Visible to the public A Modeling Method of Cyberspace Security Structure Based on Layer-Level Division

TitleA Modeling Method of Cyberspace Security Structure Based on Layer-Level Division
Publication TypeConference Paper
Year of Publication2022
AuthorsZhu, Yuwen, Yu, Lei
Conference Name2022 IEEE 5th International Conference on Computer and Communication Engineering Technology (CCET)
Date Publishedaug
KeywordsCollaboration, composability, compositionality, computational complexity, Computational modeling, computer security, computer theory, Cyberspace, cyberspace security structure, graph theory, Human Behavior, layer division, level division, Metrics, Network topology, policy governance, pubcrawl, resilience, Resiliency, security, Topology
AbstractAs the cyberspace structure becomes more and more complex, the problems of dynamic network space topology, complex composition structure, large spanning space scale, and a high degree of self-organization are becoming more and more important. In this paper, we model the cyberspace elements and their dependencies by combining the knowledge of graph theory. Layer adopts a network space modeling method combining virtual and real, and level adopts a spatial iteration method. Combining the layer-level models into one, this paper proposes a fast modeling method for cyberspace security structure model with network connection relationship, hierarchical relationship, and vulnerability information as input. This method can not only clearly express the individual vulnerability constraints in the network space, but also clearly express the hierarchical relationship of the complex dependencies of network individuals. For independent network elements or independent network element groups, it has flexibility and can greatly reduce the computational complexity in later applications.
DOI10.1109/CCET55412.2022.9906354
Citation Keyzhu_modeling_2022