WO2026011691A1 - Method and system for ensuring trustworthiness and security of cyberspace - Google Patents
Method and system for ensuring trustworthiness and security of cyberspaceInfo
- Publication number
- WO2026011691A1 WO2026011691A1 PCT/CN2024/139809 CN2024139809W WO2026011691A1 WO 2026011691 A1 WO2026011691 A1 WO 2026011691A1 CN 2024139809 W CN2024139809 W CN 2024139809W WO 2026011691 A1 WO2026011691 A1 WO 2026011691A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- digital
- network
- identifier
- cyberspace
- packet
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Algebra (AREA)
- General Physics & Mathematics (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Mathematical Physics (AREA)
- Pure & Applied Mathematics (AREA)
- Physics & Mathematics (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
本发明涉及网络空间安全的技术领域,尤其涉及一种确保网络空间可信且安全的方法,并进一步涉及一种确保网络空间可信且安全的系统。This invention relates to the technical field of cyberspace security, and more particularly to a method for ensuring the trustworthiness and security of cyberspace, and further to a system for ensuring the trustworthiness and security of cyberspace.
随着现代科学技术的发展,互联网已经成为当今社会发展不可缺失的一环,其作为信息的一种载体,已经渗透到包括政治、经济、文化、教育、医疗卫生等人类生活的各种领域。在互联网内容和需求高速发展的同时,现如今的网络需求逐渐表露出越来越多与最初IP设计模式不可调和的冲突。现有IP体系下,DNS根区数据库单一机构管控和IP地址语义过载等问题极大程度上限制了互联网的发展,IP网络体系存在三个根本缺陷。With the development of modern science and technology, the Internet has become an indispensable part of modern society. As a carrier of information, it has permeated various aspects of human life, including politics, economics, culture, education, and healthcare. While Internet content and demands are rapidly evolving, current network needs are increasingly revealing conflicts with the original IP design model. Under the existing IP system, problems such as the single-organizational control of the DNS root zone database and the semantic overload of IP addresses significantly limit the development of the Internet. The IP network system suffers from three fundamental flaws.
第一缺陷是中心化管理使得IP网络创始者可以垄断网络空间管理,形成网络霸权。整个域名系统包括根服务器DNS、域名解析及地址分配服务由单一机构管理,全球网络通信实质上受单一机构监视及控制。故不可能在IP上构建可信安全有序法治和平的网络空间。The first drawback is that centralized management allows the creators of the IP network to monopolize cyberspace management, forming cyber hegemony. The entire Domain Name System, including root servers (DNS), domain name resolution, and address allocation services, is managed by a single organization, meaning global network communications are essentially monitored and controlled by a single entity. Therefore, it is impossible to build a trustworthy, secure, orderly, law-abiding, and peaceful cyberspace on IP.
第二个缺陷是IP网络缺乏安全基因,数据包源地址可以造假、溯源困难、用户数据泄密,导致安全事故不断,数据隐私及数字资产保护困难、个体和实体数权沦陷。个人信息保护法将生物标识、特定身份、医疗健康、金融账户和行踪轨迹等信息列为敏感个人信息。中心化数据管理可能会造成个人隐私数据被滥用。The second drawback is the lack of robust security features in IP networks. Data packet source addresses can be forged, tracing is difficult, and user data leaks are frequent, leading to ongoing security incidents, difficulties in protecting data privacy and digital assets, and the loss of individual and entity data rights. The Personal Information Protection Law classifies biometrics, specific identities, medical and health information, financial accounts, and location tracking as sensitive personal information. Centralized data management may result in the misuse of personal privacy data.
第三个缺陷是IP网络架构协议固化严重,演进升级难,时间长且成本高。例如,IPv4到IPv6的升级是一项耗时而昂贵的任务。IPv4在1983年成为ARPANET上的科研用的标准协议,到1990年ARPANET被关闭,标志着实验任务结束开始商业应用。IPv4不到8年时间取代其它竞争对手成为全球事实上的行业标准,1998年IETF开始提出IPv6的草稿版本,20年后2017年为正式版本,并且它与IPv4不兼容。实际上IPv6的DNS系统与IPv4是相同的一套,只是增多了地址,其它没有本质改进。因此,全球主要国家都在研究后IP的未来网络,IP架构体系只是一个序曲,研发代替IP体系的新型网络体系势在必行。The third drawback is the rigidity of IP network architecture protocols, making evolution and upgrades difficult, time-consuming, and costly. For example, upgrading from IPv4 to IPv6 was a time-consuming and expensive task. IPv4 became the standard protocol for research on ARPANET in 1983, and by 1990, ARPANET was shut down, marking the end of experimental tasks and the beginning of commercial applications. In less than eight years, IPv4 replaced its competitors to become the de facto global industry standard. In 1998, the IETF began proposing a draft version of IPv6, which was officially released 20 years later in 2017, and it is incompatible with IPv4. In fact, the IPv6 DNS system is the same as IPv4, only with more addresses, with no other fundamental improvements. Therefore, major countries around the world are researching the future network after IP; the IP architecture is just a prelude, and the development of a new network architecture to replace the IP system is imperative.
需要说明的是,IP网络体系明显存在着网络空间的安全风险。IP网络设计之初是为了实现端对端传输,因此并未着重考虑安全问题。在TCP/IP网络体系之中,每一层均存在若干常见的恶意攻击方式。It should be noted that the IP network architecture clearly presents cybersecurity risks. IP networks were initially designed for end-to-end transmission, and therefore security was not a primary focus. Within the TCP/IP network architecture, each layer is susceptible to several common malicious attack methods.
在数据链路层,存在着ARP毒化攻击及对于MAC地址的泛洪攻击等等,其中ARP欺骗攻击是利用以太网的通信机制来实现的,如果IP主机需要自动请求目标主机的MAC,那么ARP协议就必须被使用,攻击者可以利用冒充源主机的方式,来毒化受害者的ARP关系映射表,以此来达到数据窃取等目的。而MAC泛洪攻击则是利用灌满受害者主机的MAC表,造成交换机MAC地址表溢出,从而使得进入交换机的数据包被广播到每一个端口,而入侵者可以从交换机任何端口上成功监听交换机的所有数据。At the data link layer, there are attacks such as ARP poisoning and MAC address flooding. ARP spoofing attacks exploit Ethernet's communication mechanisms. If an IP host needs to automatically request the target host's MAC address, the ARP protocol must be used. Attackers can impersonate the source host to poison the victim's ARP mapping table, thereby achieving data theft. MAC flooding attacks, on the other hand, flood the victim host's MAC address table, causing it to overflow. This allows incoming data packets to be broadcast to every port, enabling intruders to successfully eavesdrop on all data on the switch from any port.
在网络层,则存在着smurf泛洪攻击、IP欺骗攻击、ICMP路由欺骗攻击等。其中Smurf泛洪攻击通常与IP欺骗攻击组合出现,smurf攻击通过使用将回复地址设置成受害网络的广播地址的ICMP应答请求(ping)数据包,来淹没受害主机,最终导致该网络的所有主机都对此ICMP应答请求做出答复,导致网络阻塞。更加复杂的smurf将源地址改为第三方的受害者,最终导致第三方崩溃。这些攻击的本质在于IP体系下缺少签名及认证机制。At the network layer, attacks include smurf flooding, IP spoofing, and ICMP routing spoofing. Smurf flooding attacks often combine with IP spoofing attacks. A smurf attack floods the victim host with ICMP ping request packets whose reply address is set to the victim network's broadcast address, causing all hosts on the network to respond to these ICMP ping requests, leading to network congestion. More sophisticated smurf attacks change the source address to that of a third party, ultimately causing the third party to crash. The essence of these attacks lies in the lack of signature and authentication mechanisms within the IP architecture.
在传输层,攻击者通常可以使用端口扫描和UDP泛洪攻击等网络攻击的手段。其中端口扫描的原理是当一个主机向远端一个服务器的某一个端口提出建立一个连接的请求,如果对方有此项服务,就会应答,如果对方未安装此项服务时,即使你向相应的端口发出请求,对方仍无应答,利用这个原理,如果对所有熟知端口或自己选定的某个范围内的熟知端口分别建立连接,并记录下远端服务器所给予的应答,通过查看记录就可以知道目标服务器上都安装了哪些服务。At the transport layer, attackers typically use network attack techniques such as port scanning and UDP flooding. Port scanning works by having a host request a connection to a remote server on a specific port. If the server provides that service, it will respond; otherwise, it won't respond even if the request is sent to the corresponding port. By exploiting this principle, by establishing connections to all well-known ports or a selected range of well-known ports and recording the responses from the remote server, attackers can determine which services are installed on the target server by reviewing the records.
在应用层,IP体系则出现了大量的网络攻击方式,诸如欺骗、越权、盗用身份和泛洪等攻击方式。At the application layer, the IP system has seen a large number of network attack methods, such as deception, unauthorized access, identity theft, and flooding.
因此,明显的,要确保网络空间的可信和安全,保证网络空间的有序、法治以及和平,急需一个适应当前发展速度的网络体系、方法与系统。Therefore, it is clear that to ensure the credibility and security of cyberspace, and to guarantee its order, rule of law, and peace, there is an urgent need for a network system, methods, and mechanisms that are adapted to the current pace of development.
本发明所要解决的技术问题是需要提供一种确保网络空间可信且安全的方法,旨在通过基于多标识网络的身份认证、多标识寻址、数字海关、数字护照以及数字签证等来保障网络空间的可信且安全,为保证网络空间的有序、法治以及和平提供更好的基础,以提供能够适应当前发展速度的网络体系、方法与系统。The technical problem to be solved by this invention is to provide a method to ensure the trustworthiness and security of cyberspace. It aims to safeguard the trustworthiness and security of cyberspace through identity authentication based on multi-identifier networks, multi-identifier addressing, digital customs, digital passports, and digital visas, so as to provide a better foundation for ensuring the order, rule of law, and peace of cyberspace, and to provide network systems, methods, and systems that can adapt to the current pace of development.
对此,本发明提供一种确保网络空间可信且安全的方法,包括以下步骤:To address this, the present invention provides a method for ensuring the trustworthiness and security of cyberspace, comprising the following steps:
步骤S1,基于多标识网络实现内嵌身份认证和包签名的多标识寻址,用户在注册完成后,先对发布的每个数据包以自己的私钥进行签名,写入多标识网络包的签名区,中间路由器定期维护从多标识管理系统得到的用户信息表,在收到报文后从中提取对应用户的签名信息,然后通过从多标识管理系统中获得的公钥信息,对收到的多标识网络包进行身份认证;并在身份认证通过后,通过支持可变报文长度的报文格式进行对应的多标识寻址;Step S1: Implement embedded identity authentication and packet signing for multi-identity addressing based on a multi-identity network. After registration, the user first signs each published data packet with their private key and writes it into the signature area of the multi-identity network packet. The intermediate router periodically maintains the user information table obtained from the multi-identity management system. After receiving a packet, it extracts the signature information of the corresponding user from the table and then uses the public key information obtained from the multi-identity management system to authenticate the received multi-identity network packet. After successful authentication, multi-identity addressing is performed using a packet format that supports variable packet length.
步骤S2,定义基于多标识网络的数字海关、数字护照以及数字签证;Step S2, define digital customs, digital passports, and digital visas based on a multi-identifier network;
步骤S3,对时间数据和数字签证密钥进行按位异或运算,通过哈希函数对按位异或运算后的数据进行单向映射,得到基于多标识网络的数字签证;Step S3: Perform a bitwise XOR operation on the time data and the digital visa key, and use a hash function to perform a one-way mapping on the data after the bitwise XOR operation to obtain a digital visa based on a multi-identifier network.
步骤S4,根据数字签证的哈希值和跨国护照密钥,计算得到基于多标识网络的数字护照;Step S4: Calculate the digital passport based on the hash value of the digital visa and the cross-border passport key;
步骤S5,通过多标识网络路由器实现数字海关,通过所述数字海关使用并维护出境表;Step S5: Implement digital customs through a multi-identifier network router, and use and maintain the exit form through the digital customs.
步骤S6,通过所述数字海关使用入境表验证所述数字护照,并更新所述入境表。Step S6: Verify the digital passport using the entry form through the digital customs and update the entry form.
本发明的进一步改进在于,所述步骤S1包括以下子步骤:A further improvement of the present invention is that step S1 includes the following sub-steps:
步骤S101,多标识网络客户端为用户在本地生成公钥和私钥,然后将公钥和用私钥签名的身份信息提交给多标识管理系统中的任意节点;当节点接收到请求时进行验证,在验证成功后由多标识管理系统联盟链的记账节点生成一个交易,并将其发送给所有区块链节点;区块链中的投票节点收到一个预区块时,将对是否允许这个预区块成为一个正式区块进行投票,领导节点收集投票结果进行计数并生成投票证明,对投票通过的预区块的区块信息进行存储,并从区块信息中提取用户注册信息存储在用户注册表中;In step S101, the multi-identity network client generates a public key and a private key for the user locally, and then submits the public key and the identity information signed with the private key to any node in the multi-identity management system. When a node receives a request, it verifies it. After successful verification, the ledger node of the multi-identity management system consortium chain generates a transaction and sends it to all blockchain nodes. When a voting node in the blockchain receives a pre-block, it votes on whether to allow the pre-block to become a formal block. The leader node collects the voting results, counts them, generates a voting proof, stores the block information of the pre-block that passed the vote, and extracts the user registration information from the block information and stores it in the user registry.
步骤S102,注册后的用户对发布的每个数据包以自己的私钥进行签名,采用SM2椭圆曲线算法将数字签名写入至多标识网络包的签名区,中间路由器定期维护从多标识管理系统得到的用户信息表,在收到报文后从中提取对应用户的签名信息,然后通过从多标识管理系统中获得的公钥信息,对收到的多标识网络包进行身份认证;Step S102: After registration, the user signs each data packet with their private key and writes the digital signature into the signature area of the multi-identifier network packet using the SM2 elliptic curve algorithm. The intermediate router periodically maintains the user information table obtained from the multi-identifier management system. After receiving a message, it extracts the signature information of the corresponding user from the table and then uses the public key information obtained from the multi-identifier management system to authenticate the received multi-identifier network packet.
步骤S103,在身份认证通过后,通过支持可变报文长度的报文格式进行对应的多标识寻址;所述报文格式的数据包包含标识区、签名区、只读区和可变区共四个区域,所述标识区用于存放一个或多个标识,以区分不同网络分组;所述签名区用于存放一个或多个数字签名,每个数字签名由签名信息和签名值组成,签名信息指的是签名类型以及用于验证签名的证书的位置;所述只读区用于存放由网络发送者填充的数据块;所述可变区包括保护区和危险区,所述保护区用于存放需要进行签名的可修改字段,所述危险区用于存放无需进行签名的可修改字段;Step S103: After successful authentication, multi-identifier addressing is performed using a message format that supports variable message length. The data packet of the message format includes four areas: an identifier area, a signature area, a read-only area, and a variable area. The identifier area stores one or more identifiers to distinguish different network packets. The signature area stores one or more digital signatures, each consisting of signature information and a signature value. The signature information refers to the signature type and the location of the certificate used to verify the signature. The read-only area stores data blocks filled by the network sender. The variable area includes a protected area and a dangerous area. The protected area stores modifiable fields that require signature, and the dangerous area stores modifiable fields that do not require signature.
所述步骤S2中,基于多标识网络的数字海关,指的是用于处理出入境多标识网络包的边界路由器,为本国出境的多标识网络包签发数字护照,并核验外国入境的多标识网络包的数字签证;基于多标识网络的数字护照和数字签证分别指携带在多标识网络包上的不同的特定字段,所述特定字段通过加密、哈希计算和证书中的任意一种或几种方式进行生成并验证。In step S2, the digital customs based on the multi-identifier network refers to the border router used to process inbound and outbound multi-identifier network packets, issue digital passports for multi-identifier network packets leaving the country, and verify digital visas for multi-identifier network packets entering the country from abroad; the digital passport and digital visa based on the multi-identifier network refer to different specific fields carried on the multi-identifier network packet, and the specific fields are generated and verified by any one or more of encryption, hash calculation and certificates.
本发明的进一步改进在于,所述步骤S3包括以下子步骤:A further improvement of the present invention is that step S3 includes the following sub-steps:
步骤S301,通过公式Time=UNIX Time and 0xFFFFFFFFFFFFFFF0计算时间参数Time,其中,UNIX Time为一个64位的整数,用于表示自预设时间开始所经过的秒数,且秒数UNIX Time在二进制下的最低4位设置为0;Step S301: Calculate the time parameter Time using the formula Time = UNIX Time and 0xFFFFFFFFFFFFFFFF0, where UNIX Time is a 64-bit integer representing the number of seconds elapsed since the preset time, and the lowest 4 bits of the number of seconds UNIX Time in binary are set to 0.
步骤S302,通过公式Time256=Time×(1+264+2128+2192)获取256位的时间数据Time256;Step S302: Obtain the 256-bit time data Time256 using the formula Time256=Time×(1+2 64 +2 128 +2 192 );
步骤S303,通过公式Visa=SHA256(Time256 xor CVK)对时间数据Time256和数字签证密钥CVK进行按位异或运算,并进行哈希函数的单向映射,得到基于多标识网络的数字签证Visa;数字签证密钥CVK为一个256位的密钥,该数字签证密钥CVK关联用户的多标识网络身份信息和真实身份信息。Step S303: Perform a bitwise XOR operation on the time data Time256 and the digital visa key CVK using the formula Visa = SHA256(Time256 xor CVK), and perform a one-way mapping of the hash function to obtain the digital visa based on the multi-identifier network; the digital visa key CVK is a 256-bit key, which is associated with the user's multi-identifier network identity information and real identity information.
本发明的进一步改进在于,所述步骤S3中,以当前时间和16秒之前时间所计算得到的数字签证Visa均有效。A further improvement of the present invention is that, in step S3, the digital visa calculated using the current time and the time 16 seconds prior is valid.
本发明的进一步改进在于,所述步骤S4中,通过公式Pass=SHA256(Visa xor CPK)计算得到基于多标识网络的数字护照Pass,其中,CPK指的是预先约定的256位的跨国护照密钥。A further improvement of the present invention is that, in step S4, a digital passport Pass based on a multi-identifier network is calculated using the formula Pass = SHA256 (Visa xor CPK), where CPK refers to a pre-agreed 256-bit cross-border passport key.
本发明的进一步改进在于,所述步骤S5中,数字海关中存储有多个出境表,每一个出境表对应一个目标国家;当数字海关收到转发表所转发出境的多标识网络包时,首先检查多标识网络包所对应的目标国家,然后将多标识网络包分配给对应国家的出境表进行处理,处理过程包括以下子步骤:A further improvement of the present invention is that, in step S5, the digital customs stores multiple exit tables, each exit table corresponding to a target country; when the digital customs receives a multi-identifier network packet forwarded from the forwarding table, it first checks the target country corresponding to the multi-identifier network packet, and then assigns the multi-identifier network packet to the exit table of the corresponding country for processing. The processing includes the following sub-steps:
步骤A1,所述数字海关丢弃没有出境许可的用户的多标识网络包;Step A1: The digital customs discards multi-identifier network packets from users without exit permits;
步骤A2,当多标识网络包中携带的数字签证Visa和出境表表项中的LastVisa相同时,数字海关直接在多标识网络包中使用出境表中的LastPass签署数字护照,并转发多标识网络包,LastVisa指的是用户上一个多标识网络包的数字签证,LastPass指的是基于用户上一个多标识网络包的数字签证LastVisa所计算得到的数字护照;Step A2: When the digital visa carried in the multi-identifier network packet is the same as the LastVisa in the exit form, the digital customs directly signs the digital passport in the multi-identifier network packet using the LastPass in the exit form and forwards the multi-identifier network packet. LastVisa refers to the digital visa of the user's previous multi-identifier network packet, and LastPass refers to the digital passport calculated based on the digital visa LastVisa of the user's previous multi-identifier network packet.
步骤A3,当多标识网络包中携带的数字签证Visa和出境表表项中的LastVisa不同时,判断当前时间和LastTime的差值是否小于8秒,若是,则数字海关直接使用LastPass作为数字护照,将该数字护照填入至多标识网络包并立即转发,LastTime指的是用户上一个多标识网络包到达的时间;若否,则根据当前时间计算新的数字护照,并根据新的数字护照更新出境表,将新的数字护照签发进多标识网络包。Step A3: When the digital visa carried in the multi-identifier network packet is different from the LastVisa in the departure form, determine whether the difference between the current time and LastTime is less than 8 seconds. If so, digital customs directly uses LastPass as the digital passport, fills the digital passport into the multi-identifier network packet, and forwards it immediately. LastTime refers to the time when the user's previous multi-identifier network packet arrived. If not, calculate the new digital passport based on the current time, update the departure form based on the new digital passport, and issue the new digital passport into the multi-identifier network packet.
本发明的进一步改进在于,所述步骤S6中,在数字海关使用并维护一个入境表,当一个多标识网络包要进入网络边境时,所述数字海关通过所述入境表进行验证处理,验证处理的过程包括以下子步骤:A further improvement of the present invention is that, in step S6, an entry form is used and maintained in the digital customs. When a multi-identifier network packet is about to enter the network border, the digital customs performs verification processing through the entry form. The verification process includes the following sub-steps:
步骤B1,如果发送方未持有数字护照,且不属于免签情况,则通过所述数字海关直接丢弃多标识网络包;Step B1: If the sender does not hold a digital passport and is not in a visa-free situation, the multi-identifier network packet is directly discarded through the digital customs.
步骤B2,如果发送方持有数字护照,通过数字海关验证所述数字护照的有效性,若判定为无效,则所述数字海关丢弃带无效数字护照的多标识网络包;若判定为有效,则多标识网络包对应的数字护照及其数字签证通过验证;Step B2: If the sender holds a digital passport, the validity of the digital passport is verified through digital customs. If it is determined to be invalid, the digital customs discards the multi-identifier network packet containing the invalid digital passport; if it is determined to be valid, the digital passport and its digital visa corresponding to the multi-identifier network packet are verified.
所述步骤S6更新所述入境表的过程包括以下任一步骤:The process of updating the entry form in step S6 includes any of the following steps:
步骤C,数字海关遍历入境表的所有条目,每隔固定时间计算和更新LastPass、Pass和NextPass字段,其中,LastPass指的是基于用户上一个多标识网络包的数字签证LastVisa所计算得到的数字护照,Pass指的是基于LastTime之后固定时间计算的数字签证Visa所计算得到的数字护照,NextPass指的是基于LastTime之后两倍固定时间计算的数字护照;Step C: Digital Customs traverses all entries in the entry form, calculating and updating the LastPass, Pass, and NextPass fields at fixed intervals. LastPass refers to the digital passport calculated based on the LastVisa digital visa of the user's previous multi-identifier network packet. Pass refers to the digital passport calculated based on the digital visa calculated at a fixed time after LastTime. NextPass refers to the digital passport calculated based on twice the fixed time after LastTime.
步骤D,所述数字海关收到多标识网络包时,判断所述入境表表项中的LastPass是否已经过期,若是,则将LastPass替换为Pass,并将Pass替换为NextPass;若否,则返回。Step D: When the digital customs receives a multi-identifier network packet, it determines whether the LastPass in the entry form has expired. If so, it replaces LastPass with Pass and Pass with NextPass; otherwise, it returns.
