期刊首页 优先出版 当期阅读 过刊浏览 作者中心 关于期刊 English

《中国工程科学》 >> 2021年 第23卷 第2期 doi: 10.15302/J-SSCAE-2021.02.001

网络空间战略预警体系的建设思考

信息系统安全技术重点实验室,北京 100191

资助项目 :中国工程院咨询项目“网络强国” (2020-ZD-14) 收稿日期: 2021-02-05 修回日期: 2021-03-07 发布日期: 2021-03-22

下一篇 上一篇

摘要

网络空间战略预警体系指为早期发现、跟踪、识别、报知来袭的重大战略攻击或烈性病毒传播破坏而建立的警告体系,是国家安全防御体系的重要组成部分;实施网络强国战略需要高度重视网络空间战略预警体系建设。本文分析了网络空间战略预警的主要特点和基本要求,研究了安全漏洞预警、安全威胁预警、入侵攻击预警、异常行为预警等主要预警样式,梳理了国内外网络空间战略预警监测体系的建设情况。研究认为,应重点抓好网络空间测绘系统、漏洞收集预警平台、威胁情报感知推送系统、安全监控综合预警系统等方面的建设工程。研究建议,强化高层统筹协调,注重多源数据融合,设立专业预警机构,开展经常性安全评估, 实行威胁预警分级机制,以此精准保障网络空间战略预警体系建设。

参考文献

[ 1 ] 张峰, 秦志光, 刘锦德. 基于入侵事件预测的网络安全预警方法 [J]. 计算机科学, 2004, 31(11): 77–79, 129. Zhang F, Qin Z G, Liu J D. Intrusion event based early warning method for network security [J]. Computer Science, 2004, 31(11): 77–79, 129.
Zhang F, Qin Z G, Liu J D. Intrusion event based early warning method for network security [J]. Computer Science, 2004, 31(11): 77–79, 129. Chinese. 链接1

[ 2 ] 陈明, 王乔保, 汤文峤. 网络空间安全战略情报保障能力研究 [J]. 情报杂志, 2020, 39(4): 127–131. Chen M, Wang Q B, Tang W Q. The capability of strategic intelligence supporting for cyberspace security [J]. Journal of Intelligence, 2020, 39(4): 127–131.
Chen M, Wang Q B, Tang W Q. The capability of strategic intelligence supporting for cyberspace security [J]. Journal of Intelligence, 2020, 39(4): 127–131. Chinese. 链接1

[ 3 ] 龚俭, 臧小东, 苏琪, 等. 网络安全态势感知综述 [J]. 软件学报, 2017, 28(4): 1010–1026. Gong J, Zang X D, Su Q, et al. Survey of network security situation awareness [J]. Journal of Software, 2017, 28(4): 1010– 1026.
Gong J, Zang X D, Su Q, et al. Survey of network security situation awareness [J]. Journal of Software, 2017, 28(4): 1010– 1026. Chinese. 链接1

[ 4 ] 吴彤. 境外信息网络监控形势与挑战 [J]. 国防科技, 2016, 37(3): 40–43. Wu T. Situation and challenges of overseas information network monitoring [J]. National Defense Technology, 2016, 37(3): 40–43.
Wu T. Situation and challenges of overseas information network monitoring [J]. National Defense Technology, 2016, 37(3): 40–43. Chinese. 链接1

[ 5 ] 李鸿飞, 田康生, 金宏斌. 浅析战略预警空天目标与识别 [J]. 飞 航导弹, 2015 (6): 30–33. Li H F, Tian K S, Jin H B. Analysis on strategic early warning aerospace target and identification [J]. Aerodynamic Missile Journal, 2015 (6): 30–33.
Li H F, Tian K S, Jin H B. Analysis on strategic early warning aerospace target and identification [J]. Aerodynamic Missile Journal, 2015 (6): 30–33. Chinese. 链接1

