期刊首页 优先出版 当期阅读 过刊浏览 作者中心 关于期刊 English

《工程(英文)》 >> 2018年 第4卷 第1期 doi: 10.1016/j.eng.2018.01.003

构建新型网络空间安全生态体系 实现从网络大国走向网络强国

a Science and Technology on Communication Information Security Control Laboratory, Jiaxing, Zhejiang 314033, China
b Science and Technology on Electro-Optical Information Security Control Laboratory, Tianjin 300300, China

收稿日期: 2017-12-08 修回日期: 2017-12-30 录用日期: 2018-01-05 发布日期: 2018-02-26

下一篇 上一篇

摘要

首先面向我国网络空间实际情况,提出网络空间“三分论”,针对公共互联网(C 空间)、党政军保密网(S 空间)和关键基础设施网(K 空间)三大网络空间的不同需求,给出了相应的安全应对策略和研究框架。然后重点针对公共互联网,探讨了基于SMCRC 环(situation awareness,monitoring,cooperative defense,recovery,countermeasure)的网络空间安全生态体系的功能特点和内在信息交互方式,并分别对“SMCRC 环”中态势感知、持续监控、协同防御、快速恢复、溯源反制等五大环节的核心关键技术进行了讨论,以期对国家网络空间安全研究起到抛砖引玉之作用。

图片

图1

图2

图3

参考文献

[ 1 ] Applegate SD. The principle of maneuver in cyber operations. In: Czosseck C, Ottis R, Ziolkowski K, editors. 2012 4th International conference on cyber conflict: proceedings; 2012 Jun 5–8; Tallinn, Estonia. Tallinn: NATO CCD COE Publications; 2012. p. 1–13. 链接1

[ 2 ] Office of the US Air Force Chief Scientist. Cyber vision 2025: United States air force cyberspace science & technology vision 2012–2015. Report. Washington, DC: US Department of the Air Force; 2012 Dec. Report No.: 2012–0439/460/ 715.

[ 3 ] Cyber Priorities Steering Council. Cyber S&T priority steering council research roadmap. Washington, DC: US Department of Defense; 2011 Nov. 链接1

[ 4 ] Desk N. Cyber maneuvering and morphing—Are defense networks on course to ‘‘self awareness”? [Internet]. Qadima: Defense Update; c2002–2017 [updated 2012 Jul 21; cited 2017 Jul 26]. Available from: http://defense-update.com/ 20120721_raytheon-to-develop-cyber-maneuver-technology-for-us-army. html.

[ 5 ] Marlborough M. Raytheon to develop cyber maneuver technology for US Army: Proactive cyber approach to improve network defense in high-threat environments [Internet]. Waltham: Raytheon Company; c2015 [updated 2012 Jul 16; cited 2017 Jul 26]. Available from: http://raytheon.mediaroom.com/ index.php?s=43&item=2136.

[ 6 ] US Department of Homeland Security. Blueprint for a secure cyber future: the cybersecurity strategy for the homeland security enterprise. Washington, DC: US Department of Homeland Security; 2011 Sep.

[ 7 ] Reitinger P. Enabling distributed security in cyberspace: building a healthy and resilient cyber ecosystem with automated collective action. Washington, DC: US Department of Homeland Security; 2011.

[ 8 ] Dombroski MJ, Carley KM. NETEST: estimating a terrorist network’s structure— Graduate Student Best Paper Award, CASOS 2002 Conference. Comput Math Organ Theory 2002;8(3):235–41. 链接1

[ 9 ] Beraud P, Cruz A, Hassell S, Meadows S. Using cyber maneuver to improve network resiliency. In: Proceedings of the 2011 Military Communications 52 X.-N. Yang et al. / Engineering 4 (2018) 47–52 Conference; 2011 Nov 7–10; Baltimore, MD, USA. Piscataway: Institute of Electrical and Electronics Engineers; 2011. p. 1121–6. 链接1

[10] Defense Advanced Research Projects Agency. Clean-slate design of resilient, adaptive, secure hosts (CRASH): Broad agency announcement [Internet]. Arlington: Defense Advanced Research Projects Agency; 2010 Jun [updated 2010 Jun 1; cited 2017 Jul 26]. Available from: https://www.fbo.gov/index?s= opportunity&mode=form &id= 4022d960a15e87bcaf0fb70101ab53b8&tab = core&_cview=1. 链接1

[11] Tansley AG. The use and abuse of vegetational concepts and terms. Ecology 1935;16(3):284–307. 链接1

相关研究