In recent years,machine learning has made great progress in intrusion detection,network protection,anomaly detection,and other issues in cyberspace.However,these traditional machine learning algorithms usually require...In recent years,machine learning has made great progress in intrusion detection,network protection,anomaly detection,and other issues in cyberspace.However,these traditional machine learning algorithms usually require a lot of data to learn and have a low recognition rate for unknown attacks.Among them,“one-shot learning”,“few-shot learning”,and“zero-shot learning”are challenges that cannot be ignored for traditional machine learning.The more intractable problem in cyberspace security is the changeable attack mode.When a new attack mode appears,there are few or even zero samples that can be learned.Meta-learning comes from imitating human problem-solving methods as humans can quickly learn unknown things based on their existing knowledge when learning.Its purpose is to quickly obtain a model with high accuracy and strong generalization through less data training.This article first divides the meta-learning model into five research directions based on different principles of use.They are model-based,metric-based,optimization-based,online-learning-based,or stacked ensemble-based.Then,the current problems in the field of cyberspace security are categorized into three branches:cyber security,information security,and artificial intelligence security according to different perspectives.Then,the application research results of various meta-learning models on these three branches are reviewed.At the same time,based on the characteristics of strong generalization,evolution,and scalability of meta-learning,we contrast and summarize its advantages in solving problems.Finally,the prospect of future deep application of meta-learning in the field of cyberspace security is summarized.展开更多
Uncertain security threats caused by vulnerabilities and backdoors are the most serious and difficult problem in cyberspace.This paper analyzes the philosophical and technical causes of the existence of so-called"...Uncertain security threats caused by vulnerabilities and backdoors are the most serious and difficult problem in cyberspace.This paper analyzes the philosophical and technical causes of the existence of so-called"dark functions"such as system vulnerabilities and backdoors,and points out that endogenous security problems cannot be completely eliminated at the theoretical and engineering levels;rather,it is necessary to develop or utilize the endogenous security functions of the system architecture itself.In addition,this paper gives a definition for and lists the main technical characteristics of endogenous safety and security in cyberspace,introduces endogenous safety and security mechanisms and characteristics based on dynamic heterogeneous redundancy(DHR)architecture,and describes the theoretical implications of a coding channel based on DHR.展开更多
以Web of Science数据库收录的有关研究Cyberspace的大量文献为数据源,采用文献计量学的分析方法,借助信息可视化软件CiteSpace Ⅱ对所采集的数据进行统计分析;获取1993 ~2013年检索数据,通过可视化图谱的方法挖掘出该领域的研究重点...以Web of Science数据库收录的有关研究Cyberspace的大量文献为数据源,采用文献计量学的分析方法,借助信息可视化软件CiteSpace Ⅱ对所采集的数据进行统计分析;获取1993 ~2013年检索数据,通过可视化图谱的方法挖掘出该领域的研究重点和学科分布;从地理学角度,揭示了该领域的研究热点和方向.展开更多
运用CitespaceⅡ信息可视化图谱软件对"cyberspace" or "cyber warfare"研究文献数据进行分析,绘制了共引网络图谱,并依据图谱中关键节点文献的知识基础,对研究热点及趋势进行了初步探讨,得出国外研究的热点与前沿...运用CitespaceⅡ信息可视化图谱软件对"cyberspace" or "cyber warfare"研究文献数据进行分析,绘制了共引网络图谱,并依据图谱中关键节点文献的知识基础,对研究热点及趋势进行了初步探讨,得出国外研究的热点与前沿的相关结论,对"cyberspace" or "cyber warfare"的研究具有一定的参考价值。展开更多
With the rapid development of information technology,the cyberspace security problem is increasingly serious.Kinds of dynamic defense technology have emerged such as moving target defense and mimic defense.This paper ...With the rapid development of information technology,the cyberspace security problem is increasingly serious.Kinds of dynamic defense technology have emerged such as moving target defense and mimic defense.This paper aims to describe the architecture and analyze the performance of Cyberspace Mimic DNS based on generalized stochastic Petri net.We propose a general method of anti-attacking analysis.For general attack and special attack model,the available probability,escaped probability and nonspecial awareness probability are adopted to quantitatively analyze the system performance.And we expand the GSPN model to adjust to engineering practice by specifying randomness of different output vectors.The result shows that the proposed method is effective,and Mimic system has high anti-attacking performance.To deal with the special attack,we can integrate the traditional defense mechanism in engineering practice.Besides,we analyze the performance of mimic DNSframework based on multi-ruling proxy and input-output desperation,the results represent we can use multi ruling or high-speed cache servers to achieve the consistent cost of delay,throughput compared with single authorized DNS,it can effectively solve 10%to 20%performance loss caused by general ruling proxy.展开更多
With its advantages in technological innovation,industrial leadership,and international influence,the United States(US)has long dominated cyberspace.However,with the evolution of international power structures,competi...With its advantages in technological innovation,industrial leadership,and international influence,the United States(US)has long dominated cyberspace.However,with the evolution of international power structures,competition for power in cyberspace has intensified,thereby bringing unprecedented challenges to the US’dominance.Cyberspace has become an increasingly important battleground,especially in the context of Sino-US strategic competition.To maintain its advantages and safeguard national interests,the US government has made continuous efforts to explore and consolidate cyberspace power from three dimensions—adjusting ideologies,strengthening capabilities,and seeking institutional power.These trends will have profound impacts on the future development of,and power structures in,cyberspace.展开更多
