In recent years,machine learning has made great progress in intrusion detection,network protection,anomaly detection,and other issues in cyberspace.However,these traditional machine learning algorithms usually require...In recent years,machine learning has made great progress in intrusion detection,network protection,anomaly detection,and other issues in cyberspace.However,these traditional machine learning algorithms usually require a lot of data to learn and have a low recognition rate for unknown attacks.Among them,“one-shot learning”,“few-shot learning”,and“zero-shot learning”are challenges that cannot be ignored for traditional machine learning.The more intractable problem in cyberspace security is the changeable attack mode.When a new attack mode appears,there are few or even zero samples that can be learned.Meta-learning comes from imitating human problem-solving methods as humans can quickly learn unknown things based on their existing knowledge when learning.Its purpose is to quickly obtain a model with high accuracy and strong generalization through less data training.This article first divides the meta-learning model into five research directions based on different principles of use.They are model-based,metric-based,optimization-based,online-learning-based,or stacked ensemble-based.Then,the current problems in the field of cyberspace security are categorized into three branches:cyber security,information security,and artificial intelligence security according to different perspectives.Then,the application research results of various meta-learning models on these three branches are reviewed.At the same time,based on the characteristics of strong generalization,evolution,and scalability of meta-learning,we contrast and summarize its advantages in solving problems.Finally,the prospect of future deep application of meta-learning in the field of cyberspace security is summarized.展开更多
Uncertain security threats caused by vulnerabilities and backdoors are the most serious and difficult problem in cyberspace.This paper analyzes the philosophical and technical causes of the existence of so-called"...Uncertain security threats caused by vulnerabilities and backdoors are the most serious and difficult problem in cyberspace.This paper analyzes the philosophical and technical causes of the existence of so-called"dark functions"such as system vulnerabilities and backdoors,and points out that endogenous security problems cannot be completely eliminated at the theoretical and engineering levels;rather,it is necessary to develop or utilize the endogenous security functions of the system architecture itself.In addition,this paper gives a definition for and lists the main technical characteristics of endogenous safety and security in cyberspace,introduces endogenous safety and security mechanisms and characteristics based on dynamic heterogeneous redundancy(DHR)architecture,and describes the theoretical implications of a coding channel based on DHR.展开更多
以Web of Science数据库收录的有关研究Cyberspace的大量文献为数据源,采用文献计量学的分析方法,借助信息可视化软件CiteSpace Ⅱ对所采集的数据进行统计分析;获取1993 ~2013年检索数据,通过可视化图谱的方法挖掘出该领域的研究重点...以Web of Science数据库收录的有关研究Cyberspace的大量文献为数据源,采用文献计量学的分析方法,借助信息可视化软件CiteSpace Ⅱ对所采集的数据进行统计分析;获取1993 ~2013年检索数据,通过可视化图谱的方法挖掘出该领域的研究重点和学科分布;从地理学角度,揭示了该领域的研究热点和方向.展开更多
运用CitespaceⅡ信息可视化图谱软件对"cyberspace" or "cyber warfare"研究文献数据进行分析,绘制了共引网络图谱,并依据图谱中关键节点文献的知识基础,对研究热点及趋势进行了初步探讨,得出国外研究的热点与前沿...运用CitespaceⅡ信息可视化图谱软件对"cyberspace" or "cyber warfare"研究文献数据进行分析,绘制了共引网络图谱,并依据图谱中关键节点文献的知识基础,对研究热点及趋势进行了初步探讨,得出国外研究的热点与前沿的相关结论,对"cyberspace" or "cyber warfare"的研究具有一定的参考价值。展开更多
With the rapid development of information technology,the cyberspace security problem is increasingly serious.Kinds of dynamic defense technology have emerged such as moving target defense and mimic defense.This paper ...With the rapid development of information technology,the cyberspace security problem is increasingly serious.Kinds of dynamic defense technology have emerged such as moving target defense and mimic defense.This paper aims to describe the architecture and analyze the performance of Cyberspace Mimic DNS based on generalized stochastic Petri net.We propose a general method of anti-attacking analysis.For general attack and special attack model,the available probability,escaped probability and nonspecial awareness probability are adopted to quantitatively analyze the system performance.And we expand the GSPN model to adjust to engineering practice by specifying randomness of different output vectors.The result shows that the proposed method is effective,and Mimic system has high anti-attacking performance.To deal with the special attack,we can integrate the traditional defense mechanism in engineering practice.Besides,we analyze the performance of mimic DNSframework based on multi-ruling proxy and input-output desperation,the results represent we can use multi ruling or high-speed cache servers to achieve the consistent cost of delay,throughput compared with single authorized DNS,it can effectively solve 10%to 20%performance loss caused by general ruling proxy.展开更多
