Search scope:
排序: Display mode:
Study on the Development of China’s Cyberspace Security Industry
An Da, Liang Zhihao, Xu Shouren
Strategic Study of CAE 2016, Volume 18, Issue 4, Pages 38-43 doi: 10.15302/J-SSCAE-2016.04.006
The paper summarizes the development situation and experiences of the Chinese cyberspace security industry during the 12th Five-Year Plan, analyzes its new development trends, and proposes policy suggestions for the industry development to provide a reference for cyberspace security industry during the 13th Five-Year Plan.
Keywords: cyberspace security cyberspace security industry independent and controllable standards
Research on the International Strategy for National Cyberspace Security
Fang Binxing,Du Aning and Zhang Xi,Wang Zhongru
Strategic Study of CAE 2016, Volume 18, Issue 6, Pages 13-16 doi: 10.15302/J-SSCAE-2016.06.003
Cyberspace security has been a crucial part in national security and is more and more important in the development of economy and society. Based on the current situation of international cyberspace security, this article analyzes the opportunities and challenges that China is confronted with, and study China's international cyberspace security strategy suitable for its own value and national interest. We then propose the objectives, principles and tasks of the strategy.
Keywords: cyberspace security cyberspace governance cyberspace strategy
Cyberspace Endogenous Safety and Security Article
Jiangxing Wu
Engineering 2022, Volume 15, Issue 8, Pages 179-185 doi: 10.1016/j.eng.2021.05.015
Uncertain security threats caused by vulnerabilities and backdoors are the most serious and difficult problem in cyberspace. This paper analyzes the philosophical and technical causes of the existence of so-called “dark functions” such as system vulnerabilities and backdoors, and points out that endogenous security problems cannot be completely eliminated at the theoretical and engineering levels; rather, it is necessary to develop or utilize the endogenous security functions of the system architecture itself. In addition, this paper gives a definition for and lists the main technical characteristics of endogenous safety and security in cyberspace, introduces endogenous security mechanisms and characteristics based on dynamic heterogeneous redundancy (DHR) architecture, and describes the theoretical implications of a coding channel based on DHR.
Keywords: Cyberspace endogenous security problem Uncertain threat Cyberspace endogenous safety and security Relative right axiom Dynamic heterogeneous redundant architecture
Emergency and Response for Cyberspace Security
Yu Quan,Yang Lifeng and Gao Guijun、Kou Ziming、Zhai Lidong
Strategic Study of CAE 2016, Volume 18, Issue 6, Pages 79-82 doi: 10.15302/J-SSCAE-2016.06.016
Based on the current situation and main problems with cyberspace security in China, this paper proposes that cyberspace security should shift its focus from emergency to response. Some transformation strategies are proposed, including three aspects: network security-monitoring capacity, network security guarantee capacity, and talents construction capacity.
Keywords: cyberspace security emergency for cyberspace security response for cyberspace security transformation strategy
Research on Cyberspace Sovereignty
Fang Binxing,Zou Peng and Zhu Shibing
Strategic Study of CAE 2016, Volume 18, Issue 6, Pages 1-7 doi: 10.15302/J-SSCAE-2016.06.001
Cyberspace sovereignty (referred to here by its short form, cyber sovereignty) is the extension of national sovereignty to the platform of information and communication technology systems. This article defines cyberspace and cyber sovereignty, discusses the existence of cyber sovereignty, and judges several erroneous points of view that deny cyber sovereignty.
Keywords: cyberspace cyberspace sovereignty stakeholder
A review on cyber security named entity recognition Review Article
Chen Gao, Xuan Zhang, Mengting Han, Hui Liu,zhxuan@ynu.edu.cn
Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 9, Pages 1153-1168 doi: 10.1631/FITEE.2000286
Keywords: 命名实体识别(NER);信息抽取;网络空间安全;机器学习;深度学习
Cyberspace Security Models and Systematic Development from Multiple Perspectives
Sun Shuai , Zhang Lei , Hu Chunhui , Fu Shouqing , Qing Yu , Cui Yong
Strategic Study of CAE 2023, Volume 25, Issue 6, Pages 116-125 doi: 10.15302/J-SSCAE-2023.06.009
As cyberspace technologies advance rapidly, cyberspace security risks derived from new applications and technologies are becoming more complex and hidden. Establishing a unique cyberspace security model is a common practice to deal with complex security threats in China and abroad. However, existing cyberspace security models have problems such as unclear development directions, insufficient ability to analyze risks derived from new technologies, and lack of security capabilities required for cyberspace security defense assessment. This study evaluates existing cyberspace security models from the perspectives of technology, discipline, and industry, sorts out the characteristics and development context of the cyberspace security technology system, and clarifies the urgent problems existing in cybersecurity applications. Focusing on the perspective of cyberspace security technology, this study proposes a cyberspace security model system framework based on technical elements, using existing security technologies and emerging technologies to verify the security analysis capabilities of the system framework. This study further proposes the following development suggestions: (1) improving the core framework of the cyberspace security technology system, (2) promoting the industryuniversity-research integration in the field of cyberspace security, (3) promoting the formulation of core technology standards regarding cyberspace security, and (4) addressing AI security threats, thus to effectively deal with cyberspace security threats and enhance the cyberspace security capabilities of China.