Given the challenges facing the cyberspace of the nation, this paper presents the tripartite theory of cyberspace, based on the status quo of cyberspace. Corresponding strategies and a research architecture are propos...Given the challenges facing the cyberspace of the nation, this paper presents the tripartite theory of cyberspace, based on the status quo of cyberspace. Corresponding strategies and a research architecture are proposed for common public networks (C space), secure classified networks (S space), and key infras- tructure networks (K space), based on their individual characteristics. The features and security require- ments of these networks are then discussed. Taking C space as an example, we introduce the SMCRC (which stands for "situation awareness, monitoring and management, cooperative defense, response and recovery, and countermeasures and traceback") loop for constructing a cyberspace security ecosys- tem. Following a discussion on its characteristics and information exchange, our analysis focuses on the critical technologies of the SMCRC loop. To obtain more insight into national cyberspace security, special attention should be paid to global sensing and precise mapping, continuous detection and active manage- ment, cross-domain cooperation and systematic defense, autonomous response and rapid processing, and accurate traceback and countermeasure deterrence.展开更多
With the rapid growth of network technology, the methods and types of cyber-attacks are increasing rapidly. Traditional static passive defense technologies focus on external security and known threats to the target sy...With the rapid growth of network technology, the methods and types of cyber-attacks are increasing rapidly. Traditional static passive defense technologies focus on external security and known threats to the target system and cannot resist advanced persistent threats. To solve the situation that cyberspace security is easy to attack and difficult to defend, Chinese experts on cyberspace security proposed an innovative theory called mimic defense, it is an active defense technology that employs “Dynamic, Heterogeneous, Redundant” architecture to defense attacks. This article first briefly describes the classic network defense technology and Moving Target Defense (MTD). Next, it mainly explains in detail the principles of the mimic defense based on the DHR architecture and analyzes the attack surface of DHR architecture. This article also includes applications of mimic defense technology, such as mimic routers, and mimic web defense systems. Finally, it briefly summarizes the existing research on mimic defense, expounds the problems that need to be solved in mimic defense, and looks forward to the future development of mimic defense.展开更多
How to improve the rescue efficiency of the network after the earthquake is the key content of emergency management decision-making, improve the efficiency of emergency rescue, and reduce the impact of emergency rescu...How to improve the rescue efficiency of the network after the earthquake is the key content of emergency management decision-making, improve the efficiency of emergency rescue, and reduce the impact of emergency rescue to the non victims. Using cyberspace of lifeline network traffic and emergency transportation problem, considering the network restoration problem of disaster area, earthquake emergency supplies distribution model is established. In the model, to consider the need to repair the damaged sections and the existing emergency rescue generated traffic volume of emergency rescue network effects. And design heuristic algorithm for solving the model. Finally the example shows that in emergency rescue, emergency rescue of critical damage repair the road and traffic control of the whole lifeline network rescue efficiency highest, with the average nuisance greatly reduce, the lifeline network connectivity reliability.展开更多
In recent years,problems such as cyber warfares,cyber espionages and cyber crimes have become global public nuisances and always challenge the authority of the sovereign states. Therefore,the governance of the derivat...In recent years,problems such as cyber warfares,cyber espionages and cyber crimes have become global public nuisances and always challenge the authority of the sovereign states. Therefore,the governance of the derivative problems concerning the global cyberspace has become an issue of importance in the international law. To overcome these challenges,sovereign states begin to get involved in cyberspace and seek international cooperation,so as to promote the evolution of the international rule of law in cyberspace. Currently,the cyberspace is filled with contradictions and conflicts. The cyber hegemonic states monopolize basic resources for cyberspaces,and their liberalism of double standards is the best tool to maintain their centralized and dominant situations. Moreover,the differences on governance problems between different camps leads to the significant institutional supply shortage. Accordingly,as a responsible power,China should advocate the Chinese solution and wisdom so as to create the reform of global cyberspace governance system. Possible specific measures include clarifying the governance structure of sovereign state-orientation,adhering to the model of shared governance with multilateral approach and multi-party participation.展开更多
The rising role of state actors,in particular cyber powers in cyberspace governance,has become a promine nt feature of the governance process.All countries begin to take more proactive measures,in terms of building cy...The rising role of state actors,in particular cyber powers in cyberspace governance,has become a promine nt feature of the governance process.All countries begin to take more proactive measures,in terms of building cyber capacities,and getting more involved in global cyberspace governance.This process will be determined upon the interactions of China and the US to be framed within the laws and regulations of global cyberspace governance.展开更多
基金supported by Hebei Province Natural Science Fund for Distinguished Young Scholars (NO.E2020209082).