With the rapid growth of network technology, the methods and types of cyber-attacks are increasing rapidly. Traditional static passive defense technologies focus on external security and known threats to the target sy...With the rapid growth of network technology, the methods and types of cyber-attacks are increasing rapidly. Traditional static passive defense technologies focus on external security and known threats to the target system and cannot resist advanced persistent threats. To solve the situation that cyberspace security is easy to attack and difficult to defend, Chinese experts on cyberspace security proposed an innovative theory called mimic defense, it is an active defense technology that employs “Dynamic, Heterogeneous, Redundant” architecture to defense attacks. This article first briefly describes the classic network defense technology and Moving Target Defense (MTD). Next, it mainly explains in detail the principles of the mimic defense based on the DHR architecture and analyzes the attack surface of DHR architecture. This article also includes applications of mimic defense technology, such as mimic routers, and mimic web defense systems. Finally, it briefly summarizes the existing research on mimic defense, expounds the problems that need to be solved in mimic defense, and looks forward to the future development of mimic defense.展开更多
How to improve the rescue efficiency of the network after the earthquake is the key content of emergency management decision-making, improve the efficiency of emergency rescue, and reduce the impact of emergency rescu...How to improve the rescue efficiency of the network after the earthquake is the key content of emergency management decision-making, improve the efficiency of emergency rescue, and reduce the impact of emergency rescue to the non victims. Using cyberspace of lifeline network traffic and emergency transportation problem, considering the network restoration problem of disaster area, earthquake emergency supplies distribution model is established. In the model, to consider the need to repair the damaged sections and the existing emergency rescue generated traffic volume of emergency rescue network effects. And design heuristic algorithm for solving the model. Finally the example shows that in emergency rescue, emergency rescue of critical damage repair the road and traffic control of the whole lifeline network rescue efficiency highest, with the average nuisance greatly reduce, the lifeline network connectivity reliability.展开更多
In recent years,problems such as cyber warfares,cyber espionages and cyber crimes have become global public nuisances and always challenge the authority of the sovereign states. Therefore,the governance of the derivat...In recent years,problems such as cyber warfares,cyber espionages and cyber crimes have become global public nuisances and always challenge the authority of the sovereign states. Therefore,the governance of the derivative problems concerning the global cyberspace has become an issue of importance in the international law. To overcome these challenges,sovereign states begin to get involved in cyberspace and seek international cooperation,so as to promote the evolution of the international rule of law in cyberspace. Currently,the cyberspace is filled with contradictions and conflicts. The cyber hegemonic states monopolize basic resources for cyberspaces,and their liberalism of double standards is the best tool to maintain their centralized and dominant situations. Moreover,the differences on governance problems between different camps leads to the significant institutional supply shortage. Accordingly,as a responsible power,China should advocate the Chinese solution and wisdom so as to create the reform of global cyberspace governance system. Possible specific measures include clarifying the governance structure of sovereign state-orientation,adhering to the model of shared governance with multilateral approach and multi-party participation.展开更多
The rising role of state actors,in particular cyber powers in cyberspace governance,has become a promine nt feature of the governance process.All countries begin to take more proactive measures,in terms of building cy...The rising role of state actors,in particular cyber powers in cyberspace governance,has become a promine nt feature of the governance process.All countries begin to take more proactive measures,in terms of building cyber capacities,and getting more involved in global cyberspace governance.This process will be determined upon the interactions of China and the US to be framed within the laws and regulations of global cyberspace governance.展开更多
Often regarded as one crucial concept in the current of poststructrualistic thought,intertextuality is influential with regard to its application in discursive perspective and literary criticism.This paper argues that...Often regarded as one crucial concept in the current of poststructrualistic thought,intertextuality is influential with regard to its application in discursive perspective and literary criticism.This paper argues that the notion should also be understood in the theoretical backdrop of how the concept of subject is constructed in the 1960s.Two critics are specifically mentioned in the discussion:Julia Kristeva’s psychoanalytic understanding of the subject in process that stresses the transpositions of signs in both textual and contextual meanings complicates the once delimited register of textuality,while Roland Barthes,with his claim of the demise of the author,appeals for a reevaluation of the conventional grasp of the idea of the writer and the reader,and their relations with the text.This paper will conclude with one of the most significant derivations of intertextuality—hypertextuality.Relevant to how modern subjects in the era of digitalization read and write,this latter concept materializes,in cyberspace,the documents of printed media,and substantially demonstrates the liquification of information on the Internet.展开更多
基金supported by Hebei Province Natural Science Fund for Distinguished Young Scholars (NO.E2020209082).
