Search scope:
排序: Display mode:
Emergency and Response for Cyberspace Security
Yu Quan,Yang Lifeng and Gao Guijun、Kou Ziming、Zhai Lidong
Strategic Study of CAE 2016, Volume 18, Issue 6, Pages 79-82 doi: 10.15302/J-SSCAE-2016.06.016
Based on the current situation and main problems with cyberspace security in China, this paper proposes that cyberspace security should shift its focus from emergency to response. Some transformation strategies are proposed, including three aspects: network security-monitoring capacity, network security guarantee capacity, and talents construction capacity.
Keywords: cyberspace security emergency for cyberspace security response for cyberspace security transformation strategy
A Study on the Improvement of the Cybersecurity Legal System in China
Li Yuxiao,Wu Hequan and Xie Yongjiang,Jiang Shuli、Cui Congcong、Mi Tienan
Strategic Study of CAE 2016, Volume 18, Issue 6, Pages 28-33 doi: 10.15302/J-SSCAE-2016.06.006
Although cybersecurity legislation has made some progress since the 18th National Congress of the Communist Party of China, there is still a large gap between the law and development of cybersecurity and informatization and the requirements of the public. In addition, many problems exist in the fields of legislation, enforcement, administration, and legality. Some people, both at home and abroad, question China's efforts in the legislation of cybersecurity. Based on a study of current cybersecurity law, we suggest that it is necessary to speed up cybersecurity legislation and improve the legal system, particularly in order to enact cybersecurity law, e-commercial law, administrative law for cyber information service, personal information protection law, e-government law, information and telecommunication network law, and administrative law for cyber society, supported by matched regulations and by laws. In this way, a perfected legal system for cybersecurity will be achieved.
Keywords: networks Internet cybersecurity cybersecurity law legal system
Cyber security meets artificial intelligence: a survey Review Article
Jian-hua LI
Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 12, Pages 1462-1474 doi: 10.1631/FITEE.1800573
There is a wide range of interdisciplinary intersections between cyber security and artificial intelligence (AI). On one hand, AI technologies, such as deep learning, can be introduced into cyber security to construct smart models for implementing malware classification and intrusion detection and threating intelligence sensing. On the other hand, AI models will face various cyber threats, which will disturb their sample, learning, and decisions. Thus, AI models need specific cyber security defense and protection technologies to combat adversarial machine learning, preserve privacy in machine learning, secure federated learning, etc. Based on the above two aspects, we review the intersection of AI and cyber security. First, we summarize existing research efforts in terms of combating cyber attacks using AI, including adopting traditional machine learning methods and existing deep learning solutions. Then, we analyze the counterattacks from which AI itself may suffer, dissect their characteristics, and classify the corresponding defense methods. Finally, from the aspects of constructing encrypted neural network and realizing a secure federated deep learning, we expatiate the existing research on how to build a secure AI system.
Keywords: Cyber security Artificial intelligence (AI) Attack detection Defensive techniques
Summarization of Network Security
Li Ying,Shan Xiuming,Ren Yong
Strategic Study of CAE 2004, Volume 6, Issue 1, Pages 10-15
The content of computer network security is discussed in this article Firstly, the concept, system and structure and model of computer network security are given. Then the main content and correlative researching aspect are included. In the end, the main product is introduced.
Research on a Cybersecurity Review System with Suggestions
Chen Xiaohua,He Dequan,Wang Hailong,Shang Yanmin,Xu Kefu
Strategic Study of CAE 2016, Volume 18, Issue 6, Pages 39-43 doi: 10.15302/J-SSCAE-2016.06.008
Cybersecurity is part of national security. The rules and regulations for security testing and evaluation are distributed as policies for national security review or cyberspace management. This paper focuses on the current international systems related to cybersecurity review, and analyzes governments’ practices in the aspects of information technology product and service security evaluation, critical information infrastructure security evaluation and management, information and communication technology (ICT) supply chain security, and background security investigation. Based on the above, this paper discusses how to establish a cybersecurity review system in the fields of law and regulation, organization framework, operation mode, review approach, and supporting technology.
