计算机科学 ›› 2018, Vol. 45 ›› Issue (11A): 377-381.

• 信息安全 • 上一篇    下一篇

新型网络空间防御体系的构建及效能评估

靳骁, 葛慧, 马锐   

  1. 中国航天系统科学与工程研究院 北京100048
  • 出版日期:2019-02-26 发布日期:2019-02-26
  • 作者简介:靳 骁(1992-),男,硕士生,主要研究方向为信息安全,E-mail:deprajin@163.com;葛 慧(1979-),女,硕士,主要研究方向为信息安全;马 锐(1978-),女,硕士,主要研究方向为信息安全。
  • 基金资助:
    本文受国家重点研发计划(2016YFB0800700)资助。

Construction and Effectiveness Evaluation of New Cyber Defense System

JIN Xiao, GE Hui, MA Rui   

  1. China Aerospace Academy of Systems Science and Engineering,Beijing 100048,China
  • Online:2019-02-26 Published:2019-02-26

摘要: 当前的网络空间中,防御方往往在攻防博弈中处于被动地位,这种现状可以通过构建动态赋能的网络空间防御体系来改变。通过研究基于动态赋能的网络空间防御体系,从网络、软件、平台、数据4个方面梳理提升传统网络空间安全性的关键动态技术,以及构建动态赋能的网络空间的方法;通过结合攻防两方面对动态赋能网络进行安全效能评估,证明了动态赋能网络空间防御体系在提高系统安全防御能力方面的贡献。

关键词: 动态赋能, 网络安全, 网络空间, 效能评估

Abstract: In the current network space,the defender is in the passive position in the attack-and-defense game.This situa-tion can be changed by constructing a dynamically-enabled cyber defense system.Through the research of the dynamically-enabled cyber defense system,critical danamic technology is given in four aspects (network,software,platform,data) for enhancing the security of the traditional cyber space,and a danamically-enapled cyber space method is constructed.By combining with the offensive and defensive in the face of dynamically-enabled cyber security effectivenessevalua-tion,the contribution of the dynamically-enabled cyberspace defense system in the safety of cyber space was proved.

Key words: Cyber space, Dynamically-enabled, Effectiveness evaluation, Network security

中图分类号: 

  • TP393
[1]杨林,于全.动态赋能网络空间防御[M].北京:人民邮电出版社,2016.
[2]邬江兴.网络空间拟态安全防御[J].保密科学技术,2014(10):4-9.
[3]BADISHI G,HERZBERG A,KEIDAR I.Keeping Denial-of-Service Attackers in the Dark [J].IEEE Transactions on Dependable & Secure Computing,2005,4(3):191-204.
[4]CADAR C,AKRITIDIS P,COSTA M,et al.Data Randomization[OL].http://www.msr-waypoint.com/pubs/70626/tr-2008-120.pdf.
[1] 柳杰灵, 凌晓波, 张蕾, 王博, 王之梁, 李子木, 张辉, 杨家海, 吴程楠.
基于战术关联的网络安全风险评估框架
Network Security Risk Assessment Framework Based on Tactical Correlation
计算机科学, 2022, 49(9): 306-311. https://doi.org/10.11896/jsjkx.210600171
[2] 王磊, 李晓宇.
基于随机洋葱路由的LBS移动隐私保护方案
LBS Mobile Privacy Protection Scheme Based on Random Onion Routing
计算机科学, 2022, 49(9): 347-354. https://doi.org/10.11896/jsjkx.210800077
[3] 赵冬梅, 吴亚星, 张红斌.
基于IPSO-BiLSTM的网络安全态势预测
Network Security Situation Prediction Based on IPSO-BiLSTM
计算机科学, 2022, 49(7): 357-362. https://doi.org/10.11896/jsjkx.210900103
[4] 杜鸿毅, 杨华, 刘艳红, 杨鸿鹏.
基于网络媒体的非线性动力学信息传播模型
Nonlinear Dynamics Information Dissemination Model Based on Network Media
计算机科学, 2022, 49(6A): 280-284. https://doi.org/10.11896/jsjkx.210500043
[5] 陶礼靖, 邱菡, 朱俊虎, 李航天.
面向网络安全训练评估的受训者行为描述模型
Model for the Description of Trainee Behavior for Cyber Security Exercises Assessment
计算机科学, 2022, 49(6A): 480-484. https://doi.org/10.11896/jsjkx.210800048
[6] 吕鹏鹏, 王少影, 周文芳, 连阳阳, 高丽芳.
基于进化神经网络的电力信息网安全态势量化方法
Quantitative Method of Power Information Network Security Situation Based on Evolutionary Neural Network
计算机科学, 2022, 49(6A): 588-593. https://doi.org/10.11896/jsjkx.210200151
[7] 邓凯, 杨频, 李益洲, 杨星, 曾凡瑞, 张振毓.
一种可快速迁移的领域知识图谱构建方法
Fast and Transmissible Domain Knowledge Graph Construction Method
计算机科学, 2022, 49(6A): 100-108. https://doi.org/10.11896/jsjkx.210900018
[8] 张师鹏, 李永忠.
基于降噪自编码器和三支决策的入侵检测方法
Intrusion Detection Method Based on Denoising Autoencoder and Three-way Decisions
计算机科学, 2021, 48(9): 345-351. https://doi.org/10.11896/jsjkx.200500059
[9] 周仕承, 刘京菊, 钟晓峰, 卢灿举.
基于深度强化学习的智能化渗透测试路径发现
Intelligent Penetration Testing Path Discovery Based on Deep Reinforcement Learning
计算机科学, 2021, 48(7): 40-46. https://doi.org/10.11896/jsjkx.210400057
[10] 李贝贝, 宋佳芮, 杜卿芸, 何俊江.
DRL-IDS:基于深度强化学习的工业物联网入侵检测系统
DRL-IDS:Deep Reinforcement Learning Based Intrusion Detection System for Industrial Internet of Things
计算机科学, 2021, 48(7): 47-54. https://doi.org/10.11896/jsjkx.210400021
[11] 陈海彪, 黄声勇, 蔡洁锐.
一个基于智能电网的跨层路由的信任评估协议
Trust Evaluation Protocol for Cross-layer Routing Based on Smart Grid
计算机科学, 2021, 48(6A): 491-497. https://doi.org/10.11896/jsjkx.201000169
[12] 王金恒, 单志龙, 谭汉松, 王煜林.
基于遗传优化PNN神经网络的网络安全态势评估
Network Security Situation Assessment Based on Genetic Optimized PNN Neural Network
计算机科学, 2021, 48(6): 338-342. https://doi.org/10.11896/jsjkx.201200239
[13] 张凯, 刘京菊.
基于吸收Markov链的网络入侵路径分析方法
Attack Path Analysis Method Based on Absorbing Markov Chain
计算机科学, 2021, 48(5): 294-300. https://doi.org/10.11896/jsjkx.200700108
[14] 陈明豪, 祝跃飞, 芦斌, 翟懿, 李玎.
基于Attention-CNN的加密流量应用类型识别
Classification of Application Type of Encrypted Traffic Based on Attention-CNN
计算机科学, 2021, 48(4): 325-332. https://doi.org/10.11896/jsjkx.200900155
[15] 刘全明, 李尹楠, 郭婷, 李岩纬.
基于Borderline-SMOTE和双Attention的入侵检测方法
Intrusion Detection Method Based on Borderline-SMOTE and Double Attention
计算机科学, 2021, 48(3): 327-332. https://doi.org/10.11896/jsjkx.200600025
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!