文摘In recent years,machine learning has made great progress in intrusion detection,network protection,anomaly detection,and other issues in cyberspace.However,these traditional machine learning algorithms usually require a lot of data to learn and have a low recognition rate for unknown attacks.Among them,“one-shot learning”,“few-shot learning”,and“zero-shot learning”are challenges that cannot be ignored for traditional machine learning.The more intractable problem in cyberspace security is the changeable attack mode.When a new attack mode appears,there are few or even zero samples that can be learned.Meta-learning comes from imitating human problem-solving methods as humans can quickly learn unknown things based on their existing knowledge when learning.Its purpose is to quickly obtain a model with high accuracy and strong generalization through less data training.This article first divides the meta-learning model into five research directions based on different principles of use.They are model-based,metric-based,optimization-based,online-learning-based,or stacked ensemble-based.Then,the current problems in the field of cyberspace security are categorized into three branches:cyber security,information security,and artificial intelligence security according to different perspectives.Then,the application research results of various meta-learning models on these three branches are reviewed.At the same time,based on the characteristics of strong generalization,evolution,and scalability of meta-learning,we contrast and summarize its advantages in solving problems.Finally,the prospect of future deep application of meta-learning in the field of cyberspace security is summarized.
基金supported by the National Natural Science Foundation Innovation Group Project(61521003)。
文摘Uncertain security threats caused by vulnerabilities and backdoors are the most serious and difficult problem in cyberspace.This paper analyzes the philosophical and technical causes of the existence of so-called"dark functions"such as system vulnerabilities and backdoors,and points out that endogenous security problems cannot be completely eliminated at the theoretical and engineering levels;rather,it is necessary to develop or utilize the endogenous security functions of the system architecture itself.In addition,this paper gives a definition for and lists the main technical characteristics of endogenous safety and security in cyberspace,introduces endogenous safety and security mechanisms and characteristics based on dynamic heterogeneous redundancy(DHR)architecture,and describes the theoretical implications of a coding channel based on DHR.
文摘以Web of Science数据库收录的有关研究Cyberspace的大量文献为数据源,采用文献计量学的分析方法,借助信息可视化软件CiteSpace Ⅱ对所采集的数据进行统计分析;获取1993 ~2013年检索数据,通过可视化图谱的方法挖掘出该领域的研究重点和学科分布;从地理学角度,揭示了该领域的研究热点和方向.
文摘运用CitespaceⅡ信息可视化图谱软件对"cyberspace" or "cyber warfare"研究文献数据进行分析,绘制了共引网络图谱,并依据图谱中关键节点文献的知识基础,对研究热点及趋势进行了初步探讨,得出国外研究的热点与前沿的相关结论,对"cyberspace" or "cyber warfare"的研究具有一定的参考价值。
基金This work was supported by the specific issues of national cyberspace security(Grant No.2018YFB0804001)the Innovative Research Groups of the National key R&D plan(Grant No.2020YFB18040803).
文摘With the rapid development of information technology,the cyberspace security problem is increasingly serious.Kinds of dynamic defense technology have emerged such as moving target defense and mimic defense.This paper aims to describe the architecture and analyze the performance of Cyberspace Mimic DNS based on generalized stochastic Petri net.We propose a general method of anti-attacking analysis.For general attack and special attack model,the available probability,escaped probability and nonspecial awareness probability are adopted to quantitatively analyze the system performance.And we expand the GSPN model to adjust to engineering practice by specifying randomness of different output vectors.The result shows that the proposed method is effective,and Mimic system has high anti-attacking performance.To deal with the special attack,we can integrate the traditional defense mechanism in engineering practice.Besides,we analyze the performance of mimic DNSframework based on multi-ruling proxy and input-output desperation,the results represent we can use multi ruling or high-speed cache servers to achieve the consistent cost of delay,throughput compared with single authorized DNS,it can effectively solve 10%to 20%performance loss caused by general ruling proxy.