Keywords: cybersecurity review information technology product and service critical information infrastructure supply chain security background security
A network security entity recognition method based on feature template and CNN-BiLSTM-CRF Research Papers
Ya QIN, Guo-wei SHEN, Wen-bo ZHAO, Yan-ping CHEN, Miao YU, Xin JIN
Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 6, Pages 872-884 doi: 10.1631/FITEE.1800520
By network security threat intelligence analysis based on a security knowledge graph (SKG), multi-source threat intelligence data can be analyzed in a fine-grained manner. This has received extensive attention. It is difficult for traditional named entity recognition methods to identify mixed security entities in Chinese and English in the field of network security, and there are difficulties in accurately identifying network security entities because of insufficient features extracted. In this paper, we propose a novel FT-CNN-BiLSTM-CRF security entity recognition method based on a neural network CNN-BiLSTM-CRF model combined with a feature template (FT). The feature template is used to extract local context features, and a neural network model is used to automatically extract character features and text global features. Experimental results showed that our method can achieve an F-score of 86% on a large-scale network security dataset and outperforms other methods.
Keywords: Network security entity Security knowledge graph (SKG) Entity recognition Feature template Neural network
The Current Network Security Situation and Emergency Network Response
Liu Xinran、Li Baisong、Chang Anqi、Lu Hui、Tian Zhihong
Strategic Study of CAE 2016, Volume 18, Issue 6, Pages 83-88 doi: 10.15302/J-SSCAE-2016.06.017
Considering the emergence of recent network security threats, this article presents network security features and the current situation. Updated attack methods, enhanced attack technology, and expanded attack scope have changed emergency work. Some problems exist in emergency management of the status quo; the core technology and security assurance are relatively backward. Learning from the emergency response system in traditional areas in order to improve current emergency technical measures becomes an important part of network security. In this paper, the author proposes a multi-linkage elimination method that can mobilize system strength and protect against network threats based on the system and the mechanism.
Keywords: network security threat information security emergency response emergency system
A Practical Approach to Constructing a Knowledge Graph for Cybersecurity Article
Yan Jia, Yulu Qi, Huaijun Shang, Rong Jiang, Aiping Li
Engineering 2018, Volume 4, Issue 1, Pages 53-60 doi: 10.1016/j.eng.2018.01.004
Cyberattack forms are complex and varied, and the detection and prediction of dynamic types of attack are always challenging tasks. Research on knowledge graphs is becoming increasingly mature in many fields. At present, it is very significant that certain scholars have combined the concept of the knowledge graph with cybersecurity in order to construct a cybersecurity knowledge base. This paper presents a cybersecurity knowledge base and deduction rules based on a quintuple model. Using machine learning, we extract entities and build ontology to obtain a cybersecurity knowledge base. New rules are then deduced by calculating formulas and using the path-ranking algorithm. The Stanford named entity recognizer (NER) is also used to train an extractor to extract useful information. Experimental results show that the Stanford NER provides many features and the useGazettes parameter may be used to train a recognizer in the cybersecurity domain in preparation for future work.
Keywords: Cybersecurity Knowledge graph Knowledge deduction
Network Security Management and Protection of Industrial Internet Equipment
Ma Juan, Yu Guangchen, Ke Haoren, Yang Dongmei, Wushour Silamu
Strategic Study of CAE 2021, Volume 23, Issue 2, Pages 81-87 doi: 10.15302/J-SSCAE-2021.02.011
The new generation of information and communications technology is deeply integrated with the industrial system. The industrial Internet promotes the ubiquitous and deep interconnection and comprehensive perception of human, machines, and things. The industrial Internet equipment becomes increasingly networked, digital, and intelligent; therefore, the network security design, application management, and protection of these equipment become increasingly important. In this study, we clarify the connotation, protection scope, and requirements of the industrial Internet equipment, and summarize the development status of industrial Internet in China and abroad from the aspects of security control and security certification. Moreover, the problems regarding the network security of industrial Internet equipment in China are analyzed, and the specific implementation paths regarding the network security management and protection for the industrial internet equipment in China are discussed. Furthermore, several development suggestions are proposed. Specifically, the network security access mechanism of the industrial Internet equipment should be improved at the national level, a network security testing and certification system for the equipment should be established, research on the network security architecture and engineering application of the equipment should be promoted, and the network security risk monitoring and perception of the equipment should be strengthened.