文摘In recent years,machine learning has made great progress in intrusion detection,network protection,anomaly detection,and other issues in cyberspace.However,these traditional machine learning algorithms usually require a lot of data to learn and have a low recognition rate for unknown attacks.Among them,“one-shot learning”,“few-shot learning”,and“zero-shot learning”are challenges that cannot be ignored for traditional machine learning.The more intractable problem in cyberspace security is the changeable attack mode.When a new attack mode appears,there are few or even zero samples that can be learned.Meta-learning comes from imitating human problem-solving methods as humans can quickly learn unknown things based on their existing knowledge when learning.Its purpose is to quickly obtain a model with high accuracy and strong generalization through less data training.This article first divides the meta-learning model into five research directions based on different principles of use.They are model-based,metric-based,optimization-based,online-learning-based,or stacked ensemble-based.Then,the current problems in the field of cyberspace security are categorized into three branches:cyber security,information security,and artificial intelligence security according to different perspectives.Then,the application research results of various meta-learning models on these three branches are reviewed.At the same time,based on the characteristics of strong generalization,evolution,and scalability of meta-learning,we contrast and summarize its advantages in solving problems.Finally,the prospect of future deep application of meta-learning in the field of cyberspace security is summarized.
基金supported by the National Natural Science Foundation Innovation Group Project(61521003)。
文摘Uncertain security threats caused by vulnerabilities and backdoors are the most serious and difficult problem in cyberspace.This paper analyzes the philosophical and technical causes of the existence of so-called"dark functions"such as system vulnerabilities and backdoors,and points out that endogenous security problems cannot be completely eliminated at the theoretical and engineering levels;rather,it is necessary to develop or utilize the endogenous security functions of the system architecture itself.In addition,this paper gives a definition for and lists the main technical characteristics of endogenous safety and security in cyberspace,introduces endogenous safety and security mechanisms and characteristics based on dynamic heterogeneous redundancy(DHR)architecture,and describes the theoretical implications of a coding channel based on DHR.
文摘以Web of Science数据库收录的有关研究Cyberspace的大量文献为数据源,采用文献计量学的分析方法,借助信息可视化软件CiteSpace Ⅱ对所采集的数据进行统计分析;获取1993 ~2013年检索数据,通过可视化图谱的方法挖掘出该领域的研究重点和学科分布;从地理学角度,揭示了该领域的研究热点和方向.
文摘运用CitespaceⅡ信息可视化图谱软件对"cyberspace" or "cyber warfare"研究文献数据进行分析,绘制了共引网络图谱,并依据图谱中关键节点文献的知识基础,对研究热点及趋势进行了初步探讨,得出国外研究的热点与前沿的相关结论,对"cyberspace" or "cyber warfare"的研究具有一定的参考价值。
基金This work was supported by the specific issues of national cyberspace security(Grant No.2018YFB0804001)the Innovative Research Groups of the National key R&D plan(Grant No.2020YFB18040803).
文摘With the rapid development of information technology,the cyberspace security problem is increasingly serious.Kinds of dynamic defense technology have emerged such as moving target defense and mimic defense.This paper aims to describe the architecture and analyze the performance of Cyberspace Mimic DNS based on generalized stochastic Petri net.We propose a general method of anti-attacking analysis.For general attack and special attack model,the available probability,escaped probability and nonspecial awareness probability are adopted to quantitatively analyze the system performance.And we expand the GSPN model to adjust to engineering practice by specifying randomness of different output vectors.The result shows that the proposed method is effective,and Mimic system has high anti-attacking performance.To deal with the special attack,we can integrate the traditional defense mechanism in engineering practice.Besides,we analyze the performance of mimic DNSframework based on multi-ruling proxy and input-output desperation,the results represent we can use multi ruling or high-speed cache servers to achieve the consistent cost of delay,throughput compared with single authorized DNS,it can effectively solve 10%to 20%performance loss caused by general ruling proxy.
