浏览全部资源
扫码关注微信
1. 清华大学网络科学与网络空间研究院,北京 100084
2. 清华大学计算机科学与技术系,北京 100084
3. 清华大学北京信息科学与技术国家研究中心,北京100084
[ "王继龙(1973- ),男,黑龙江大兴安岭人,博士,清华大学教授,主要研究方向为网络空间治理、网络空间测绘、位置网、未来网络试验设施等" ]
[ "庄姝颖(1996- ),女,河南周口人,清华大学博士生,主要研究方向为网络空间测绘" ]
[ "缪葱葱(1993- ),男,浙江台州人,清华大学博士生,主要研究方向为网络空间测绘、网络管理、网络数据挖掘等" ]
[ "安常青(1970- ),女,江苏徐州人,清华大学副研究员,主要研究方向为计算机网络体系结构、网络协议、网络测量" ]
网络出版日期:2020-02,
纸质出版日期:2020-02-25
移动端阅览
王继龙, 庄姝颖, 缪葱葱, 等. 网络空间信息系统模型与应用[J]. 通信学报, 2020,41(2):74-83.
Jilong WANG, Shuying ZHUANG, Congcong MIAO, et al. Model and application of cyberspace information system[J]. Journal on communications, 2020, 41(2): 74-83.
王继龙, 庄姝颖, 缪葱葱, 等. 网络空间信息系统模型与应用[J]. 通信学报, 2020,41(2):74-83. DOI: 10.11959/j.issn.1000-436x.2020018.
Jilong WANG, Shuying ZHUANG, Congcong MIAO, et al. Model and application of cyberspace information system[J]. Journal on communications, 2020, 41(2): 74-83. DOI: 10.11959/j.issn.1000-436x.2020018.
针对网络空间可视化往往还在使用传统的地理信息系统,难以真正展现网络空间特点和规律的问题,提出了多尺度、多维度、多视图的网络空间信息系统模型,将网络空间信息系统定位为与地理信息系统相平行的概念,即地理信息系统支持以地理坐标系为基础的可视化表达,网络空间信息系统支持基于网络空间自身坐标系的可视化表达。同时定义了网络空间信息系统的基本概念模型,为之后的研究奠定理论基础,并阐述了网络空间信息系统关键技术,以及部分关于坐标系、比例尺、多维度表达模型等探索性研究工作和应用案例。研发的原型效果表明,网络空间信息系统更便于网络空间事务的展现和处理。
For the visualization of cyberspace is still using the traditional geographic information system
which makes it difficult to truly express the characteristics and laws of cyberspace
a multi-scale
multi-dimensional and multi-view cyberspace information system model was proposed to take the cyberspace information system as a concept parallel to the geographic information system
that was
the geographic information system supported visualization based on the geographic coordinate system
and the cyberspace information system supported visualization based on the coordinate system of cyberspace itself.Then
the basic concepts of cyberspace information system were defined to provide a theoretical foundation for later research
and the key technologies
part of exploratory research work including the coordinate system
scale
multi-dimensional expression model and application cases were expounded.According to the prototype developed
the cyberspace information system is more convenient for the display and processing of cyberspace affairs.
MÜLLER-MAGUHN A , POITRAS L , ROSENBACH M , et al . Treasure map:the NSA breach of telekom and other German firms [J ] . Feedback , 2014 , 12 :13.
LEE N , PLAN X , GENERATION Z . Counterterrorism and cybersecurity [M ] . Berlin : SpringerPress , 2015 : 301 - 319 .
KSHETRI N . Kaspersky lab:from Russia with anti-virus [J ] . Emerald Emerging Markets Case Studies , 2011 , 1 ( 3 ): 1 - 10 .
MIAO C C , WANG J L , ZHUANG S Y , et al . A coordinated view of cyberspace [J ] . arXiv Preprint,arXiv:1910.09787 , 2019 .
JIANG B , ORMELING F J . Cybermap:the map for cyberspace [J ] . The Cartographic Journal , 1997 , 34 ( 2 ): 111 - 116 .
张峥 . 赛博地图构建理论研究 [D ] . 郑州:信息工程大学 , 2012 .
ZHANG Z . The research on theory of cybermap [D ] . Zhengzhou:Information Engineering University , 2012 .
GUONIAN L Ü , LIN W Y , ZHAO Y U . Surveying and mapping geographical information from the perspective of geography [J ] . Acta Geodaetica et Cartographica Sinica , 2017 , 46 ( 10 ): 1549 - 1556 .
郝梁 . 电子地图与地理信息系统 [J ] . 电子技术与软件工程 , 2019 ( 11 ):249.
HAO L . Electronic map and geographic information system [J ] . Electronic Technology & Software Engineering , 2019 ( 11 ):249.