本发明的进一步改进在于,还包括基于加权中心度算法的拟态防御步骤,在拟态防御步骤中,先获取多标识网络中各设备的指标,所述指标包括点度中心性、接近中心性和中介中心性;在获取以上三项指标后,对各个指标分别进行排序以作为该指标的得分,然后对三项指标得分进行加和得到加和值sum,对加和值sum进行排序得到最后的中心度等级值Rank;对于存储服务器,赋予第一权值,其加和值sum除以3得到新的加和值sum';对于边界路由器,赋予第二权值,其加和值sum除以2得到新的加和值sum';对于转发服务器,赋予第三权值,其加和值sum不变;所述第一权值大于第二权值,所述第二权值大于第三权值。A further improvement of this invention is that it also includes a mimicry defense step based on a weighted centrality algorithm. In the mimicry defense step, the indicators of each device in the multi-identifier network are first obtained, including degree centrality, proximity centrality, and betweenness centrality. After obtaining the above three indicators, each indicator is sorted to obtain a score for that indicator. Then, the scores of the three indicators are summed to obtain a sum value sum. The sum value sum is sorted to obtain the final centrality rank value Rank. For the storage server, a first weight is assigned, and its sum value sum is divided by 3 to obtain a new sum value sum'. For the border router, a second weight is assigned, and its sum value sum is divided by 2 to obtain a new sum value sum'. For the forwarding server, a third weight is assigned, and its sum value sum remains unchanged. The first weight is greater than the second weight, and the second weight is greater than the third weight.
本发明的进一步改进在于,还包括步骤S7,用于建立网络空间管理体系;在网络空间管理体系中进行AI检测管理,当网络空间受到干扰或攻击时,通过数据分析、深度学习、强化学习以及模型训练中的至少一项对网络流量、用户行为和系统日志进行监测分析,并存储至区块链日志记录中。A further improvement of the present invention is that it also includes step S7, which is used to establish a cyberspace management system; AI detection and management are carried out in the cyberspace management system, and when the cyberspace is interfered with or attacked, network traffic, user behavior and system logs are monitored and analyzed by at least one of data analysis, deep learning, reinforcement learning and model training, and stored in the blockchain log record.
本发明的进一步改进在于,在网络空间管理体系中,当查找不到干扰或攻击所对应的攻击方时,通过网络空间中的保险服务公司进行赔偿,或通过网络空间应急部门提供紧急援助和支持,所述网络空间应急部门包括网络空间中的国内应急部门和国际应急部门;所述保险服务公司和网络空间应急部门均基于多标识网络实现内嵌身份认证,并通过多标识寻址访问区块链日志记录。A further improvement of this invention is that, in the cyberspace management system, when the attacker corresponding to the interference or attack cannot be found, compensation is provided through an insurance service company in cyberspace, or emergency assistance and support are provided through a cyberspace emergency response department, which includes domestic and international emergency response departments in cyberspace; both the insurance service company and the cyberspace emergency response department implement embedded identity authentication based on a multi-identifier network and access blockchain log records through multi-identifier addressing.
本发明的进一步改进在于,还包括步骤S8,用于建立网络空间裁判体系;在网络空间裁判体系中,当涉及到数据资产、数据隐私或网络空间的纠纷和冲突时,根据区块链日志记录进行调查,将调查结果发送至对应的国内网络法庭或国际网络法庭;并将相关的判决记录公布在区块链网络空间之中。A further improvement of the present invention is that it also includes step S8, which is used to establish a cyberspace adjudication system; in the cyberspace adjudication system, when disputes and conflicts involving data assets, data privacy or cyberspace are involved, an investigation is conducted based on blockchain log records, and the investigation results are sent to the corresponding domestic or international cyber courts; and the relevant judgment records are published in the blockchain cyberspace.
本发明还提供一种确保网络空间可信且安全的系统,采用了如上所述的确保网络空间可信且安全的方法,并包括:This invention also provides a system for ensuring the trustworthiness and security of cyberspace, employing the method described above, and comprising:
身份认证和多标识寻址模块,基于多标识网络实现内嵌身份认证和包签名的多标识寻址,用户在注册完成后,先对发布的每个数据包以自己的私钥进行签名,写入多标识网络包的签名区,中间路由器定期维护从多标识管理系统得到的用户信息表,在收到报文后从中提取对应用户的签名信息,然后通过从多标识管理系统中获得的公钥信息,对收到的多标识网络包进行身份认证;并在身份认证通过后,通过支持可变报文长度的报文格式进行对应的多标识寻址;The identity authentication and multi-identity addressing module implements embedded identity authentication and packet signing multi-identity addressing based on a multi-identity network. After registration, users first sign each published data packet with their private key and write it into the signature area of the multi-identity network packet. Intermediate routers periodically maintain a user information table obtained from the multi-identity management system. Upon receiving a packet, they extract the corresponding user's signature information from the table and then use the public key information obtained from the multi-identity management system to authenticate the received multi-identity network packet. After successful authentication, multi-identity addressing is performed using a packet format that supports variable packet length.
定义模块,定义基于多标识网络的数字海关、数字护照以及数字签证;Define the module to define digital customs, digital passports, and digital visas based on a multi-identifier network;
数字签证模块,对时间数据和数字签证密钥进行按位异或运算,通过哈希函数对按位异或运算后的数据进行单向映射,得到基于多标识网络的数字签证;The digital visa module performs a bitwise XOR operation on the time data and the digital visa key, and then uses a hash function to perform a one-way mapping on the data after the bitwise XOR operation to obtain a digital visa based on a multi-identifier network.
数字护照模块,根据数字签证的哈希值和跨国护照密钥,计算得到基于多标识网络的数字护照;The digital passport module calculates a digital passport based on a multi-identifier network, using the hash value of the digital visa and the cross-border passport key.
使用并维护出境表模块,通过多标识网络路由器实现数字海关,通过所述数字海关使用并维护出境表;The exit form module is used and maintained, and digital customs is implemented through a multi-identifier network router. The exit form is used and maintained through the digital customs.
使用并更新入境表模块,通过所述数字海关使用入境表验证所述数字护照,并更新所述入境表。Use and update the entry form module to verify the digital passport through the digital customs and update the entry form.
与现有技术相比,本发明的有益效果在于:先基于多标识网络实现内嵌身份认证和包签名的多标识寻址,然后通过基于多标识网络的数字签证、数字护照以及数字海关来实现出境表的使用和维护,实现入境表的使用和更新,进而能够有效地通过多标识网络及多标识网络管理系统提供适应当前发展速度的网络体系、方法与系统,以便更为有效地保障网络空间的可信和安全,为保证网络空间的有序、法治以及和平提供更好的基础。当涉及到数据资产、数据隐私或网络空间的纠纷和冲突时,受害方可以根据区块链日志记录进行调查,将调查结果发送至对应的国内网络法庭或国际网络法庭,为进行国内或国际网络法庭诉讼提供了可靠的基础。本发明能够更好地应用于在全球网络空间中,便于管理各国网络空间边界,保护各国的网络空间主权,打击跨国网络攻击与犯罪。Compared with existing technologies, the beneficial effects of this invention are as follows: First, it achieves multi-identifier addressing with embedded identity authentication and packet signature based on a multi-identifier network. Then, it realizes the use and maintenance of exit forms and the use and updating of entry forms through digital visas, digital passports, and digital customs based on the multi-identifier network. This effectively provides a network system, method, and framework adapted to the current pace of development through the multi-identifier network and its management system, thereby more effectively ensuring the trustworthiness and security of cyberspace and providing a better foundation for ensuring order, rule of law, and peace in cyberspace. When disputes and conflicts involving data assets, data privacy, or cyberspace arise, the victim can conduct investigations based on blockchain log records and send the investigation results to the corresponding domestic or international cyber courts, providing a reliable basis for domestic or international cyber court litigation. This invention can be better applied in global cyberspace, facilitating the management of national cyberspace boundaries, protecting national cyberspace sovereignty, and combating transnational cyberattacks and crimes.
在此基础上,还进一步实现了基于加权中心度算法的拟态防御,以便根据用户安全需求,有侧重地提高网络防护的效率;建立抗攻击的随机过程鞅量化模型,增强网络空间层次化分析结构的灵活性,进一步提高网络完全性;建立网络空间管理体系和网络空间裁判体系,为网络空间的安全和可信提供了保障,为确保网络空间的安全、和平、法治和有序管理提供了很好的基础。Building upon this foundation, a mimicry defense based on a weighted centrality algorithm was further implemented to improve the efficiency of network protection in a targeted manner according to user security needs; a martingale quantization model for attack-resistant stochastic processes was established to enhance the flexibility of the hierarchical analysis structure of cyberspace and further improve network integrity; and a cyberspace management system and a cyberspace adjudication system were established to provide guarantees for the security and trustworthiness of cyberspace and to lay a solid foundation for ensuring the safe, peaceful, rule-of-law-based, and orderly management of cyberspace.
图1是本发明一种实施例的工作流程示意图;Figure 1 is a schematic diagram of the workflow of an embodiment of the present invention;
图2是本发明一种实施例的网络空间的整体方案架构示意图;Figure 2 is a schematic diagram of the overall network space scheme architecture according to an embodiment of the present invention;
图3是本发明一种实施例的多标识网络体系安全防护示意图;Figure 3 is a schematic diagram of security protection for a multi-identifier network system according to an embodiment of the present invention;
图4是本发明一种实施例的多标识网络包的格式示意图;Figure 4 is a schematic diagram of the format of a multi-identifier network packet according to an embodiment of the present invention;
图5是本发明一种实施例基于数字海关构建国际网络空间的组网示意图;Figure 5 is a network diagram of an embodiment of the present invention for building an international cyberspace based on digital customs;
图6是本发明一种实施例的多标识网络安全防御方案示意图;Figure 6 is a schematic diagram of a multi-identifier network security defense scheme according to an embodiment of the present invention;
图7是本发明一种实施例的多标识网络的层级化安全方案示意图;Figure 7 is a schematic diagram of a hierarchical security scheme for a multi-identifier network according to an embodiment of the present invention;
图8是本发明一种实施例的随机徘徊过程的马尔可夫链示意图;Figure 8 is a schematic diagram of a Markov chain for a random wandering process according to an embodiment of the present invention;
图9是本发明一种实施例的多标识网络安全保护机制示意图;Figure 9 is a schematic diagram of a multi-identifier network security protection mechanism according to an embodiment of the present invention;
图10是本发明一种实施例的多标识网络的攻击转移示意图;Figure 10 is a schematic diagram of attack transfer in a multi-identifier network according to an embodiment of the present invention;
图11是本发明一种实施例的主动防御云环境架构示意图;Figure 11 is a schematic diagram of an active defense cloud environment architecture according to an embodiment of the present invention;
图12是本发明一种实施例的虚拟机迁移架构示意图;Figure 12 is a schematic diagram of a virtual machine migration architecture according to an embodiment of the present invention;
图13是本发明一种实施例的任务执行流程图;Figure 13 is a task execution flowchart of an embodiment of the present invention;
图14是网络攻击流程示意图;Figure 14 is a schematic diagram of the network attack process;
图15是本发明一种实施例的详细工作流程示意图。Figure 15 is a detailed flowchart of an embodiment of the present invention.
在介绍本发明的较优的实施例之前,先对相关的技术方案进行介绍。Before introducing the preferred embodiments of the present invention, the relevant technical solutions will be described first.
第一种相关的技术方案为IP-VPN。The first relevant technical solution is IP-VPN.
IP-VPN是最早的基于IP体系提出的虚拟安全专网。传统意义上的VPN主要是指因为整个VPN网络的任意2个节点之间的连接并没有传统专网所需的端到端的物理链路,通过架构在公用网络服务商所提供的网络平台,用户数据可在逻辑链路中传输。IP-VPN则是指通过对IP网络数据的封包和加密传输,利用现有的电力信息网资源建立的虚拟专用网,通过共享的IP网络建立私有数据传输通道,将远程的分支办公室、商业伙伴、移动办公人员等连接起来,提供端到端的服务质量(QoS)保证以及安全服务。IP-VPN is the earliest virtual private network based on the IP architecture. Traditional VPNs, in their traditional sense, refer to networks where the connection between any two nodes lacks the end-to-end physical link required by traditional private networks. By leveraging a network platform provided by a public network service provider, user data can be transmitted via a logical link. IP-VPN, however, utilizes existing power information network resources to establish a virtual private network through packet encapsulation and encryption of IP network data. It establishes a private data transmission channel via a shared IP network, connecting remote branch offices, business partners, and mobile workers, providing end-to-end Quality of Service (QoS) guarantees and security services.
目前,IP-VPN主要依靠以下四项技术来确保数据的安全性:一是隧道技术(Tunneling),通过在公用网络上建立隧道,将数据封装在隧道中进行传输,以保护数据的机密性和完整性。二是加密技术(Encryption),采用加密算法对数据进行加密,使其在传输过程中无法被未经授权的人员窃取或篡改。三是密钥管理技术(Key Management),用于生成、分发和管理加密通信所需的密钥,确保通信双方能够安全地共享密钥。四是使用者与设备身份认证技术(Authentication),通过验证用户和设备的身份来确保只有合法的用户和设备可以访问IP-VPN,防止未经授权的访问和攻击。Currently, IP-VPNs primarily rely on the following four technologies to ensure data security: First, tunneling, which establishes a tunnel over a public network to encapsulate data during transmission, protecting its confidentiality and integrity. Second, encryption, which uses encryption algorithms to encrypt data, preventing unauthorized access or tampering during transmission. Third, key management, used to generate, distribute, and manage the keys required for encrypted communication, ensuring secure key sharing between communicating parties. Fourth, user and device authentication, verifying the identities of users and devices to ensure only legitimate users and devices can access the IP-VPN, preventing unauthorized access and attacks.
这种相关技术方案存在以下缺点:尽管IP-VPN在名称上被称为虚拟专用网,但实质上它仍然是建立在IP协议架构之上的逻辑概念,而非真正的专网,这就导致了一些缺点的存在。在过去的20-30年中,IP-VPN并未能真正解决安全问题,存在以下限制:一是安全性挑战,由于IP-VPN完全依赖于IP协议,它面临着来自各种网络安全威胁的挑战,如数据泄露和入侵攻击等。二是信任问题,在传统的IP-VPN中,所有节点都被视为可信任的,这可能导致未经授权的节点获得访问权限,从而增加了安全风险。三是可扩展性限制,随着网络规模和复杂性的增加,传统的IP-VPN难以适应大规模网络和不断增长的用户需求。四是管理复杂性,传统的IP-VPN需要进行复杂的配置和管理,包括密钥管理和身份认证等,这也增加了管理的复杂性和成本。This related technical solution has the following drawbacks: Although IP-VPN is called a Virtual Private Network, it is essentially a logical concept built on the IP protocol architecture, rather than a true private network, which leads to several shortcomings. Over the past 20-30 years, IP-VPN has failed to truly solve security problems, exhibiting the following limitations: First, security challenges: Because IP-VPN relies entirely on the IP protocol, it faces challenges from various network security threats, such as data breaches and intrusion attacks. Second, trust issues: In traditional IP-VPNs, all nodes are considered trustworthy, which can lead to unauthorized nodes gaining access, increasing security risks. Third, scalability limitations: As network size and complexity increase, traditional IP-VPNs struggle to adapt to large-scale networks and growing user demands. Fourth, management complexity: Traditional IP-VPNs require complex configuration and management, including key management and authentication, which increases management complexity and cost.
第二种相关的技术方案为传统防火墙。The second relevant technical solution is the traditional firewall.
传统防火墙是一种网络安全设备,可通过过滤数据包中的IP地址(IPAddresses)和服务端口(Ports)来实现对网络流量的控制。然而,防火墙在面对攻击者使用合法的IP地址和端口号进行攻击活动或恶意行为时往往无法起到作用,因为它通常只能够对数据包进行表面级别的检查,而且即使使用了深度包检测技术(Deep Packet Inspection,DPI),也仍然会面临诸多挑战。一般每种恶意攻击代码都具有独特的特征(Signature),可以通过这些特征将病毒与正常的应用程序代码区分开来。杀毒软件(Antivirus Programs)则通过存储已知病毒的特征来辨别病毒。在ISO/OSI七层网络层次模型中,防火墙主要位于第二层到第四层之间,防火墙将在这些层次展开流量控制和分析,而对第四层到第七层之间的网络层次仅仅具有较小的影响。杀毒软件则主要在第五层到第七层之间进行病毒识别。Traditional firewalls are network security devices that control network traffic by filtering IP addresses and service ports in data packets. However, firewalls are often ineffective against attackers using legitimate IP addresses and port numbers for malicious activities, as they typically only perform surface-level packet inspections. Even with Deep Packet Inspection (DPI), they still face numerous challenges. Generally, each malicious attack code has a unique signature, which can be used to distinguish viruses from legitimate application code. Antivirus programs identify viruses by storing the signatures of known viruses. In the ISO/OSI seven-layer network model, firewalls primarily operate between layers two and four, performing traffic control and analysis at these layers, with only a minor impact on layers four through seven. Antivirus software primarily identifies viruses between layers five and seven.
防火墙是一种常见的网络安全技术,但它仍然是基于IP架构下的防护措施。这种相关技术方案存在以下缺点:一是无法应对高级威胁,传统防火墙主要依赖于已知的病毒特征或规则进行检测,无法有效应对新型的高级威胁和未知攻击模式。二是无法识别应用层威胁,传统防火墙在第四层以下的网络层次上进行流量控制和分析,对于隐藏在应用层的威胁往往无法识别和阻止。三是容易受到欺骗,传统防火墙容易受到攻击者使用欺骗性技术绕过检测,例如使用加密通信或伪装流量等手段。四是限制了网络性能,传统防火墙需要进行深度包检测和规则匹配,这对网络性能造成一定的影响,尤其在高流量环境下可能导致网络延迟和吞吐量降低。Firewalls are a common network security technology, but they are still protection measures based on IP architecture. This type of technology has the following drawbacks: First, it cannot deal with advanced threats. Traditional firewalls mainly rely on known virus signatures or rules for detection, and cannot effectively deal with new advanced threats and unknown attack patterns. Second, it cannot identify application-layer threats. Traditional firewalls perform traffic control and analysis at network layers below Layer 4, and often cannot identify and block threats hidden at the application layer. Third, it is vulnerable to deception. Traditional firewalls are easily bypassed by attackers using deceptive techniques, such as encrypted communication or disguised traffic. Fourth, it limits network performance. Traditional firewalls require deep packet inspection and rule matching, which has a certain impact on network performance, especially in high-traffic environments, potentially leading to reduced network latency and throughput.
第三种相关的技术方案为IDS和IPS。The third related technical solution is IDS and IPS.
为填补防火墙和杀毒软件在七层网络模型中的第四层到第五层之间的空白,工业界引入了入侵检测系统(Intrusion Detection System,IDS)和入侵防御系统(Intrusion Prevention System,IPS)。IDS主要用于检测异常入侵行为并告警。IPS则主要用于检测被明确判断为攻击行为、能够对网络造成危害的恶意活动,并进行相应的防御。IPS相比之下更侧重于风险控制。To fill the gap between layers four and five of the seven-layer network model, where firewalls and antivirus software operate, the industry has introduced Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS). IDS primarily detects and alerts on abnormal intrusion behavior. IPS, on the other hand, primarily detects malicious activities clearly identified as attacks that could harm the network and provides corresponding defenses. IPS, comparatively, places greater emphasis on risk control.
IDS可以实时监视网络传输,当发现异常情况时能够立即向管理人员或防火墙进行警报。IDS是一种监听设备,无需跨接在任何链路上即可工作。因此部署IDS要求将其连接在流量必经的链路上。IDS通常被放置在尽可能靠近攻击源或受保护资源的位置,例如服务器区域的交换机以及保护网段的局域网交换机。IDS (Intrusion Detection System) can monitor network traffic in real time and immediately alert administrators or firewalls when anomalies are detected. IDS is a monitoring device that can operate without being bridging any links. Therefore, deploying an IDS requires connecting it to a link that traffic must pass through. IDS is typically placed as close as possible to the attack source or protected resource, such as switches in server areas or LAN switches in protected network segments.
与IDS类似,IPS关注于在数据内部进行防御如搜索攻击代码特征,对有害数据包进行过滤或丢弃,大多数IPS还结合应用程序或网络传输中的异常行为对攻击进行辅助识别。例如,用户程序违反安全条例、数据包敏感时段进行发包解包和应用程序漏洞被利用等。IPS不仅考虑已知病毒特征,更重要的是识别攻击程序或有害代码及其克隆和变种,采取预防措施,尽早预防或至少降低其危害性。IPS在使用场景中通常作为防火墙和防病毒软件的补充。必要时IPS还可以为追究攻击者的刑事责任提供有效证据。Similar to Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS) focus on defense within the data itself, such as searching for attack code signatures, filtering or dropping malicious packets. Most IPS also incorporate anomalous behavior in applications or network transmissions to aid in attack identification. Examples include user programs violating security regulations, packet sending and unpacking during sensitive periods, and the exploitation of application vulnerabilities. IPS not only considers known virus signatures but, more importantly, identifies attack programs or malicious code and their clones and variants, taking preventative measures to prevent or at least mitigate their harm as early as possible. In practice, IPS is often used as a supplement to firewalls and antivirus software. When necessary, IPS can also provide valid evidence for pursuing the criminal liability of attackers.
但是,这种相关技术方案存在以下缺点:IDS系统在识别大规模组合式、分布式入侵攻击方面,还没有较好的解决方法,误报与漏报现象严重。误报将使得大量的报警事件分散管理员的精力,反而无法对真正的攻击做出反应。而与误报相对应的是漏报,随着攻击方法的不断更新,IDS是否能报出网络中所有的攻击也是一个问题。IDS技术采用了一种预设置式和特征分析式工作原理,所以检测规则的更新总是落后于攻击手段的更新,无法主动发现网络中的安全隐患和故障。另外,IDS只是检测和报警,并不具有真正的防御和阻止攻击的能力,在报警的同时,攻击已经发生了。However, this related technical solution has the following drawbacks: IDS systems lack effective solutions for identifying large-scale, combined, distributed intrusion attacks, resulting in severe false positives and false negatives. False positives distract administrators, hindering their ability to respond to genuine attacks. Conversely, false negatives raise concerns about whether IDS can detect all attacks on the network as attack methods evolve. IDS technology employs a pre-configured and signature-based operating principle, meaning that detection rules always lag behind updated attack methods, preventing proactive discovery of network security vulnerabilities and faults. Furthermore, IDS only detects and alerts; it lacks the ability to truly defend against and prevent attacks. By the time an alert is issued, the attack has already occurred.
IPS技术也存在单点故障、性能瓶颈、误报和漏报问题。设计要求IPS必须以嵌入模式工作在网络中,而这就可能造成瓶颈问题或单点故障。如果IDS出现故障,最坏的情况也就是造成某些攻击无法被检测到,而嵌入式的IPS设备出现问题,就会严重影响网络的正常运转。如果IPS出现故障而关闭,用户就会面对一个由IPS造成的拒绝服务问题,所有客户都将无法访问企业网络提供的应用。由于能够实时检测和实时阻止攻击,IPS大大提高了安全保护的效率和效果。IPS的弱势也源于其优势。由于采用与IDS相同的检测技术,IPS同样面临误报和漏报的风险。在发现入侵时,IPS需要当即立断做出准许或阻止数据包通过的判断,因此IPS的误报和漏报会导致比IDS更为严重的后果。IDS的误报顶多会增加网络噪音,给网管员增加麻烦,然而IPS的误报则会导致拒绝服务,合法访问被拒之门外。IPS technology also suffers from single points of failure, performance bottlenecks, false positives, and false negatives. The design requires IPS to operate embedded in the network, which can lead to bottlenecks or single points of failure. While a faulty Intrusion Detection System (IDS) might at worst result in some attacks going undetected, a problem with an embedded IPS device can severely impact network operation. If an IPS fails and shuts down, users will face a denial-of-service (DoS) issue, preventing all customers from accessing applications provided by the enterprise network. Because it can detect and block attacks in real time, IPS significantly improves the efficiency and effectiveness of security protection. However, IPS's weaknesses also stem from its strengths. Using the same detection technology as IDS, IPS also faces the risk of false positives and false negatives. Upon detecting an intrusion, IPS needs to immediately decide whether to allow or block data packets, so false positives and false negatives in IPS can lead to more severe consequences than with IDS. While false positives in IDS might at most increase network noise and add hassle for network administrators, false positives in IPS can lead to a DoS, denying legitimate access.
第四种相关的技术方案为Web应用防火墙。The fourth related technical solution is a Web application firewall.
