浏览全部资源
扫码关注微信
1. 国防科技大学,湖南 长沙 410073
2. 中国电子设备系统工程公司,北京 100089
[ "亓玉璐(1986-),女,国防科技大学博士生,主要研究方向为网络信息安全" ]
[ "江荣(1984-),男,博士,国防科技大学助理研究员,主要研究方向为网络空间安全大数据分析" ]
[ "荣星(1986-),男,中国电子设备系统工程公司工程师,主要研究方向为网络安全、云计算" ]
[ "李爱平(1974-),男,博士,国防科技大学研究员,主要研究方向为语义网络、数据挖掘和网络信息安全" ]
网络出版日期:2021-09,
纸质出版日期:2021-09-20
移动端阅览
亓玉璐, 江荣, 荣星, 等. 基于网络安全知识图谱的天地一体化信息网络攻击研判框架[J]. 天地一体化信息网络, 2021,2(3):57-65.
Yulu QI, Rong JIANG, Xing RONG, et al. Attack Analysis Framework of Space-Integrated-Ground Information Network Based on Cybersecurity Knowledge Graph[J]. Space-integrated-ground information networks, 2021, 2(3): 57-65.
亓玉璐, 江荣, 荣星, 等. 基于网络安全知识图谱的天地一体化信息网络攻击研判框架[J]. 天地一体化信息网络, 2021,2(3):57-65. DOI: 10.11959/j.issn.2096-8930.2021031.
Yulu QI, Rong JIANG, Xing RONG, et al. Attack Analysis Framework of Space-Integrated-Ground Information Network Based on Cybersecurity Knowledge Graph[J]. Space-integrated-ground information networks, 2021, 2(3): 57-65. DOI: 10.11959/j.issn.2096-8930.2021031.
天地一体化信息网络在实现全球覆盖、随遇接入、按需服务、安全可信的同时,也面临着更加复杂多变的安全威胁,相比于传统互联网,卫星网络具有拓扑的高动态变化、特有的数据传输协议和格式等特点。因此,将卫星网络攻击的规律融合到APT攻击的规律中,构建天地一体化信息网络安全知识图谱和攻击规则库,进而对天地一体化信息网络攻击进行综合研判。采用包含时空属性的数据模型表达攻击规律,在数据有非连续漏报和误报的情况下,可以进行攻击研判的补全。本文提出的攻击研判框架可以实时、准确地感知天地一体化信息网络的安全状态,并为其威胁响应提供决策支撑。
While realizing global coverage
random access
on-demand service
security and credibility
the space-integrated-ground information network(SGIN) is confronted with more complex and variable security threats.Compared with the internet
satellite network has a lot of diff erences
such as highly dynamic changes of topology
transfer protocol and data format.In terms of these questions
it was necessary to integrated the rule of satellite network attacks into the rules of APT attacks
developed the cybersecurity knowledge graph and the attack rules library to analyzed the attacks of the SGIN.The pattern of attack rules was expressed based on time-space data model
which was used to completed the attack chain when there were non-continuous missed data or false positives data.The attack analysis framework proposed in this paper could accurately perceived the security status of the SGIN in real time
and provided decision support for the SGIN.
方滨兴 . 定义网络空间安全 [J ] . 网络与信息安全学报 , 2018 , 4 ( 1 ): 1 - 5 .
FANG B X . Define cyberspace security [J ] . Chinese Journal of Network and Information Security , 2018 , 4 ( 1 ): 1 - 5 .
季新生 , 梁浩 , 扈红超 . 天地一体化信息网络安全防护技术的新思考 [J ] . 电信科学 , 2017 , 33 ( 12 ): 24 - 35 .
JI X S , LIANG H , HU H C . New thoughts on security technologies for space-ground integration information network [J ] . Telecommunications Science , 2017 , 33 ( 12 ): 24 - 35 .
蒋盘林 . 反卫星电子攻击综述 [J ] . 通信对抗 , 2016 ( 2 ): 42 - 46 .
JIANG P L . Review of anti-satellite electronic attack [J ] . Communication Countermeasures , 2016 ( 2 ): 42 - 46 .
