期刊文献+

双边网络冲突结果与相对网络能力强弱相关性研究——基于双边网络事件争端数据库和贝尔弗国家网络能力指数2020

On Correlation Between Inter-state Cyber Conflict Results and Relative Cyber Capability—Based on Dyadic Cyber Incident Compaign Dataset and National Cyber Power Index 2020
下载PDF
导出
摘要 [目的/意义]正确认识与量化网络空间“非对称进攻优势”,防止泛化的网络威胁对网络空间发展与合作造成负面影响,为我国顺利实现以信息技术为核心的新基建提供基本参考。[方法/过程]引入双边网络事件与争端数据库和“贝尔弗国家网络能力指数2020”,根据有关变量将网络冲突分为通用信息系统网络冲突和专用控制系统网络冲突两类,分别统计频数、占比和网络进攻成功率,并结合攻守双方网络能力相对强弱,计算出双边网络冲突结果与相对网络能力强弱的相关性系数。[结果/结论]2000-2016年,通用信息系统内存在较为显著的“非对称进攻优势”,但是在跨越通用信息系统边界时则有充分的理由怀疑“非对称进攻优势”得到一定程度的衰减,但在专用控制系统持续信息化的过程中,这些衰减可能逐渐得到恢复。在推进工业互联网建设时既不能过分夸大安全威胁而踌躇不前,也不能忽视潜在的风险来源而盲目乐观。 [Purpose/Significance]To correctly understand and quantify the"asymmetric offensive advantage"of cyberspace,preventing the negative impact of generalized cyber threats on the development and cooperation of cyberspace,to provide a basic reference for developing information technology within the struct of new infrastructure construction.[Method/Process]By introducing the dyadic cyber incident and campaign dataset(DCID)and national cyber power index 2020,cyber conflicts are divided into general information system based cyber conflicts and custom-built control system based cyber conflicts according to relevant variables.The frequency,proportion and cyber attack success rate are counted respectively.Combined with the cyber power index of both sides,the correlation coefficient of dyadic cyber incident results and relative cyber capability strength are calculated respectively.[Result/Conclusion]Between 2000 and 2016,There is indeed a significant"asymmetric attack advantage"in the general information system,but there are reasons to doubt whether the significance would be kept when it crosses the boundary of the general information system.As informatization of custom-built control system,the difference between them would be narrow.When promoting the construction of the industrial Internet,we can neither overstate the security threat,nor ignore the potential risk sources and be blindly optimistic.
作者 宋道青 葛腾飞 陈曦 Song Daoqing;Ge Tengfei;Chen Xi(International Studies College,National University of Defense Technology,Nanjing 210039)
出处 《情报杂志》 CSSCI 北大核心 2021年第6期39-44,51,共7页 Journal of Intelligence
基金 国家社会科学基金重大项目“海上丝绸之路地缘安全及其风险管控研究”(编号:18ZDA130)研究成果之一。
关键词 通用信息系统 专用控制系统 非对称进攻优势 相关性分析 general information system custom-built control system asymmetric attack advantage correlation analysis
  • 相关文献

参考文献5

二级参考文献23

  • 1Han J ,Fu Y.Exploration of the power of attribute-oriented induction in data mining[M].In:Fayyad U M et al eds. Advances in Knowledge Discover and Data Mining,Cambridge:AAAI/MIT Press,1996:399~421
  • 2J Han,Y Cai,N Cercone. Knowledge discovery in databases:An attribute_Oriented approach[C].In Proc 18th Int Conf,Very Large Data Bases,Vancouver, Canada: 1992: 547-559
  • 3Cheung D W,Fu A W C,Han J.Knowledge discovery in databases:a rule based attribute oriented approach[C].In:Zbigniew Reds. Methodologies for Intelligent systems,8th International Symposium,Berlin:Springer-Verlag, 1994:164~173
  • 4Han J Chiang,J Chee,S Chen et al.DBMiner:A system for data mining in relational databases and data warehouses[C].in Proc CASCON'-97,Meeting of Minds',Toronto,Canada:1997:249-260
  • 5J Han,Y Fu. Dynamie generation and refinement of concept hierarchies for knowledge discovery in databases[C].In Proc AAAI'94 Workshop Knowledge Discovery in Databases(KDD'94),Seattle,WA:1994:157-168
  • 6Y Zhao,P M Deshpande,J F Naughton.An array_Based algorithm for simultaneous multidimensional aggregates[C].In Proc ACM_SIGMOD Int Conf Management of Data,Tucson, Arizona: 1997:159-170
  • 7赛迪智库软件与信息服务研究所:《美国将发展大数据提升到战略层面》,《中国电子报》2012年7月17日.
  • 8刘丰.大国制衡行为:争论与进展[J].外交评论(外交学院学报),2010,27(1):111-125. 被引量:17
  • 9张文贵,彭博.美国等西方国家加紧抢占网络空间制高点[J].信息网络安全,2010(10):79-82. 被引量:12
  • 10董青岭,戴长征.网络空间威慑报复是否可行?[J].世界经济与政治,2012(7):99-116. 被引量:18

共引文献31

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部