Web应用防火墙(Web Application Firewall,WAF)是一种专门为Web应用提供保护的设备,其通过执行一系列针对HTTP/HTTPS的安全策略来保护Web应用。近年来,随着Web应用越来越丰富和复杂,Web服务器也逐渐成为攻击者的主要目标,如SQL注入、网页篡改和网页挂马等安全事件频繁发生。传统的防火墙等设备往往束手无策,而Web应用防护系统则能够解决这些问题。A Web Application Firewall (WAF) is a device specifically designed to protect web applications. It protects web applications by enforcing a series of security policies specific to HTTP/HTTPS. In recent years, as web applications have become increasingly rich and complex, web servers have gradually become a primary target for attackers, with security incidents such as SQL injection, website tampering, and malware injection occurring frequently. Traditional firewalls and similar devices are often ineffective against these threats, while web application protection systems can solve these problems.
与传统防火墙不同的是,WAF工作在应用层。通过对Web应用业务流程和逻辑进行学习,WAF能够对来自Web应用程序客户端的发出的各种类型请求进行检测,从而验证其内容的安全性与合法性,并对非法的请求及时进行中断,从而达到保护网站安全的目的。WAF的主要功能包括审计设备、访问控制设备、架构设计工具和Web应用加固工具。审计设备用于截获HTTP数据或者满足某些规则的会话;访问控制设备用于控制对Web应用的访问,包提供了两种安全模式分别为主动安全模式和被动安全模式;架构设计工具则在反向代理模式下用于分配职能、集中控制和虚拟基础结构等;Web应用加固工具则用于增强被保护的Web应用的安全性,包括防攻击、防漏洞、防暗链、防爬虫、防挂马和抗DDOS等。Unlike traditional firewalls, Web Application Firewalls (WAFs) operate at the application layer. By learning the business processes and logic of web applications, WAFs can inspect various types of requests from web application clients, verifying the security and legitimacy of their content and promptly interrupting illegal requests, thereby protecting website security. The main functions of a WAF include auditing devices, access control devices, architecture design tools, and web application hardening tools. Auditing devices are used to intercept HTTP data or sessions that meet certain rules; access control devices control access to web applications, providing two security modes: active security and passive security; architecture design tools, in reverse proxy mode, are used for assigning functions, centralized control, and virtual infrastructure; and web application hardening tools enhance the security of protected web applications, including protection against attacks, vulnerabilities, hidden links, web crawlers, malware injection, and DDoS attacks.
这种相关技术方案存在以下缺点:WAF在减缓黑客攻击方面起了一定作用,但同时WAF也存在较大的局限性。首先,WAF存在一定“被绕过”几率。WAF对HTTP(S)协议进行自行解析,可能存在与web服务器对HTTP(S)请求的理解不一致的问题,从而发生“被绕过”的情况。其次,WAF的防御往往滞后于黑客的攻击,无法对新型的攻击进行有效的识别和阻断。目前市面上大多数的WAF都是基于规则匹配的,即WAF对接数据收到的包进行正则匹配过滤,如果正则匹配到与现有漏洞知识库的攻击代码相同,则认为这个为恶意代码,从而对其进行阻断,显而易见规则的更新往往是滞后于攻击发生的。最后,WAF对于逻辑漏洞的防御总是捉襟见肘。WAF对攻击的识别来自于已经设定好的规则库,对于看似“正常”的业务逻辑漏洞却无能为力,例如越权操作、未授权访问、任意用户密码重置和弱口令漏洞等。This related technical solution has the following drawbacks: While WAF plays a role in mitigating hacker attacks, it also has significant limitations. First, WAFs have a certain chance of being bypassed. WAFs parse the HTTP(S) protocol themselves, which may lead to inconsistencies between their interpretation and the web server's understanding of HTTP(S) requests, resulting in bypass attempts. Second, WAF defenses often lag behind hacker attacks, failing to effectively identify and block new types of attacks. Most WAFs on the market are based on rule matching; that is, the WAF filters received data packets using regular expressions. If the regular expression matches attack code in an existing vulnerability knowledge base, it is considered malicious and blocked. Obviously, rule updates often lag behind attacks. Finally, WAFs are always inadequate in defending against logical vulnerabilities. WAF attack identification relies on a pre-defined rule base, rendering it powerless against seemingly "normal" business logic vulnerabilities, such as unauthorized access, arbitrary password resets, and weak password vulnerabilities.
第五种相关的技术方案为态势感知。The fifth related technical solution is situational awareness.
态势感知于20世纪80年代提出,其包含感知、理解和预测三个层次。基于Endsley的理论对网络安全态势感知做出的定义:网络安全态势感知是综合分析网络安全要素,评估网络安全状况,预测其发展趋势,并以可视化的方式展现给用户,并给出相应的报表和应对措施。态势感知平台应当是利用大数据和机器学习等技术对海量数据进行提取,进行多维度的关联分析。能够提供对安全风险保持报警、趋势预测等,海量数据、关联分析、大屏展示和趋势预测是四个重点。其中,趋势预测最核心,同时也是比较难实现的部分。Situational awareness, proposed in the 1980s, encompasses three levels: perception, understanding, and prediction. Based on Endsley's theory, cybersecurity situational awareness is defined as the comprehensive analysis of cybersecurity elements, assessment of the cybersecurity situation, prediction of its development trends, and presentation of these findings to users in a visual manner, along with corresponding reports and countermeasures. A situational awareness platform should utilize big data and machine learning technologies to extract massive amounts of data and conduct multi-dimensional correlation analysis. It should provide alerts for security risks, trend prediction, and other capabilities. Massive data, correlation analysis, large-screen display, and trend prediction are the four key aspects. Among these, trend prediction is the most crucial and also the most challenging to implement.
态势感知重点在于通过大数据和机器学习等技术加深了对安全趋势的预测。目前国内安全厂商提供的态势感知产品包含的功能模块有:资产管理、漏洞管理、大数据平台、日志分析平台、威胁情报、沙箱、用户行为分析、网络流量分析、取证溯源和威胁捕捉等能力。随着监测范围的扩大,数据量也在扩大,需要一个具备大数据处理和计算能力的大数据平台,这是整个态势感知平台建设重要的基础。威胁情报对于降低大量数据和报警中的垃圾数据或者报警噪声,帮助更快速、更高效的发现攻击行为和攻击者非常关键,威胁情报的质量是检验态势感知平台能力的很重要的方面。利用态势感知这样的平台能力的核心目的,是要监测到复杂的、高级的攻击,这就需要态势感知平台首先要捕获到微观的状态,低成本、高效率的全要素数据采集能力是基础。当前网络空间防御攻击不再是基于特征的监测,需要运用威胁情报和专家经验,来构建基于场景的分析系统,这是一个与时俱进的攻防对抗中不断学习、学习参考的过程,需要持续运营这样的分析管理。Situational awareness focuses on enhancing the prediction of security trends through technologies such as big data and machine learning. Currently, domestic security vendors offer situational awareness products with functional modules including asset management, vulnerability management, big data platforms, log analysis platforms, threat intelligence, sandboxing, user behavior analysis, network traffic analysis, forensics and tracing, and threat capture. As the monitoring scope expands, so does the amount of data, necessitating a big data platform with large-scale processing and computing capabilities—a crucial foundation for the entire situational awareness platform. Threat intelligence is critical for reducing junk data and alarm noise in large volumes of data and alerts, helping to discover attack behaviors and attackers more quickly and efficiently. The quality of threat intelligence is a significant aspect of evaluating the capabilities of a situational awareness platform. The core purpose of utilizing such a platform is to monitor complex and advanced attacks. This requires the situational awareness platform to first capture micro-level states; low-cost, high-efficiency, full-element data collection capabilities are fundamental. Current cyberspace attack defense is no longer based on feature-based monitoring; it requires the use of threat intelligence and expert experience to build scenario-based analysis systems. This is a continuous learning and referencing process in the ever-evolving offensive and defensive confrontation, requiring continuous operation and management of such analysis.
这种相关技术方案存在以下缺点:传统的安全态势感知其设计仅涉及对网络行为进行数据收集和分析,主要专注于单一网络环境。随着网络规模的不断扩大,相应的指标体系出现,但这些指标往往不够全面,并在精准性与实时性方面存在缺陷。大数据技术的出现提升了感知能力,而深度学习则增强了预测分析能力。因此,安全态势感知系统具备了实际应用能力,但这依赖于大量的历史数据和关联数据。然而,网络形势变化迅速,仅依靠先验知识难以精确应对碎片化和超长潜伏期的威胁行为。特别是对于新型威胁的识别,存在较大困难。This related technical solution has the following drawbacks: Traditional security situation awareness is designed only to collect and analyze network behavior data, primarily focusing on a single network environment. As network scale continues to expand, corresponding indicator systems emerge, but these indicators are often incomplete and lack accuracy and real-time performance. The emergence of big data technology has improved perception capabilities, while deep learning has enhanced predictive analysis capabilities. Therefore, security situation awareness systems possess practical application capabilities, but this relies on large amounts of historical and correlated data. However, the network landscape changes rapidly, and relying solely on prior knowledge is insufficient to accurately address fragmented and long-latent threat behaviors. Identifying new threats, in particular, presents significant challenges.
第六种相关的技术方案为零信任理念。The sixth related technical solution is the zero-trust concept.
1994年,“零信任”一词由Stephen Paul Marsh在斯特灵大学的计算机安全博士论文中提出。Marsh将信任看作是可以用数学来描述论证的东西,并断言信任不能包含道德、伦理、合法性、正义和判断等人类因素。2010年,Forrester Research的分析师John Kindervag使用术语零信任模型来表示公司内部更严格的网络安全计划和访问控制。2013年,云安全联盟CSA提出了新一代网络安全技术架构—即软件定义边界SDP,为零信任首个技术解决方案。2018-2020年,NIST和NCCoE开展相关工作并连发两版零信任标准草案,将零信任(ZT)定义为一组概念和想法,旨在减少在面对被视为受损的网络时在信息系统和服务中执行准确的、按请求的访问决策时的不确定性。In 1994, the term "zero trust" was coined by Stephen Paul Marsh in his doctoral dissertation on computer security at the University of Stirling. Marsh viewed trust as something that could be mathematically described and argued, asserting that trust should not include human factors such as morality, ethics, legitimacy, justice, and judgment. In 2010, John Kindervag, an analyst at Forrester Research, used the term zero trust model to describe stricter cybersecurity initiatives and access controls within companies. In 2013, the Cloud Security Alliance (CSA) proposed a new generation of cybersecurity architecture—Software-Defined Perimeter (SDP)—as the first technical solution for zero trust. From 2018 to 2020, NIST and NCCoE conducted related work and released two draft versions of the zero trust standard, defining zero trust (ZT) as a set of concepts and ideas aimed at reducing uncertainty in making accurate, on-demand access decisions in information systems and services when faced with networks perceived as compromised.
零信任安全包含五个基本假定:一是网络无时无刻不处于危险环境中;二是网络自始至终存在外部或内部威胁;三是网络位置不足以决定网络可信程度;四是所有的设备、用户和网络流量都应当经过认证和授权;五是网络安全策略必须是动态的,并应基于尽可能多的数据源计算得来。Zero-trust security comprises five basic assumptions: First, the network is always in a dangerous environment; second, the network is always threatened by external or internal threats; third, the location of the network is insufficient to determine its trustworthiness; fourth, all devices, users, and network traffic should be authenticated and authorized; and fifth, network security policies must be dynamic and calculated based on as many data sources as possible.
零信任并非一种独立的产品或单一设备,而是一套不断发展的网络安全范式,将静态的、基于网络边界的传统防御方法转向关注用户、资产和资源方面。零信任架构并非完全摒弃现有安全技术另起炉灶,而是依然使用很多传统的网络安全技术,例如身份认证、访问控制等。零信任只是将认证与控制的范围从广泛的网络边界转移到单个或小组资源。Zero Trust is not a standalone product or single device, but rather an evolving cybersecurity paradigm that shifts the focus from static, perimeter-based traditional defenses to those addressing users, assets, and resources. Zero Trust does not completely abandon existing security technologies and start from scratch; it still utilizes many traditional cybersecurity techniques, such as authentication and access control. Zero Trust simply shifts the scope of authentication and control from the broad network perimeter to individual or small-group resources.
零信任以三大关键技术作为底层支撑。零信任模式的研发和部署必然经历复杂的技术迭代升级,涉及身份认证与访问管理(IAM)、微隔离(Micro Segmentation)和软件定义边界(Software Defined Perimeter)等核心技术。首先是身份认证与访问管理,即通过动态认证和授权对身份进行全面验证,是零信任架构的基石。身份认证与访问管理技术解决了身份唯一标识、身份属性和身份全生命周期管理等关键问题。其次是微隔离,通过更细粒度地分割资源,隔离内外系统主机,并独立控制访问权限,有效防止违规访问横向传播。最后是软件定义边界,能够在“移动+云”环境中建立虚拟边界,只有经过设备和身份认证的用户才能访问资源,且通过临时、单一的“访问隧道”,不会泄露资源位置。这三大技术是零信任架构的核心组成部分,零信任安全近年来也得到了广泛推广。Zero Trust is underpinned by three key technologies. The development and deployment of the Zero Trust model inevitably involves complex technological iterations and upgrades, encompassing core technologies such as Identity and Access Management (IAM), Micro Segmentation, and Software-Defined Perimeter (SDP). First, Identity and Access Management (IAM) comprehensively verifies identities through dynamic authentication and authorization, forming the cornerstone of the Zero Trust architecture. IAM technology addresses key issues such as unique identity identification, identity attributes, and full lifecycle management of identities. Second, Micro Segmentation isolates internal and external system hosts through finer-grained resource segmentation and independently controls access permissions, effectively preventing the lateral propagation of unauthorized access. Finally, Software-Defined Perimeter (SDP) establishes virtual boundaries in "mobile + cloud" environments, allowing only users with device and identity authentication to access resources through temporary, single "access tunnels" without revealing resource locations. These three technologies are the core components of the Zero Trust architecture, and Zero Trust security has been widely adopted in recent years.
这种相关技术方案存在以下缺点:零信任理念自1994年提出以来,已经推广了数十年,但每年全球网络安全领域依然还是会出现受到影响的十大事件。此外,Facebook也曾遭受大规模个人数据泄露事件。对于其他国家而言,零信任要求信任单一机构控制的IP网络域名系统,这使得实现真正的零信任更加困难。This related technical solution has the following drawbacks: The zero-trust concept has been promoted for decades since its inception in 1994, yet the global cybersecurity field still experiences one of the top ten impactful incidents every year. Furthermore, Facebook has also suffered a large-scale personal data breach. For other countries, zero trust requires trust in an IP network domain name system controlled by a single organization, making true zero trust even more difficult to achieve.
当前互联网发展迅猛,给现有网络体系带来了很大的挑战,IP发明和网络控制的主要参与者投入数十年的时间研究网络安全,但每年仍会出现在十大网络安全事件。现有单边主义下的域名管理系统在专业化服务质量和安全管控方面已经力不从心。而上面所述的这些相关技术方案均无法确保全球化趋势的网络空间可信和安全,为了保证网络空间的可信、安全、有序、法治以及和平,需要提供一个适应当前发展速度的网络体系、方法与系统。The rapid development of the internet has brought significant challenges to the existing network infrastructure. Despite decades of research into cybersecurity by key players in IP invention and network control, cybersecurity incidents still occur in the top ten cybersecurity incidents every year. Existing unilateral domain name management systems are inadequate in terms of professional service quality and security control. Furthermore, the aforementioned technical solutions cannot guarantee the trustworthiness and security of cyberspace in a globalized world. To ensure a trustworthy, secure, orderly, law-abiding, and peaceful cyberspace, a network architecture, methodology, and system adapted to the current pace of development is needed.
为此,本实施例旨在提供一种确保网络空间可信且安全的方法与系统,以满足适应当前发展速度的网络体系、方法与系统需求。下面将结合附图,对本发明的较优的实施例作进一步的详细说明。Therefore, this embodiment aims to provide a method and system for ensuring the trustworthiness and security of cyberspace, to meet the needs of network architectures, methods, and systems that adapt to the current pace of development. The preferred embodiments of the present invention will be further described in detail below with reference to the accompanying drawings.
新一代的网络体系架构应当是支持包含内容、身份、IP地址、服务和地理空间等多标识的体系,为全人类共同拥有,各国共管、共治和共享的网络空间。新的网络体系应该具有高安全的基因、新的系统应该是可扩展和可演进的,以适应未来网络的发展,并且需要整体框架规划安全感知及可嵌入的模块化设计以防范应对各种攻击。当小概率攻击突破安全技术的防线时,系统需要有相应的手段来解决冲突事件,并将处理结果反馈给现有网络空间,以保持网络空间的和平安全和法治。The next-generation network architecture should support a multi-identifier system encompassing content, identity, IP address, service, and geospatial attributes, creating a cyberspace shared by all humanity and governed, managed, and shared by all nations. This new network architecture should possess a high level of security, be scalable and evolvable to adapt to future network developments, and require a comprehensive framework for security awareness and embeddable modular design to prevent and respond to various attacks. When a low-probability attack breaches security defenses, the system needs appropriate mechanisms to resolve the conflict and feed the results back to the existing cyberspace to maintain peace, security, and the rule of law.
因此,如图1至图14所示,本实施例提供一种确保网络空间可信且安全的方法,包括以下步骤:Therefore, as shown in Figures 1 to 14, this embodiment provides a method for ensuring the trustworthiness and security of cyberspace, including the following steps:
步骤S1,基于多标识网络实现内嵌身份认证和包签名的多标识寻址,用户在注册完成后,先对发布的每个数据包以自己的私钥进行签名,写入多标识网络包的签名区,中间路由器定期维护从多标识管理系统得到的用户信息表,在收到报文后从中提取对应用户的签名信息,然后通过从多标识管理系统中获得的公钥信息,对收到的多标识网络包进行身份认证;并在身份认证通过后,通过支持可变报文长度的报文格式进行对应的多标识寻址;Step S1: Implement embedded identity authentication and packet signing for multi-identity addressing based on a multi-identity network. After registration, the user first signs each published data packet with their private key and writes it into the signature area of the multi-identity network packet. The intermediate router periodically maintains the user information table obtained from the multi-identity management system. After receiving a packet, it extracts the signature information of the corresponding user from the table and then uses the public key information obtained from the multi-identity management system to authenticate the received multi-identity network packet. After successful authentication, multi-identity addressing is performed using a packet format that supports variable packet length.
步骤S2,定义基于多标识网络的数字海关、数字护照以及数字签证;Step S2, define digital customs, digital passports, and digital visas based on a multi-identifier network;
步骤S3,对时间数据和数字签证密钥进行按位异或运算,通过哈希函数对按位异或运算后的数据进行单向映射,得到基于多标识网络的数字签证;Step S3: Perform a bitwise XOR operation on the time data and the digital visa key, and use a hash function to perform a one-way mapping on the data after the bitwise XOR operation to obtain a digital visa based on a multi-identifier network.
步骤S4,根据数字签证的哈希值和跨国护照密钥,计算得到基于多标识网络的数字护照;Step S4: Calculate the digital passport based on the hash value of the digital visa and the cross-border passport key;
步骤S5,通过多标识网络路由器实现数字海关,通过所述数字海关使用并维护出境表;Step S5: Implement digital customs through a multi-identifier network router, and use and maintain the exit form through the digital customs.
步骤S6,通过所述数字海关使用入境表验证所述数字护照,并更新所述入境表。Step S6: Verify the digital passport using the entry form through the digital customs and update the entry form.
本实施例还提供一种确保网络空间可信且安全的系统,如图2所示,采用了所述的确保网络空间可信且安全的方法,包括基于MIN体系、安全技术以及分组数据网络的网络空间,包括基于MIN的网络空间、从管理层面提供保障的网络空间管理体系,还包括基于MIN的网络空间、从法律层面提供保障的网络空间裁判体系,以提供适应当前发展速度的网络体系、方法与系统。This embodiment also provides a system to ensure the trustworthiness and security of cyberspace. As shown in Figure 2, the system employs the aforementioned method for ensuring the trustworthiness and security of cyberspace, including a cyberspace based on the MIN architecture, security technologies, and packet data networks. This includes a cyberspace based on MIN, a cyberspace management system that provides security from a management perspective, and a cyberspace adjudication system based on MIN that provides security from a legal perspective, in order to provide a network system, method, and system that adapts to the current pace of development.
在全球共同使用的网络空间,要确保全球网络空间可信安全有序守法和平,需要在解决技术问题的基础上,如图3所示,通过技术方案将安全技术、与各个主体系统管理、以及各国内部/全球国际法律仲裁体系这三者相结合来实现,各国内部/全球国际法律仲裁体系可以包括网络线上法庭及传统国内/国际法庭等。To ensure the credibility, security, order, law-abidingness, and peace of the global cyberspace shared by all countries, it is necessary to address technical issues. As shown in Figure 3, this can be achieved by combining security technologies, the management of various entity systems, and the domestic/global international legal arbitration systems. These systems can include online courts and traditional domestic/international courts.
第一,在技术上,本实施例采用基于MIN体系组成的网络。在MIN网络中,每一个国家在出入境路由器处设置数字海关,为本国出境的MIN网络包签署数字护照,核验国外入境的MIN网络包的数字签证。通过数字护照与数字签证机制,各国可以有效控制出入境的MIN网络包,打击跨国网络犯罪和攻击,维护自身网络空间主权。MIN指的是Multi-Identifier Network,即多标识网络。First, technically, this embodiment employs a network based on the MIN architecture. In the MIN network, each country establishes a digital customs checkpoint at the entry/exit routers to issue digital passports for MIN network packets departing from its territory and verify digital visas for MIN network packets entering from abroad. Through this digital passport and digital visa mechanism, countries can effectively control the entry and exit of MIN network packets, combat transnational cybercrime and attacks, and safeguard their own cyberspace sovereignty. MIN stands for Multi-Identifier Network.
第二,采用基于MIN体系网络的各类安全技术。图3为MIN体系安全防护示意图,MIN体系依靠满足CAP三性的强一致性,线性可扩展的可用性,分区容忍的区块链多边共管全球及各国的网络空间,贯彻真实身份注册使用网络,以密码学记各种生物特征技术实现隐私保护和可控可管平衡。每个用户个人及单位都有密码学的账号及公私钥,先注册登记与区块链系统才能用网络,每次交互通信会话先验证身份再通信,每次的访问读写日志都有区块链记录可溯源,不能抵赖。各自新技术的应用,如区块链、量子技术、量子区块链、内生安全和拟态防御等在技术层面将未知威胁转换为已知威胁,提高安全指数。Second, various security technologies based on the MIN system network are adopted. Figure 3 is a schematic diagram of the MIN system's security protection. The MIN system relies on strong consistency that satisfies the CAP theorem, linear scalability, availability, and partition tolerance, with blockchain multilateral co-management of global and national cyberspace. It implements real-name registration for network use and uses cryptographic recording of various biometric technologies to achieve a balance between privacy protection and controllability. Each individual user and organization has a cryptographic account and public/private keys. Registration with the blockchain system is required before using the network. Each interaction and communication session verifies identity before communication, and each access, read, and write log is recorded by the blockchain for traceability and non-repudiation. The application of various new technologies, such as blockchain, quantum technology, quantum blockchain, intrinsic security, and mimicry defense, transforms unknown threats into known threats at the technical level, improving the security index.
第三,管理是安全的基本保证,没有有效管理的结合,技术方案将难以实施。每个单位及个人系统对网络使用过程中的异常,可以通过基于AI的主动预计、检测及人工管理员进行处理的系统,实现防范处理。若遇到无主事件,则交由应急部门进行相应处理和赔偿。Third, effective management is the fundamental guarantee of security; without it, technical solutions will be difficult to implement. Each unit and individual system can prevent and handle anomalies during network usage through AI-based proactive prediction and detection, combined with human administrator intervention. In the event of unattended incidents, the emergency response department will handle the matter and provide compensation.
