Journal Home Online First Current Issue Archive For Authors Journal Information 中文版

Engineering >> 2018, Volume 4, Issue 1 doi: 10.1016/j.eng.2018.01.003

Research on the Construction of a Novel Cyberspace Security Ecosystem

a Science and Technology on Communication Information Security Control Laboratory, Jiaxing, Zhejiang 314033, China
b Science and Technology on Electro-Optical Information Security Control Laboratory, Tianjin 300300, China

Received: 2017-12-08 Revised: 2017-12-30 Accepted: 2018-01-05 Available online: 2018-02-26

Next Previous

Abstract

Given the challenges facing the cyberspace of the nation, this paper presents the tripartite theory of cyberspace, based on the status quo of cyberspace. Corresponding strategies and a research architecture are proposed for common public networks (C space), secure classified networks (S space), and key infrastructure networks (K space), based on their individual characteristics. The features and security requirements of these networks are then discussed. Taking C space as an example, we introduce the SMCRC (which stands for ‘‘situation awareness, monitoring and management, cooperative defense, response and recovery, and countermeasures and traceback”) loop for constructing a cyberspace security ecosystem. Following a discussion on its characteristics and information exchange, our analysis focuses on the critical technologies of the SMCRC loop. To obtain more insight into national cyberspace security, special attention should be paid to global sensing and precise mapping, continuous detection and active management, cross-domain cooperation and systematic defense, autonomous response and rapid processing, and accurate traceback and countermeasure deterrence.

Figures

Fig. 1

Fig.2

Fig. 3

References

[ 1 ] Applegate SD. The principle of maneuver in cyber operations. In: Czosseck C, Ottis R, Ziolkowski K, editors. 2012 4th International conference on cyber conflict: proceedings; 2012 Jun 5–8; Tallinn, Estonia. Tallinn: NATO CCD COE Publications; 2012. p. 1–13. link1

[ 2 ] Office of the US Air Force Chief Scientist. Cyber vision 2025: United States air force cyberspace science & technology vision 2012–2015. Report. Washington, DC: US Department of the Air Force; 2012 Dec. Report No.: 2012–0439/460/ 715.

[ 3 ] Cyber Priorities Steering Council. Cyber S&T priority steering council research roadmap. Washington, DC: US Department of Defense; 2011 Nov. link1

[ 4 ] Desk N. Cyber maneuvering and morphing—Are defense networks on course to ‘‘self awareness”? [Internet]. Qadima: Defense Update; c2002–2017 [updated 2012 Jul 21; cited 2017 Jul 26]. Available from: http://defense-update.com/ 20120721_raytheon-to-develop-cyber-maneuver-technology-for-us-army. html.

[ 5 ] Marlborough M. Raytheon to develop cyber maneuver technology for US Army: Proactive cyber approach to improve network defense in high-threat environments [Internet]. Waltham: Raytheon Company; c2015 [updated 2012 Jul 16; cited 2017 Jul 26]. Available from: http://raytheon.mediaroom.com/ index.php?s=43&item=2136.

[ 6 ] US Department of Homeland Security. Blueprint for a secure cyber future: the cybersecurity strategy for the homeland security enterprise. Washington, DC: US Department of Homeland Security; 2011 Sep.

[ 7 ] Reitinger P. Enabling distributed security in cyberspace: building a healthy and resilient cyber ecosystem with automated collective action. Washington, DC: US Department of Homeland Security; 2011.

[ 8 ] Dombroski MJ, Carley KM. NETEST: estimating a terrorist network’s structure— Graduate Student Best Paper Award, CASOS 2002 Conference. Comput Math Organ Theory 2002;8(3):235–41. link1

[ 9 ] Beraud P, Cruz A, Hassell S, Meadows S. Using cyber maneuver to improve network resiliency. In: Proceedings of the 2011 Military Communications 52 X.-N. Yang et al. / Engineering 4 (2018) 47–52 Conference; 2011 Nov 7–10; Baltimore, MD, USA. Piscataway: Institute of Electrical and Electronics Engineers; 2011. p. 1121–6. link1

[10] Defense Advanced Research Projects Agency. Clean-slate design of resilient, adaptive, secure hosts (CRASH): Broad agency announcement [Internet]. Arlington: Defense Advanced Research Projects Agency; 2010 Jun [updated 2010 Jun 1; cited 2017 Jul 26]. Available from: https://www.fbo.gov/index?s= opportunity&mode=form &id= 4022d960a15e87bcaf0fb70101ab53b8&tab = core&_cview=1. link1

[11] Tansley AG. The use and abuse of vegetational concepts and terms. Ecology 1935;16(3):284–307. link1

Related Research