Keywords: cyberspace security model security capability derivative risk
Artificial Intelligence Enabled Cyberspace Security Defense
Jia Yan, Fang Binxing, Li Aiping, Gu Zhaoquan
Strategic Study of CAE 2021, Volume 23, Issue 3, Pages 98-105 doi: 10.15302/J-SSCAE-2021.03.003
Cyberspace is regarded as the fifth largest activity space following land, sea, air, and space. Protecting cyberspace security is a major issue related to national security, national sovereignty, and the legitimate rights and interests of the people. With the rapid development of artificial intelligence (AI) technology and its application in various fields, cyberspace security has been facing new challenges. This study analyzes the new risks of cyberspace security in the era of AI, such as more intelligent network attacks, more frequent large-scale network attacks, higher concealment of network attacks, stronger confrontation game of network attacks, and easier exposure to stealing of important data. AI technology has significant advantages in dealing with massive data, multi-source heterogeneous data, and real-time dynamic data, which can significantly improve the defense capability of cyberspace. This study introduces some key problems and technologies of AI-enabled cyberspace security defense, particularly the construction of a cyberspace security knowledge brain and the detection of network attacks. Furthermore, we propose the corresponding countermeasures and suggestions from three aspects: the construction of a dynamic and scalable network security knowledge brain, the promotion of intelligent detection against network attacks, and the evaluation of AI technologies’ security.
Keywords: artificial intelligence (AI),cyberspace security,cyber attacks,cyber defense
Cyberspace Security Competition and Talent Management
Yu Xiangzhan,Zhang Hongli and Yu Haining、Tian Zhihong、Zhai Jianhong、Pan Zhuting
Strategic Study of CAE 2016, Volume 18, Issue 6, Pages 49-52 doi: 10.15302/J-SSCAE-2016.06.010
Competition of talents is fundamental to international cyberspace security, and the discovery and tracking of talents is one of the key links. First, we investigate the development status of domestic and international cyberspace security competition. Then, we analyze the main problems of cyberspace security competition in discovering and tracking talents. Finally, we propose a long-term policy to discover and track talents based on cyberspace competitions.
Keywords: cyberspace security competition talent-discovery talent-track
Current Status and Future Development of Cyberspace Security in Rail Transit Industry
Peng Yihua, Liu Mingyuan, Gao Shuai, Su Wei, Zhang Hongke
Strategic Study of CAE 2023, Volume 25, Issue 6, Pages 136-149 doi: 10.15302/J-SSCAE-2023.06.005
The wide application of network technologies has meanwhile brought about increasingly complex challenges regarding network environment for the key infrastructure of the rail transit industry. Therefore, deepening the research on cyberspace security in the rail transit industry becomes increasingly important. This study expounds on the basic concept and major characteristics of cyberspace security in the rail transit industry and summarizes its macro situation from the perspectives of strategies in China and abroad as well as security system and standards. It sorts out the development status of cyberspace security protection systems in the rail transit industry from three aspects: basic, enhanced, and collaborative protection. Moreover, the study analyzes the corresponding security risks and causes, involving practical cases of traditional network threats and data attack threats, and concludes that internal and external risk factors become the double threats to the industry’s dedicated network and the traditional network architecture restricts network security and reliability in the rail transit industry. Furthermore, we propose the following suggestions: (1) strengthening the original basic research and systematic innovation of networks, (2) building an independent and controllable industrial chain of network security, (3) improving the operation and management of network security, and (4) enhancing talent cultivation for network security in the rail transit industry.
Keywords: rail transit cyberspace security network architecture customized network network attack
Research on the Architecture of Cyberspace Security Professional Certification in China
Zhang Hongli,Yu Haining and Fang Binxing、Qin Yuhai、Yu Xiangzhan、Chu Chengyuan
Strategic Study of CAE 2016, Volume 18, Issue 6, Pages 44-48 doi: 10.15302/J-SSCAE-2016.06.009
Cyberspace security professional certification and vocational training is an important part of cyberspace security talent cultivation. It can quickly grow talents and continuously improve the technical level and practical ability of existing employees. First, we survey the current situation of cyberspace security professional certification and vocational training. Then, we analyze the main problems of cyberspace security professional certification and vocational training. Finally, we propose a policy proposal to establish the architecture of cyberspace security professional certification and vocational training.