第四,是法治法律法庭裁判体系及系统。全球各国都有网络空间相关法律,当发生资产、数据隐私或其他网络空间的受害事件时,受害人可以报警。由于所有交互都有日志记录,是可溯源的,网络警察可以根据区块链系统记录的日志判定可能发起事端的参与方。如果当事人来自同一个国家,该事件交由该国的国内网络法庭审判;如是当事人来自不同的国家,该事件交由国际网络法庭审批。由此过失或犯罪者将得到法律制裁、经济赔偿或坐牢等处罚,其判决记录及执行也将公布于区块链网络空间。Fourthly, there is the rule of law, legal system, and judicial system. Countries worldwide have laws related to cyberspace, allowing victims to report incidents involving asset, data privacy, or other cyber threats to the police. Since all interactions are logged and traceable, cyber police can use the logs recorded by the blockchain system to identify potential initiators. If the parties are from the same country, the case is adjudicated by that country's domestic cyber court; if they are from different countries, the case is adjudicated by an international cyber court. Those who commit negligence or crimes will receive legal sanctions, financial compensation, or imprisonment, and the records and execution of these judgments will be published in the blockchain cyberspace.
本实施例使用的MIN网络支持顶级标识由各国共同管理,支持互联互通;下级标识由各国独立管理,主权独立。同时,各国间通过数字海关技术实现个人及企业的跨国数据资产的被确权及保护。最后结合安全技术、各个主体系统的管理和法律仲裁体系,实现系统的持续建立及运作,形成闭环,以实现基于技术方案而实现的网络空间可信且安全的方法及系统,使得没有人敢于故意的以攻击损害其它人的网络上的资产名誉或操控其他人的物理系统,比如操控其他人的汽车或生产设备等等,包括且不限于操控汽车伤害他人的人身安全。The MIN network used in this embodiment supports top-level identifiers being jointly managed by various countries, enabling interconnectivity; lower-level identifiers are managed independently by each country, ensuring sovereign autonomy. Simultaneously, digital customs technology facilitates the confirmation and protection of cross-border data assets for individuals and enterprises. Finally, by combining security technologies, the management of various entity systems, and legal arbitration mechanisms, the system's continuous establishment and operation are achieved, forming a closed loop. This provides a trustworthy and secure cyberspace method and system based on technological solutions, ensuring that no one dares to intentionally attack or damage another's network assets or reputation, or manipulate another's physical systems, such as controlling another's car or production equipment, including but not limited to manipulating a car to harm another's personal safety.
本实施例所述步骤S1用于提供基于多标识网络的内嵌身份认证和包签名的多标识寻址技术方案。Step S1 in this embodiment is used to provide a multi-identifier addressing technology solution based on embedded identity authentication and packet signature of a multi-identifier network.
本实施例采用的MIN体系使用内嵌身份认证和包签名的多标识寻址方案。每个用户和设备入网前,都需要在MIS联盟链中注册自己的真实身份信息,以获得其唯一的身份标识,后续发出的每个数据包都需要用对应的私钥签名,以供转发、接受节点对其进行身份认证。这样可以实现用户与内容的紧密绑定。如果发布或请求的内容有问题,可以准确定位到个人,确保行为和资源可以得到有效管理和控制。总的身份注册和包转发过程参与者包括MIN客户端、MIS系统和MIN路由器。MIS指的是Multi-Identifier System,即多标识管理系统。This embodiment employs a MIN system with embedded identity authentication and packet signing multi-identifier addressing. Before joining the network, each user and device must register their real identity information in the MIS consortium blockchain to obtain a unique identifier. Each subsequent data packet must be signed with the corresponding private key for authentication by forwarding and receiving nodes. This achieves a tight binding between users and content. If there is a problem with the published or requested content, the individual can be accurately located, ensuring effective management and control of behavior and resources. The participants in the overall identity registration and packet forwarding process include the MIN client, the MIS system, and the MIN router. MIS stands for Multi-Identifier System.
本实施例所述步骤S1优选包括步骤S101至步骤S103。In this embodiment, step S1 preferably includes steps S101 to S103.
步骤S101,本实施例的用户身份注册过程优选基于非对称密码学,多标识网络客户端为用户在本地生成公钥和私钥,然后将公钥和用私钥签名的身份信息提交给多标识管理系统中的任意节点;当节点接收到请求时进行验证,首先检查其格式,然后在本地数据库中搜索用户信息,并对其中的一些内容进行简单的验证,包括且不限于用户名是否合法、是否存在用户信息重复以及用户公私钥是否有效等,若上述任一验证失败,则向用户返回这个错误信息;如果全部验证成功,则由多标识管理系统联盟链的记账节点生成一个交易,并将其发送给所有区块链节点;区块链中的投票节点收到一个预区块时,将对是否允许这个预区块成为一个正式区块进行投票,正式区块包括-1、0或1的形式,领导节点收集投票结果进行计数并生成投票证明,对投票通过的预区块的区块信息进行存储,优选存储在MongoDB数据库中,并从区块信息中提取用户注册信息存储在用户注册表中。Step S101: In this embodiment, the user registration process is preferably based on asymmetric cryptography. The multi-identity network client generates a public key and a private key for the user locally, and then submits the public key and the identity information signed with the private key to any node in the multi-identity management system. When a node receives a request, it performs verification. First, it checks the format, then searches for user information in its local database, and performs simple verification on some of the content, including but not limited to whether the username is valid, whether there is duplicate user information, and whether the user's public and private keys are valid. If any of the above verifications fail, an error message is returned to the user. If all verifications are successful, the ledger node of the multi-identity management system consortium chain generates a transaction and sends it to all blockchain nodes. When a voting node in the blockchain receives a pre-block, it votes on whether to allow the pre-block to become a formal block. The formal block includes the form of -1, 0, or 1. The leader node collects the voting results, counts them, and generates a voting proof. The block information of the pre-block that passes the vote is stored, preferably in a MongoDB database, and user registration information is extracted from the block information and stored in the user registry.
步骤S102,在注册完成后,用户对发布的每个数据包以自己的私钥进行签名,优选采用SM2椭圆曲线算法将数字签名写入至多标识网络包的签名区,中间路由器定期维护从多标识管理系统(MIS)得到的用户信息表,在收到报文后从中提取对应用户的签名信息,然后通过从多标识管理系统中获得的公钥信息,对收到的多标识网络包进行身份认证。In step S102, after registration, the user signs each published data packet with their private key. Preferably, the SM2 elliptic curve algorithm is used to write the digital signature into the signature area of the multi-identifier network packet. The intermediate router periodically maintains the user information table obtained from the multi-identifier management system (MIS). After receiving a message, it extracts the signature information of the corresponding user from the table and then uses the public key information obtained from the multi-identifier management system to authenticate the received multi-identifier network packet.
除了安全因素外,考虑到不同的用户有可能存在不同的寻址需求,路由过程应该对应不同的标识。为了支持多种标识,摆脱对传统网络的寻址依赖,本实施例结合上述身份认证的技术方案,设计对应的多标识寻址方式。不同的标识适合的传输语义并不相同,主要包括以IP网络架构为代表的“推”模式和以内容中心网络(Content Centric Network,CCN)为代表的“拉”模式。Besides security factors, considering that different users may have different addressing needs, the routing process should correspond to different identifiers. To support multiple identifiers and break free from the reliance on traditional network addressing, this embodiment combines the aforementioned identity authentication technical solutions to design a corresponding multi-identifier addressing method. Different identifiers are suitable for different transmission semantics, mainly including the "push" mode represented by IP network architecture and the "pull" mode represented by Content-Centric Network (CCN).
因此,本实施例所述步骤S103,在身份认证通过后,通过支持可变报文长度的报文格式进行对应的多标识寻址,以增强网络分组定义的灵活性和可扩展性;同时,在安全性方面,该报文格式支持在每个网络分组中以内嵌数字签名的方式确保网络分组的完整性,并且支持溯源。Therefore, in step S103 of this embodiment, after identity authentication is passed, corresponding multi-identifier addressing is performed through a message format that supports variable message length to enhance the flexibility and scalability of network packet definition; at the same time, in terms of security, the message format supports ensuring the integrity of network packets by embedding digital signatures in each network packet, and supports traceability.
如图4所示,本实施例用于多标识寻址的报文的网络分组编码中,包含类型、大小和数据三个要素,这三个要素分别通过T(type)、S(size)和D(data)表示。该编码方式支持层级化嵌套,同时具有不定长特性,可以提供更强的扩展功能。所述报文格式的数据包包含标识区、签名区、只读区和可变区共四个区域。As shown in Figure 4, this embodiment uses network packet encoding for multi-identifier-addressed messages, which includes three elements: type, size, and data. These three elements are represented by T (type), S (size), and D (data), respectively. This encoding method supports hierarchical nesting and has variable length characteristics, providing stronger scalability. The data packet in the message format includes four areas: an identification area, a signature area, a read-only area, and a variable area.
本实施例所述标识区(Identifier area)用于存放一个或多个标识,以区分不同网络分组。所述签名区(Signature area)用于存放一个或多个数字签名,每个数字签名由签名信息和签名值组成,签名信息指的是签名类型以及用于验证签名的证书的位置;用户在获得自己的公钥和私钥后,在MIS系统中注册,每次发包时,都会用私钥对包信息进行签名并写入本区域,用于转发节点或源端节点对发包者的身份认证;这个签名区是可扩展的,也就是说用户可以根据其安全需求选择逐跳签名或源端签名等不同安全等级的签名方案。所述只读区(Read only area)用于存放由网络发送者填充的数据块,包含0个至多个TSD数据块,中间路由器不可以篡改;只读区和签名区一起配合保证了发送内容的真实性、完整性和不可抵赖性。所述可变区(Mutable area)包括保护区和危险区,所述保护区用于存放需要进行签名的可修改字段,用以存放比较重要但可以修改的字段;所述危险区用于存放无需进行签名的可修改字段,用以存放重要等级低且可修改的信息,例如存活时间(Time To Live,TTL)等;在路由过程中,对于不同的标识,内容标识和服务标识采用拉式语义,通信时使用兴趣包和数据包;推式语义通信时采用通用推式包(General Push Packet,GPPkt)。常见的使用推式语义的标识包括身份、地理信息和IP标识。The Identifier area described in this embodiment stores one or more identifiers to distinguish different network packets. The Signature area stores one or more digital signatures. Each digital signature consists of signature information and a signature value. The signature information refers to the signature type and the location of the certificate used to verify the signature. After obtaining their public and private keys, users register in the MIS system. Each time a packet is sent, the user signs the packet information with their private key and writes it into this area for authentication of the sender by forwarding nodes or source nodes. This signature area is expandable, meaning that users can choose different security levels of signature schemes, such as hop-by-hop signing or source-end signing, according to their security requirements. The Read-Only area stores data blocks filled by the network sender, containing zero to multiple TSD data blocks, which cannot be tampered with by intermediate routers. The Read-Only area and the Signature area work together to ensure the authenticity, integrity, and non-repudiation of the sent content. The mutable area includes a protected area and a dangerous area. The protected area stores modifiable fields that require signatures, and is used to store relatively important but modifiable fields. The dangerous area stores modifiable fields that do not require signatures, and is used to store low-importance and modifiable information, such as Time To Live (TTL). During routing, pull semantics are used for different identifiers, content identifiers, and service identifiers, and interest packets and data packets are used for communication. Push semantics communication uses General Push Packets (GPPkt). Common identifiers using push semantics include identity, geographic information, and IP identifiers.
路由设备优选采用多标识路由器MIR,MIR指的是Multi-Identifier Router。MIR包含逻辑接口、包验证模块、转发模块、转发表模块和决策器等模块。对于接收到的包,MIR首先会进行格式审查,并通过识别标识区中存放的标识类型区分包的类型,只有多标识网络包(也称MIN包)才会被继续转发。对于每一个MIN包,MIR首先以包验证模块验证其签名是否正确有效,如果验证失败,则丢弃该包。如果验证通过,则将该包传递给标识选择模块,选出用于转发的标识,并根据标识区分不同的网络分组,分别执行对应的转发处理流程。Routing devices preferably employ Multi-Identifier Routers (MIRs). An MIR includes logical interfaces, packet verification modules, forwarding modules, forwarding table modules, and decision-makers. Upon receiving a packet, the MIR first performs a format check and distinguishes the packet type by identifying the identifier type stored in the identifier area. Only multi-identifier network packets (also known as MIN packets) are forwarded. For each MIN packet, the MIR first verifies the validity of its signature using the packet verification module. If verification fails, the packet is discarded. If verification passes, the packet is passed to the identifier selection module, which selects the appropriate identifier for forwarding and distinguishes different network packets based on the identifier, executing the corresponding forwarding process accordingly.
(1)兴趣包:首先查询本地内容缓存,如果命中缓存,则直接返回请求的数据。否则查询待定兴趣表(Pending Interest Table,PIT),如果PIT中存在匹配的条目,则表示已经有相同名字的兴趣包被发出且未被满足。那么聚合这些同样的兴趣包,将接收到兴趣包的逻辑接口记录到对应PIT条目中,并停止转发该兴趣包。如果PIT中不存在匹配的条目,则为其创建一个PIT条目,并查询转发表(Forwarding Information Base,FIB)中是否有匹配的路由。如果查询成功,则根据转发策略进行转发;否则,根据转发策略选择丢弃或者返回Nack消息。(1) Interest Packet: First, query the local content cache. If the cache is hit, return the requested data directly. Otherwise, query the Pending Interest Table (PIT). If a matching entry exists in the PIT, it means that an interest packet with the same name has already been sent but not satisfied. Aggregate these identical interest packets, record the logical interface that received the interest packet in the corresponding PIT entry, and stop forwarding the interest packet. If no matching entry exists in the PIT, create a PIT entry for it and query the Forwarding Information Base (FIB) for a matching route. If the query is successful, forward the packet according to the forwarding policy; otherwise, discard the packet or return a NACK message according to the forwarding policy.
(2)数据包:首先查询PIT表,如果没有查询到匹配的条目,则说明并不是被用户请求的数据包,直接丢弃;否则将该数据包存储到本地缓存中,并根据转发策略进行转发。(2) Data packet: First, query the PIT table. If no matching entry is found, it means that the data packet is not requested by the user and is discarded directly; otherwise, the data packet is stored in the local cache and forwarded according to the forwarding policy.
(3)GPPkt包:MIR对其处理逻辑与IP路由器相似,在FIB中查询目的标识,如果没有查询到匹配的条目,则直接丢弃;否则根据转发策略进行转发。(3) GPPkt packets: MIR processes them in a similar way to IP routers. It queries the destination identifier in FIB. If no matching entry is found, the packet is discarded. Otherwise, it is forwarded according to the forwarding policy.
除了网络层,在应用层,本实施例也会对每个用户的身份进行校验。并且用户的所有访问行为,也会根据其本身的访问权限来受到相关的约束。若该身份的权限允许其可以进行相关操作,那么用户可以正常访问;反之,用户的操作会被拒绝并且被MIS记录下来。In addition to the network layer, this embodiment also verifies the identity of each user at the application layer. Furthermore, all user access behaviors are subject to relevant constraints based on their access permissions. If the user's permissions allow them to perform the relevant operation, then the user can access the service normally; otherwise, the user's operation will be denied and recorded by the MIS.
本实施例的合法用户实行实名认证,用户从网络中拉取数据时需要签名。对于MIN体系内部用户发起请求的数据,其内容和请求者均由区块链进行记录。一旦出现问题,可以立刻进行问题回溯和追责,从而保证信息的真实可靠,在一定程度上可以避免内网用户的恶意操作。上述技术方案使得各国在网络空间的管理,就像现实空间之中,每个人都有数字护照,进入他国都需要获得数字签证,其行为都将在各国及本国的数字海关的联盟链或国内的网络空间之中留下不能否认的记录。In this embodiment, legitimate users undergo real-name authentication, and users are required to sign when retrieving data from the network. For data requested by users within the MIN system, both the content and the requester are recorded by the blockchain. In case of problems, immediate backtracking and accountability can be implemented, ensuring the authenticity and reliability of information and mitigating malicious operations by internal network users to a certain extent. The above technical solution enables countries to manage cyberspace in a manner similar to that in the real world, where everyone has a digital passport, and entering other countries requires a digital visa. All actions will leave an undeniable record in the consortium blockchain of each country's and its own digital customs or in the domestic cyberspace.
本实施例所述步骤S2用于定义基于多标识网络中的数字海关、数字护照以及数字签证。所述步骤S2中,基于多标识网络的数字海关,指的是用于处理出入境多标识网络包的边界路由器,决定本国多标识网络包是否能够出境,为本国出境的多标识网络包签发数字护照,并核验外国入境的多标识网络包的数字签证。所述多标识网络包也称MIN网络包或MIN包。所述数字海关在设计上的主要需求包括,在满足普通多标识网络路由器功能的前提下,能够实现数字海关的功能需求,单个数字海关能够处理千万级别用户的网络出入境需求。数字海关可以有效控制MIN网络包的出入境,从而塑造维护各国网络空间主权。Step S2 in this embodiment defines digital customs, digital passports, and digital visas based on a multi-identifier network. In step S2, the digital customs based on a multi-identifier network refers to a border router that processes inbound and outbound multi-identifier network packets, determines whether domestic multi-identifier network packets can leave the country, issues digital passports for outbound domestic multi-identifier network packets, and verifies digital visas for inbound foreign multi-identifier network packets. The multi-identifier network packet is also called a MIN network packet or MIN packet. The main design requirements of the digital customs include, while meeting the functions of a regular multi-identifier network router, the ability to realize the functional requirements of a digital customs, with a single digital customs office capable of handling the network inbound and outbound needs of tens of millions of users. Digital customs can effectively control the inbound and outbound of MIN network packets, thereby shaping and maintaining the cyberspace sovereignty of various countries.
基于多标识网络的数字护照和数字签证分别指携带在多标识网络包上的不同的特定字段,所述特定字段通过加密、哈希计算和证书中的任意一种或几种方式进行生成并验证。将首次提出的基于多标识网络的数字护照和数字签证应用于网络空间中,能够通过可靠的技术方案管理各国网络空间边界,保护各国网络空间主权,打击跨国网络攻击与犯罪。Digital passports and digital visas based on multi-identifier networks refer to different specific fields carried on multi-identifier network packets. These specific fields are generated and verified through one or more methods, including encryption, hash calculation, and certificates. Applying these digital passports and digital visas based on multi-identifier networks to cyberspace for the first time can manage national cyberspace boundaries through reliable technical solutions, protect national cyberspace sovereignty, and combat transnational cyberattacks and crimes.
具体的,在多标识网络中,所述数字护照指的是携带在MIN网络包上的特定字段。该字段可以采用加密、哈希或证书等手段生成和验证。该字段仅由数字海关添加,以保证其安全和可靠性。数字护照无法被它国伪造,并且可以抵御网络攻击,如重放攻击等。数字护照的计算简单有效,降低数字海关的计算负担,关于这一点,将在后面进行描述。数字护照可以反应某国网络空间主权对出境MIN网络包的背书与认可,为网络空间安全事件划定更加清晰的责任界限,推动全球网络空间治理。Specifically, in a multi-identifier network, the digital passport refers to a specific field carried on the MIN network packet. This field can be generated and verified using methods such as encryption, hashing, or certificates. This field is added solely by digital customs to ensure its security and reliability. The digital passport cannot be forged by other countries and can resist cyberattacks such as replay attacks. The calculation of the digital passport is simple and efficient, reducing the computational burden on digital customs, a point that will be described later. The digital passport can reflect a country's endorsement and recognition of its cyberspace sovereignty over outbound MIN network packets, defining clearer boundaries of responsibility for cybersecurity incidents and promoting global cyberspace governance.
在多标识网络中,数字签证指的是在MIN网络包上的特定字段。该字段可以采用加密、哈希或证书等手段生成和验证。该字段应当由用户添加,无法由数字海关伪造,从而确保MIN网络包来自授权的境外用户,而非它国数字海关伪造。数字签证可以抵御网络攻击,如重放攻击等。数字签证的计算简单有效,降低数字海关的计算负担,关于这一点,也将在后面进行描述。数字签证可以有效保护网络空间边界,避免境内网络数据与资产的泄露,有效打击全球跨国网络攻击和犯罪。In multi-identity networks (MINs), a digital visa refers to a specific field on a MIN packet. This field can be generated and verified using methods such as encryption, hashing, or certificates. This field must be added by the user and cannot be forged by digital customs, thus ensuring that the MIN packet originates from an authorized overseas user and is not forged by a foreign country's digital customs. Digital visas can defend against cyberattacks, such as replay attacks. The computation of digital visas is simple and efficient, reducing the computational burden on digital customs, a point that will be described later. Digital visas can effectively protect cyberspace boundaries, prevent the leakage of domestic network data and assets, and effectively combat global transnational cyberattacks and crimes.
由于多标识网络的可扩展性与演进性,所述数字海关、数字护照以及数字签证的实现方法具有多种选择,并可以伴随技术发展不断演进。本实施例在步骤S3至步骤S6中提供了一种优选的实现方案。其中,图5所示的是数字海关治理全球网络边界的示意图,即基于数字海关构建国际网络空间的组网示意图。Due to the scalability and evolvability of multi-identifier networks, there are multiple options for implementing digital customs, digital passports, and digital visas, and these methods can evolve continuously with technological advancements. This embodiment provides a preferred implementation scheme in steps S3 to S6. Figure 5 shows a schematic diagram of digital customs governing the global network boundary, i.e., a network diagram of building an international cyberspace based on digital customs.
本实施例所述步骤S3为了实现基于多标识网络的数字签证。本实施例将数字签证定义为一个256位的哈希值,用于判断来自境外的MIN网络包是否可以进入主权国家网络空间。考虑到多标识网络同时支持推送式和拉取式语义,所述数字签证仅适用于推式语义下的通用推式包和拉式语义下的兴趣包。Step S3 in this embodiment aims to implement a digital visa based on a multi-identifier network. In this embodiment, the digital visa is defined as a 256-bit hash value used to determine whether a MIN network packet originating from outside the country can enter the sovereign nation's cyberspace. Considering that the multi-identifier network supports both push and pull semantics, the digital visa is only applicable to general push packets under push semantics and interest packets under pull semantics.
在多标识网络(MIN)中,每个用户从多标识管理系统(MIS)中获得一个256位的MIN身份。用户使用真实身份信息和MIN身份信息向外国数字海关申请数字签证密钥(CyberSpace Visa Key,CVK)。真实身份信息包括现实中的护照以及生物特征信息等身份信息,数字签证密钥CVK是一个256位的密钥。外国数字海关记录用户的MIN身份信息、数字签证密钥CVK和真实身份信息。用户保存自己的数字签证密钥CVK。当数字签证密钥CVK泄漏时,用户应及时向外国数字海关挂失该数字签证密钥CVK并进行重新申请。In a Multi-Identifier Network (MIN), each user obtains a 256-bit MIN identity from a Multi-Identifier Management System (MIS). Users apply for a CyberSpace Visa Key (CVK) from foreign digital customs using their real identity information and MIN identity information. Real identity information includes physical passport data and biometric data, while the CVK is a 256-bit key. Foreign digital customs records the user's MIN identity information, CVK, and real identity information. Users retain their CVK. If a CVK is leaked, the user should promptly report the loss to foreign digital customs and apply for a new one.
本实施例所述数字签证的具体技术方案之中,优选通过用户与外国的数字海关预先约定一个长度为256位的数字签证密钥CVK,并根据当前国际时间,使用哈希函数用于实现所述数字签证的计算和核验,进而能够保证其计算速度快,安全性高;并且不影响上层协议,适用于大规模跨国场景的数字护照的计算需求。In the specific technical solution of the digital visa described in this embodiment, it is preferable to pre-agree on a 256-bit digital visa key (CVK) between the user and the foreign digital customs, and use a hash function based on the current international time to calculate and verify the digital visa, thereby ensuring fast calculation speed and high security; and without affecting the upper-layer protocol, it is suitable for the calculation needs of digital passports in large-scale cross-border scenarios.
