计算机科学 ›› 2024, Vol. 51 ›› Issue (11): 321-328.doi: 10.11896/jsjkx.231000127

• 信息安全 • 上一篇    下一篇

基于知识图谱的网络空间地理图谱构建方法

吴越1, 胡威2, 李城龙1, 杨家海1, 李祉岐3, 尹琴3, 夏昂2, 党芳芳4   

  1. 1 清华大学网络科学与网络空间研究院 北京 100084
    2 国家电网有限公司信息通信分公司 北京 100053
    3 国网思极网安科技(北京)有限公司 北京 102209
    4 国网河南省电力公司信息通信分公司数据中心 郑州 450000
  • 收稿日期:2023-10-20 修回日期:2024-08-26 出版日期:2024-11-15 发布日期:2024-11-06
  • 通讯作者: 胡威(whu@sgcc.com.cn)
  • 作者简介:(wuyue23@mails.tsinghua.edu.cn)
  • 基金资助:
    国家电网有限公司科技项目(5700-202252199A-1-1-ZN)

Knowledge Graph Based Approach to Cyberspace Geographic Mapping Construction

WU Yue1, HU Wei2, LI Chenglong1, YANG Jiahai1, LI Zhiqi3, YIN Qin3, XIA Ang2, DANG Fangfang4   

  1. 1 Institute for Network Sciences and Cyberspace,Tsinghua University,Beijing 100084,China
    2 State Grid Information & Telecommunication Co.,Ltd.,Beijing 100053,China
    3 State Grid Cyber Security Technology(Beijing) Co.,Ltd.,Beijing 102209,China
    4 State Grid Henan Information & Telecommunication Company Data Center,Zhengzhou 450000,China
  • Received:2023-10-20 Revised:2024-08-26 Online:2024-11-15 Published:2024-11-06
  • About author:WU Yue,born in 2002,Ph.D.Her main research interests include network measurement and security and so on.
    HU Wei,born in 1977,professor.His main research interests include network information security and situational awareness.
  • Supported by:
    Science and Technology Project of State Grid Corporation of China(5700-202252199A-1-1-ZN).

摘要: 在互联网快速发展且网络安全愈发重要的数字信息时代,网络空间地理图谱被认为是认知和管理网络空间的新型手段,其通过综合网络空间和地理空间的信息,能够从多个角度更加全面地展示网络空间态势。但目前对于网络空间地理图谱的研究工作缺乏对网络空间模型细粒度的刻画,也缺乏网络空间地理图谱的具体构建方法和应用方式。针对上述问题,以网络空间认知为目标,文中扩展提出了一个带有时间参考轴的四层四级的网络空间分层模型。此外,为了更好地理解复杂的网络空间环境,还结合知识图谱技术,提出了一个构建网络空间地理图谱的具体框架以及构建网络空间本体的方法。基于Censys的真实测绘数据,成功构建了一个模拟园区网络的网络空间地理图谱原型。本研究提出了对网络空间分层结构的改进方法,同时也将知识图谱引入网络空间地理学的研究领域。这不仅有助于提高对网络空间的理解,而且在网络安全、资源管理、故障恢复、决策制定等方面具有实际的应用意义。

关键词: 网络空间地理学, 知识图谱, 网络空间层次模型, 网络空间本体, 网络空间地理图谱

Abstract: In the digital information era of rapid development of the Internet and increasing importance of cybersecurity,cyberspace geographic mapping is regarded as a new type of means of cognition and management of cyberspace.By synthesizing the information of cyberspace and geospatial information,it is able to display the cyberspace situation more comprehensively from multiple perspectives.However,the current research work on cyberspace geographic mapping lacks a fine-grained portrayal of cyberspace model,as well as specific construction methods and application methods of cyberspace geographic mapping.To address the above problems,with the goal of cyberspace cognition,this paper proposes a four-layer,four-level cyberspace hierarchical model with a time reference axis.In addition,in order to better understand the complex cyberspace environment,a specific framework for constructing a cyberspace geographic mapping,as well as a method for constructing a cyberspace ontology,is proposed in conjunction with the knowledge graph technology.Based on real mapping data from Censys,a prototype cyberspace geographic mapping of a simulated park network is successfully constructed.This study proposes an improved approach to the hierarchical structure of cyberspace,and also introduces knowledge mapping into the research field of cyberspace geography,which not only helps to improve the understanding of cyberspace,but also has practical application significance in cybersecurity,resource management,fault recovery,and decision making.