文摘With its advantages in technological innovation,industrial leadership,and international influence,the United States(US)has long dominated cyberspace.However,with the evolution of international power structures,competition for power in cyberspace has intensified,thereby bringing unprecedented challenges to the US’dominance.Cyberspace has become an increasingly important battleground,especially in the context of Sino-US strategic competition.To maintain its advantages and safeguard national interests,the US government has made continuous efforts to explore and consolidate cyberspace power from three dimensions—adjusting ideologies,strengthening capabilities,and seeking institutional power.These trends will have profound impacts on the future development of,and power structures in,cyberspace.
文摘Given the challenges facing the cyberspace of the nation, this paper presents the tripartite theory of cyberspace, based on the status quo of cyberspace. Corresponding strategies and a research architecture are proposed for common public networks (C space), secure classified networks (S space), and key infras- tructure networks (K space), based on their individual characteristics. The features and security require- ments of these networks are then discussed. Taking C space as an example, we introduce the SMCRC (which stands for "situation awareness, monitoring and management, cooperative defense, response and recovery, and countermeasures and traceback") loop for constructing a cyberspace security ecosys- tem. Following a discussion on its characteristics and information exchange, our analysis focuses on the critical technologies of the SMCRC loop. To obtain more insight into national cyberspace security, special attention should be paid to global sensing and precise mapping, continuous detection and active manage- ment, cross-domain cooperation and systematic defense, autonomous response and rapid processing, and accurate traceback and countermeasure deterrence.
文摘With the rapid growth of network technology, the methods and types of cyber-attacks are increasing rapidly. Traditional static passive defense technologies focus on external security and known threats to the target system and cannot resist advanced persistent threats. To solve the situation that cyberspace security is easy to attack and difficult to defend, Chinese experts on cyberspace security proposed an innovative theory called mimic defense, it is an active defense technology that employs “Dynamic, Heterogeneous, Redundant” architecture to defense attacks. This article first briefly describes the classic network defense technology and Moving Target Defense (MTD). Next, it mainly explains in detail the principles of the mimic defense based on the DHR architecture and analyzes the attack surface of DHR architecture. This article also includes applications of mimic defense technology, such as mimic routers, and mimic web defense systems. Finally, it briefly summarizes the existing research on mimic defense, expounds the problems that need to be solved in mimic defense, and looks forward to the future development of mimic defense.
文摘How to improve the rescue efficiency of the network after the earthquake is the key content of emergency management decision-making, improve the efficiency of emergency rescue, and reduce the impact of emergency rescue to the non victims. Using cyberspace of lifeline network traffic and emergency transportation problem, considering the network restoration problem of disaster area, earthquake emergency supplies distribution model is established. In the model, to consider the need to repair the damaged sections and the existing emergency rescue generated traffic volume of emergency rescue network effects. And design heuristic algorithm for solving the model. Finally the example shows that in emergency rescue, emergency rescue of critical damage repair the road and traffic control of the whole lifeline network rescue efficiency highest, with the average nuisance greatly reduce, the lifeline network connectivity reliability.
基金funded by the Ministry of Education’s Humanities and Social Sciences Research Youth Fund Project“Research on Legal Issues in China Promoting the Construction of Cyberspace Global Governance System”(18YJC820060)Chongqing Municipal Education Commission’s Humanities and Social Sciences Research Project “Research on International Legal Institutionalization of Cyberspace Destiny Community”(20SKGH067)a phased achievement of interpretation and collaborative innovation team for the Research on Chongqing Municipal Xi Jinping Thought on Socialism with Chinese Characteristics for a New Era。
文摘In recent years,problems such as cyber warfares,cyber espionages and cyber crimes have become global public nuisances and always challenge the authority of the sovereign states. Therefore,the governance of the derivative problems concerning the global cyberspace has become an issue of importance in the international law. To overcome these challenges,sovereign states begin to get involved in cyberspace and seek international cooperation,so as to promote the evolution of the international rule of law in cyberspace. Currently,the cyberspace is filled with contradictions and conflicts. The cyber hegemonic states monopolize basic resources for cyberspaces,and their liberalism of double standards is the best tool to maintain their centralized and dominant situations. Moreover,the differences on governance problems between different camps leads to the significant institutional supply shortage. Accordingly,as a responsible power,China should advocate the Chinese solution and wisdom so as to create the reform of global cyberspace governance system. Possible specific measures include clarifying the governance structure of sovereign state-orientation,adhering to the model of shared governance with multilateral approach and multi-party participation.
基金one of the key projects of the philosophy and social sciences research of the Ministry of Education,Research on Building a Globalized Internet System.The project number is 17JZD032
文摘The rising role of state actors,in particular cyber powers in cyberspace governance,has become a promine nt feature of the governance process.All countries begin to take more proactive measures,in terms of building cyber capacities,and getting more involved in global cyberspace governance.This process will be determined upon the interactions of China and the US to be framed within the laws and regulations of global cyberspace governance.