具体的,本实施例所述步骤S3优选包括以下子步骤:Specifically, step S3 in this embodiment preferably includes the following sub-steps:
步骤S301,通过公式Time=UNIX Time and 0xFFFFFFFFFFFFFFF0计算时间参数Time,其中,UNIX Time为一个64位的整数,用于表示自预设时间开始所经过的秒数,且秒数UNIX Time在二进制下的最低4位设置为0;Step S301: Calculate the time parameter Time using the formula Time = UNIX Time and 0xFFFFFFFFFFFFFFFF0, where UNIX Time is a 64-bit integer representing the number of seconds elapsed since the preset time, and the lowest 4 bits of the number of seconds UNIX Time in binary are set to 0.
步骤S302,通过公式Time256=Time×(1+264+2128+2192)将时间参数Time复制4份并按位连接,获取256位的时间数据Time256;Step S302: Copy the time parameter Time four times and concatenate them bit by bit using the formula Time256=Time×(1+2 64 +2 128 +2 192 ) to obtain the 256-bit time data Time256;
步骤S303,通过公式Visa=SHA256(Time256 xor CVK)对时间数据Time256和数字签证密钥CVK进行按位异或运算,并进行哈希函数的单向映射,得到基于多标识网络的数字签证Visa;数字签证密钥CVK为一个256位的密钥,该数字签证密钥CVK关联用户的多标识网络身份信息和真实身份信息;xor表示按位异或运算。Step S303: Perform a bitwise XOR operation on the time data Time256 and the digital visa key CVK using the formula Visa = SHA256(Time256 xor CVK), and perform a one-way mapping of the hash function to obtain the digital visa based on the multi-identity network; the digital visa key CVK is a 256-bit key, which is associated with the user's multi-identity network identity information and real identity information; xor represents the bitwise XOR operation.
也就是说,本实施例可以按照如下方法计算一个MIN网络包所对应的数字签证Visa。UNIX Time是一个64位的整数,表示自预设时间开始所经过的秒数,默认为从1970年1月1日(UTC/GMT的午夜)开始所经过的秒数,不考虑闰秒。所述预设时间可以根据实际情况和需求进行设置与调整,默认为1970年1月1日(UTC/GMT的午夜)。本实施例优选将秒数UNIX Time的最低4位赋值为0获得时间参数Time,以降低计算的复杂程度;时间参数Time每16秒变化一次,值为16的倍数。64位的Time复制4份并按位连接为256位的Time256。时间数据Time256和数字签证密钥CVK按位异或运算,然后使用SHA256哈希函数单向映射为数字签证。In other words, this embodiment can calculate the digital visa corresponding to a MIN network packet as follows: UNIX Time is a 64-bit integer representing the number of seconds elapsed since a preset time, which defaults to the number of seconds elapsed since January 1, 1970 (midnight UTC/GMT), ignoring leap seconds. The preset time can be set and adjusted according to actual conditions and needs, with the default being January 1, 1970 (midnight UTC/GMT). This embodiment preferably assigns the lowest 4 bits of the seconds UNIX Time to 0 to obtain the time parameter Time, reducing computational complexity; the time parameter Time changes every 16 seconds, with values being multiples of 16. The 64-bit Time is copied four times and concatenated bitwise to form a 256-bit Time256. The time data Time256 and the digital visa key CVK are XORed bitwise, and then the SHA256 hash function is used for one-way mapping to the digital visa.
需要说明的是,当秒数UNIX Time在16的倍数附近时,用户计算得到的数字签证Visa所使用的时间,与数字海关计算数字签证Visa时所使用的时间可能相差16秒。这种情况将会导致持有合法的数字签证Visa的MIN网络包无法顺利入境,进而严重影响跨国网络服务的可靠性。因此,本实施例在所述步骤S3中,以当前时间和16秒之前时间所计算得到的数字签证Visa均有效,进而能够很好地避免这种由于时间差而带来的影响跨国网络服务的问题。It should be noted that when the UNIX Time (seconds) is near a multiple of 16, the time used by the user to calculate the digital visa may differ by 16 seconds from the time used by digital customs to calculate the digital visa. This situation can prevent MIN network packets holding valid digital visas from entering the country smoothly, thus seriously affecting the reliability of cross-border network services. Therefore, in this embodiment, in step S3, both the digital visa calculated using the current time and the time 16 seconds ago are valid, thereby effectively avoiding this problem of affecting cross-border network services due to time differences.
本实施例基于多标识网络来实现数字签证除了具有多标识网络的可扩展性和安全性等特点之外,还具有以下优势:第一、使用哈希函数而不是对称或非对称加密的加密算法,能够使得所述数字签证Visa的计算速度更快,可以适应跨国管理的大流量场景。第二、利用哈希函数具有单向特性,无法被逆向破解数字签证密钥CVK,这使得数字签证密钥CVK非常安全。第三、除哈希函数运算之外,所述步骤S3的所有操作均为二进制位运算操作,硬件执行效率非常高。第四、数字签证Visa的计算和时间相关联,进而可以有效地避免了重放攻击。This embodiment, based on a multi-identifier network, implements digital visas and, in addition to the scalability and security of multi-identifier networks, offers the following advantages: First, by using hash functions instead of symmetric or asymmetric encryption algorithms, the digital visa (CVK) can be calculated faster, adapting to high-volume scenarios in cross-border management. Second, the one-way nature of hash functions prevents reverse engineering of the digital visa key (CVK), making it highly secure. Third, aside from hash function operations, all operations in step S3 are binary bitwise operations, resulting in very high hardware execution efficiency. Fourth, the calculation of the digital visa is time-dependent, effectively preventing replay attacks.
在本实施例中,由于用户和数字海关一起约定的数字签证密钥CVK。当用户根据数字签证密钥CVK和时间计算得到的数字签证Visa的哈希值,与数字海关根据对应用户数字签证密钥CVK和时间计算得到的数字签证Visa的哈希值一致时,可以确认为授权的外国用户在进入主权网络空间。当两个数字签证Visa的哈希值不一致时,则直接丢弃持有非法的数字签证Visa的MIN网络包。In this embodiment, a digital visa key (CVK) is agreed upon by the user and the digital customs authority. When the hash value of the digital visa calculated by the user based on the CVK and time matches the hash value of the digital visa calculated by the digital customs authority based on the corresponding user's CVK and time, it can be confirmed that an authorized foreign user is entering sovereign cyberspace. When the hash values of the two digital visas do not match, the MIN network packet containing an invalid digital visa is directly discarded.
因此,通过网络空间的数字签证,数字海关可以确保所有进入网络空间的MIN网络包都来自授权的境外用户。数字海关可以取消用于非法行为的数字签证,并追究对应数字签证持有者的责任。这将有效保护网络空间边界不受境外攻击,国内数据不被境外用户轻易拉取,为塑造网络空间主权提供更好的基础。Therefore, through digital visas for cyberspace, digital customs can ensure that all MIN network packets entering cyberspace originate from authorized foreign users. Digital customs can revoke digital visas used for illicit activities and hold the corresponding digital visa holders accountable. This will effectively protect cyberspace boundaries from foreign attacks, prevent domestic data from being easily retrieved by foreign users, and provide a better foundation for shaping cyberspace sovereignty.
本实施例所述步骤S4用于实现基于多标识网络的数字护照。本实施例将数字护照定义为数字海关为MIN网络包签署的256位的哈希值。所述数字护照适用于拉取式语义下的兴趣包、数据包和推送式语义下的通用推式包(GPPkt)。Step S4 in this embodiment is used to implement a digital passport based on a multi-identifier network. In this embodiment, the digital passport is defined as a 256-bit hash value signed by digital customs for a MIN network packet. The digital passport is applicable to interest packets and data packets under pull semantics, and general push packets (GPPkt) under push semantics.
用户使用真实身份信息和MIN身份信息向所属国家的数字海关申请数字护照权限。真实身份信息包括现实中的护照以及生物特征信息等,数字海关记录持有网络护照权限用户的真实身份信息和MIN身份信息。Users apply for digital passport access from their country's digital customs using their real identity information and MIN identity information. Real identity information includes a physical passport and biometric data. Digital customs records the real identity information and MIN identity information of users holding online passport access.
国家A与每个其他国家分别约定一个256位的跨国护照密钥CPK(Cross-States Passport Key)。当一个MIN网络包从国家A发送到国家B时,国家A的数字海关通过如下方式为该MIN网络包签发“数字护照”。跨国护照密钥CPK优选由国家A和国家B之间预先约定。Country A agrees with each of the other countries on a 256-bit Cross-State Passport Key (CPK). When a MIN packet is sent from Country A to Country B, Country A's digital customs issues a "digital passport" for the MIN packet in the following manner. The Cross-State Passport Key (CPK) is preferably pre-agreed between Country A and Country B.
具体的在本实施例所述步骤S4中,通过公式Pass=SHA256(Visa xor CPK)计算得到基于多标识网络的数字护照Pass,其中,CPK指的是预先约定的256位的跨国护照密钥。Specifically, in step S4 of this embodiment, the digital passport Pass based on the multi-identifier network is calculated by the formula Pass = SHA256 (Visa xor CPK), where CPK refers to a pre-agreed 256-bit cross-border passport key.
本实施例基于多标识网络来实现数字签证除了具有多标识网络的优势和特点之外,还具有以下优势:第一、由于数字签证Visa的计算与时间有关,数字护照Pass基于数字签证计算,所以该数字护照Pass也与时间有关,进而同样能够避免针对数字护照Pass的重放攻击。第二、哈希函数具有单向性,跨国护照密钥CPK安全性高;跨国护照密钥CPK是两两国家之间进行预先的私下约定,因此,能够避免数字护照Pass被其他国家伪造。第三、数字护照Pass由数字签证Visa计算而来,所以数字海关只需要查验数字护照Pass即可,相当于已经一并查验了数字签证Visa,进而能够有效地减少数字海关的工作量和流程,减小跨境网络不必要的延时。This embodiment, based on a multi-identifier network, implements digital visas and, in addition to the advantages and characteristics of multi-identifier networks, offers the following advantages: First, since the calculation of a digital visa is time-dependent, and the digital passport is also calculated based on the digital visa, it is also time-dependent, thus preventing replay attacks on the digital passport. Second, hash functions are unidirectional, and the cross-border passport key CPK has high security; the cross-border passport key CPK is a pre-agreed private agreement between two countries, thus preventing the digital passport from being forged by other countries. Third, since the digital passport is calculated from the digital visa, digital customs only needs to verify the digital passport, which is equivalent to verifying the digital visa simultaneously, effectively reducing the workload and processes of digital customs and minimizing unnecessary latency in cross-border networks.
当数字海关收到MIN网络包时,通过跨国护照密钥CPK和数字签证密钥CVK计算该用户的合法数字护照Pass的哈希值,并验证数字护照Pass的哈希值是否一致。如果数字护照Pass错误,MIN网络包将被丢弃。MIN网络包包括且不限于兴趣包、数据包或GPPkt等。When Digital Customs receives a MIN packet, it calculates the hash of the user's valid digital passport pass using the cross-border passport key (CPK) and digital visa key (CVK), and verifies whether the hashes match. If the digital passport pass is incorrect, the MIN packet is discarded. MIN packets include, but are not limited to, interest packets, data packets, or GPPkts.
通过数字护照Pass,数字海关可以确保所有进入本国网络空间的MIN网络包都得到了其他国家的合法授权。同时,数字海关也可以拒绝部分用户访问外国网络,比如拒绝有网络攻击记录的用户访问。通过基于多标识网络的数字护照Pass,能够有助于减少跨国网络攻击和网络犯罪,以划定更加清晰的网络空间边界,保证网络空间的可信和安全。Through digital passports, digital customs can ensure that all MIN network packets entering the country's cyberspace are legally authorized by other countries. Simultaneously, digital customs can also deny access to foreign networks to certain users, such as those with a history of cyberattacks. By using digital passports based on multi-identifier networks, it can help reduce transnational cyberattacks and cybercrime, delineate clearer cyberspace boundaries, and ensure the trustworthiness and security of cyberspace.
本实施例所述步骤S5,通过基于多标识网络中的数字海关进行数字护照的签发。数字海关是专门为边界管理而设计的多标识网络路由器。数字海关使用出境表(Exit Border Table,EBT)为出境的MIN网络包签署数字护照Pass。出境表EBT存储每个用户的一些字段,如下表1所示。Step S5 in this embodiment involves issuing digital passports through digital customs based on a multi-identifier network. Digital customs is a multi-identifier network router specifically designed for border management. Digital customs uses an Exit Border Table (EBT) to sign digital passports for outgoing MIN network packets. The Exit Border Table (EBT) stores some fields for each user, as shown in Table 1 below.
表1出境表EBT的存储字段示意表
Table 1. Schematic diagram of storage fields in the Exit Form (EBT)
由于跨国护照密钥CPK由国家两两私下协商,对于前往不同国家而签发数字护照Pass的哈希值不同,所以在数字海关中有多个出境表EBT,每一个出境表EBT对应一个目标国家。上表中,Identity是用户的MIN身份。passport holder显示用户的MIN网络包是否可以出境。LastVisa是用户上一个MIN网络包中的数字签证Visa。LastPass是基于LastVisa计算的数字护照Pass。LastTime是用户上一个MIN包到达的时间,格式为二进制且最低4位为0。Because the cross-border passport key (CPK) is privately negotiated between countries, the hash value of the digital passport pass issued for travel to different countries is different. Therefore, there are multiple exit tables (EBTs) in digital customs, each corresponding to a destination country. In the table above, Identity is the user's MIN identity. Passport holder indicates whether the user's MIN packet is allowed to leave the country. LastVisa is the digital visa in the user's previous MIN packet. LastPass is the digital passport pass calculated based on LastVisa. LastTime is the arrival time of the user's previous MIN packet, in binary format with the lowest 4 bits set to 0.
当数字海关根据查询转发表(Forwarding Information Base,FIB)转发出境的MIN网络包时,首先检查MIN网络包的目标国家,然后将MIN网络包分配给对应国家的出境表EBT处理。所述数字海关执行的过程通过如下伪代码表示,即通过MIN数据包在数字海关中签发数字护照Pass的过程。When digital customs forwards an outbound MIN packet based on the Forwarding Information Base (FIB), it first checks the target country of the MIN packet and then assigns the MIN packet to the corresponding country's Exit Transaction Board (EBT) for processing. This process executed by digital customs is represented by the following pseudocode: the process of issuing a digital passport (Pass) through the MIN packet within digital customs.
Algorithm 1Sign the Cyberspace Passport for a MIN packet PAlgorithm 1Sign the Cyberspace Passport for a MIN packet P
1:id=P.ldentily1:id=P.ldentily
2:if EBTlid].Passportllold=False then家:Drop the Packet P2:if EBTlid].Passportllold=False then:Drop the Packet P
4:return4: return
5:end if5:end if
6:if EBTlid].LastVisa=P.Visa then7:P.Pass=EBTid].LastPass6:if EBTlid].LastVisa=P.Visa then7:P.Pass=EBTid].LastPass
7:P.Pass=EBTid].LastPass7:P.Pass=EBTid].LastPass
8:else8:else
9:if NowTime-EBTlid].LastTime<8then9:if NowTime-EBTlid].LastTime<8then
10:P.Pass=EBTlid].LastPass10:P.Pass=EBTlid].LastPass
11:Send the Packet P11: Send the Packet P
12:SlowUpdateEBT(id,P.Visa)12:SlowUpdateEBT(id,P.Visa)
13:else13:else
14:FastUpdateEBT(id,P.Visa)14: FastUpdateEBT(id, P.Visa)
15:P.Pass=EBTlid].LastPass15:P.Pass=EBTlid].LastPass
16:Send the Packet P16: Send the Packet P
17:end if17:end if
18:end if18:end if
19:return19:return
数字海关首先丢弃来自没有出境许可的用户的MIN网络包。当MIN网络包中携带的数字签证Visa和出境表EBT表项中的LastVisa相同时,数字海关直接在MIN网络包中使用出境表EBT的表项中的LastPass签署数字护照Pass并转发MIN网络包。基于这样的设计,本实施例可以有效降低计算数字护照Pass带来的负载和延迟。Digital Customs first discards MIN network packets from users without exit permits. When the digital visa carried in the MIN network packet matches the LastVisa in the Exit Form EBT entry, Digital Customs directly signs the digital passport pass in the MIN network packet using the LastPass from the Exit Form EBT entry and forwards the MIN network packet. Based on this design, this embodiment can effectively reduce the load and latency caused by calculating the digital passport pass.
也就是说,本实施例所述步骤S5中,数字海关中存储有多个出境表,每一个出境表对应一个目标国家;当数字海关收到转发表所转发出境的多标识网络包时,首先检查多标识网络包所对应的目标国家,然后将多标识网络包分配给对应国家的出境表进行处理,处理过程包括以下子步骤:In other words, in step S5 of this embodiment, the digital customs stores multiple exit tables, each corresponding to a target country. When the digital customs receives a multi-identifier network packet forwarded from the forwarding table, it first checks the target country corresponding to the multi-identifier network packet, and then assigns the multi-identifier network packet to the exit table of the corresponding country for processing. The processing includes the following sub-steps:
步骤A1,所述数字海关丢弃没有出境许可的用户的多标识网络包;Step A1: The digital customs discards multi-identifier network packets from users without exit permits;
步骤A2,当多标识网络包中携带的数字签证Visa和出境表表项中的LastVisa相同时,数字海关直接在多标识网络包中使用出境表中的LastPass签署数字护照,并转发多标识网络包,LastVisa指的是用户上一个多标识网络包的数字签证,LastPass指的是基于用户上一个多标识网络包的数字签证LastVisa所计算得到的数字护照;Step A2: When the digital visa carried in the multi-identifier network packet is the same as the LastVisa in the exit form, the digital customs directly signs the digital passport in the multi-identifier network packet using the LastPass in the exit form and forwards the multi-identifier network packet. LastVisa refers to the digital visa of the user's previous multi-identifier network packet, and LastPass refers to the digital passport calculated based on the digital visa LastVisa of the user's previous multi-identifier network packet.
步骤A3,当多标识网络包中携带的数字签证Visa和出境表表项中的LastVisa不同时,由于本实施例以当前时间和16秒之前时间所计算得到的数字签证Visa均有效,因此,本实施例判断当前时间和LastTime的差值是否小于8秒,若是(即当前时间和LastTime的差值小于8秒时),则数字海关直接使用LastPass作为数字护照,将该数字护照填入至多标识网络包并立即转发,以便有效地减少计算所述数字护照Pass而带来的延迟,LastTime指的是用户上一个多标识网络包到达的时间;此外,数字海关已经知晓了该用户最新的数字签证Visa,数字海关可以在转发MIN网络包后,才使用最新的数字签证Visa计算新的数字护照Pass,也就是采用Slow Update EBT,以尽可能减少网络延迟,并保证下一次签发的有效性。Step A3: When the digital visa carried in the multi-identifier network packet differs from the LastVisa in the departure form, since the digital visa calculated using the current time and the time 16 seconds ago are both valid in this embodiment, this embodiment determines whether the difference between the current time and LastTime is less than 8 seconds. If so (i.e., the difference between the current time and LastTime is less than 8 seconds), then the digital customs directly uses LastPass as the digital passport, fills the multi-identifier network packet with the digital passport, and forwards it immediately to effectively reduce the delay caused by calculating the digital passport Pass. LastTime refers to the time when the user's last multi-identifier network packet arrived. In addition, since the digital customs already knows the user's latest digital visa, the digital customs can use the latest digital visa to calculate the new digital passport Pass only after forwarding the MIN network packet, that is, to adopt Slow Update EBT to minimize network latency and ensure the validity of the next issuance.
若否(即当前时间和LastTime的差值大于8秒时),如果使用LastPass直接作为MIN网络包的数字护照Pass,当MIN网络包抵达外国数字海关时,数字护照Pass可能已经过期。因此,新的数字护照Pass必须立即计算和更新,也就是采用Fast Update EBT,数字海关根据当前时间计算新的数字护照,并根据新的数字护照更新出境表,将新的数字护照签发进多标识网络包,以避免出现合法的数字护照Pass过期的情况。If not (i.e., the difference between the current time and LastTime is greater than 8 seconds), and LastPass is used directly as the digital passport for the MIN network packet, the digital passport may have expired by the time the MIN network packet arrives at foreign digital customs. Therefore, a new digital passport must be calculated and updated immediately, using Fast Update EBT. Digital customs calculates the new digital passport based on the current time and updates the exit form accordingly, issuing the new digital passport into the multi-identifier network packet to prevent valid digital passports from expiring.
本实施例所述步骤S6通过基于多标识网络中的数字海关进行数字护照的签证核验。所述数字海关使用入境表(Arrival Border Table,ABT)用于验证来自外国的MIN网络包的数字签证Visa和数字护照Pass。入境表ABT存储每个外国用户的部分字段,如下表2所示。In this embodiment, step S6 verifies digital passport visas through digital customs based on a multi-identifier network. The digital customs uses an Arrival Border Table (ABT) to verify digital visas and digital passports from foreign MIN network packets. The Arrival Border Table (ABT) stores some fields for each foreign user, as shown in Table 2 below.
表2入境表ABT的存储字段示意表
Table 2. Schematic diagram of storage fields in the Arrival Form ABT
在数字海关中只有一个入境表ABT。其中,Identity是用户的MIN身份。用户来自的国家是SrcDomain。LastPass是基于LastTime计算的数字护照。Pass是基于LastTime之后16秒时间计算的数字护照。NextPass是基于LastTime之后32秒时间计算的数字护照。当一个MIN网络包要进入网络边境时,所述数字海关执行的过程通过如下伪代码表示,即通过MIN数据包在数字海关中签证核验数字护照Pass的过程。签证核验也称验证处理。In the digital customs system, there is only one entry form (ABT). Here, Identity is the user's MIN identity. The user's country of origin is SrcDomain. LastPass is a digital passport calculated based on LastTime. Pass is a digital passport calculated based on 16 seconds after LastTime. NextPass is a digital passport calculated based on 32 seconds after LastTime. When a MIN network packet is about to enter the network border, the process performed by the digital customs is represented by the following pseudocode: the process of verifying the digital passport (Pass) through the MIN data packet in the digital customs system. Verification is also called authentication processing.
Algorithm 2 Check the entry of a MIN packet PAlgorithm 2 Check the entry of a MIN packet P
1:id=P.Identily1:id=P.Identily
2:if ABTid.CVK=None and VisaWaiver(P)=False then2:if ABTid.CVK=None and VisaWaiver(P)=False then
3:Drop the Packet P3: Drop the Packet P
4:return4: return
5:end if5:end if
6:if ABTlid,.LastTime+32<NowTime then6:if ABTlid,.LastTime+32<NowTime then
7:FastUpdateABT(id)7: FastUpdateABT(id)
8:end if8:end if
9:if ABTlid].LastPass/Pass/P.Pass then9:if ABTlid].LastPass/Pass/P.Pass then
10:Drop the Packet10: Drop the Packet
11:return11:return
12:end if12:end if
13:if P.type=Dala Packet then13:if P.type=Dala Packet then
14:Forward the Packet P to PT14:Forward the Packet P to PT
15return15 returns
16:else16:else
17:if P.type=Interest Packet then17:if P.type=Interest Packet then
18:Forward the Packet P lo CS18:Forward the Packet P lo CS
19:else19:else
20:Forward the Packet P to FlB20:Forward the Packet P to FlB
21:end if21:end if
22:end if22:end if
23:return23:return
具体的,本实施例所述步骤S6中,在数字海关使用并维护一个入境表,当一个多标识网络包要进入网络边境时,所述数字海关通过所述入境表进行验证处理,验证处理的过程包括以下子步骤:Specifically, in step S6 of this embodiment, an entry form is used and maintained by the digital customs. When a multi-identifier network packet needs to enter the network border, the digital customs performs verification processing through the entry form. The verification process includes the following sub-steps:
步骤B1,如果发送方未持有数字护照,且不属于免签情况,则通过所述数字海关直接丢弃多标识网络包;Step B1: If the sender does not hold a digital passport and is not in a visa-free situation, the multi-identifier network packet is directly discarded through the digital customs.