[ 6 ] 宣蕾, 苏金树, 苗青, 等. 网络安全战略预警系统研究 [J]. 通信 技术, 2001 (7): 90–92. Xuan L, Su J S, Miao Q, et al. Study on network security strategic indication/warning system [J]. Communications Technology, 2001 (7): 90–92.
Xuan L, Su J S, Miao Q, et al. Study on network security strategic indication/warning system [J]. Communications Technology, 2001 (7): 90–92. Chinese. 链接1

[ 7 ] 刘凤增, 肖兵, 刘捷, 等. 美国战略预警体系发展探析 [J]. 飞航 导弹, 2019 (3): 65–69. Liu F Z, Xiao B, Liu J, et al. Analysis on the development of American strategic early warning system [J]. Aerodynamic Missile Journal, 2019 (3): 65–69.
Liu F Z, Xiao B, Liu J, et al. Analysis on the development of American strategic early warning system [J]. Aerodynamic Missile Journal, 2019 (3): 65–69. Chinese. 链接1

[ 8 ] 冯伟, 梅越. 大数据时代, 数据主权主沉浮 [J]. 信息安全与通信 保密, 2015 (6): 49–51. Feng W, Mei Y. In the era of big data, data sovereignty rises and falls [J]. Information Security and Communications Privacy, 2015 (6): 49–51.
Feng W, Mei Y. In the era of big data, data sovereignty rises and falls [J]. Information Security and Communications Privacy, 2015 (6): 49–51. Chinese. 链接1

[ 9 ] 俞飞. “爱因斯坦计划”升级美国网络安全 [J]. 保密工作, 2013 (8): 54–55. Yu F. “Einstein plan” upgrades American cyber security [J]. Confidential Work, 2013 (8): 54–55.
Yu F. “Einstein plan” upgrades American cyber security [J]. Confidential Work, 2013 (8): 54–55. Chinese. 链接1

[10] 赵阳光, 黄海波. 美国“爱因斯坦计划”研究 [J]. 信息安全研究, 2020, 6(11): 1013–1016. Zhao Y G, Huang H B. American “Einstein plan” research [J]. Journal of Information Security Research, 2020, 6(11): 1013– 1016.
Zhao Y G, Huang H B. American “Einstein plan” research [J]. Journal of Information Security Research, 2020, 6(11): 1013– 1016. Chinese. 链接1

[11] Common Vulnerabilities & Exposures Numbering Authorities. Common vulnerabilities and exposures [EB/OL]. (2021-03-05) [2021-03-06]. http://cve.mitre.org/cve/.

[12] 国家信息安全漏洞库. 漏洞信息 [EB/OL]. (2021-03-05) [2021- 03-06]. http://www.cnnvd.org.cn/web/vulnerability/querylist.tag. China National Vulnerability Database of Information Security. Vulnerability information [EB/OL]. (2021-03-05) [2021-03-06]. http://www.cnnvd.org.cn/web/vulnerability/querylist.tag.
China National Vulnerability Database of Information Security. Vulnerability information [EB/OL]. (2021-03-05) [2021-03-06]. http://www.cnnvd.org.cn/web/vulnerability/querylist.tag. Chinese. 链接1

[13] 周勇林. 计算机应急响应与我国互联网应急处理体系 [J]. 世界 电信, 2004 (3): 33–38. Zhou Y L. Computer network emergency response and internet emergency coordination system in China [J]. World Telecommunications, 2004 (3): 33–38.
Zhou Y L. Computer network emergency response and internet emergency coordination system in China [J]. World Telecommunications, 2004 (3): 33–38. Chinese. 链接1

[14] 戴艳梅. 俄罗斯反恐机制研究 [J]. 俄罗斯东欧中亚研究, 2012 (5): 31–38, 95–96. Dai Y M. Research on Russian anti-terrorism mechanism [J]. Russian, Central Asian & East European Studies, 2012 (5): 31–38, 95–96.
Dai Y M. Research on Russian anti-terrorism mechanism [J]. Russian, Central Asian & East European Studies, 2012 (5): 31–38, 95–96. Chinese. 链接1

相关研究