|
|
|
本文已被:浏览 33次 下载 7次 |
 码上扫一扫! |
网络空间拟态防御综述 |
李炳萱,陈世展,许光全,贾云刚,王聪,薛飞,王晓,王伟,李哲涛,李建欣 |
|
(天津大学国际工程师学院 天津 中国 300350;天津大学智能与计算学部 天津 中国 300350;国家计算机网络应急技术处理协调中心天津分中心 天津 中国 300100;国网宁夏电力有限公司电力科学研究院 银川 中国 750001;天津大学智能与计算学部 天津 中国 300350;广东省安全智能新技术重点实验室 深圳 中国 518000;北京交通大学计算机与信息技术学院 北京 中国 100044;暨南大学信息科学技术学院 广州 中国 510632;北京航空航天大学计算机学院 北京 中国 100191) |
|
摘要: |
随着网络技术的不断发展,网络空间已经成为人们工作和个人生活中的重要组成部分。然而,对网络空间的日益依赖也带来了一系列安全挑战,数字领域的互联性质使其容易受到黑客攻击、数据泄露、身份盗窃等网络威胁,确保网络空间安全已成为当务之急。为保障网络空间安全,邬江兴院士基于拟态架构计算理论提出了网络空间拟态防御(Cyber Mimic Defense,CMD)理论体系,这一开创性理念旨在改变长期困扰网络空间“易攻难守”困境的安全格局,其内生安全效应彻底改变了拟态防御系统的防御能力,使其能够有效应对未知的安全威胁。自概念提出以来,众多学者致力于研究和推进网络空间拟态防御思想的概念框架和实际应用,并通过严格的建模评估对其原理进行了充分验证。本文对网络空间拟态防御相关研究展开全面概述,首先回顾了拟态防御思想的核心内涵;接着详细介绍了应用场景、架构研究和建模评估三个维度的工作方法和显著成果;最后,分析了网络空间拟态防御技术面临的挑战,并展望了未来发展方向和研究重点。通过总结该领域的研究工作与进展,本文有助于推进网络空间安全战略的持续努力,为从业者和研究人员提供宝贵参考。本文提供的全面概述旨在激发网络空间拟态防御领域的进一步探索和创新,不断增强网络空间面对持续不断的网络威胁所具有的安全性能。 |
关键词: 网络空间拟态防御 动态异构冗余架构 主动防御 内生安全 网络安全 |
DOI:10.19363/J.cnki.cn10-1380/tn.2025.05.06 |
投稿时间:2023-07-05修订日期:2023-10-23 |
基金项目:本课题得到国家重点研发计划(No. 2022YFB3102100), 国家自然科学基金项目(No. U22B202、 No. 62172297、 No. 62102262、 No.61902276、 No. 62272311), 天津市智能制造专项资金(No. 20211097), 天津自然科学基金面上项目(No. 22JCYBJC01550), 广东省安全智能新技术重点实验室项目(No. 2022B1212010005), 广西科技计划项目(No. AD23026096)资助。 |
|
A Review of Cyberspace Mimic Defense Research |
LI Bingxuan,CHEN Shizhan,XU Guangquan,JIA Yungang,WANG Cong,XUE Fei,WANG Xiao,WANG Wei,LI Zhetao,LI Jianxin |
Tianjin International Engineering Institute, Tianjin University, Tianjin 300350, China;College of Intelligence and Computing, Tianjin University, Tianjin 300350, China;Tianjin Branch of the National Computer Network Emergency Technology Handling and Coordination Center, Tianjin 300100, China;Electric Power Research Institute of State Grid Ningxia Electric Power Co., Ltd, Yinchuan 750001, China;College of Intelligence and Computing, Tianjin University, Tianjin 300350, China;Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies, Shenzhen 518000, China;School of Computer and Information Technology, Beijing Jiaotong University, Beijing 100044, China;College of Information Science and Technology, Jinan University, Guangzhou 510632, China;School of Computer Science and Technology, Beihang University, Beijing 100191, China |
Abstract: |
With the continuous development of network technology, cyberspace has become an integral and pervasive aspect of people’s work and personal lives. However, the increasing dependence on cyberspace has also brought a series of security challenges. The interconnected nature of the digital field makes it vulnerable to cyber threats such as hacker attacks, data leaks, and identity theft. Ensuring cyberspace security has become a top priority. To address this pressing need, Academician Wu Jiangxing proposed the theoretical system of Cyberspace Mimic Defense (CMD) based on the theory of Mimic Structure Calculation(MSC). CMD aims to transform the security landscape of cyberspace, which has long been plagued by the predicament of being “easy to attack but difficult to defend” Its endogenous security mechanisms have revolutionized the capabilities of the mimic defense system, enabling it to effectively counter unknown security threats. Since the introduction of this concept, numerous scholars have conducted extensive research on the conceptual framework and practical implementation of cyberspace mimic defense, duly substantiating its principles through rigorous modeling and evaluation. This paper provides a comprehensive overview of research on Cyberspace Mimic Defense. First, it reviews the core connotation of mimic defense thought. It introduces the working methods and remarkable achievements in the dimensions of application scenarios, architecture research, and modeling evaluation. Furthermore, the paper analyzes the challenges faced by Cyberspace Mimic Defense technology, and provides an outlook on future development directions and research priorities in the field of Cyberspace Mimic Defense. By summarizing the research work and progress in this field, this paper contributes to the advancement of secure cyberspace strategies. It serves as a valuable reference for practitioners and researchers alike, providing insights into the principles, methodologies, and achievements of Cyberspace Mimic Defense. The comprehensive overview offered in this article aims to stimulate further exploration, innovation, and collaboration in the field, ultimately enhancing the resilience and security of cyberspace in the face of evolving cyber threats. |
Key words: cyber mimic defense dynamic heterogeneous redundancy active defense endogenous safety and security cybersecurity |
|
|
|
|
|
|