步骤B2,如果发送方持有数字护照,通过数字海关验证所述数字护照的有效性,若判定为无效,则所述数字海关丢弃带无效数字护照的多标识网络包;若判定为有效,则多标识网络包对应的数字护照及其数字签证通过验证;本实施例这样验证的原因在于:数字护照是基于网络空间签证计算的,只要数字护照合法,数字签证必然合法,因此不再需要另外验证数字签证。Step B2: If the sender holds a digital passport, the validity of the digital passport is verified through digital customs. If it is determined to be invalid, the digital customs discards the multi-identifier network packet containing the invalid digital passport; if it is determined to be valid, the digital passport and its digital visa corresponding to the multi-identifier network packet pass the verification. The reason for this verification in this embodiment is that the digital passport is calculated based on cyberspace visa. As long as the digital passport is valid, the digital visa must be valid, so there is no need to verify the digital visa separately.
值得说明的是,本实施例的入境表ABT有两种更新方式,一种是Slow Update ABT,即下面的步骤C;另一种是Fast Update ABT,即下面的步骤D。It is worth noting that the Arrival Form ABT in this embodiment has two update methods: one is Slow Update ABT, which is step C below; the other is Fast Update ABT, which is step D below.
具体的,本实施例所述步骤S6更新所述入境表的过程包括以下任一步骤:Specifically, the process of updating the entry form in step S6 of this embodiment includes any of the following steps:
步骤C,数字海关遍历入境表的所有条目,每隔固定时间计算和更新LastPass、Pass和NextPass字段,其中,LastPass指的是基于用户上一个多标识网络包的数字签证LastVisa所计算得到的数字护照,Pass指的是基于LastTime之后固定时间计算的数字签证Visa所计算得到的数字护照,NextPass指的是基于LastTime之后两倍固定时间计算的数字护照;所述固定时间指的是预设的固定更新周期,默认为16秒;每隔最多16秒,入境表ABT中的所有条目都会更新一次。由于涉及数字签证和数字护照的计算,因此称为Slow Update ABT;Step C: Digital Customs iterates through all entries in the arrival form, calculating and updating the LastPass, Pass, and NextPass fields at fixed intervals. LastPass refers to the digital passport calculated based on the LastVisa digital visa from the user's previous multi-identifier network packet. Pass refers to the digital passport calculated based on the LastVisa digital visa calculated at a fixed time after LastTime. NextPass refers to the digital passport calculated at twice the fixed time after LastTime. The fixed time refers to a preset fixed update cycle, defaulting to 16 seconds. Every 16 seconds at most, all entries in the Arrival Form ABT are updated. Because this involves calculations of digital visas and digital passports, it is called Slow Update ABT.
步骤D,所述数字海关收到多标识网络包时,判断所述入境表表项中的LastPass是否已经过期,若是,则将LastPass替换为Pass,并将Pass替换为NextPass;若否,则返回。由于这种更新方式无需数字签证和数字护照的计算,因此称为Fast Update ABT。将Slow Update ABT和Fast Update ABT相结合,根据不同的情况选择不同的更新方式,可以显著地降低数字海关验证数字护照的时延。In step D, when the digital customs receives a multi-identifier network packet, it determines whether the LastPass in the entry form has expired. If so, it replaces LastPass with Pass and Pass with NextPass; otherwise, it returns. Because this update method does not require calculations for digital visas and digital passports, it is called Fast Update ABT. Combining Slow Update ABT and Fast Update ABT, and selecting different update methods according to different situations, can significantly reduce the latency of digital customs verifying digital passports.
本实施例通过额外增加两张表:入境表ABT以及处境表EBT,能够在几乎不带来额外时延的情况下完成所述数字护照Pass的签发,并完成所述数字签证Visa和数字护照Pass的核验,适用于千万级别的用户服务。This embodiment, by adding two additional forms: the Arrival Form (ABT) and the Exit Form (EBT), can complete the issuance of the digital passport and the verification of the digital visa and digital passport with almost no additional delay, making it suitable for serving tens of millions of users.
本实施例还包括基于加权中心度算法的拟态防御步骤。This embodiment also includes a mimicry defense step based on a weighted centrality algorithm.
除了对用户的身份认证、多标识寻址等行为管理、数字护照和数字签证机制,在网络环境安全方面,本实施例还优选使用加权中心度算法(Weighted Network Centrality Measure,WNCM)对网络设备进行中心性和重要性排序,从中选择最重要和影响力最高的一部分设备进行重点保护。中心度算法(Network centrality measure,NCM)常用于图论和网络分析领域,用于识别图中特定节点的角色和对网络的影响。在本实施例中,该算法用于在系统资源有限的情况下,根据用户安全需求,有侧重的选择节点提高网络防护的效率。In addition to user authentication, multi-identifier addressing, and digital passport and visa mechanisms, this embodiment also preferably uses the Weighted Network Centrality Measure (WNCM) algorithm to rank network devices by centrality and importance, selecting the most important and influential devices for focused protection. The Network Centrality Measure (NCM) algorithm is commonly used in graph theory and network analysis to identify the role of specific nodes in a graph and their impact on the network. In this embodiment, this algorithm is used to selectively choose nodes based on user security needs, given limited system resources, to improve the efficiency of network protection.
以图6所示的网络拓扑为例,在图6所示的网络环境中,除外部攻击者,内网共包含七个可被重点防护的设备,其中有两个边界路由器、三个提供内网转发服务的服务器和两个提供存储功能的服务器。用中心度算法对其进行对比,选择其中的2-3个设备部署重点防护机制。本实施例选择中心度算法系列指标中的三个核心指标:点度中心性(Degree Centrality)、接近中心性(Closeness Centrality)和中介中心性(Between Centrality)。Taking the network topology shown in Figure 6 as an example, in the network environment shown in Figure 6, excluding external attackers, the internal network contains seven devices that can be prioritized for protection. These include two border routers, three servers providing internal network forwarding services, and two servers providing storage functions. Using the centrality algorithm, these devices are compared, and 2-3 devices are selected for key protection mechanisms. This embodiment selects three core indicators from the centrality algorithm series: Degree Centrality, Closeness Centrality, and Between Centrality.
点度中心性(Degree Centrality),用以描述在一个共有n个节点的网络中,一个节点与其他n-1分节点相联系的程度。接近中心性(Closeness Centrality),用以描述某个节点与其他节点的接近程度,与每个节点到其他节点的最短路径平均长度有关。中介中心性(Between Centrality),用以衡量一个节点在多大程度上可以成为其他节点信息传递的中介。用节点出现在其他任意两个顶点对之间最短路径上的次数占该顶点对存在的所有最短路径条数的比例进行描述。Degree centrality describes the degree to which a node is connected to the other n-1 nodes in a network of n nodes. Closeness centrality describes the proximity of a node to other nodes and is related to the average length of the shortest paths from each node to other nodes. Between centrality measures the extent to which a node can act as a mediator for information transfer between other nodes. It is described by the proportion of times a node appears on the shortest path between any two other vertex pairs out of the total number of shortest paths between those vertex pairs.
如果一个节点的中介中心性(Between Centrality)指标比较高,那么可以认为该节点是核心成员,起到了比较重要的中介作用,可以较大程度地控制信息的传递而影响群体。因此,在本实施例的拟态防御步骤中,先获取多标识网络中各设备的指标,所述指标包括点度中心性、接近中心性和中介中心性;在获取以上三项指标后,对各个指标分别进行排序以作为该指标的得分,然后对三项指标得分进行加和(也称求和)得到加和值sum,对加和值sum进行排序得到最后的中心度等级值Rank。If a node has a high Between Centrality score, it can be considered a core member, playing a significant mediating role and effectively controlling information transmission to influence the group. Therefore, in the mimicry defense step of this embodiment, the metrics for each device in the multi-identifier network are first obtained, including degree centrality, proximity centrality, and between centrality. After obtaining these three metrics, each metric is ranked to obtain its score. Then, the scores of the three metrics are summed (also known as summation) to obtain a sum value (sum). Finally, the sum value (sum) is ranked to obtain the final centrality rank value (Rank).
通过Rank'表示加权中心度等级,根据多标识网络的特点,本实施例对各节点的权值做了一定的调整。因为存储服务器存储着网络的核心数据,所以对于存储服务器,赋予最高的第一权值,其加和值sum除以3得到新的加和值sum'。边界路由器负责连通内外网,承受来自外部的攻击,并且提供包封装、审计功能,所以对于边界路由器,赋予中等的第二权值,其加和值sum除以2得到新的加和值sum';对于转发服务器,赋予最低的第三权值,其加和值sum不变;所述第一权值大于第二权值,所述第二权值大于第三权值。The weighted centrality level is represented by Rank'. Based on the characteristics of multi-identifier networks, this embodiment adjusts the weights of each node. Since the storage server stores the network's core data, it is assigned the highest first weight, and its sum (sum) is divided by 3 to obtain the new sum (sum'). The border router is responsible for connecting the internal and external networks, withstanding external attacks, and providing packet encapsulation and auditing functions. Therefore, it is assigned a medium second weight, and its sum (sum) is divided by 2 to obtain the new sum (sum'). The forwarding server is assigned the lowest third weight, and its sum (sum) remains unchanged. The first weight is greater than the second weight, and the second weight is greater than the third weight.
需要加强保护的节点比例以δ表示。比如,系统管理员设置δ=30%,选择两个节点进行保护,那么如果采用原始Rank指标,将会保护EMIR1(即边界路由器)和转发服务器2;如果采用加权Rank'指标,将会保护存储服务器1和EMIR1。防守者可以根据系统需求对权值和保护比例δ进行调整。The proportion of nodes requiring enhanced protection is represented by δ. For example, if the system administrator sets δ = 30% and selects two nodes for protection, then using the original Rank metric will protect EMIR1 (i.e., the border router) and forwarding server 2; using the weighted Rank metric will protect storage server 1 and EMIR1. Defenders can adjust the weights and protection proportions δ according to system requirements.
被WNCM计算出的需加强保护的节点上将会被部署拟态防御机制。拟态的思想起源于可靠性领域非相似余度结构,通过对内部结构的非相似构造并重新配置,将信息系统的属性由同构静态转化为异构动态。从而形成一种内生的安全效应,也就是说使系统在不依赖先验知识或攻击行为特征的情况下,具有广义鲁棒控制的安全能力。因此,向攻击者提出了一个动态攻击面,破坏了攻击链的构造和有效性,增加了攻击的代价和难度。在应用层,防火墙、重要路由器和服务器等核心设备具有部署拟态架构的方案。本实施例将拟态与编码相结合,提出拟态存储服务器。Mimicry defense mechanisms will be deployed on nodes identified by WNCM as requiring enhanced protection. The concept of mimicry originates from dissimilar redundant structures in the reliability domain. By constructing and reconfiguring dissimilar internal structures, the attributes of an information system are transformed from homogeneous static to heterogeneous dynamic. This creates an inherent security effect, meaning the system possesses generalized robust control capabilities without relying on prior knowledge or attack behavior characteristics. Therefore, it presents attackers with a dynamic attack surface, disrupting the construction and effectiveness of the attack chain and increasing the cost and difficulty of attacks. At the application layer, core devices such as firewalls, critical routers, and servers have options for deploying mimicry architectures. This embodiment combines mimicry with coding to propose a mimicry storage server.
拟态存储服务器的系统包括客户端、动态异构模块及对象存储模块。动态异构模块又包含动态配置管理以及异构功能模块。前者负责动态管理系统配置,包括使用伪随机方式轮换纠删码等,使攻击者无法判定系统内部的准确状态。后者包括多个异构的执行体,负责处理收到的请求。其结果将由动态配置管理模块中的多余度表决器收集并判定输出。当纠删码解码输出结果不一致时,判决器裁定正确结果并进行后续警报等操作。除此之外,动态配置管理模块每隔一定的周期T对在线的异构执行体以概率ω进行随机替换,防止系统中存在潜伏的攻击者。The mimicry storage service system comprises a client, a dynamic heterogeneous module, and an object storage module. The dynamic heterogeneous module further includes a dynamic configuration management module and a heterogeneous function module. The former is responsible for dynamically managing system configuration, including using pseudo-random methods to rotate erasure coding, making it impossible for attackers to determine the exact internal state of the system. The latter includes multiple heterogeneous executors responsible for processing received requests. The results are collected and judged by a redundancy voter in the dynamic configuration management module. When the erasure coding decoding outputs are inconsistent, the decision-maker rules the correct result and performs subsequent alerts and other operations. In addition, the dynamic configuration management module randomly replaces online heterogeneous executors with probability ω at regular intervals T to prevent the presence of lurking attackers in the system.
一些拟态存储系统的异构执行体为开源的分布式文件系统,如HDFS、Ceph或Lustre等,但不同分布式文件系统之间的异构性有限。本实施例通过对文件数据使用多种不同纠删码编码的方式实现异构。作为容错冗余技术,纠删码由于其较高的性能而广泛用于分布式存储系统,有利用率高和容错能力强的优点。(k,n)纠删码将原始数据分割为k个数据块,然后编码生成n(n>k)个数据块并存储在多个分布式节点中。其(k,n)特性指编码后任意k'(k'≥k)个切片都可恢复原始完整数据。本实施例优选在系统中嵌入了多种不同的纠删码,如基于二进制域里德所罗门码BRS,最小带宽再生码MBR,最小存储再生码MSR等。由于每种编码方式参数不同,因此由相同数据块得到的编码块在大小和数量存在巨大差异。这种设计能够从底层保证执行体之间的异构性和网络的动态性。Some mimicry storage systems use open-source distributed file systems, such as HDFS, Ceph, or Lustre, as their heterogeneous execution entities. However, the heterogeneity between different distributed file systems is limited. This embodiment achieves heterogeneity by using various erasure coding methods to encode file data. As a fault-tolerant redundancy technology, erasure coding is widely used in distributed storage systems due to its high performance, offering advantages such as high utilization and strong fault tolerance. (k,n) erasure coding divides the original data into k data blocks, then encodes them into n (n>k) data blocks and stores them across multiple distributed nodes. Its (k,n) characteristic means that any k' (k'≥k) slices after encoding can recover the original complete data. This embodiment preferably embeds various different erasure codes into the system, such as Binary Reed-Solomon Code (BRS), Minimum Bandwidth Regeneration Code (MBR), and Minimum Storage Regeneration Code (MSR). Since each encoding method has different parameters, the size and number of encoded blocks obtained from the same data block vary significantly. This design can guarantee the heterogeneity between execution entities and the dynamism of the network from the underlying layer.
下面,本实施例将分析基于多标识网络来实现的可靠性与计算复杂度。Below, this embodiment will analyze the reliability and computational complexity of implementation based on a multi-identifier network.
本实施例采用的MIN网络体系与IP网络体系的差异从网络层开始体现出来,MIN网络的传输机制采用CS表、PIT表与FIB表来转发数据包,这种机制很大程度上缓解了一些IP体系的泛洪攻击。MIN网络是基于身份标识来进行路由的,并且其会对每一个网络中的数据包都进行签名和验证,这些机制保障了网络层的安全性,在很大程度上解决了IP网络体系下经常会出现的数据包欺骗篡改问题。The differences between the MIN network architecture and the IP network architecture used in this embodiment begin at the network layer. The MIN network's transmission mechanism uses CS tables, PIT tables, and FIB tables to forward data packets. This mechanism greatly mitigates some of the flooding attacks common in IP networks. The MIN network routes data based on identity identifiers, and it signs and verifies every data packet in the network. These mechanisms ensure network layer security and largely solve the data packet spoofing and tampering problems that often occur in IP networks.
MIN不仅在网络层具有的很高的安全性,而且在传输层和应用层也能抵御和缓解一些IP下的攻击手段。在MIN网络中,已经没有了IP下的端口概念,取而代之的是LogicalFace网络接口,因此在IP网络下常见的网络扫描在MIN网络中是不可行的。且由于MIN网络本身就是基于身份标识和身份认证的网络,因此其能更方便地实现安全的传输通道。MIN网络中的用户标识包含很多信息,例如用户使用的设备和用户的证书等等,同时这些信息会锁存在MIN网络体系的区块链之中,由多标识管理系统(Multi-Identifier System,MIS)进行管理。基于身份的管理使得很多网络攻击都无法在MIN网络中发挥出较好的效果,例如身份窃取、账号爆破和越权访问/操作等等。图7所示的是MIN的层级化安全方案。MIN not only boasts high security at the network layer but also mitigates and resists some IP-based attacks at the transport and application layers. In the MIN network, the concept of IP ports is eliminated, replaced by LogicalFace network interfaces. Therefore, network scanning, common in IP networks, is ineffective in the MIN network. Furthermore, since the MIN network is based on identity identification and authentication, it more easily achieves secure transmission channels. User identifiers in the MIN network contain a wealth of information, such as the user's device and certificates, which are stored on the MIN network's blockchain and managed by a Multi-Identifier System (MIS). This identity-based management makes many network attacks less effective in the MIN network, such as identity theft, brute-force attacks, and unauthorized access/operations. Figure 7 illustrates MIN's hierarchical security scheme.
首先在网络底层,MIN体系被设计以真实身份为中心的多标识共存及其路由方案,保证网络的独立和可管可控,这提供了架构安全性。这个路由方案中内嵌底层身份认证和包签名,使得MIN能够追踪每个包的来源,确保网络内容可追责,保障入网实体身份可信。针对未知的漏洞威胁,MIN提出加权中心度算法WNCM找寻网络重要节点,部署拟态防御构建起内生安全体系,保障数据安全性和服务可靠性。Firstly, at the network's underlying layer, the MIN system is designed with a multi-identifier coexistence and routing scheme centered on real identities, ensuring network independence, manageability, and controllability, thus providing architectural security. This routing scheme embeds underlying identity authentication and packet signing, enabling MIN to trace the origin of each packet, ensuring network content traceability and guaranteeing the trustworthiness of entities entering the network. To address unknown vulnerability threats, MIN proposes the Weighted Centrality Metric (WNCM) algorithm to identify critical network nodes and deploys mimicry defenses to build an intrinsic security system, ensuring data security and service reliability.
在可靠性方面,本实施例对比了系统采用WNCM、NCM、随机策略和穷举策略四种重要节点选择策略下,网络的可靠性情况。穷举方案指遍历所有可以选择的方案,对比其抗攻击性能,从中选择最优方案。Regarding reliability, this embodiment compares the network reliability under four important node selection strategies: WNCM, NCM, random strategy, and exhaustive strategy. The exhaustive strategy involves traversing all available options, comparing their attack resistance performance, and selecting the optimal strategy.
以图6展示的网络拓扑为例,外网用户想通过MIN网络访问存储在存储服务器1和存储服务器2的数据。通过测试,当采用以上四种算法选择相同比例的节点部署拟态防御,其他节点随机失效时,用户无法获得数据即访问失败的概率。下面的表3和表4分别描述了四种选择策略下MIN网络随机失效30%的节点和40%的节点时,用户访问失败的概率pf。表5描述了保护比例δ=30%时。在不同失效比例下的用户访问失败概率pf。Taking the network topology shown in Figure 6 as an example, an external user wants to access data stored on storage server 1 and storage server 2 through the MIN network. Through testing, when the above four algorithms are used to select the same proportion of nodes for mimicry defense deployment, and other nodes randomly fail, the probability of the user failing to obtain data (i.e., access failure) is determined. Tables 3 and 4 below describe the probability of user access failure, p<sub>f</sub> , when 30% and 40% of the nodes in the MIN network randomly fail under the four selection strategies, respectively. Table 5 describes the probability of user access failure, p<sub>f</sub> , under different failure proportions when the protection ratio δ = 30%.
表3随机失效30%的节点
Table 3. Nodes with 30% random failures
表4随机失效40%的节点
Table 4. Nodes with 40% random failures
表5用户访问失败的概率
Table 5 Probability of User Access Failure
由表3至表5可知,总体的规律都是WNCM的效果与穷举方案相同,且都优于NCM优于随机方案,WNCM和NCM的防守效果随着保护比例的上升而直线上升,对于图6的网络拓扑,在保护比例达到40%,也就是保护3个节点时,二者都已经构造了完整的信息传播链条,可以抵抗其他节点失效。随机方案的抗攻击能力并不随保护比例的上升而改变,这是因为其节点保护和节点失效都是相互独立的随机策略。根据条件概率公式和全概率公式,当采取随机保护策略时,平均访问失败概率只与失效节点个数有关,与防守者选择几个重点保护节点无关。Tables 3 to 5 show that the overall trend is that WNCM performs similarly to the exhaustive approach, and both are superior to NCM, which in turn is superior to the random approach. The defensive effectiveness of both WNCM and NCM increases linearly with the protection ratio. For the network topology in Figure 6, when the protection ratio reaches 40%, i.e., protecting 3 nodes, both have constructed a complete information propagation chain, capable of resisting the failure of other nodes. The attack resistance of the random approach does not change with the increase of the protection ratio because its node protection and node failure are independent random strategies. According to the conditional probability formula and the law of total probability, when adopting a random protection strategy, the average access failure probability depends only on the number of failed nodes and is independent of how many key protection nodes the defender chooses.
只有当网络随机失效30%且只选一个重点节点保护(即表3第一列)时,NCM方案的失败概率高于随机方案。这是因为不管是WNCM还是NCM方案,都和一定能提供最优解的穷举方案不同。中心度算法会根据多重指标,选择通用的相对重要节点,并不一定是每种场景下的最优方案。在该场景下,NCM方案会倾向于保护重要的中央节点。但在图6中,根据穷举法,最优策略应该是选择四个端节点进行保护,这是造成NCM方案的失效概率高于随机方案的原因。如上述三个表格的数据可知,多标识网络中的加权方案WNCM根据MIN网络的特性对不同设备进行了权值调整,其计算结果非常接近最优策略。在计算复杂度方面,穷举方案可以保障给出最优保护策略,但是其计算开销随着网络规模的增大呈指数级复杂度。而WNCM和NCM方案都是多项式复杂度。总之,WNCM在相同的保护比例,即防守代价下,可以以更低的计算复杂度,提供相当接近最优解的节点选择策略。The failure probability of the NCM scheme is higher than that of the random scheme only when 30% of the network fails randomly and only one key node is selected for protection (i.e., the first column of Table 3). This is because neither WNCM nor NCM schemes are the same as the exhaustive search scheme, which guarantees an optimal solution. The centrality algorithm selects relatively important nodes based on multiple indicators, which may not be the optimal solution for every scenario. In this scenario, the NCM scheme tends to protect important central nodes. However, in Figure 6, according to the exhaustive search method, the optimal strategy should be to select four end nodes for protection, which is why the failure probability of the NCM scheme is higher than that of the random scheme. As can be seen from the data in the three tables above, the weighted scheme WNCM in multi-identifier networks adjusts the weights of different devices according to the characteristics of the MIN network, and its calculation result is very close to the optimal strategy. In terms of computational complexity, the exhaustive search scheme can guarantee the optimal protection strategy, but its computational cost increases exponentially with the increase of network size. In contrast, both WNCM and NCM schemes have polynomial complexity. In summary, WNCM provides a node selection strategy that is quite close to the optimal solution with lower computational complexity, while maintaining the same protection ratio, i.e., defense cost.
因此,明显的,基于多标识网络来实现的本实施例的整体技术方案,安全和可靠性强,且能够以更低的计算复杂度实现更优的效果和策略。Therefore, it is evident that the overall technical solution of this embodiment, based on a multi-identifier network, is highly secure and reliable, and can achieve better results and strategies with lower computational complexity.
本实施例还优选包括建立随机过程鞅量化模型的步骤,旨在提供抗攻击的随机过程鞅量化模型。This embodiment also preferably includes the step of establishing a stochastic process martingale quantization model, with the aim of providing an attack-resistant stochastic process martingale quantization model.
主动防御(Adaptive Cyber Defense,ACD)是近年来出现的一种新型网络防御技术,通过自发进行随机重配置网络环境,不断改变可被利用的攻击面。主动防御的动态性扭转了传统静态网络攻防不对等的局面,为防御者提供了在攻防博弈中的战术优势。Adaptive Cyber Defense (ACD) is a new type of network defense technology that has emerged in recent years. It continuously changes the exploitable attack surface by spontaneously and randomly reconfiguring the network environment. The dynamic nature of ACD reverses the asymmetrical situation of traditional static networks, providing defenders with a tactical advantage in the offensive and defensive game.
