
构建新型网络空间安全生态体系 实现从网络大国走向网络强国
Research on the Construction of a Novel Cyberspace Security Ecosystem
Given the challenges facing the cyberspace of the nation, this paper presents the tripartite theory of cyberspace, based on the status quo of cyberspace. Corresponding strategies and a research architecture are proposed for common public networks (C space), secure classified networks (S space), and key infrastructure networks (K space), based on their individual characteristics. The features and security requirements of these networks are then discussed. Taking C space as an example, we introduce the SMCRC (which stands for “situation awareness, monitoring and management, cooperative defense, response and recovery, and countermeasures and traceback”) loop for constructing a cyberspace security ecosystem. Following a discussion on its characteristics and information exchange, our analysis focuses on the critical technologies of the SMCRC loop. To obtain more insight into national cyberspace security, special attention should be paid to global sensing and precise mapping, continuous detection and active management, cross-domain cooperation and systematic defense, autonomous response and rapid processing, and accurate traceback and countermeasure deterrence.
Cyberspace security ecosystem / SMCRC loop / Tripartite theory of cyberspace
[1] |
|
[2] |
Office of the US Air Force Chief Scientist. Cyber vision 2025: United States air force cyberspace science & technology vision 2012- 2015. Report. Washington, DC: US Department of the Air Force; 2012 Dec. Report No.: 2012-0439/460/715.
|
[3] |
Cyber Priorities Steering Council. Cyber S&T priority steering council research roadmap. US Department of Defense, Washington, DC (2011 Nov)
|
[4] |
|
[5] |
Marlborough M. Raytheon to develop cyber maneuver technology for US Army: Proactive cyber approach to improve network defense in high-threat environments [Internet]. Waltham: Raytheon Company; c2015 [updated 2012 Jul 16; cited 2017 Jul 26]. Available from: http://raytheon.mediaroom.com/index.php?s=43&item=2136.
|
[6] |
US Department of Homeland Security. Blueprint for a secure cyber future: the cybersecurity strategy for the homeland security enterprise. US Department of Homeland Security, Washington, DC (2011 Sep)
|
[7] |
|
[8] |
M.J. Dombroski, K.M. Carley. NETEST: estimating a terrorist network’s structure—Graduate Student Best Paper Award, CASOS 2002 Conference. Comput Math Organ Theory, 8 (3) (2002), pp. 235-241
|
[9] |
|
[10] |
Defense Advanced Research Projects Agency.Clean-slate design of resilient, adaptive, secure hosts (CRASH): Broad agency announcement [Internet]. Arlington: Defense Advanced Research Projects Agency; 2010 Jun [updated 2010 Jun 1; cited 2017 Jul 26]. Available from: https://www.fbo.gov/index?s=opportunity&mode=form &id= 4022d960a15e87bcaf0fb70101ab53b8&tab = core&_cview=1.
|
[11] |
|
/
〈 |
|
〉 |