Welcome To  NEM   

Journals(Abstract)


Overview of Sensitive Information Extraction and Forgery Technology under Complex Network Malicious Behavior

Yibo Chang, Changjiang Ge

College of Electronic Warfare, National University of Defense Technology

Abstract:

In the context of rapid advancements in information technology, complex network malicious activities have become a significant challenge in the cybersecurity field. Within this context, the extraction and forgery of sensitive information have garnered considerable attention. This paper provides a systematic review of relevant technologies in the realm of complex network malicious activities. It begins by introducing the concept, characteristics, and operational processes of complex network malicious activities, along with their threats to sensitive information security. It then delves into common techniques for extracting sensitive information, including methods based on network traffic analysis, vulnerability exploitation, and social engineering, and discusses their advantages and limitations in practical applications. The paper further explores techniques for forging sensitive information, such as data tampering and the creation of false identities, and examines their roles and impacts in complex network malicious activities. Additionally, it analyzes and summarizes current detection and defense technologies for the extraction and forgery of sensitive information under in complex network environments network malicious activities. Finally, it looks ahead to the future trends in this field, aiming to provide comprehensive references for cybersecurity researchers and practitioners to better address the security risks posed by complex network malicious activities.


Key Words:

complex network malicious behavior; sensitive information extraction; sensitive information forgery; network security; detection and defense

技术支持:人人站CMS
Powered by RRZCMS