本实施例对复杂主动防御网络的完整攻防过程建立了完整模型,该模型命名为SPM,并以此对主动防御网络的安全性和多防御技术的相互作用进行了评估。SPM由三层组成,集成了随机回报网络、泊松过程、马尔可夫链和鞅理论。层次化分析的结构带来了更强的灵活性,三层分析模型可以结合在一起分析完整网络的安全性,也可以每层独立使用来评估对应单个ACD(主动防御)技术的有效性。This embodiment establishes a complete model of the entire attack and defense process of a complex active defense network, named SPM, and uses it to evaluate the security of the active defense network and the interaction of multiple defense technologies. SPM consists of three layers, integrating stochastic reward networks, Poisson processes, Markov chains, and martingale theory. The hierarchical analysis structure provides greater flexibility; the three-layer analysis model can be combined to analyze the security of the entire network, or each layer can be used independently to evaluate the effectiveness of a corresponding individual ACD (Active Defense) technology.
该随机过程鞅量化模型总体上由三个相互连接的子模型组成。在底层建立了评估以NVP技术保障单个节点安全有效性的SRN模型,在顶层建立了分析VM迁移(即虚拟机迁移)有效性的Markov和鞅模型。这两层模型之间通过泊松模型作为中间层进行连接。The martingale quantization model for this stochastic process consists of three interconnected sub-models. At the bottom layer is the SRN model, which evaluates the effectiveness of NVP technology in ensuring the security of a single node. At the top layer are Markov and martingale models, which analyze the effectiveness of VM migration. These two layers are connected by a Poisson model as an intermediate layer.
即,本实施例在底层模型建立基于深度学习神经网络SRN的单步攻击评估模型;在顶层模型建立离散时间马尔可夫链模型和鞅模型,通过公式 计算网络的平均攻击时间MTTA,并通过公式 计算网络的平均修复时间MTTR,其中,L表示攻击者抵达攻击目标节点时所途径的被保护设备的数量,T表示迁移周期,ω表示进行动态迁移的概率,表示一个迁移周期内攻击失败的概率;在底层模型和顶层模型之间通过泊松模型作为中间层进行连接。That is, in this embodiment, a single-step attack evaluation model based on a deep learning neural network SRN is established in the bottom-level model; a discrete-time Markov chain model and a martingale model are established in the top-level model, and the evaluation is performed using the formula... Calculate the network's average attack time (MTTA) using the formula. Calculate the network's Mean Time To Repair (MTTR), where L represents the number of protected devices an attacker passes through on their way to the target node, T represents the migration period, and ω represents the probability of dynamic migration. It represents the probability of an attack failing within a migration cycle; a Poisson model is used as an intermediate layer to connect the bottom-level model and the top-level model.
值得注意的是,虽然上述三层模型中,底层的SRN模型本质上也可以同构为Markov过程,但这一层建模与SPM模型顶层的Markov链并没有直接关系。SRN模型针对节点的内部构造,其稳态分布描述的是攻击主动防御节点一次可能发生的结果分布。而顶层Markov模型刻画攻击者在攻击链上的位置变化,其稳态描述的是攻击链中被攻破节点的总数,也就是攻击者可能处于的位置分布。这三层模型每一层都专注于一个攻击阶段,下层的输出用作上层的输入。根据NVP和VM迁移防御过程的特征选择SRN、泊松过程、Markov和鞅评估方法。下面给出为每个层选择对应建模方法的原因。It is worth noting that although the bottom-level SRN model in the above three-layer model can essentially be isomorphic to a Markov process, this layer of modeling is not directly related to the top-level Markov chain of the SPM model. The SRN model focuses on the internal structure of the nodes, and its steady-state distribution describes the possible outcome distribution of an attack on an active defense node. The top-level Markov model, on the other hand, characterizes the attacker's position changes on the attack chain, and its steady-state description is the total number of compromised nodes in the attack chain, i.e., the possible position distribution of the attacker. Each of these three layers focuses on a single attack phase, with the output of the lower layer serving as the input of the upper layer. SRN, Poisson process, Markov, and martingale evaluation methods are chosen based on the characteristics of NVP and VM migration defense processes. The reasons for choosing the corresponding modeling method for each layer are explained below.
首先,针对单个主动防御节点的单步攻击过程,侧重于分析采用NVP技术保护后节点内部的详细攻防过程。单个节点的攻防过程包含了攻击者和防御者之间许多详细的行为和交互。这些细节的交互行为增加了Markov或概率方法等其他更加数学的方法来描述它的难度。所以针对这个过程,选择基于SRN的建模方案,建立基于SRN的单步攻击评估模型来刻画单节点内的单次攻击过程,同时给出量化计算结果和图形化的表达。在这一层,防御能力是通过单步攻击的成功率来定量衡量的。First, focusing on the single-step attack process of a single active defense node, this study emphasizes the detailed attack and defense process within the node after NVP protection. The attack and defense process of a single node involves many detailed behaviors and interactions between the attacker and defender. These detailed interactions increase the difficulty of describing it using more mathematical methods such as Markov or probabilistic methods. Therefore, for this process, a SRN-based modeling scheme is chosen to establish an SRN-based single-step attack evaluation model to characterize a single attack process within a single node, while providing quantitative calculation results and graphical representations. At this level, defense capability is quantitatively measured by the success rate of single-step attacks.
然后,多次迁移期间,攻击者对单个节点的重复攻击呈现无记忆性。而泊松分布是最适合模拟关键、无记忆事件发生时间的随机分布类型。因此,本实施例采用泊松分布来描述每个迁移期间的攻击次数。Then, during multiple migrations, the attacker's repeated attacks on a single node exhibit memorylessness. The Poisson distribution is the most suitable type of random distribution for simulating the timing of critical, memoryless events. Therefore, this embodiment uses a Poisson distribution to describe the number of attacks during each migration.
最后,需要分析VM迁移策略下,攻击者在整个攻击链上位置的移动,也就是攻击者每个迁移周期攻击节点的位置变更。每个迁移周期与上一个迁移周期相比,攻击者在攻击链上位置的改变有3种可能的移动方向:攻击下一个节点、返回上一个节点或停留在同一个节点。而整个攻击者在攻击链上的移动过程中,无论攻击者如何到达了当前位置,在下一个迁移周期的位置仅取决于他的当前位置和不同方向的转移概率。这呈现出了Markov特征。因此,在SPM的第三层中,构建齐次离散时间马尔可夫链(Homogeneous Discrete-Time Markov Chain,DTMC)来描述这一过程。DTMC模型可以计算目标节点失效的稳态概率,并且为鞅理论的使用奠定了基础。在此基础上进一步建立的鞅模型可以计算整个网络的失效时间、修复时间。Finally, it is necessary to analyze the attacker's movement along the entire attack chain under the VM migration strategy, that is, the change in the attacker's attack node position in each migration cycle. Compared with the previous migration cycle, the attacker's position on the attack chain has three possible directions of movement: attacking the next node, returning to the previous node, or remaining on the same node. Throughout the attacker's movement along the attack chain, regardless of how the attacker reaches its current position, its position in the next migration cycle depends only on its current position and the probability of transitioning in different directions. This exhibits Markov characteristics. Therefore, in the third layer of SPM, a homogeneous discrete-time Markov chain (DTMC) is constructed to describe this process. The DTMC model can calculate the steady-state probability of target node failure and lays the foundation for the use of martingale theory. The martingale model further developed on this basis can calculate the failure time and repair time of the entire network.
攻击链如图8所示。假设攻击者已经入侵了k个节点。接下来,利用鞅理论计算攻击者移动到下L个节点(即节点k+L)或返回到前L个节点(即节点k-L)的期望时间。L表示攻击者抵达攻击目标节点时所途径的被保护设备的数量。The attack chain is shown in Figure 8. Assume the attacker has already compromised k nodes. Next, martingale theory is used to calculate the expected time for the attacker to move to the next L nodes (node k+L) or return to the previous L nodes (node k-L). L represents the number of protected devices the attacker passes through to reach the target node.
在此,本实施例先介绍鞅的概念:Here, this embodiment first introduces the concept of martingale:
定义1:随机过程Zn,n≥1是鞅过程,如果:对于所有的n,E[|Zn|]<∞,并且E[Zn+1|Z1,Z2,…,Zn]=Zn。n为自然数,表示随机变量Z的序号。Definition 1: A stochastic process Z <sub>n </sub>, n≥1 is a martingale process if: for all n, E[|Z <sub>n</sub> |]<∞, and E[Z <sub>n+1 </sub>|Z <sub>1 </sub>, Z<sub> 2 </sub>, …, Z<sub>n</sub> ]=Z <sub>n</sub> . n is a natural number representing the index of the random variable Z.
当攻击者在第n个重配置周期开始位于k节点时,在下个迁移周期,攻击状态可被推测如下:P{Xn+1=k+1∣Xn=k}=(1-ω)μ、P{Xn+1=k∣Xn=k}=(1-ω)(1-μ)和P{Xn+1=k-1∣Xn=k}=ω。P{*∣*}表示攻击状态发生的概率,k表示节点序号,Xn表示随机变量,ω表示进行动态迁移的概率,μ表示攻击单个节点成功的概率。When an attacker starts at node k in the nth reconfiguration cycle, the attack state in the next migration cycle can be predicted as follows: P{X <sub>n+1 </sub> = k+1 | X<sub>n</sub> = k} = (1-ω)μ, P{X <sub>n+1 </sub> = k | X <sub>n</sub> = k} = (1-ω)(1-μ), and P{X <sub>n+1 </sub> = k-1 | X<sub> n </sub> = k} = ω. P{*|*} represents the probability of the attack state occurring, k represents the node number, X<sub>n</sub> represents a random variable, ω represents the probability of dynamic migration, and μ represents the probability of successfully attacking a single node.
因此,可以得到E[Xn+1∣Xn=k]=k+(1-ω)μ-ω=Xn+(1-ω)μ-ω。E[Xn+1∣Xn=k]表示给定Xn=k下Xn+1的条件期望。Therefore, we can obtain E[X n+1 |X n = k] = k + (1-ω)μ-ω = X n + (1-ω)μ-ω. E[X n+1 |X n = k] represents the conditional expectation of X n +1 given X n = k.
接下来建立鞅序列。Next, the martingale sequence is constructed.
定理1:设随机变量M0,M1,…,Mn,其中Mi=Xi-[(1-ω)μ-ω]·i,那么序列Mn是关于X0,X1,…,Xn的鞅序列。i为序列序号,i∈0~n。Theorem 1: Let random variables M <sub>0 </sub>, M <sub>1 </sub>, ..., M <sub>n</sub> , where Mi = Xi - [(1-ω)μ-ω]·i, then the sequence M<sub>n</sub> is a martingale sequence of X <sub>0</sub> , X <sub>1</sub> , ..., X<sub>n</sub> . i is the sequence index, i∈0~n.
证明公式如下: The proof formula is as follows:
在建立鞅序列以后,为了计算攻击时间,需要先定义停时。After establishing the martingale sequence, a stopping time needs to be defined in order to calculate the attack time.
定义2:可能取无穷大的正整数随机变量N成为对过程{Zn,N≥1}的随机时刻,如果事件N=n由随机变量Z1,…,Zn确定,即知道了Z1,…,Zn就知道是否有N=n。如果P{N<∞}=1,那么随机时间N被称为一个停时。Definition 2: A random variable N, which may take the form of an infinite positive integer, is called a random moment in the process {Z <sub>n </sub>, N≥1}. If the event N = n is determined by the random variables Z <sub>1</sub> , ..., Z <sub>n </sub>, that is, knowing Z <sub>1</sub> , ..., Z<sub> n </sub> tells us whether N = n exists. If P{N<∞} = 1, then the random time N is called a stopping time.
攻防能力的相对强弱的不同会影响攻击者在攻击链上的整体移动方向。例如,如果攻击能力((1-ω)μ)强于防御能力(ω),则随着时间的推移,攻击者可以靠近攻击目标;反之,攻击者会受VM迁移的影响,失去本已获得的特权,相当于逐步被清理出系统。这意味着,当E[Xn+1∣Xn]>Xn,即ω<μ/(μ+1)时,沿攻击链靠近目标节点L跳的时间趋向于正数。相反,当E[Xn+1∣Xn]<Xn,即ω>μ/(μ+1)时,移动到下一个节点的概率小于攻击者返回到上一个节点的概率。VM迁移使得攻击者逐步失去获得的非法特权,此时到达目标节点方向第L个节点的时间呈现负值趋向。而客观上时间一定只能是正数,这种情况下讨论下行L跳的负值时间失去了意义,但上行L跳的时间可以类似的计算出来。因此,可以根据ω和μ/(μ+1)之间的相对大小关系,分析对应场景下第一次到达不同特定节点的时间。The relative strength of attack and defense capabilities affects the attacker's overall movement direction along the attack chain. For example, if the attack capability ((1-ω)μ) is stronger than the defense capability (ω), the attacker can approach the target over time; conversely, the attacker will be affected by VM migration, losing the privileges they have gained, essentially being gradually removed from the system. This means that when E[X <sub>n+1 </sub> | X<sub>n</sub> ] >X<sub>n</sub> , i.e., ω < μ/(μ+1), the time for the attacker to move L hops towards the target node along the attack chain tends to be positive. Conversely, when E[X <sub>n+1 </sub> | X<sub>n</sub> ] < X <sub>n </sub>, i.e., ω > μ/(μ+1), the probability of moving to the next node is less than the probability of the attacker returning to the previous node. VM migration causes the attacker to gradually lose the illegal privileges they have gained, and the time to reach the Lth node in the direction of the target node tends to be negative. However, objectively, time can only be positive, so discussing the negative time of the downlink L hops becomes meaningless in this case, but the time of the uplink L hops can be calculated similarly. Therefore, based on the relative magnitude relationship between ω and μ/(μ+1), the time to reach different specific nodes for the first time in the corresponding scenario can be analyzed.
当ω<μ/(μ+1),此时,攻击从入口处开始,即其初始位置为A0=0。When ω < μ/(μ+1), the attack starts from the entrance, i.e., its initial position is A0 = 0.
定义3:当ω<μ/(μ+1),鞅序列的停时S为最小i值,使得:E[Xi]=L。为了推导攻击者沿攻击链下行L跳到达目标节点的步数,引入鞅停时定理,即引理1。其证明过程如下所示。Definition 3: When ω < μ/(μ+1), the stopping time S of the martingale sequence is the minimum value of i, such that E[ Xi ] = L. To derive the number of steps it takes for an attacker to reach the target node by jumping L hops down the attack chain, we introduce the martingale stopping time theorem, i.e., Lemma 1. The proof is shown below.
引理1:S是鞅序列{Zn,n≥1}的停时,且满足以下任意一个条件:停止过程Zn是一致有界的,或S是有界的,或E[S]≤∞,并且存在一个M≤∞使得E[|Zn+1-Zn||Z1,…,Zn|]<M,则有E[ZS]=E[Z0]。Lemma 1: S is a stopping time of a martingale sequence {Z <sub>n </sub>, n≥1}, and satisfies any of the following conditions: the stopping process Z <sub>n</sub> is uniformly bounded, or S is bounded, or E[S]≤∞, and there exists an M≤∞ such that E[|Z <sub>n+1 </sub> - Z<sub>n</sub>||Z<sub> 1 </sub>,…,Z <sub>n</sub> |]<M, then E[Z<sub> S </sub>]=E[Z<sub>0</sub> ].
定理2:对于一个ACD攻防过程,有μ概率攻击单节点成功,每隔T时间每个节点以概率ω被迁移、重配置,如果有L个节点构成攻击链上,攻击者获胜,即到达目标节点L的期望迁移周期数为:T表示时间间隔周期。Theorem 2: For an ACD attack and defense process, there is a probability μ of successfully attacking a single node. Every T time interval, each node is migrated and reconfigured with probability ω. If L nodes form an attack chain, the attacker wins. That is, the expected number of migration cycles to reach the target node L is: T represents the time interval period.
证明:当(1-ω)μ>ω时,停时S的条件是XS=L,这时到达第L个节点的时间趋向于正值。在n轮迁移后可以根据攻击者位置判断n和S是否相等,所以时刻S是鞅的停时。接下来验证引理1的第三个条件,证明其可用如下公式: Proof: When (1-ω)μ>ω, the stopping time S is conditional on XS = L, at which point the time to reach the Lth node tends to be positive. After n rounds of migration, we can determine whether n and S are equal based on the attacker's position, so time S is the stopping time of the martingale. Next, we verify the third condition of Lemma 1, proving that it can be expressed by the following formula:
所以到达节点L的步数期望可以根据引理1来计算:E[MS]=E[M0]=E[X0]=0。E[MS]=E[XS-[(1-ω)μ-ω]·S]=E[XS]-[(1-ω)μ-ω]·E[S]=0。Therefore, the expected number of steps to reach node L can be calculated according to Lemma 1: E[ MS ] = E[ M0 ] = E[ X0 ] = 0. E[ MS ] = E[ XS - [(1-ω)μ-ω]·S] = E[ XS ] - [(1-ω)μ-ω]·E[S] = 0.
又因为E[XS]=L,所以有L-[(1-ω)μ-ω]·E[S]=0, Since E[X S ] = L, we have L - [(1-ω)μ-ω]·E[S] = 0.
当ω=μ/(μ+1)时,攻击者下行概率和上行概率相等,Markov(马尔可夫)的状态服从均匀分布,攻击者的位置随时间推移保持稳定不变,也就是E[Xn+1|Xn]=Xn。所以他到达其他任何其他节点的时间都趋于正无穷。When ω = μ/(μ+1), the attacker's downlink and uplink probabilities are equal, the Markov state follows a uniform distribution, and the attacker's position remains stable over time, i.e., E[Xn +1 | Xn ] = Xn . Therefore, the time it takes for him to reach any other node tends to positive infinity.
当ω>μ/(μ+1)时,到达下L个节点的期望时间倾向于负值,没有实际意义。不过这种情况下,随着时间的推移攻击者会逐步远离攻击目标,被推移出网络。那么可以计算驱逐攻击者需要的时间期望,驱逐时间反映了网络从最坏情况下(多于L个节点被攻破)进行自我修复(将攻击者移除)的能力。When ω > μ/(μ+1), the expected time to reach the next L nodes tends to be negative and has no practical significance. However, in this case, the attacker will gradually move away from the target and be pushed out of the network over time. Therefore, we can calculate the expected time required to expel the attacker. The expulsion time reflects the network's ability to self-repair (remove the attacker) from the worst-case scenario (more than L nodes being compromised).
在这种情况下,假设攻击在最开始已经成功,也就是X′0=L。X′i表示与Xi相同的分布,但二者表征的攻击者初始位置不同,X′i从节点L开始而不是X0=0。第i个迁移周期开始时攻击者的位置用随机变量X′i表示。接下来分析将攻击者驱逐回L个节点之前即回到攻击入口的期望时间。In this scenario, we assume the attack was successful initially, i.e., X′0 = L. X′i represents the same distribution as Xi , but the attacker's initial position differs; X′i starts from node L instead of X0 = 0. The attacker's position at the start of the i-th migration cycle is represented by the random variable X′i . Next, we analyze the expected time before the attacker is expelled back to L nodes, i.e., before returning to the attack entry point.
定义4:当ω≥μ/(μ+1),鞅序列的停时S’为最小i值,使得:E[X′i]=0。此时到达停时的条件是X′S′=0。对应的序列M′i=X′i-[(1-ω)μ-ω]·i仍然是关于X′0,X′i,…,X′n的鞅。这种情况下,(1-ω)μ和ω的不同大小关系,只影响了对停时的主观选择,并不影响客观存在的Xn序列和Mn序列。X′i和M′i可以看作是从其他节点开始的Xi和Mi序列。Definition 4: When ω ≥ μ/(μ+1), the stopping time S' of the martingale sequence is the minimum value of i, such that E[ X′i ] = 0. The condition for reaching the stopping time is X′S ′ = 0. The corresponding sequence M′i = X′i - [(1-ω)μ-ω]·i is still a martingale about X′0 , X′i , ..., X′n . In this case, the different magnitudes of (1-ω)μ and ω only affect the subjective choice of the stopping time, and do not affect the objectively existing Xn and Mn sequences. X′i and M′i can be regarded as Xi and Mi sequences starting from other nodes.
定理3:对于一个ACD攻防过程,有μ概率攻击单节点成功,每隔T时间每个节点以概率ω被迁移、重配置,当攻击者已经攻克了L个节点时,将攻击者驱逐回入口节点的期望迁移周期数为: Theorem 3: For an ACD attack and defense process, there is a probability μ of successfully attacking a single node. Every T time interval, each node is migrated and reconfigured with probability ω. When the attacker has conquered L nodes, the expected number of migration cycles to expel the attacker back to the entry node is:
证明:与当(1-ω)ω>μ时的证明过程类似,时刻S′是鞅的停时,并且符合引理1的可用条件。Proof: Similar to the proof when (1-ω)ω>μ, time S′ is the stopping time of the martingale and satisfies the availability condition of Lemma 1.
根据引理1,修复网络的迁移周期数满足:E[M′S′]=E[M′0]=E[X′0]=L。According to Lemma 1, the number of migration cycles of the repair network satisfies: E[M′ S′ ]=E[M′ 0 ]=E[X′ 0 ]=L.
那么,根据引理1和E[M′S′]=0,可求得修复网络的迁移周期数:E[M′S′]=E[X′S′]-[(1-ω)μ-ω]·E[S′]=L, Therefore, according to Lemma 1 and E[M′ S′ ]=0, the number of migration cycles of the repair network can be obtained: E[M′ S′ ]=E[X′ S′ ]-[(1-ω)μ-ω]·E[S′]=L,
推论1:对于以μ为单节点被攻破概率、ω为节点在每个周期T内被迁移概率的ACD攻防过程,攻击者沿攻击链下行或上行L个节点的时间期望为: Corollary 1: For an ACD attack and defense process where μ is the probability of a single node being compromised and ω is the probability of a node being migrated within each period T, the expected time for an attacker to move down or up L nodes along the attack chain is:
根据以上分析,当攻击者和防御者以不同的相对强弱抗衡,攻击者有可能随时间推移逐步接近目标或失去获得的权限被从系统中移除。因此,可以根据不同的场景提供不同的防守强度,达到对应的防守目标。首先定义两种场景:(1)普通防御场景:没有检测到攻击者的日常防御,防守者倾向于使用更低的防守代价,换取一定的安全级别保障。攻击者可以接近目标,以平均攻击时间(Mean Time To Attack,MTTA)评估系统的抗攻击能力。(2)危机场景防御:系统有可能已经检测出了攻击者存在,或者有更高的安全防护需求。此时,防守者愿意以更昂贵的防守开销换取更高级别的安全保障。更加频繁和大范围的VM迁移操作,会使得攻击者难以靠近攻击目标,反而会逐渐失去非法特权,此时以平均修复时间(Mean Time To Repair,MTTR)作为抗攻击能力的评估指标。Based on the above analysis, when attackers and defenders are at different relative strengths, attackers may gradually approach the target or lose their privileges and be removed from the system over time. Therefore, different defense strengths can be provided according to different scenarios to achieve the corresponding defense objectives. First, two scenarios are defined: (1) Normal defense scenario: No attackers are detected in routine defenses, and defenders tend to use lower defense costs to obtain a certain level of security. Attackers can approach the target, and the system's anti-attack capability is evaluated by Mean Time To Attack (MTTA). (2) Crisis scenario defense: The system may have detected the existence of attackers or has higher security protection requirements. At this time, defenders are willing to pay higher defense costs to obtain a higher level of security. More frequent and large-scale VM migration operations will make it difficult for attackers to approach the attack target, and they will gradually lose their illegal privileges. At this time, Mean Time To Repair (MTTR) is used as the evaluation index of anti-attack capability.