李凤华 , 殷丽华 , 吴巍 , 等 . 天地一体化信息网络安全保障技术研究进展及发展趋势 [J ] . 通信学报 , 2016 , 37 ( 11 ): 156 - 168 .
LI F H , YIN L H , WU W , et al . Research status and development trends of security assurance for space-ground integration information network [J ] . Journal on Communications , 2016 , 37 ( 11 ): 156 - 168 .
KIWIA D , DEHGHANTANHA A , CHOO K K R , et al . A cyber kill chain based taxonomy of banking Trojans for evolutionary computational intelligence [J ] . Journal of Computational Science , 2018 , 27 : 394 - 409 .
BRYANT B D , SAIEDIAN H . A novel kill-chain framework for remote security log analysis with SIEM software [J ] . Computers &Security , 2017 , 67 : 198 - 210 .
漆桂林 , 高桓 , 吴天星 . 知识图谱研究进展 [J ] . 情报工程 , 2017 , 3 ( 1 ): 4 - 25 .
QI G L , GAO H , WU T X . The research advances of knowledge graph [J ] . Technology Intelligence Engineering , 2017 , 3 ( 1 ): 4 - 25 .
PUJARA J , MIAO H , GETOOR L , et al . Knowledge graph identification [M ] // Advanced Information Systems Engineering . Berlin,Heidelberg : Springer Berlin Heidelberg , 2013 : 542 - 557 .
DETTMERS T , MINERVINI P , STENETORP P , et al . Convolutional 2D knowledge graph embeddings [J ] . arXiv:1707.01476v6 . 2017 .
WANG Z , ZHANG J , FENG J , et al . Knowledge graph embedding by translating on hyperplanes [C ] // Twenty-eighth Aaai Conference on Artificial Intelligence . AAAI Press , 2014 .
王慧强 , 赖积保 , 朱亮 , 等 . 网络态势感知系统研究综述 [J ] . 计算机科学 , 2006 , 33 ( 10 ): 5 - 10 .
WANG H Q , LAI J B , ZHU L , et al . Survey of network situation awareness system [J ] . Computer Science , 2006 , 33 ( 10 ): 5 - 10 .
FRANKE U , BRYNIELSSON J . Cyber situational awareness - A systematic review of the literature [J ] . Computers & Security , 2014 ( 46 ): 18 - 31 .
龚俭 , 臧小东 , 苏琪 , 等 . 网络安全态势感知综述 [J ] . 软件学报 , 2017 , 28 ( 4 ): 1010 - 1026 .
GONG J , ZANG X D , SU Q , et al . Survey of network security situation awareness [J ] . Journal of Software , 2017 , 28 ( 4 ): 10101026 .
刘效武 , 王慧强 , 吕宏武 , 等 . 网络安全态势认知融合感控模型 [J ] . 软件学报 , 2016 , 27 ( 8 ): 2099 - 2114 .
LIU X W , WANG H Q , LYU H W , et al . Fusion-based cognitive awareness-control model for network security situation [J ] . Journal of Software , 2016 , 27 ( 8 ): 2099 - 2114 .
SINGH M , BHANDARI P . Building a framework for network security situation awareness [C ] // Proceedings of 2016 3rd International Conference on Computing for Sustainable Global Development(INDIACom) . Piscataway:IEEE Press , 2016 : 2578 - 2583 .
XU G Q , CAO Y , REN Y Y , et al . Network security situation awareness based on semantic ontology and user-defined rules for Internet of Things [J ] . IEEE Access , 2017 ( 5 ): 21046 - 21056 .
JIA Y , QI Y L , SHANG H J , et al . A practical approach to constructing a knowledge graph for cybersecurity [J ] . Engineering , 2018 , 4 ( 1 ): 53 - 60 .
李琪 , 张欣 , 张平康 , 等 . 基于Spark框架的CFSFDP改进算法 [J ] . 电子科技 , 2019 , 32 ( 5 ): 38 - 43 , 54 .
LI Q , ZHANG X , ZHANG P K , et al . Improved CFSFDP algorithm based on spark framework [J ] . Electronic Science and Technology , 2019 , 32 ( 5 ): 38 - 43 , 54 .
0
浏览量
1340
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构