Cyberspace Anti-Mapping: An Intelligent Defense Framework Integrating Network Deception Technologies
DOI: 10.23977/jnca.2025.100112 | Downloads: 2 | Views: 80
Author(s)
Dexin Li 1, Han Li 1, Liang Guo 1
Affiliation(s)
1 360 Digital Security Technology Group Co., Ltd., Beijing, 100020, China
Corresponding Author
Han LiABSTRACT
Within the analytical framework of continuous advancement and evolution of cyberspace mapping technologies, traditional network security defense mechanisms have encountered unprecedented challenges. This paper conducts an in-depth exploration of cyberspace anti-mapping strategies with substantial theoretical significance. Particularly, it presents an intelligent defense framework developed from our research, which is established on the semantic abstraction of attack-defense elements and threat representation, integrated with network deception-based technical implementations. Empirical evidence demonstrates that the adoption of such semantic abstraction facilitates the construction of an effective model for feasibility characterization and constraint optimization of anti-mapping targets. The integration of evidence perturbation, adaptive strategy domain orchestration, and concrete technical modules (e.g., source address spoofing, host fingerprint obfuscation) provides practical defense mechanisms. These mechanisms address the complex and diverse mapping attack scenarios while ensuring asset concealment and system availability.
KEYWORDS
Cyberspace Assets; Anti-Mapping; Intelligent Defense; Evidence Perturbation Network Deception; Topology HidingCITE THIS PAPER
Dexin Li, Han Li, Liang Guo, Cyberspace Anti-Mapping: An Intelligent Defense Framework Integrating Network Deception Technologies. Journal of Network Computing and Applications (2025) Vol. 10: 107-112. DOI: http://dx.doi.org/10.23977/jnca.2025.100112.
REFERENCES
[1] Guo Li, Cao Yanan, Su Majing, et al. Cyberspace Resources Surveying and Mapping: The Concepts and Technologies [J]. Journal of Information Security, 2018, 3(4): 1-14. (in Chinese)
[2] Xue X, Zou H, Zhao J, et al. Advances in Anti-Surveying-and-Mapping Theory and Technologies for Data Infrastructure[J]. Strategic Study of Chinese Academy of Engineering, 2025, 27(1): 72-87. ((in Chinese)
[3] Harshitha DH, Swaroop Pattar, Chandan Kumar. THE PERFECT STORM: INSIDER THREATS AND ADVANCED DECEPTION TACTICS IN CYBERSECURITY[J]. International Research Journal of Modernization in Engineering Technology and Science, 2025,7(1):1071-1077
[4] LIU Qingyun, LI Renjie, ZHOU Zhou, ZHONG Youbing, SHI Fengyuan, GUO Li. Research on Cyberspace Anti-Surveying and Mapping[J].Journal of Cyber Security, Accept.(in Chinese)2023
[5] Abdelnabi S, Fritz M. {Fact-Saboteurs}: A taxonomy of evidence manipulation attacks against {Fact-Verification} systems[C]//32nd USENIX Security Symposium (USENIX Security 23). 2023: 6719-6736.
[6] AL-Zahrani B A. Adaptive Deception Framework with Behavioral Analysis for Enhanced Cybersecurity Defense[J]. arXiv preprint arXiv:2510.02424, 2025.
| Downloads: | 1723 |
|---|---|
| Visits: | 174998 |
Sponsors, Associates, and Links
-
Power Systems Computation
-
Internet of Things (IoT) and Engineering Applications
-
Computing, Performance and Communication Systems
-
Journal of Artificial Intelligence Practice
-
Advances in Computer, Signals and Systems
-
Journal of Web Systems and Applications
-
Journal of Electrotechnology, Electrical Engineering and Management
-
Journal of Wireless Sensors and Sensor Networks
-
Journal of Image Processing Theory and Applications
-
Mobile Computing and Networking
-
Vehicle Power and Propulsion
-
Frontiers in Computer Vision and Pattern Recognition
-
Knowledge Discovery and Data Mining Letters
-
Big Data Analysis and Cloud Computing
-
Electrical Insulation and Dielectrics
-
Crypto and Information Security
-
Journal of Neural Information Processing
-
Collaborative and Social Computing
-
International Journal of Network and Communication Technology
-
File and Storage Technologies
-
Frontiers in Genetic and Evolutionary Computation
-
Optical Network Design and Modeling
-
Journal of Virtual Reality and Artificial Intelligence
-
Natural Language Processing and Speech Recognition
-
Journal of High-Voltage
-
Programming Languages and Operating Systems
-
Visual Communications and Image Processing
-
Journal of Systems Analysis and Integration
-
Knowledge Representation and Automated Reasoning
-
Review of Information Display Techniques
-
Data and Knowledge Engineering
-
Journal of Database Systems
-
Journal of Cluster and Grid Computing
-
Cloud and Service-Oriented Computing
-
Journal of Networking, Architecture and Storage
-
Journal of Software Engineering and Metrics
-
Visualization Techniques
-
Journal of Parallel and Distributed Processing
-
Journal of Modeling, Analysis and Simulation
-
Journal of Privacy, Trust and Security
-
Journal of Cognitive Informatics and Cognitive Computing
-
Lecture Notes on Wireless Networks and Communications
-
International Journal of Computer and Communications Security
-
Journal of Multimedia Techniques
-
Automation and Machine Learning
-
Computational Linguistics Letters
-
Journal of Computer Architecture and Design
-
Journal of Ubiquitous and Future Networks

Download as PDF