Keywords: cyberspace security workforce framework professional certification vocational training
Construction of Strategic Early-Warning System in Cyberspace
Zhuang Honglin, Yao Le, Wang Sheng, Gu Jiaxiang, Wu Ye, Xie Kai
Strategic Study of CAE 2021, Volume 23, Issue 2, Pages 1-7 doi: 10.15302/J-SSCAE-2021.02.001
Cyberspace strategic early-warning is a monitoring and warning system that is established by a country or group for early detection, tracking, identification, and notification of incoming major cyber attacks or the spreading destruction of powerful viruses. It’s an important component of a national security defense system. The implementation of the national cyber development strategy in China requires high attentions to the construction of a cyberspace strategic early-warning system. This study analyzes the major characteristics and basic requirements of strategic early-warning in cyberspace, and studies four major warning styles: security vulnerabilities, security threats, intrusion attacks, and abnormal behaviors warning. It also emphasizes four key projects, namely cyberspace surveying and mapping system, vulnerability collection and early-warning platform, threat intelligence perception and push system, as well as security monitoring and comprehensive early-warning system, after summarizing the construction of strategic early-warning and monitoring systems in cyberspace in China and abroad. Furthermore, we propose several countermeasures and suggestions, including strengthening high-level coordination, focusing on multi-source data integration, establishing professional earlywarning agencies, conducting regular security assessments, and implementing threat and early-warning grading mechanisms.
Keywords: cyberspace security strategic early warning situation awareness system construction
Jie CHEN, Dandan WU, Ruiyun XIE,chenjie1900@mail.nwpu.edu.cn,wudd@cetcsc.com
Frontiers of Information Technology & Electronic Engineering 2023, Volume 24, Issue 8, Pages 1117-1142 doi: 10.1631/FITEE.2200314
Keywords: Artificial intelligence (AI) Machine learning (ML) Deep learning (DL) Optimization algorithm Hybrid algorithm Cyberspace security
Security for cyberspace: challenges and opportunities Editorial
Jiang-xing WU, Jian-hua LI, Xin-sheng JI
Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 12, Pages 1459-1461 doi: 10.1631/FITEE.1840000
Keywords: None
Research on the Construction of a Novel Cyberspace Security Ecosystem Article
Xiao-Niu Yang, Wei Wang, Xiao-Feng Xu, Guo-Rong Pang, Chun-Lei Zhang
Engineering 2018, Volume 4, Issue 1, Pages 47-52 doi: 10.1016/j.eng.2018.01.003
Given the challenges facing the cyberspace of the nation, this paper presents the tripartite theory of cyberspace, based on the status quo of cyberspace. Corresponding strategies and a research architecture are proposed for common public networks (C space), secure classified networks (S space), and key infrastructure networks (K space), based on their individual characteristics. The features and security requirements of these networks are then discussed. Taking C space as an example, we introduce the SMCRC (which stands for ‘‘situation awareness, monitoring and management, cooperative defense, response and recovery, and countermeasures and traceback”) loop for constructing a cyberspace security ecosystem. Following a discussion on its characteristics and information exchange, our analysis focuses on the critical technologies of the SMCRC loop. To obtain more insight into national cyberspace security, special attention should be paid to global sensing and precise mapping, continuous detection and active management, cross-domain cooperation and systematic defense, autonomous response and rapid processing, and accurate traceback and countermeasure deterrence.
Title Author Date Type Operation
Study on the Development of China’s Cyberspace Security Industry
An Da, Liang Zhihao, Xu Shouren
Journal Article
Research on the International Strategy for National Cyberspace Security
Fang Binxing,Du Aning and Zhang Xi,Wang Zhongru
Journal Article
Emergency and Response for Cyberspace Security
Yu Quan,Yang Lifeng and Gao Guijun、Kou Ziming、Zhai Lidong
Journal Article
A review on cyber security named entity recognition
Chen Gao, Xuan Zhang, Mengting Han, Hui Liu,zhxuan@ynu.edu.cn
Journal Article
Cyberspace Security Models and Systematic Development from Multiple Perspectives
Sun Shuai , Zhang Lei , Hu Chunhui , Fu Shouqing , Qing Yu , Cui Yong
Journal Article
Artificial Intelligence Enabled Cyberspace Security Defense
Jia Yan, Fang Binxing, Li Aiping, Gu Zhaoquan
Journal Article
Cyberspace Security Competition and Talent Management
Yu Xiangzhan,Zhang Hongli and Yu Haining、Tian Zhihong、Zhai Jianhong、Pan Zhuting
Journal Article
Current Status and Future Development of Cyberspace Security in Rail Transit Industry
Peng Yihua, Liu Mingyuan, Gao Shuai, Su Wei, Zhang Hongke
Journal Article
Research on the Architecture of Cyberspace Security Professional Certification in China
Zhang Hongli,Yu Haining and Fang Binxing、Qin Yuhai、Yu Xiangzhan、Chu Chengyuan
Journal Article
Construction of Strategic Early-Warning System in Cyberspace
Zhuang Honglin, Yao Le, Wang Sheng, Gu Jiaxiang, Wu Ye, Xie Kai
Journal Article
Artificial intelligence algorithms for cyberspace security applications: a technological and status review
Jie CHEN, Dandan WU, Ruiyun XIE,chenjie1900@mail.nwpu.edu.cn,wudd@cetcsc.com
Journal Article
Security for cyberspace: challenges and opportunities
Jiang-xing WU, Jian-hua LI, Xin-sheng JI
Journal Article