|
Frontiers of Information Technology & Electronic Engineering
ISSN 2095-9184 (print), ISSN 2095-9230 (online)
2018 Vol.19 No.12 P.1459-1461
Security for cyberspace: challenges and opportunities
Abstract: Nowadays, cyberspace has become the “fifth frontier” after the ocean, land, air, and space. With the globalization of information, cyberspace has never faced so many challenges, such as principle innova-tion, theory innovation, technology innovation, and application innovation. Thus, the transition from traditional cyberspace to new cyberspace is inevitable. In the future, cyberspace will have many important characteristics, such as openness, heterogeneity, mo-bility, dynamism, and security.
With the rapid development of information technologies, future cyberspace will have higher openness, dynamism, and flexibility. The realization of cyberspace security is particularly important and emergent. Compared with traditional network security, future cyberspace security has its particularity because of the following factors. First, the traditional static security methods based on known threat characteristics can no longer effectively defend against novel threats, such as 0-day attacks and advanced persistent threats (APT). Specifically, for backdoor threats, neither static defense nor dynamic defense, not even encryption technology, can do anything about it. By exploiting the concealed and complicated means, attackers could launch targeted attacks and persistent penetrations, presenting strong concealment, latent and long-term entanglement. Usually, the detection and isolation nature of passive defense technology are invalid for these unknown novel threats. Second, because future network is based on network programming and virtualization, it can provide programmable interfaces for network applications, and these interfaces will also provide opportunity for hackers to attack, making future networks face greater risks than traditional networks. Third, due to the incomplete collection of network traffic, state and semantic gap, vulnerability analysis is difficult. To achieve multi-level, multi-angle, and multi-function security threat assessment, security defense and awareness approaches are necessary.
Regarding the aforementioned challenges, novel and efficient security should be studied. First, security should be taken as the priority in the design of architecture, to avoid or reduce the threat of attacks from various unknown vulnerabilities or backdoors in hardware and software designs, to make the system immune to endogenous security. Second, dynamic defense architecture should be considered, which can provide adaptive security protection for cyberspace. Moreover, many advanced security technologies, such as novel cryptography, should be studied and used. Finally, novel networking, computing, and artificial intelligence can all benefit high-level security for future cyberspace.
In this context, the Chinese Academy of Engi-neering (CAE) organized a special issue of “Cyber-space Security” in Frontiers of Information Tech-nology and Electronic Engineering. This special issue aims to promote advanced theory, technologies, and industry of cyberspace security. Seven papers are included in this special issue, by invitation or contribution, including three survey papers and four research papers.
Key words:
References:
Open peer comments: Debate/Discuss/Question/Opinion
<1>
DOI:
10.1631/FITEE.1840000
CLC number:
Download Full Text:
Downloaded:
2028
Clicked:
3900
Cited:
0
On-line Access:
2024-08-27
Received:
2023-10-17
Revision Accepted:
2024-05-08
Crosschecked:
0000-00-00