文摘With the rapid growth of network technology, the methods and types of cyber-attacks are increasing rapidly. Traditional static passive defense technologies focus on external security and known threats to the target system and cannot resist advanced persistent threats. To solve the situation that cyberspace security is easy to attack and difficult to defend, Chinese experts on cyberspace security proposed an innovative theory called mimic defense, it is an active defense technology that employs “Dynamic, Heterogeneous, Redundant” architecture to defense attacks. This article first briefly describes the classic network defense technology and Moving Target Defense (MTD). Next, it mainly explains in detail the principles of the mimic defense based on the DHR architecture and analyzes the attack surface of DHR architecture. This article also includes applications of mimic defense technology, such as mimic routers, and mimic web defense systems. Finally, it briefly summarizes the existing research on mimic defense, expounds the problems that need to be solved in mimic defense, and looks forward to the future development of mimic defense.
文摘How to improve the rescue efficiency of the network after the earthquake is the key content of emergency management decision-making, improve the efficiency of emergency rescue, and reduce the impact of emergency rescue to the non victims. Using cyberspace of lifeline network traffic and emergency transportation problem, considering the network restoration problem of disaster area, earthquake emergency supplies distribution model is established. In the model, to consider the need to repair the damaged sections and the existing emergency rescue generated traffic volume of emergency rescue network effects. And design heuristic algorithm for solving the model. Finally the example shows that in emergency rescue, emergency rescue of critical damage repair the road and traffic control of the whole lifeline network rescue efficiency highest, with the average nuisance greatly reduce, the lifeline network connectivity reliability.
基金funded by the Ministry of Education’s Humanities and Social Sciences Research Youth Fund Project“Research on Legal Issues in China Promoting the Construction of Cyberspace Global Governance System”(18YJC820060)Chongqing Municipal Education Commission’s Humanities and Social Sciences Research Project “Research on International Legal Institutionalization of Cyberspace Destiny Community”(20SKGH067)a phased achievement of interpretation and collaborative innovation team for the Research on Chongqing Municipal Xi Jinping Thought on Socialism with Chinese Characteristics for a New Era。
文摘In recent years,problems such as cyber warfares,cyber espionages and cyber crimes have become global public nuisances and always challenge the authority of the sovereign states. Therefore,the governance of the derivative problems concerning the global cyberspace has become an issue of importance in the international law. To overcome these challenges,sovereign states begin to get involved in cyberspace and seek international cooperation,so as to promote the evolution of the international rule of law in cyberspace. Currently,the cyberspace is filled with contradictions and conflicts. The cyber hegemonic states monopolize basic resources for cyberspaces,and their liberalism of double standards is the best tool to maintain their centralized and dominant situations. Moreover,the differences on governance problems between different camps leads to the significant institutional supply shortage. Accordingly,as a responsible power,China should advocate the Chinese solution and wisdom so as to create the reform of global cyberspace governance system. Possible specific measures include clarifying the governance structure of sovereign state-orientation,adhering to the model of shared governance with multilateral approach and multi-party participation.
基金one of the key projects of the philosophy and social sciences research of the Ministry of Education,Research on Building a Globalized Internet System.The project number is 17JZD032
文摘The rising role of state actors,in particular cyber powers in cyberspace governance,has become a promine nt feature of the governance process.All countries begin to take more proactive measures,in terms of building cyber capacities,and getting more involved in global cyberspace governance.This process will be determined upon the interactions of China and the US to be framed within the laws and regulations of global cyberspace governance.
文摘Often regarded as one crucial concept in the current of poststructrualistic thought,intertextuality is influential with regard to its application in discursive perspective and literary criticism.This paper argues that the notion should also be understood in the theoretical backdrop of how the concept of subject is constructed in the 1960s.Two critics are specifically mentioned in the discussion:Julia Kristeva’s psychoanalytic understanding of the subject in process that stresses the transpositions of signs in both textual and contextual meanings complicates the once delimited register of textuality,while Roland Barthes,with his claim of the demise of the author,appeals for a reevaluation of the conventional grasp of the idea of the writer and the reader,and their relations with the text.This paper will conclude with one of the most significant derivations of intertextuality—hypertextuality.Relevant to how modern subjects in the era of digitalization read and write,this latter concept materializes,in cyberspace,the documents of printed media,and substantially demonstrates the liquification of information on the Internet.