Keywords: industrial Internet equipment network security management protection certification
The New Frontiers of Cybersecurity
Binxing Fang, Kui Ren, Yan Jia
Engineering 2018, Volume 4, Issue 1, Pages 1-2 doi: 10.1016/j.eng.2018.02.007
Cybersecurity Research—Essential to a Successful Digital Future
Jackie Craig
Engineering 2018, Volume 4, Issue 1, Pages 9-10 doi: 10.1016/j.eng.2018.02.006
TC Assurance Architecture for Cybersecurity Infrastructure Based on Active Defense
Zhang Dawei,Shen Changxiang, Liu Jiqiang, Zhang Feifei, Li Lun, Cheng Lichen
Strategic Study of CAE 2016, Volume 18, Issue 6, Pages 58-61 doi: 10.15302/J-SSCAE-2016.06.012
This paper introduces the status, problems, and future strategies of the cyberspace security infrastructure system, and proposes that cyberspace security infrastructure must be based on active defense. Therefore, this paper proposes several suggestions for a trusted technology insurance system, which include the following: In order to build a trusted technology insurance system, independent innovation in active defense must be the breaking point; key information security systems must be developed by local institutions; independent innovation must be increased; research, product development, and active defense applications must be promoted; the development of trusted computing standards must be promoted; and experimental demonstrations must be carried out.
Keywords: active defense active immunity trusted computing trusted technology insurance system cybersecurity infrastructure
Tian Zhihong, Fang Binxing , Liao Qing , Sun Yanbin , Wang Ye , Yang Xu , Feng Jiyuan
Strategic Study of CAE 2023, Volume 25, Issue 6, Pages 96-105 doi: 10.15302/J-SSCAE-2023.06.007
Keywords: cybersecurity assurance system threat active defense guard mode
Anonymous-address-resolution model Article
Guang-jia SONG,Zhen-zhou JI
Frontiers of Information Technology & Electronic Engineering 2016, Volume 17, Issue 10, Pages 1044-1055 doi: 10.1631/FITEE.1500382
Keywords: Network security Address resolution Neighbor discovery Anonymous
Luo Xingguo, Tong Qing, Zhang Zheng, Wu Jiangxing
Strategic Study of CAE 2016, Volume 18, Issue 6, Pages 69-73 doi: 10.15302/J-SSCAE-2016.06.014
Cybersecurity is in an unbalanced situation: It is easy to attack cybersecurity but difficult to defend it. Active defense technology is a new direction in cybersecurity research that has attracted more and more attention. This paper summarizes the development of active defense via the introduction of intrusion tolerance technology and moving target defense technology. We then introduce the theory, implementation, and testing of mimic defense. By comparing mimic defense with intrusion tolerance and moving target defense, we propose a research direction and a key point in the cybersecurity rebalancing strategy in order to provide a reference for the development of national cybersecurity.
Keywords: mimic defense active defense technology cybersecurity rebalance
Title Author Date Type Operation
Emergency and Response for Cyberspace Security
Yu Quan,Yang Lifeng and Gao Guijun、Kou Ziming、Zhai Lidong
Journal Article
A Study on the Improvement of the Cybersecurity Legal System in China
Li Yuxiao,Wu Hequan and Xie Yongjiang,Jiang Shuli、Cui Congcong、Mi Tienan
Journal Article
Research on a Cybersecurity Review System with Suggestions
Chen Xiaohua,He Dequan,Wang Hailong,Shang Yanmin,Xu Kefu
Journal Article
A network security entity recognition method based on feature template and CNN-BiLSTM-CRF
Ya QIN, Guo-wei SHEN, Wen-bo ZHAO, Yan-ping CHEN, Miao YU, Xin JIN
Journal Article
The Current Network Security Situation and Emergency Network Response
Liu Xinran、Li Baisong、Chang Anqi、Lu Hui、Tian Zhihong
Journal Article
A Practical Approach to Constructing a Knowledge Graph for Cybersecurity
Yan Jia, Yulu Qi, Huaijun Shang, Rong Jiang, Aiping Li
Journal Article
Network Security Management and Protection of Industrial Internet Equipment
Ma Juan, Yu Guangchen, Ke Haoren, Yang Dongmei, Wushour Silamu
Journal Article
TC Assurance Architecture for Cybersecurity Infrastructure Based on Active Defense
Zhang Dawei,Shen Changxiang, Liu Jiqiang, Zhang Feifei, Li Lun, Cheng Lichen
Journal Article
Cybersecurity Assurance System in the New Era and Development Suggestions Thereof: From Self-Defense to Guard
Tian Zhihong, Fang Binxing , Liao Qing , Sun Yanbin , Wang Ye , Yang Xu , Feng Jiyuan
Journal Article