信息安全研究 ›› 2018, Vol. 4 ›› Issue (5): 415-419.

• 技术应用 • 上一篇    下一篇

网络空间博弈中的场景研究

李炜,余慧英,吴华颖   

  1. 北京永信至诚科技股份有限公司
  • 收稿日期:2018-05-17 出版日期:2018-05-15 发布日期:2018-05-18
  • 通讯作者: 李炜
  • 作者简介:李炜 北京永信至诚科技股份有限公司副总裁,网络空间安全智能仿真和众测关键技术北京市工程实验室主任,主要研究方向为网络安全、人才培养. 余慧英 北京永信至诚科技股份有限公司副总裁,中关村网络安全与信息化产业联盟副秘书长,主要从事网络安全人才培养与信息安全产业研究. 吴华颖 博士研究生,主要研究方向为无线网络、网络安全.

Research of the Scenes in the Cyberspace Game

  • Received:2018-05-17 Online:2018-05-15 Published:2018-05-18

摘要: 随着社会基础产业全面互联网化,网络安全形势越发严峻.首先介绍了贵阳大数据安全演练的一个实例,指出人是网络安全的核心.而场景是决定网络安全人才培养模式是否有效,进一步决定了网络空间博弈主动权的关键要素.但长期以来,对于场景的积累重视不够,场景留存方式主要侧重在文字描述和记录,无论是安全企业还是用户对于场景价值的深度挖掘和利用还有巨大的空间.接着引出作为网络安全场景积累、生成、甚至预判的基础设施的靶场,梳理了美国等发达国家靶场的建设现状,并介绍了靶场涉及到的关键技术.最后阐述了网络靶场应该具备的功能以及在各个领域的应用.

关键词: 网络靶场, 网络攻防, 安全意识, 人才培养, 场景

Abstract: With the comprehensive internetization of social fundamental industries, the network security situation has become increasingly severe. A case of Guiyang big data security drill is firstly introduced to point out that people are the core of network security. Second, we emphasize the “scenes” as one of the key factors to determine the effectiveness of talents training mode, which further influence the initiative of cyberspace game. However, for a long time, we have not paid enough attention to the accumulation of scenes and the retained methods of scenes mainly focus on text description. There is still a huge space for deep mining and utilizing the value of scenes for both security companies and users. Then Cyber Range is introduced as the infrastructure of generating and accumulating “scenes”. Based on analyzing the stateofart of Cyber Range of the United States and other developed countries, the key techniques of Cyber Range are described. Lastly, the functions that the Cyber Range should possess and applications in various fields such as product evaluation, mission rehearsal, architecture analysis, etc. are presented.

Key words: cyber range, network attack and defense, security awareness, talents training, scenes