计算机科学 ›› 2024, Vol. 51 ›› Issue (11): 321-328.doi: 10.11896/jsjkx.231000127
吴越1, 胡威2, 李城龙1, 杨家海1, 李祉岐3, 尹琴3, 夏昂2, 党芳芳4
WU Yue1, HU Wei2, LI Chenglong1, YANG Jiahai1, LI Zhiqi3, YIN Qin3, XIA Ang2, DANG Fangfang4
摘要: 在互联网快速发展且网络安全愈发重要的数字信息时代,网络空间地理图谱被认为是认知和管理网络空间的新型手段,其通过综合网络空间和地理空间的信息,能够从多个角度更加全面地展示网络空间态势。但目前对于网络空间地理图谱的研究工作缺乏对网络空间模型细粒度的刻画,也缺乏网络空间地理图谱的具体构建方法和应用方式。针对上述问题,以网络空间认知为目标,文中扩展提出了一个带有时间参考轴的四层四级的网络空间分层模型。此外,为了更好地理解复杂的网络空间环境,还结合知识图谱技术,提出了一个构建网络空间地理图谱的具体框架以及构建网络空间本体的方法。基于Censys的真实测绘数据,成功构建了一个模拟园区网络的网络空间地理图谱原型。本研究提出了对网络空间分层结构的改进方法,同时也将知识图谱引入网络空间地理学的研究领域。这不仅有助于提高对网络空间的理解,而且在网络安全、资源管理、故障恢复、决策制定等方面具有实际的应用意义。
中图分类号:
[1] FENG D G,LIAN Y F.Challenges and Countermeasures to Cyberspace Security[J].Proceedings of the Chinese Academy of Sciences,2021,36(10):1239-1245. [2] MORGAN S.2022 Official Cybercrime Report[EB/OL].(2022-10-17)[2023-09-01].https://s3.ca-central-1.amazonaws.com/esentire-dot-com-assets/assets/resourcefiles/2022-Official-Cybercrime-Report.pdf. [3] MIAO C,WANG J,ZHUANG S,et al.A Coordinated View of Cyberspace[J].arXiv:1910.09787,2019. [4] FANG B X.Coverage Areas of Cyberspace Security Technologies From a Hierarchical Perspective[J].Journal of Network and Information Security,2015,1(1):2-7. [5] GUO L,CAO Y N,SU M J,et al.Cyberspace Resource Mapping:Concepts and Techniques[J].Journal of Information Security,2018,3(4):1-14. [6] GUO Q Q,GAO C D,SUN K F,et al.Construction of a Hierarchical System of Cyberspace Elements based on the “People-Place-Network” relationship[J].Geographical Studies,2021,40(1):109-118. [7] ZHANG L,ZHOU Y,SHI Q S,et al.Cyberspace Map Model with Tight Geospatial Correlation[J].Journal of Information Security,2018,3(4):63-72. [8] CHEN S,GUO Q Q,GAO C D,et al.Concepts and Methods of Cyberspace Geographic Mapping[J].Science & Technology Review,2023,41(13):14-22. [9] DONG C,JIANG B,LU Z G,et al.A Review of Knowledge Graphs for Cyberspace Security Intelligence[J].Journal of Information Security,2020,5(5):56-76. [10] BATTY M.The geography of cyberspace[J].Environment andPlanning B:Planning and Design,1993,20(6):615-616. [11] WANG H F,DING J,HU F H,et al.An Overview of Large-Scale Enterprise-Class Knowledge Graph Practices[J].Compu-ter Engineering,2020,46(7):1-13. [12] SINGHAL A.Introducing the knowledge graph:Things,notstrings.official blog[EB/OL].(2012-05-16)[2023-09-01].https://blog.google/products/search/introducing-knowledge-gra-ph-things-not/. [13] CICALESE D,AUGE J,JOUMBLATT D,et al.Characterizing IPv4 Anycast Adoption and Deployment[C]//Proceedings of the 11th ACM Conference on Emerging Networking Experiments and Technologies.2015:1-13. [14] YANG J H,HE L,LI C L.Cyberspace Mapping-Principles,Techniques and Applications[M]//Posts and Telecom Press,2023. [15] COX K C,EICK S G,HE T.3D Geographic Network Displays[J].ACM SIGMOD Record,1996,25(4):50-54. [16] NSA/CSS Threat Operations Center.Bad Guys Are Every-where,Good Guys Are Somewhere[EB/OL].(2014-09-14)[2023-09-01].https://nsarchive.gwu.edu/sites/default/files/documents/3469146/Document-01-NSA-CSS-Threat-Operations-Center.pdf. [17] HE J B,LI X T.Awareness and Reflection on Geographic Information Classification and Coding[J].Geography and Geographic Information Science,2002,18(3):1-7. [18] Cyberspace of the Central Cyberspace Affairs Commission.Na-tional cybersecurity incident response plan[EB/OL].(2017-06-27)[2023-09-01].http://www.cac.gov.cn/2017-06/27/c_1121220113.htm. [19] Neo4j.Neo4j Graph Database[EB/OL].(2023-09-01)[2023-09-01].https://neo4j.com/. [20] Neo4j.Cypher Manual[EB/OL].(2023-09-01)[2023-09-01].https://neo4j.com/docs/cypher-manual/current/. [21] GRUBER T R.A Translation Approach to Portable OntologySpecifications[J].Knowledge Acquisition,1993,5(2):199-220. [22] BIZER C.The D2RQ Platform[EB/OL].(2010-03-04)[2023-09-01].http://d2rq.org/. [23] The D2RQ Mapping Language[EB/OL].(2012-06-22)[2023-09-01].http://d2rq.org/d2rq-language. [24] CENSYS.The Censys Internet Map[EB/OL].(2023-09-01)[2023-09-01].https://about.censys.io/. [25] CAIDA.Caida[EB/OL].2023.https://www.caida.org./. [26] ZoomEye.Zoomeye[EB/OL].https://www.zoomeye.org/. [27] BEN-ARTZI A,CHANDNA A,WARRIER U.Network ma-nagement of tcp/ip networks:present and future[J].IEEE Network,1990,4(4):35-43. |
|