期刊文献+

内生安全赋能网络弹性的构想、方法与策略

Cyber Resilience Enabled by Endogenous Security and Safety:Vision,Techniques,and Strategies
下载PDF
导出
摘要 网络弹性工程是美国、欧洲等发达国家和地区针对数字化转型、新发展形势下的网络安全挑战所采取的技术性措施,旨在以网络弹性标准为依托,构建数字技术准入“壁垒”,同时从应用服务侧和设备供应侧同时发力,提高自身数字设施和数字产品的安全能力。本文着眼网络弹性工程实施对我国发展新一代网络信息技术带来的影响和挑战,递次阐述了弹性、网络弹性、网络弹性工程的概念,从网络弹性工程的政策驱动、战略考量、发展困境等方面剖析了国外网络弹性工程的应用进展;基于内生安全理论提出了一种新的动态异构冗余架构,描述了内生安全赋能网络弹性的内在机理,阐释了内生安全赋能网络弹性的基本构想与应用方法。研究建议,加快技术创新,抵消发达国家网络弹性工程的组合效应;推动建立中国特色网络弹性政策法规体系;建立相应监管体系,明确网络安全责任边界;建立可量化、可验证、具有公信力的测试评价体系;采取市场化金融手段,多路径助力网络弹性实施,以期系统性增强我国网络弹性,推动网络强国建设。 Cyber resilience engineering is a technical approach embraced by countries and regions such as the United States and Europe to implement digital transformation and address network security challenges under new circumstances.It aims to keep the barriers to entry high for digital technologies based on the cyber resilience standard and to improve the digital infrastructure security capability of China from both the application service and device supply sides.This study focuses on the impact and challenges brought by the initiatives of cyber resilience engineering in the United States and Europe on the development of new-generation network information technology in China.It starts from a concept introduction of resilience,cyber resilience,and cyber resilience engineering.Subsequently,it elaborates on the application progress of cyber resilience engineering in the United States and Europe in terms of policy drivers,strategic considerations,and development dilemmas.Moreover,the study goes further to propose a dynamic heterogeneous redundancy architecture based on an endogenous security and safety(ESS)theory.It describes and illustrates the intrinsic mechanism,basic concepts,and application methods of cyber resilience empowered by ESS.Furthermore,we propose that China should accelerate innovation to offset the combined effects of cyber resilience engineering in developed countries,introduce a cyber resilience policy and law system with Chinese characteristics,establish corresponding regulatory systems to clarify the network security responsibilities,establish a quantifiable,verifiable,and credible testing and evaluation system,and boost the holistic implementation of cyber resilience with a multipronged approach including financial marketization,hoping to systematically enhance the cyber resilience and strength of China.
作者 邬江兴 邹宏 薛向阳 张帆 尚玉婷 Wu Jiangxing;Zou Hong;Xue Xiangyang;Zhang Fan;Shang Yuting(Institute of Big Data,Fudan University,Shanghai 200433,China;National Digital Switching System Engineering&Technological R&D Center,Zhengzhou 450002,China)
出处 《中国工程科学》 CSCD 北大核心 2023年第6期106-115,共10页 Strategic Study of CAE
基金 国家重点研发计划项目(2022YFB3102901) 中国工程院咨询项目“新发展理念引领的网络强国战略研究”(2022-HYZD-02)。
关键词 网络空间 内生安全 网络弹性 结构加密 动态异构冗余架构 cyberspace endogenous security and safety cyber resilience structure encryption dynamic heterogeneous redundancy architecture
  • 相关文献

参考文献5

二级参考文献19

  • 1PARK T, SHIN K G. LISP: A lightweight security pro- tocol for wireless sensor networks [J]. A CM Transac-tions on Embedded Computing Systems (TECS), 2004, 3: 634-660. 被引量:1
  • 2PISTER K, KAHN J, BOSER B. Smart dust [EB/OL]. (2009-06-01). http:Hrobotics.eecs.berkeley.edu/~pister/ SmartDust/. 被引量:1
  • 3KAUAR F, HUSSIAN S, YANG L T, et al. Scalable and efficient key management for heterogeneous sensor net- works [J]. The Journal of Supercomputing, 2008, 45(1): 44-65. 被引量:1
  • 4Lu K, QIAN Y, HU J. A framework for distributed key management schemes in heterogeneous wireless sensor networks [C]// Proceedings of 25th IEEE International Performance, Computing, and Communications Con- ference, IPCCC 2006. [s.1.]: IEEE, 2006: 513-519. 被引量:1
  • 5TRAYNOR P, KUMAR R, CHOI H, et al. Efficient hy- brid security mechanisms for heterogeneous sensor net- works [J]. IEEE Transactions on Mobile Computing, 2007, 6: 663-677. 被引量:1
  • 6LIU D, NING P. Location-based pairwise key estab- lishments for static sensor networks [C]//ACM Work- shop on Security in Ad Hoe and Sensor Networks (SASN '03).[s.1.]: ACM Press, 2003: 72-82. 被引量:1
  • 7Yu Z, GUAN Y. A key pre-distribution scheme using deployment knowledge for wireless sensor net- works [C]// Proceedings of Fourth International Sym- posium on Information Processing in Sensor Networks. Piscataway, N J, USA: IEEE, 2005: 261-268. 被引量:1
  • 8LIU D, NING P. Establishing pairwise keys in dis- tributed sensor networks [C]//Proceedings of lOth ACM Conference on Computer and Communications Security (CCS'03). Washington, DC, USA: ACM Press, 2003: 52-61. 被引量:1
  • 9BLUNDO C, SANTIS A D, HERZBERG A, et al. Perfectly-secure key distribution for dynamic confer- ences [C]// Proceedings of Advances in Cryptology- CRYPTO'92, LNCS 740. California, USA: ACM Press, 1993: 471-486. 被引量:1
  • 10CHAN H, GLIGOR V D, PERRIG A, et al. On the distri- bution and revocation of cryptographic keys in sensor networks [J]. IEEE Transactions on Dependable and Secure Computing, 2005, 2: 233-247. 被引量:1

共引文献33

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部