Key words: Cyberspace geography, Knowledge graph, Cyberspace hierarchy model, Cyberspace ontology, Cyberspace geographic mapping

中图分类号: 

  • TP393.2
[1] FENG D G,LIAN Y F.Challenges and Countermeasures to Cyberspace Security[J].Proceedings of the Chinese Academy of Sciences,2021,36(10):1239-1245.
[2] MORGAN S.2022 Official Cybercrime Report[EB/OL].(2022-10-17)[2023-09-01].https://s3.ca-central-1.amazonaws.com/esentire-dot-com-assets/assets/resourcefiles/2022-Official-Cybercrime-Report.pdf.
[3] MIAO C,WANG J,ZHUANG S,et al.A Coordinated View of Cyberspace[J].arXiv:1910.09787,2019.
[4] FANG B X.Coverage Areas of Cyberspace Security Technologies From a Hierarchical Perspective[J].Journal of Network and Information Security,2015,1(1):2-7.
[5] GUO L,CAO Y N,SU M J,et al.Cyberspace Resource Mapping:Concepts and Techniques[J].Journal of Information Security,2018,3(4):1-14.
[6] GUO Q Q,GAO C D,SUN K F,et al.Construction of a Hierarchical System of Cyberspace Elements based on the “People-Place-Network” relationship[J].Geographical Studies,2021,40(1):109-118.
[7] ZHANG L,ZHOU Y,SHI Q S,et al.Cyberspace Map Model with Tight Geospatial Correlation[J].Journal of Information Security,2018,3(4):63-72.
[8] CHEN S,GUO Q Q,GAO C D,et al.Concepts and Methods of Cyberspace Geographic Mapping[J].Science & Technology Review,2023,41(13):14-22.
[9] DONG C,JIANG B,LU Z G,et al.A Review of Knowledge Graphs for Cyberspace Security Intelligence[J].Journal of Information Security,2020,5(5):56-76.
[10] BATTY M.The geography of cyberspace[J].Environment andPlanning B:Planning and Design,1993,20(6):615-616.
[11] WANG H F,DING J,HU F H,et al.An Overview of Large-Scale Enterprise-Class Knowledge Graph Practices[J].Compu-ter Engineering,2020,46(7):1-13.
[12] SINGHAL A.Introducing the knowledge graph:Things,notstrings.official blog[EB/OL].(2012-05-16)[2023-09-01].https://blog.google/products/search/introducing-knowledge-gra-ph-things-not/.
[13] CICALESE D,AUGE J,JOUMBLATT D,et al.Characterizing IPv4 Anycast Adoption and Deployment[C]//Proceedings of the 11th ACM Conference on Emerging Networking Experiments and Technologies.2015:1-13.
[14] YANG J H,HE L,LI C L.Cyberspace Mapping-Principles,Techniques and Applications[M]//Posts and Telecom Press,2023.
[15] COX K C,EICK S G,HE T.3D Geographic Network Displays[J].ACM SIGMOD Record,1996,25(4):50-54.
[16] NSA/CSS Threat Operations Center.Bad Guys Are Every-where,Good Guys Are Somewhere[EB/OL].(2014-09-14)[2023-09-01].https://nsarchive.gwu.edu/sites/default/files/documents/3469146/Document-01-NSA-CSS-Threat-Operations-Center.pdf.
[17] HE J B,LI X T.Awareness and Reflection on Geographic Information Classification and Coding[J].Geography and Geographic Information Science,2002,18(3):1-7.
[18] Cyberspace of the Central Cyberspace Affairs Commission.Na-tional cybersecurity incident response plan[EB/OL].(2017-06-27)[2023-09-01].http://www.cac.gov.cn/2017-06/27/c_1121220113.htm.
[19] Neo4j.Neo4j Graph Database[EB/OL].(2023-09-01)[2023-09-01].https://neo4j.com/.
[20] Neo4j.Cypher Manual[EB/OL].(2023-09-01)[2023-09-01].https://neo4j.com/docs/cypher-manual/current/.
[21] GRUBER T R.A Translation Approach to Portable OntologySpecifications[J].Knowledge Acquisition,1993,5(2):199-220.
[22] BIZER C.The D2RQ Platform[EB/OL].(2010-03-04)[2023-09-01].http://d2rq.org/.
[23] The D2RQ Mapping Language[EB/OL].(2012-06-22)[2023-09-01].http://d2rq.org/d2rq-language.
[24] CENSYS.The Censys Internet Map[EB/OL].(2023-09-01)[2023-09-01].https://about.censys.io/.
[25] CAIDA.Caida[EB/OL].2023.https://www.caida.org./.
[26] ZoomEye.Zoomeye[EB/OL].https://www.zoomeye.org/.
[27] BEN-ARTZI A,CHANDNA A,WARRIER U.Network ma-nagement of tcp/ip networks:present and future[J].IEEE Network,1990,4(4):35-43.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!