Full Text:   <709>

Suppl. Mater.: 

CLC number: 

On-line Access: 0000-00-00

Received: 0000-00-00

Revision Accepted: 0000-00-00

Crosschecked: 0000-00-00

Cited: 0

Clicked: 1907

Citations:  Bibtex RefMan EndNote GB/T7714

-   Go to

Article info.
Open peer comments

Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.12 P.1459-1461

http://doi.org/10.1631/FITEE.1840000


Security for cyberspace: challenges and opportunities


Author(s):  Jiang-xing WU, Jian-hua LI, Xin-sheng JI

Affiliation(s):  National Digital Switching System Engineering &Technological R&D Center, Zhengzhou 450002, China; more

Corresponding email(s):   lijh888@sjtu.edu.cn

Key Words: 


Share this article to: More |Next Article >>>

Jiang-xing WU, Jian-hua LI, Xin-sheng JI. Security for cyberspace: challenges and opportunities[J]. Frontiers of Information Technology & Electronic Engineering, 2018, 19(12): 1459-1461.

@article{title="Security for cyberspace: challenges and opportunities",
author="Jiang-xing WU, Jian-hua LI, Xin-sheng JI",
journal="Frontiers of Information Technology & Electronic Engineering",
volume="19",
number="12",
pages="1459-1461",
year="2018",
publisher="Zhejiang University Press & Springer",
doi="10.1631/FITEE.1840000"
}

%0 Journal Article
%T Security for cyberspace: challenges and opportunities
%A Jiang-xing WU
%A Jian-hua LI
%A Xin-sheng JI
%J Frontiers of Information Technology & Electronic Engineering
%V 19
%N 12
%P 1459-1461
%@ 2095-9184
%D 2018
%I Zhejiang University Press & Springer
%DOI 10.1631/FITEE.1840000

TY - JOUR
T1 - Security for cyberspace: challenges and opportunities
A1 - Jiang-xing WU
A1 - Jian-hua LI
A1 - Xin-sheng JI
J0 - Frontiers of Information Technology & Electronic Engineering
VL - 19
IS - 12
SP - 1459
EP - 1461
%@ 2095-9184
Y1 - 2018
PB - Zhejiang University Press & Springer
ER -
DOI - 10.1631/FITEE.1840000


Abstract: 
Nowadays, cyberspace has become the “fifth frontier” after the ocean, land, air, and space. With the globalization of information, cyberspace has never faced so many challenges, such as principle innova-tion, theory innovation, technology innovation, and application innovation. Thus, the transition from traditional cyberspace to new cyberspace is inevitable. In the future, cyberspace will have many important characteristics, such as openness, heterogeneity, mo-bility, dynamism, and security.
With the rapid development of information technologies, future cyberspace will have higher openness, dynamism, and flexibility. The realization of cyberspace security is particularly important and emergent. Compared with traditional network security, future cyberspace security has its particularity because of the following factors. First, the traditional static security methods based on known threat characteristics can no longer effectively defend against novel threats, such as 0-day attacks and advanced persistent threats (APT). Specifically, for backdoor threats, neither static defense nor dynamic defense, not even encryption technology, can do anything about it. By exploiting the concealed and complicated means, attackers could launch targeted attacks and persistent penetrations, presenting strong concealment, latent and long-term entanglement. Usually, the detection and isolation nature of passive defense technology are invalid for these unknown novel threats. Second, because future network is based on network programming and virtualization, it can provide programmable interfaces for network applications, and these interfaces will also provide opportunity for hackers to attack, making future networks face greater risks than traditional networks. Third, due to the incomplete collection of network traffic, state and semantic gap, vulnerability analysis is difficult. To achieve multi-level, multi-angle, and multi-function security threat assessment, security defense and awareness approaches are necessary.
Regarding the aforementioned challenges, novel and efficient security should be studied. First, security should be taken as the priority in the design of architecture, to avoid or reduce the threat of attacks from various unknown vulnerabilities or backdoors in hardware and software designs, to make the system immune to endogenous security. Second, dynamic defense architecture should be considered, which can provide adaptive security protection for cyberspace. Moreover, many advanced security technologies, such as novel cryptography, should be studied and used. Finally, novel networking, computing, and artificial intelligence can all benefit high-level security for future cyberspace.
In this context, the Chinese Academy of Engi-neering (CAE) organized a special issue of “Cyber-space Security” in Frontiers of Information Tech-nology and Electronic Engineering. This special issue aims to promote advanced theory, technologies, and industry of cyberspace security. Seven papers are included in this special issue, by invitation or contribution, including three survey papers and four research papers.

Darkslateblue:Affiliate; Royal Blue:Author; Turquoise:Article

Open peer comments: Debate/Discuss/Question/Opinion

<1>

Please provide your name, email address and a comment





Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - Journal of Zhejiang University-SCIENCE