BATTY M . Virtual geography [J ] . Futures , 1997 , 29 ( 4/5 ): 337 - 352 .
BAKIS H . Understanding the geocyberspace:a major task for geographers and planners in the next decade [J ] . Netcom , 2001 , 15 ( 1/2 ): 9 - 16 .
KUIPERS J H , . Analyzing the K-root DNS anycast infrastructure [C ] // Twente Student Conference on IT . 2015 : 1 - 6 .
HUFFAKER B , PLUMMER D , MOORE D , et al . Topology discovery by active probing [C ] // 2002 Symposium on Applications and the Internet (SAINT) Workshops . IEEE , 2002 : 90 - 96 .
FUKUDA K , CHO K , ESAKI H . The impact of residential broadband traffic on Japanese ISP backbones [J ] . ACM SIGCOMM Computer Communication Review , 2005 , 35 ( 1 ): 15 - 22 .
SHANNON C , MOORE D . The spread of the witty worm [J ] . IEEE Security & Privacy , 2004 , 2 ( 4 ): 46 - 50 .
MAHADEVAN P , KRIOUKOV D , FOMENKOV M , et al . The Internet AS-level topology:three data sources and one definitive metric [J ] . ACM SIGCOMM Computer Communication Review , 2006 , 36 ( 1 ): 17 - 26 .
KEYS K , HYUN Y , LUCKIE M , et al . Internet-scale IPv4 alias resolution with MIDAR [J ] . IEEE/ACM Transactions on Networking (TON) , 2013 , 21 ( 2 ): 383 - 399 .
JIANG J , XU X L , CAO N . Research on improved physical topology discovery based on SNMP [C ] // IEEE International Conference on Computational Science and Engineering . IEEE , 2017 : 219 - 222 .
IRWIN B , PILKINGTON N . High level internet scale traffic visualization using hilbert curve mapping [M ] . Berlin : SpringerPress , 2008 : 147 - 158 .
ORENSTEIN J A , MERRETT T H . A class of data structures for associative searching [C ] // The 3rd ACM SIGACT-SIGMOD Symposium on Principles of Database Systems . ACM , 1984 : 181 - 190 .
FALOUTSOS C . Gray codes for partial match and range queries [J ] . IEEE Transactions on Software Engineering , 1988 , 14 ( 10 ): 1381 - 1393 .
MOON B , JAGADISH H V , FALOUTSOS C , et al . Analysis of the clustering properties of the hilbert space-filling curve [J ] . IEEE Transactions on Knowledge and Data Engineering , 2001 , 13 ( 1 ): 124 - 141 .
贾奋励 . 电子地图多尺度表达的研究与实践 [D ] . 郑州:信息工程大学 , 2010 .
JIA F L . Research and practice of multiscale expression of electronic maps [D ] . Zhengzhou:Information Engineering University , 2010 .
DURUMERIC Z , WUSTROW E , HALDERMAN J A . ZMap:fast internet-wide scanning and its security applications [C ] // USENIX Security Symposium . 2013 : 47 - 53 .
ADRIAN D , DURUMERIC Z , SINGH G , et al . Zippier ZMap:Internet-wide scanning at 10 Gbps [C ] // Usenix Conference on Offensive Technologies . USENIX Association , 2014 :8.
LIU S C , WANG J L , WANG H , et al . WRT:constructing users’ web request trees from HTTP header logs [C ] // 2019 IEEE International Conference on Communications (ICC) . IEEE , 2019 : 1 - 7 .
CICALESE D , AUGÉ J , JOUMBLATT D , et al . Characterizing IPv4 anycast adoption and deployment [C ] // The 11th ACM Conference on Emerging Networking Experiments and Technologies . ACM , 2015 :16.
LI H , HE Y , XI R , et al . A complete evaluation of the Chinese IP geolocation databases [C ] // 2015 8th International Conference on Intelligent Computation Technology and Automation (ICICTA) . IEEE , 2015 : 13 - 17 .
POESE I , UHLIG S , KAAFAR M A , et al . IP geolocation databases:unreliable? [J ] . ACM SIGCOMM Computer Communication Review , 2011 , 41 ( 2 ): 53 - 56 .
GHARAIBEH M , SHAH A , HUFFAKER B , et al . A look at router geolocation in public and commercial databases [C ] // The 2017 Internet Measurement Conference . ACM , 2017 : 463 - 469 .
SONG J , XU K , SONG M , et al . Credibility evaluation method of domestic IP address database [J ] . Journal of Computer Applications , 2014 , 34 : 4 - 6 .
LI H , ZHANG P , WANG Z , et al . Changing IP geolocation from arbitrary database query towards multi-databases fusion [C ] // 2017 IEEE Symposium on Computers and Communications (ISCC) . IEEE , 2017 : 1150 - 1157 .
0
浏览量
1105
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构