Education, Science, Technology, Innovation and Life
Open Access
Sign In

Cyberspace Anti-Mapping: An Intelligent Defense Framework Integrating Network Deception Technologies

Download as PDF

DOI: 10.23977/jnca.2025.100112 | Downloads: 2 | Views: 80

Author(s)

Dexin Li 1, Han Li 1, Liang Guo 1

Affiliation(s)

1 360 Digital Security Technology Group Co., Ltd., Beijing, 100020, China

Corresponding Author

Han Li

ABSTRACT

Within the analytical framework of continuous advancement and evolution of cyberspace mapping technologies, traditional network security defense mechanisms have encountered unprecedented challenges. This paper conducts an in-depth exploration of cyberspace anti-mapping strategies with substantial theoretical significance. Particularly, it presents an intelligent defense framework developed from our research, which is established on the semantic abstraction of attack-defense elements and threat representation, integrated with network deception-based technical implementations. Empirical evidence demonstrates that the adoption of such semantic abstraction facilitates the construction of an effective model for feasibility characterization and constraint optimization of anti-mapping targets. The integration of evidence perturbation, adaptive strategy domain orchestration, and concrete technical modules (e.g., source address spoofing, host fingerprint obfuscation) provides practical defense mechanisms. These mechanisms address the complex and diverse mapping attack scenarios while ensuring asset concealment and system availability.

KEYWORDS

Cyberspace Assets; Anti-Mapping; Intelligent Defense; Evidence Perturbation Network Deception; Topology Hiding

CITE THIS PAPER

Dexin Li, Han Li, Liang Guo, Cyberspace Anti-Mapping: An Intelligent Defense Framework Integrating Network Deception Technologies. Journal of Network Computing and Applications (2025) Vol. 10: 107-112. DOI: http://dx.doi.org/10.23977/jnca.2025.100112.

REFERENCES

[1] Guo Li, Cao Yanan, Su Majing, et al. Cyberspace Resources Surveying and Mapping: The Concepts and Technologies [J]. Journal of Information Security, 2018, 3(4): 1-14. (in Chinese)
[2] Xue X, Zou H, Zhao J, et al. Advances in Anti-Surveying-and-Mapping Theory and Technologies for Data Infrastructure[J]. Strategic Study of Chinese Academy of Engineering, 2025, 27(1): 72-87. ((in Chinese)
[3] Harshitha DH, Swaroop Pattar, Chandan Kumar. THE PERFECT STORM: INSIDER THREATS AND ADVANCED DECEPTION TACTICS IN CYBERSECURITY[J]. International Research Journal of Modernization in Engineering Technology and Science, 2025,7(1):1071-1077
[4] LIU Qingyun, LI Renjie, ZHOU Zhou, ZHONG Youbing, SHI Fengyuan, GUO Li. Research on Cyberspace Anti-Surveying and Mapping[J].Journal of Cyber Security, Accept.(in Chinese)2023
[5] Abdelnabi S, Fritz M. {Fact-Saboteurs}: A taxonomy of evidence manipulation attacks against {Fact-Verification} systems[C]//32nd USENIX Security Symposium (USENIX Security 23). 2023: 6719-6736.
[6] AL-Zahrani B A. Adaptive Deception Framework with Behavioral Analysis for Enhanced Cybersecurity Defense[J]. arXiv preprint arXiv:2510.02424, 2025.

Downloads: 1723
Visits: 174998

Sponsors, Associates, and Links


All published work is licensed under a Creative Commons Attribution 4.0 International License.

Copyright © 2016 - 2031 Clausius Scientific Press Inc. All Rights Reserved.