ÷¹¤ÒµÏÖ×´£¬£¬£¬£¬£¬£¬£¬¹¹½¨ÁËÐÎò´Ë¹¥»÷ÊֶεÄÄ£×Ó¡£¡£¡£¡£¡£¡£¡£¡£¸ÃÄ£×Ó½«¹¥»÷Á´Ìõ»®·ÖΪÁù¸ö½¹µã½×¶Î£º


1¡¢Ä¿µÄÑ¡ÔñÓë¹¥»÷ÍýÏë (Targets and Planning)

2¡¢¹¥»÷ÔØÌåÑ¡Ôñ£¨Carrier Choosing£©

3¡¢¹¥»÷Õ½ÂÔÖÆ¶©£¨Tactic Making£©

4¡¢´«ÊäͨµÀÑ¡Ôñ£¨Conduit Selecting£©

5¡¢ÓÐÓÃÔØºÉÓëÍøÂçÎäÆ÷¿ª·¢£¨Payload and Cyber Weapon Developing£©

6¡¢Èö²¥Ö´ÐС¢Ð§¹ûÆÀ¹ÀÓëÕ½ÂÔÐÞÕý£¨Propagation, Evaluation, and Calibration£©


ÕâÒ»»®·Ö¾«×¼Ãè»æÁ˹¥»÷Á´ÌõÖй¥»÷ÕßµÄÐÐΪ·¾¶Óë¾öÒéÂß¼­£¬£¬£¬£¬£¬£¬£¬ÓÐÖúÓÚÑо¿Ö°Ô±ºÍ·ÀÓù·½Ã÷È·ÆäÔË×÷»úÖÆ¡£¡£¡£¡£¡£¡£¡£¡£


ͼƬ3.png

¹¥»÷Ä£×ӵİ취


Ñо¿Í¬Ê±Ìá³öÁË´ËÀ๥»÷µÄÁùÏîÒªº¦ÌØÕ÷£º


1¡¢µÍͶÈë¸ß»Ø±¨£¨Low Investment with High Return£©

2¡¢¸ß¶ÈÒþ²ØÐÔ£¨Cunning Concealment£©

3¡¢¶ÔÍøÂçÎäÆ÷¹¤ÒµÁ´µÄÉî¶ÈÒÀÀµÓëʹÓã¨Utilization of Cyber-arms Business Chain£©

4¡¢Ò»Á¬ÐÔÓë¸ß¶ÈÍþвÐÔ£¨Constant and Serious Threats£©

5¡¢¶àÑù»¯µÄÈö²¥Â·¾¶£¨Diversified Propagation£©

6¡¢¿ìËÙÇÒÆÕ±éµÄÀ©É¢ÄÜÁ¦£¨Rapid and Extensive Diffusion£©


ÕâÐ©ÌØÕ÷Õ¹ÏÖÁ˸ÃÀ๥»÷±»ºÚ¿ÍÆÕ±é½ÓÄɵÄÔµ¹ÊÔ­ÓÉ£¬£¬£¬£¬£¬£¬£¬Ò²Í¹ÏÔÁËÇå¾²Ñо¿ÉçÇøØ½Ðè¹Ø×¢ÆäÍþвµÄ½ôÆÈÐÔ¡£¡£¡£¡£¡£¡£¡£¡£


ͼƬ4.png

¹¥»÷Èö²¥³¡¾°


Èö²¥Ä£×Ó¹¹½¨ÓëÑéÖ¤ ´ÓÀíÂÛ½¨Ä£µ½ÊµÖ¤ÑéÖ¤


ÔÚÂÛÎÄ¡¶Your Botnet Is His Botnet? A Deep Dive Into the Supply Chain Attack Against Cyber-Arm Industry¡·Ïà¹ØÑо¿ÖУ¬£¬£¬£¬£¬£¬£¬Ñо¿ÍŶÓÊÜKermack-McKendrickÈö²¥Ä£×ÓÔÚÍøÂçÇå¾²Ó¦ÓÃµÄÆô·¢£¬£¬£¬£¬£¬£¬£¬Ê×´ÎÌá³öÁËÊÊÓÃÓÚ´ËÀ๥»÷µÄ·Ö½×¶ÎÈö²¥Êýѧģ×Ó¡£¡£¡£¡£¡£¡£¡£¡£


