CLC number:
On-line Access: 2025-06-24
Received: 2025-01-23
Revision Accepted: 2025-04-22
Crosschecked: 0000-00-00
Cited: 0
Clicked: 37
Xiaosong ZHANG, Yukun ZHU, Xiong LI, Yongzhao ZHANG, Weina NIU, Fenghua XU, Junpeng HE, Ran YAN, Shiping HUANG. Active cybersecurity: vision,model, and key technologies[J]. Frontiers of Information Technology & Electronic Engineering, 1998, -1(-1): .
@article{title="Active cybersecurity: vision,model, and key technologies",
author="Xiaosong ZHANG, Yukun ZHU, Xiong LI, Yongzhao ZHANG, Weina NIU, Fenghua XU, Junpeng HE, Ran YAN, Shiping HUANG",
journal="Frontiers of Information Technology & Electronic Engineering",
volume="-1",
number="-1",
pages="",
year="1998",
publisher="Zhejiang University Press & Springer",
doi="10.1631/FITEE.2500053"
}
%0 Journal Article
%T Active cybersecurity: vision,model, and key technologies
%A Xiaosong ZHANG
%A Yukun ZHU
%A Xiong LI
%A Yongzhao ZHANG
%A Weina NIU
%A Fenghua XU
%A Junpeng HE
%A Ran YAN
%A Shiping HUANG
%J Journal of Zhejiang University SCIENCE C
%V -1
%N -1
%P
%@ 2095-9184
%D 1998
%I Zhejiang University Press & Springer
%DOI 10.1631/FITEE.2500053
TY - JOUR
T1 - Active cybersecurity: vision,model, and key technologies
A1 - Xiaosong ZHANG
A1 - Yukun ZHU
A1 - Xiong LI
A1 - Yongzhao ZHANG
A1 - Weina NIU
A1 - Fenghua XU
A1 - Junpeng HE
A1 - Ran YAN
A1 - Shiping HUANG
J0 - Journal of Zhejiang University Science C
VL - -1
IS - -1
SP -
EP -
%@ 2095-9184
Y1 - 1998
PB - Zhejiang University Press & Springer
ER -
DOI - 10.1631/FITEE.2500053
Abstract: Noncooperative computer systems and network confrontation present a core challenge in cyberspace security. Traditional cybersecurity technologies predominantly rely on passive response mechanisms, which exhibit significant limitations when addressing real-world complex and unknown threats. This paper introduces the concept of active cybersecurity, aiming to enhance network security not only through technical measures but also by leveraging strategy-level defenses. The core assumption of this concept is that attackers and defenders, in the context of network confrontations, act as rational decision-makers seeking to maximize their respective objectives. Building on this observation, this paper integrates game theory to analyze the interdependent relationships between attackers and defenders, thereby optimizing their strategies. Guided by this foundational idea, we propose an active cybersecurity model involving sensing, analysis, profiling, and countermeasures, termed SAPC, designed to foster an integrated defense capability encompassing threat perception, analysis, tracing, and response. Specifically, the SAPC model consists of four key components: intelligent threat sensing, in-depth behavior analysis, comprehensive path profiling, and dynamic countermeasures. At its core, SAPC incorporates theoretical analyses of adversarial behavior and the optimization of corresponding strategies informed by game theory. By profiling adversaries and modeling confrontation as a game, the model establishes a comprehensive framework that provides both theoretical insights into and practical guidance for cybersecurity. The proposed active cybersecurity model marks a transformative shift from passive defense to proactive perception and confrontation. It facilitates the evolution of cybersecurity technologies toward a new paradigm characterized by active prediction, prevention, and strategic guidance.
Open peer comments: Debate/Discuss/Question/Opinion
<1>