Survey of cyberspace surveying and mapping

被引:1
作者
Zou, Zhenwan [1 ]
Chen, Jia [2 ]
Wu, Wenshou [3 ]
Wang, Bin [1 ]
Liu, Yicheng [3 ]
机构
[1] Elect Power Res Inst State Grid Xinjiang Elect Po, Urumqi 830011, Xinjiang, Peoples R China
[2] State Grid Xinjiang Elect Power Co Ltd, Urumqi 830000, Xinjiang, Peoples R China
[3] Xinjiang Univ, Sch Software, Urumqi, Xinjiang, Peoples R China
来源
PROCEEDINGS OF 2024 3RD INTERNATIONAL CONFERENCE ON CYBER SECURITY, ARTIFICIAL INTELLIGENCE AND DIGITAL ECONOMY, CSAIDE 2024 | 2024年
关键词
Cyberspace surveying and mapping; Detecting; Mapping; Drawing; COMMUNITY DETECTION;
D O I
10.1145/3672919.3672932
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cyberspace surveying and mapping is a method of observing, measuring, analyzing, and visualizing cyberspace, aimed at revealing the structure, content, behaviors, and characteristics of networks, providing support and guidance for network planning, security management, and decision-making. Firstly, the research background, significance, and historical development of cyberspace surveying and mapping were introduced. The key technologies of the detecting layer, mapping layer, and drawing layer in cyberspace surveying and mapping were summarized, including resource scanning, component recognition, landmark mining, entity positioning, data visualization, topology visualization, etc. Finally, based on the above research, the current challenges and the future development direction faced by cyberspace surveying and mapping were pointed out.
引用
收藏
页码:66 / 71
页数:6
相关论文
共 38 条
[1]   Measuring Multipath Routing in the Internet [J].
Augustin, Brice ;
Friedman, Timur ;
Teixeira, Renata .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2011, 19 (03) :830-840
[2]  
Bhargav M, 2014, 2014 INTERNATIONAL CONFERENCE ON CONTROL, INSTRUMENTATION, COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICCICCT), P31, DOI 10.1109/ICCICCT.2014.6992925
[3]  
Carter D., 2005, Information Communication & Society, V8, P148, DOI 10.1080/13691180500146235
[4]  
CHEN Qing, 2021, Information and Communications Technology and Policy, V47, P30, DOI [10.12267/j.issn.2096-5931.2021.08.005, DOI 10.12267/J.ISSN.2096-5931.2021.08.005]
[5]  
Dainotti A, 2014, ACM SIGCOMM COMP COM, V44, P43
[6]   Improving IP Geolocation using Query Logs [J].
Dan, Ovidiu ;
Parikh, Vaibhav ;
Davison, Brian D. .
PROCEEDINGS OF THE NINTH ACM INTERNATIONAL CONFERENCE ON WEB SEARCH AND DATA MINING (WSDM'16), 2016, :347-356
[7]  
Ding SC, 2015, INT CONF ADV COMMUN, P176, DOI 10.1109/ICACT.2015.7224779
[8]   INTERNET TOPOLOGY DISCOVERY: A SURVEY [J].
Donnet, Benoit ;
Friedman, Timur .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2007, 9 (04) :56-69
[9]   Clusters in the Expanse: Understanding and Unbiasing IPv6 Hitlists [J].
Gasser, Oliver ;
Scheitle, Quirin ;
Foremski, Pawel ;
Lone, Qasim ;
Korczynski, Maciej ;
Strowes, Stephen D. ;
Hendriks, Luuk ;
Carle, Georg .
IMC'18: PROCEEDINGS OF THE INTERNET MEASUREMENT CONFERENCE, 2018, :364-378
[10]  
[郭莉 Guo Li], 2018, [信息安全学报, Journal of Cyber Security], V3, P1