Ñо¿ÍŶÓʹÓÃPoissonËæ»úÀú³Ì¶Ô¹¥»÷ÕßÔÚµØÏÂÊг¡Ê¹ÓõĶñÒâÔØÌåÈö²¥ÐÐΪ¾ÙÐн¨Ä££¬£¬£¬£¬£¬£¬£¬Í¨Ì«¹ý¶Îº¯Êý׼ȷÃè»æ²î±ð½×¶ÎµÄ¹¥»÷¶¯Ì¬£¬£¬£¬£¬£¬£¬£¬²¢Á¬ÏµµØÏÂÊг¡µÄ¶¯Ì¬×ª±äµ÷½âÄ£×Ó£¬£¬£¬£¬£¬£¬£¬¹¹½¨ÁËѬȾ¹æÄ£Õ¹Íû»úÖÆ£¬£¬£¬£¬£¬£¬£¬ÊµÏÖÁ˶ÔDZÔÚÍþвÀ©É¢Ë®Æ½µÄÁ¿»¯ÆÀ¹À£¬£¬£¬£¬£¬£¬£¬Îª¹¥»÷Ç÷ÊÆÑÐÅÐÌṩÁËÀíÂÛÖ§³Ö¡£¡£¡£¡£¡£¡£¡£¡£


ͼƬ5.png


ΪÑé֤ģ×ÓÓÐÓÃÐÔÓëÊÊÓÃÐÔ£¬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±×ۺϽÓÄÉÍøÂçÁ÷Á¿ÆÊÎö¡¢¶ñÒâ´úÂëÄæÏò¹¤³Ì¡¢Ñ¬È¾Á´ÖØÐÞÓëÑùÄÚÇéËÆÐÔÆÊÎöµÈÊÖÒÕÊֶΣ¬£¬£¬£¬£¬£¬£¬¶ÔÊýÍò·ÝÕæÊµ¶ñÒâÑù±¾¾ÙÐÐʵ֤ÆÊÎö¡£¡£¡£¡£¡£¡£¡£¡£Á¬ÏµÕæÊµ°¸Àý·¢Ã÷£¬£¬£¬£¬£¬£¬£¬¸Ã¹¥»÷ÔÚ¶à¸öÑù±¾ÈºÌåÖзºÆð¸ß¶ÈÂþÑÜÐÔ¡¢Ä £¿£¿£¿£¿ £¿é»¯Ó븴ÓÃÐÔ£¬£¬£¬£¬£¬£¬£¬ÆäÈö²¥Á´¾ßÓÐÏÔÖøµÄϵͳÐԺ͹æÄ£ÐÔÌØÕ÷¡£¡£¡£¡£¡£¡£¡£¡£


ͼƬ6.png

ͼƬ7.png

¹¥»÷Á´Öع¹


´Ë´Î½ÒÏþµÄÁ½ÏîÑо¿Õ¹ÏÖÁËÐÂÐ͹©Ó¦Á´¹¥»÷µÄ¸ßЧÈö²¥ÓëÍøÂçÎäÆ÷µØÏ¹¤ÒµÁ´¡°µÍÊÖÒÕÃż÷¡¢¸ßÊг¡³ÉÊì¶È¡±ÌØÕ÷Ö®¼äµÄÉî²ã¹ØÁª£¬£¬£¬£¬£¬£¬£¬·´Ó¦³öÄ¿½ñÍøÂç·¸·¨Éú̬Öй¥»÷ÕßÐÐΪÓëÉú̬ÑÝ»¯µÄ»¥¶¯Âß¼­£¬£¬£¬£¬£¬£¬£¬ÎªºóÐøÍøÂç¹¥»÷ÎäÆ÷µØÏ¹¤ÒµÁ´Ñо¿µÓÚ¨Á˼áʵµÄÀíÂÛ»ù´¡ºÍÒªÁìÖ§³Ö¡£¡£¡£¡£¡£¡£¡£¡£


δÀ´£¬£¬£¬£¬£¬£¬£¬ÍòÀû¹ú¼Ê¹ÙÍøÒ»Á¬Éî¸ûÍøÂçÇå¾²Ç°ÑØÊÖÒÕÑо¿£¬£¬£¬£¬£¬£¬£¬ÒÔÁ¢ÒìÍ»ÆÆÇý¶¯½¹µãÊÖÒÕÉý¼¶£¬£¬£¬£¬£¬£¬£¬ÎªÓû§Ìṩ¸üרҵµÄÇå¾²½â¾ö¼Æ»®£¬£¬£¬£¬£¬£¬£¬½øÒ»²½ÌáÉý¹ú¼ÒµÄÍøÂçÇ徲ˮƽ¡£¡£¡£¡£¡£¡£¡£¡£


ÂÛÎÄÁ´½Ó£º

1¡¢¡¶An Attack Exploiting Cyber-Arm Industry¡·£ºhttps://ieeexplore.ieee.org/document/10664640

2¡¢¡¶Your Botnet Is His Botnet? A Deep Dive Into the Supply Chain Attack Against Cyber-Arm Industry¡·£ºhttps://ieeexplore.ieee.org/document/11029499