This paper discusses one of the contemporary challenging issues--it is the challenge of e-commerce to the sovereignty of the state, where governments are unable to implement their own laws on disputed cases resulting ...This paper discusses one of the contemporary challenging issues--it is the challenge of e-commerce to the sovereignty of the state, where governments are unable to implement their own laws on disputed cases resulting from trans-border e-commerce interactions. The objective of the current research is to draw attention to the impact of international characteristics of e-commerce on the sovereignty of state, and to identify the factors affecting this sovereignty. The issue of the dynamieity of time and place will be taken into consideration, where activities carded out over the internet are characterized by their cross-border dimension. Based on real e-commerce case studies disputed on international level, this paper will draw on the legal perspective of cyberspace, identifying the relationship between cyberspace and state sovereignty, and outlining the mechanisms by which cyberspace could cross borders and the territory of the state despite all the precautions taken by the state to protect its sovereignty.展开更多
With the rapid growth of network technology, the methods and types of cyber-attacks are increasing rapidly. Traditional static passive defense technologies focus on external security and known threats to the target sy...With the rapid growth of network technology, the methods and types of cyber-attacks are increasing rapidly. Traditional static passive defense technologies focus on external security and known threats to the target system and cannot resist advanced persistent threats. To solve the situation that cyberspace security is easy to attack and difficult to defend, Chinese experts on cyberspace security proposed an innovative theory called mimic defense, it is an active defense technology that employs “Dynamic, Heterogeneous, Redundant” architecture to defense attacks. This article first briefly describes the classic network defense technology and Moving Target Defense (MTD). Next, it mainly explains in detail the principles of the mimic defense based on the DHR architecture and analyzes the attack surface of DHR architecture. This article also includes applications of mimic defense technology, such as mimic routers, and mimic web defense systems. Finally, it briefly summarizes the existing research on mimic defense, expounds the problems that need to be solved in mimic defense, and looks forward to the future development of mimic defense.展开更多
当前,随着网络技术的不断发展,网络空间日趋复杂,网络资产种类和数量越来越多,网络空间安全形势严峻。通过网络资产探测可以帮助网络安全人员掌握网络资产状况,发现非法资产接入情况,及时了解隐藏在网络中的安全风险。基于此,分析了当...当前,随着网络技术的不断发展,网络空间日趋复杂,网络资产种类和数量越来越多,网络空间安全形势严峻。通过网络资产探测可以帮助网络安全人员掌握网络资产状况,发现非法资产接入情况,及时了解隐藏在网络中的安全风险。基于此,分析了当前网络资产探测的现状,提出了一种基于结构特征的网络资产识别技术,从局部特征和全局特征两个方面对网络资产特征进行刻画,并使用最长公共子序列(Longest Common Sequence,LCS)算法计算网络资产结构特征的相似性。最后,通过分析说明了所提方法的优势,并在实际环境中进行了验证。展开更多
文摘This paper discusses one of the contemporary challenging issues--it is the challenge of e-commerce to the sovereignty of the state, where governments are unable to implement their own laws on disputed cases resulting from trans-border e-commerce interactions. The objective of the current research is to draw attention to the impact of international characteristics of e-commerce on the sovereignty of state, and to identify the factors affecting this sovereignty. The issue of the dynamieity of time and place will be taken into consideration, where activities carded out over the internet are characterized by their cross-border dimension. Based on real e-commerce case studies disputed on international level, this paper will draw on the legal perspective of cyberspace, identifying the relationship between cyberspace and state sovereignty, and outlining the mechanisms by which cyberspace could cross borders and the territory of the state despite all the precautions taken by the state to protect its sovereignty.
文摘With the rapid growth of network technology, the methods and types of cyber-attacks are increasing rapidly. Traditional static passive defense technologies focus on external security and known threats to the target system and cannot resist advanced persistent threats. To solve the situation that cyberspace security is easy to attack and difficult to defend, Chinese experts on cyberspace security proposed an innovative theory called mimic defense, it is an active defense technology that employs “Dynamic, Heterogeneous, Redundant” architecture to defense attacks. This article first briefly describes the classic network defense technology and Moving Target Defense (MTD). Next, it mainly explains in detail the principles of the mimic defense based on the DHR architecture and analyzes the attack surface of DHR architecture. This article also includes applications of mimic defense technology, such as mimic routers, and mimic web defense systems. Finally, it briefly summarizes the existing research on mimic defense, expounds the problems that need to be solved in mimic defense, and looks forward to the future development of mimic defense.
文摘当前,随着网络技术的不断发展,网络空间日趋复杂,网络资产种类和数量越来越多,网络空间安全形势严峻。通过网络资产探测可以帮助网络安全人员掌握网络资产状况,发现非法资产接入情况,及时了解隐藏在网络中的安全风险。基于此,分析了当前网络资产探测的现状,提出了一种基于结构特征的网络资产识别技术,从局部特征和全局特征两个方面对网络资产特征进行刻画,并使用最长公共子序列(Longest Common Sequence,LCS)算法计算网络资产结构特征的相似性。最后,通过分析说明了所提方法的优势,并在实际环境中进行了验证。