在给定系统参数L,ω,T,r和pA的情况下,MTTA和MTTR可分别计算如下:和其中,r表示系统的攻击率,pA表示单步攻击成功率。Given the system parameters L, ω, T, r, and pA , MTTA and MTTR can be calculated as follows: and Where r represents the system's attack rate, and pA represents the single-step attack success rate.
下面,本实施例将分析基于多标识网络来实现的安全性与计算复杂度。Below, this embodiment will analyze the security and computational complexity of implementing a multi-identifier network.
由于MIN是以身份标识为中心网络进行建设,因此系统自身具有更好的防护效果。本实施例以身份标识为中心网络与现有IP网络的数据传输方式完全不同,所以针对IP网络的攻击在MIN中就失去了运行环境,不能有效发作。MIN是在边界路由器EMIR处对访问信息进行过滤,只有在多标识网络之中主动发起的请求内容才可以通过EMIR。也就是说,攻击者无法像在普通被动防御网络中一样,对系统进行持续性扫描、攻击,甚至难以将恶意信息主动发送进MIN内。Because MIN is built around identity-centric networks, the system itself offers superior protection. This embodiment's identity-centric network data transmission method is completely different from existing IP networks. Therefore, attacks targeting IP networks lose their operational environment within the MIN and cannot be effectively launched. The MIN filters access information at the border router EMIR; only requests initiated actively within a multi-identity network can pass through the EMIR. In other words, attackers cannot continuously scan or attack the system as they would in a typical passive defense network, and it is even difficult for them to actively send malicious information into the MIN.
MIN内用户必须实名认证,用户从网络中拉取数据时需要签名。对于MIN内部用户发起请求的数据,其内容和请求者均由区块链进行记录。一旦出现问题,可以立刻进行问题回溯和追责,从而保证信息的真实可靠,在一定程度上可以避免内网用户的恶意操作。Users within MIN must be real-name authenticated, and they need to sign when pulling data from the network. For data requests initiated by MIN users, both the content and the requester are recorded on the blockchain. In case of problems, immediate backtracking and accountability can be implemented, ensuring the authenticity and reliability of information and mitigating malicious operations by internal users to some extent.
图9中第一层安全防护主要借助密码学并依赖身份认证等安全机制,现有加密算法的攻击难度已达到指数级。以常用的RSA算法为例,使用当前性能最高的超级计算机来破解也需要花费数十年。The first layer of security in Figure 9 primarily relies on cryptography and security mechanisms such as authentication. The attack difficulty of existing encryption algorithms has reached exponential levels. For example, even using the most powerful supercomputer currently available, it would take decades to crack the commonly used RSA algorithm.
RSA算法的破解难度与密钥的长度有关,公钥为e、模为n的RSA算法,其暴力破解的攻击复杂度为O(ne)。最常见的破解方法是因式分解。如果密钥的长度小于等于256位,能被一台高速计算机在一天内成功分解其因子。位数越高,因式分解所需的时间也越长。就目前的计算能力来说,破解1024位密钥至少也需要两年时间,而破解2048位密钥起码需要80年。取攻破时间为50年,计算得到每秒的攻击成功率为6.34×10-10。The difficulty of cracking the RSA algorithm is related to the key length. For an RSA algorithm with a public key of e and a modulus of n, the brute-force attack complexity is O(n e ). The most common method is factorization. If the key length is less than or equal to 256 bits, it can be successfully factored by a high-speed computer in one day. The higher the number of bits, the longer the factorization time. With current computing power, cracking a 1024-bit key would take at least two years, and cracking a 2048-bit key would take at least 80 years. Taking the cracking time as 50 years, the calculated attack success rate per second is 6.34 × 10⁻¹⁰ .
从MIN的EMIR到内容请求节点和内容请求节点到核心网络之间,攻击者需要突破的节点组成攻击链路。这个阶段的攻击过程主要是恶意信息在MIN内攻击链路上的传播,可以看作是恶意信息在攻击链上的游走。The attack chain consists of nodes that an attacker needs to breach, from the MIN's EMIR to the content request node and from the content request node to the core network. This stage of the attack process mainly involves the propagation of malicious information along the attack chain within the MIN, which can be viewed as the movement of malicious information along the attack chain.
在内容传输到MIN后,除了有EMIR到核心网络之间的防火墙、包检测、文本识别检测、音频识别检测、图像与视频识别检测以及自然语言处理等过滤手段对传输内容进行逐层过滤,攻击者需要突破各层防护才能抵达攻击目标。若想通过沿着攻击链攻击核心网络,攻击者需要依次攻击该链路上的各个审查节点。攻击者沿攻击链推进,每成功通过一层过滤,则沿攻击链下行一步;若被过滤手段捕捉,便沿着攻击链退行一步;若既没有攻击成功,又没有被捕获,则停留在该节点。After the content is transmitted to the MIN, it undergoes layer-by-layer filtering by firewalls, packet inspection, text recognition and detection, audio recognition and detection, image and video recognition and detection, and natural language processing between the EMIR and the core network. Attackers need to bypass each layer of protection to reach their target. To attack the core network along the attack chain, attackers need to attack each review node on the chain sequentially. As attackers advance along the attack chain, they move down one step after successfully passing each layer of filtering; if they are caught by the filtering, they move back one step; if they neither succeed in attacking nor are caught, they remain at that node.
令攻击单个节点成功(即突破一层过滤)的概率为μ,攻击链的节点总数为θ,系统在某一时刻选择该节点进行动态迁移(即选择某个节点对其彻底清洗,并将过滤后的内容重新过滤一遍)的概率为ω。假设当前时刻攻击者停留在第k个节点,即已攻破k个节点,那么攻击转移流程如图10所示。Let μ be the probability of successfully attacking a single node (i.e., breaking through one layer of filtering), θ be the total number of nodes in the attack chain, and ω be the probability that the system selects a node for dynamic migration at a certain moment (i.e., selects a node to thoroughly clean it and re-filters the filtered content). Assuming that the attacker is currently at the k-th node, i.e. has already compromised k nodes, the attack transfer process is shown in Figure 10.
根据攻击转移图,构造一个攻击转移矩阵Mθ×θ,元素Mi,j表示从第i个节点向第j个节点转移的概率。攻击时,攻击者沿着链路前行,攻克一个节点后,攻击者将会得到后继节点的信息。在攻击过程中,只有被攻击节点和攻击起始点均未被选中进行迁移,此时的单节点攻击才可能成功。显然,攻击有回退、下行和原地不动三个方向。具体的转移概率如下。Based on the attack transition graph, an attack transition matrix M θ×θ is constructed, where the element Mi ,j represents the probability of transitioning from the i-th node to the j-th node. During an attack, the attacker moves along the link, and after conquering a node, the attacker obtains information about the successor node. A single-node attack can only succeed if neither the attacked node nor the attack starting point is selected for migration. Clearly, the attack has three directions: backtracking, downlinking, and remaining stationary. The specific transition probabilities are as follows.
(1)回退。无论攻击者是否发动攻击,只要系统进行动态迁移时改变了攻击者所在的节点或者正在攻击的目标节点,攻击将无法进行,攻击者必须回退到已被攻击的上一节点,即Mi,i-1=ω。攻击者需要重新对i点进行单节点攻击,只有在下一次动态迁移前攻陷i点,它才可以继续下行攻击。(1) Rollback. Regardless of whether the attacker launches an attack, if the attacker's node or the target node being attacked changes during the system's dynamic migration, the attack will fail. The attacker must roll back to the previous node that has already been attacked, i.e., Mi ,i-1 = ω. The attacker needs to launch a single-node attack on point i again. Only by conquering point i before the next dynamic migration can the attacker continue the downlink attack.
(2)下行。攻击者攻击下个节点成功的概率为μ,变换周期内,系统不对攻击相关节点进行动态迁移的概率为(1-ω),因此攻击者成功攻击下一个节点且期间不发生动态迁移的概率为Mi,i+1=(1-ω)μ。(2) Downlink. The probability that the attacker will successfully attack the next node is μ. During the transformation period, the probability that the system will not dynamically migrate the attack-related nodes is (1-ω). Therefore, the probability that the attacker will successfully attack the next node and that no dynamic migration will occur during the period is Mi ,i+1 = (1-ω)μ.
(3)原地不动。攻击者攻击下个节点不成功,恰好系统也没有对相关节点进行动态迁移,此时系统的状态保持不变,有Mi,i=(1-ω)(1-μ)。令X0,X1,X2,…,Xn表示一串随机变量,Xi表示第i个时间段开始时攻击者所处的节点位置,Xi的取值范围为[0,θ],其中X0=0,表示攻击的初始位置为进入攻击链的位置。已知n时刻攻击者处于k位置,则下一跳的位置为:P{Xn+1=k+1|Xn=k}=(1-ω)μ、P{Xn+1=k|Xn=k}=(1-ω)(1-μ)和P{Xn+1=k-1|Xn=k}=ω。(3) Remaining in place. If the attacker fails to attack the next node and the system does not dynamically migrate the relevant nodes, the system state remains unchanged, with Mi ,i = (1-ω)(1-μ). Let X0 , X1 , X2 , ..., Xn represent a series of random variables, and Xi represent the node position of the attacker at the beginning of the i-th time period. The value range of Xi is [0, θ], where X0 = 0, indicating that the initial position of the attack is the position of entering the attack chain. Given that the attacker is at position k at time n, the position of the next hop is: P{ Xn+1 = k+1| Xn = k} = (1-ω)μ, P{ Xn+1 = k| Xn = k} = (1-ω)(1-μ) and P{ Xn+1 = k-1| Xn = k} = ω.
根据定理2,E[S]是到达核心网络的步数期望,可以用θ、ω和μ计算得到。通过这种方式,可以获得了击溃系统的极限概率和系统参数之间的定量关系。Θ表示攻击链的节点数。According to Theorem 2, E[S] is the expected number of steps to reach the core network, which can be calculated using θ, ω, and μ. In this way, a quantitative relationship can be obtained between the limiting probability of system defeat and the system parameters. Θ represents the number of nodes in the attack chain.
进一步的,本实施例还优选采用自适应防御网络架构(Adaptive Network Defense,AND),旨在提高网络的抗攻击能力。AND架构的核心思想是将网络安全防御工具集成在一起,形成一个动态的、自适应的网络防御系统,能够在网络受到新型攻击时快速适应并进行有效的防御。Furthermore, this embodiment preferably employs an Adaptive Network Defense (AND) architecture, aiming to improve the network's resistance to attacks. The core idea of the AND architecture is to integrate network security defense tools to form a dynamic, adaptive network defense system that can quickly adapt and effectively defend against new types of attacks.
AND架构由以下四个部分组成:The AND architecture consists of the following four parts:
攻击检测层:负责监测网络中的攻击行为。这一层通常包括入侵检测系统、威胁情报分析和行为分析系统等工具。这些工具可以通过分析网络流量、日志和其他数据源来检测潜在的攻击行为。Attack detection layer: Responsible for monitoring attack behavior within the network. This layer typically includes tools such as intrusion detection systems, threat intelligence analysis, and behavioral analysis systems. These tools can detect potential attack behaviors by analyzing network traffic, logs, and other data sources.
攻击响应层:负责对检测到的攻击行为进行响应。这一层通常包括入侵防御系统、反病毒软件和反间谍软件等工具。这些工具可以根据检测到的攻击行为采取相应的防御措施,如阻止攻击流量或清除恶意软件。Attack Response Layer: Responsible for responding to detected attacks. This layer typically includes tools such as intrusion prevention systems, antivirus software, and anti-spyware software. These tools can take appropriate defensive measures based on the detected attack behavior, such as blocking attack traffic or removing malware.
联动协同层:负责协调攻击检测层和攻击响应层之间的交互。这一层通常包括网络安全情报共享平台和自适应安全管控等工具。这些工具可以帮助攻击检测层和攻击响应层之间实现快速的信息共享和响应。Collaboration Layer: Responsible for coordinating the interaction between the attack detection layer and the attack response layer. This layer typically includes tools such as a cybersecurity intelligence sharing platform and adaptive security controls. These tools facilitate rapid information sharing and response between the attack detection and attack response layers.
运营管理层:负责管理整个AND系统的运营。这一层通常包括网络安全信息和事件管理系统、安全分析和决策支持系统和安全策略和合规性管理系统等工具。这些工具可以帮助管理员监测网络的安全状态并制定相应的安全策略和合规性管理措施。Operations Management Layer: Responsible for managing the overall operation of the AND system. This layer typically includes tools such as network security information and incident management systems, security analytics and decision support systems, and security policy and compliance management systems. These tools help administrators monitor the network's security status and formulate corresponding security policies and compliance management measures.
本实施例在技术层面统一设计,通过多标识网络来实现;能够基于多标识的架构,采用目前及未来出现的各自能够提升安全增益的技术,使得网络节点及其应用被一次攻击击败的概率理论上可以任意小(与愿意投入的成本有关),如10-15;10-20;10-25,10-30次方。在系统管理层面,依靠系统的持续感知及安全应对,对用户使用或管理的账号或设备可能危险及时通过电邮、短信和电话各自核实的方式提醒用户,及主动应对的操作,从线上到线下直接应对各种攻击,防范以未然。当小概率的攻击出现时,也能够及时溯源,排查物理系统和软件上的风险,对来源能够准确定位,进行相关系统配置或软件的整改,使得相同攻击被有效杜绝。This embodiment features a unified technical design, implemented through a multi-identifier network. Based on this architecture, it leverages current and future technologies that enhance security, theoretically reducing the probability of a network node and its application being defeated by a single attack to an arbitrarily low level (related to the willingness to invest), such as 10⁻¹⁵ , 10⁻²⁰ , 10⁻²⁵ , or 10⁻³⁰ . At the system management level, relying on continuous system awareness and security responses, it promptly alerts users to potential threats to their accounts or managed devices via email, SMS, and telephone verification, and proactively addresses various attacks both online and offline, preventing them before they occur. Even when a low-probability attack does occur, it allows for timely source tracing, investigating risks in both physical and software systems, accurately locating the source, and making necessary system configuration or software modifications to effectively prevent similar attacks.
本实施例还优选提供的一种自适应防御网络架构如图11所示:在网络的下层以NVP思想提升单个节点安全性;在网络的上层以VM迁移为网络带来动态性。图中,每个网络节点由一个资源管理系统(Resource Management System,RMS)和多个异构执行体,又称异构服务组件版本(Heterogeneous Service Component Version,SCV)组成。每个资源管理系统负责与其他来自不同节点的RMS通信,并且管理本节点内部的多个SCV。网络可以作为上下两层结构,上层网络表示RMS也就是不同节点之间的连接关系,下层网络则表示每个节点的内部构造,也就是RMS和内部SCV的连接关系。This embodiment also preferably provides an adaptive defense network architecture as shown in Figure 11: At the lower layer of the network, the NVP (Network Virtualization) concept is used to improve the security of individual nodes; at the upper layer of the network, VM migration brings dynamism to the network. In the figure, each network node consists of a Resource Management System (RMS) and multiple heterogeneous execution entities, also known as Heterogeneous Service Component Versions (SCVs). Each RMS is responsible for communicating with RMSs from different nodes and managing multiple SCVs within its own node. The network can be viewed as a two-layer structure: the upper network represents the RMS, i.e., the connection relationships between different nodes; the lower network represents the internal structure of each node, i.e., the connection relationships between the RMS and its internal SCVs.
NVP思想被应用于底层的节点内部,将收到的任务分配给多个不同SCV并行执行;VM迁移应用于网络上层,周期性对部分节点进行重构。The NVP concept is applied to the underlying nodes, distributing received tasks to multiple different SCVs for parallel execution; VM migration is applied to the upper network layer, periodically refactoring some nodes.
利用NVP的思想加强安全性,任务被分配给多个异构执行体执行,执行体之间的异构可以是操作系统、软件、数据格式等各种不同层级的异构。节点收到的需求和任务将会交付给功能等效,但结构或版本不尽相同的执行体并行执行。然后这些执行体的输出结果会返回给RMS,按照预先设定的投票规则进行裁决,确定最终的结果返回给用户。投票规则可以根据系统的需求进行选择,例如采用阈值投票,输出阈值记为M′。Security is enhanced using the principles of NVP (Variable Parameterization). Tasks are distributed to multiple heterogeneous executors, which can be heterogeneous in various levels, such as operating systems, software, and data formats. Nodes receive requests and tasks, which are then delivered to functionally equivalent executors, but with different structures or versions, for parallel execution. The outputs of these executors are then returned to RMS (Realm Management System), where they are adjudicated according to pre-defined voting rules to determine the final result, which is then returned to the user. The voting rules can be selected based on system requirements, such as threshold voting, with the output threshold denoted as M′.
当节点接收到来自用户的请求或任务,RMS将会把它们分配给N′个在线SCV,记为SCV1,SCV2,…,SCVN′一直等待,直到收集到足够的结果向量或所有SCV都完成输出。收集到的结果中,出现等于或多于M′的相同向量被视为正确向量,并输出给用户。而返回了其他结果即未被认定为正确结果的SCV将被标记为可疑SCV,在下一轮任务分配时,它们将被本节点的备用SCV替换掉。这样可以防止攻击在节点内扩散。如果当所有SCV都完成了任务,而相同结果的数量少于M′次,也就是说没有合法结果被输出,此时,RMS将返回一个错误消息,提示节点进行后续处理。为了避免存在多个结果矢量同时达到阈值,一般取M′>N′/2。When a node receives a request or task from a user, the RMS will assign it to N′ online SCVs, denoted as SCV 1 , SCV 2 , ..., SCV N′ , waiting until enough result vectors are collected or all SCVs have completed their output. Among the collected results, those with the same vector appearing more than M′ times are considered correct vectors and output to the user. SCVs that return other results (not considered correct) are marked as suspicious SCVs and will be replaced by the node's backup SCVs in the next round of task assignment. This prevents attacks from spreading within the node. If all SCVs have completed their tasks, but the number of identical results is less than M′ (meaning no legitimate results were output), the RMS will return an error message prompting the node to proceed with further processing. To avoid multiple result vectors reaching the threshold simultaneously, M′ > N′/2 is generally chosen.
在虚拟机迁移方面,在自适应防御网络架构中,在每个固定迁移周期T内,每个节点以概率ω被选为迁移对象,进行随机迁移。需要迁移的节点,对应的RMS将被迁移到新的物理主机上,旧的虚拟机被移除,然后将应用程序的当前状态以及相关的数据和服务迁移到新的VM上。虚拟机迁移会使攻击者收集、监听到的信息和已经安插的后门失效,这使得攻击时间成为攻击能否成功的重要约束条件之一。通过这种机制,可以有效阻止攻击在网络中的扩散。Regarding virtual machine migration, in the adaptive defense network architecture, within each fixed migration cycle T, each node is selected as a migration target with probability ω and undergoes random migration. For nodes requiring migration, the corresponding RMS (Real-Time Management System) is migrated to the new physical host, the old virtual machine is removed, and then the current state of the application, along with related data and services, is migrated to the new VM. Virtual machine migration renders information collected and monitored by attackers and any backdoors they have installed ineffective, making attack timing a crucial constraint for the success of an attack. This mechanism effectively prevents the spread of attacks within the network.
云计算的发展为用户提供了灵活高效的服务,资源可以按需分配、共享。然而这使得用户有可能与恶意用户共享部分资源,带来了额外的安全隐患。主动防御通过动态迁移,从降低共居时间的角度提供了一种抗共居攻击的解决方案。云计算允许多个用户按需使用各种服务,如存储、计算、应用等,同一用户的任务可以通过在不同的物理服务器上创建和托管多个虚拟机来执行。这种虚拟化方法提高了云提供商底层硬件平台的利用率,并将计算资源的维护外包给用户。但由于云用户需要其他租户共享物理服务器等IT资源,也面临着新的安全风险。虽然同一台服务器上运行的多个虚拟机在逻辑上相互隔离,但恶意租户可以通过创建各种侧通道来绕过隔离。那么当恶意邻居的攻击VM与目标VM驻留在同一台物理服务器上,数据便有可能被窃取甚至被破坏。The development of cloud computing provides users with flexible and efficient services, allowing resources to be allocated and shared on demand. However, this also makes it possible for users to share some resources with malicious users, introducing additional security risks. Proactive defense, through dynamic migration, provides a solution against cohabitation attacks by reducing cohabitation time. Cloud computing allows multiple users to use various services on demand, such as storage, computing, and applications. The same user's tasks can be executed by creating and hosting multiple virtual machines on different physical servers. This virtualization method improves the utilization of the underlying hardware platform of cloud providers and outsources the maintenance of computing resources to users. However, because cloud users need to share IT resources such as physical servers with other tenants, they also face new security risks. Although multiple virtual machines running on the same server are logically isolated from each other, malicious tenants can bypass the isolation by creating various side channels. Therefore, when the attacking VM of a malicious neighbor resides on the same physical server as the target VM, data may be stolen or even destroyed.
目前已经有一些防御工作通过消除或检测侧信道来解决这个问题,如消除侧通道,共居攻击检测,构建虚拟私有云,调整VM分配策略,基于NVP的防御方案等。但大部分防御方法要么需要更改现有部署,要么只专门针对已知某种跨VM侧信道攻击。Some defenses already exist that address this issue by eliminating or detecting side-channel attacks, such as side-channel elimination, co-occurrence attack detection, building virtual private clouds, adjusting VM allocation strategies, and NVP-based defense solutions. However, most of these defense methods either require changes to existing deployments or are specifically designed for a particular type of cross-VM side-channel attack.
主动防御技术为此从不同角度提出了解决方案,通过在任务执行期间随机移动需要保护的目标,来减少共居时间。并且,主动防御的一项重要优点是可以在不用改变底层部署的情况下,与其他防御方法叠加使用。比如将VM迁移与VM分配策略叠加,在每次迁移时搭配合适的VM选择策略,进一步降低攻击成功率。当这些技术被部署进云环境时,需要对其有效性进行证明,尤其是当这些技术与云环境本身其他防御策略结合在一起时。然而目前对其有效性的分析研究要么侧重于评估主动防御自身的有效性,要么侧重于研究云计算其他静态策略的有效性。Proactive defense technologies offer solutions from various perspectives, reducing cohabitation time by randomly moving the targets to be protected during task execution. Furthermore, a key advantage of proactive defense is its ability to be combined with other defense methods without altering the underlying deployment. For example, VM migration can be combined with VM allocation policies, using appropriate VM selection strategies for each migration to further reduce attack success rates. When these technologies are deployed in cloud environments, their effectiveness needs to be demonstrated, especially when combined with other cloud environment defense strategies. However, current analyses of their effectiveness either focus on evaluating the effectiveness of proactive defense itself or on studying the effectiveness of other static cloud computing strategies.
在选取的云计算场景中,有两种需要考虑的VM放置。第一种是初始放置,也就是为新的服务请求创建VM并将它们分配给某个服务器。第二种是动态迁移后的VM放置,需要在每次迁移时根据迁移和分配规则为需要迁移的虚拟机选择合适的服务器。下面依次介绍虚拟机迁移、分配策略和攻防过程。In the selected cloud computing scenarios, there are two types of VM placement to consider. The first is initial placement, which involves creating VMs for new service requests and assigning them to a server. The second is placement of VMs after dynamic migration, which requires selecting a suitable server for the VMs to be migrated based on migration and allocation rules each time a migration occurs. The following sections describe the VM migration, allocation strategies, and attack/defense processes in turn.
图12展示了云计算平台的虚拟化系统。该系统包含一个管理节点和多台服务器。每当收到新的任务,系统都会创建对应的虚拟机并分配给物理服务器。管理节点负责创建虚拟机,收集各服务器的信息,并根据分配策略将虚拟机分配到具体服务器。如果管理节点收到用户发送的n′个任务和攻击者发送的m个带有恶意软件的请求,管理节点很难将其区分开。所以同一批到达的请求,都会被创建对应的虚拟机来进行任务处理。管理节点将会对应创建n′个防御者的VM(Defender’s VM,DVM)和m个攻击者的VM(Attacker’s VM,AVM),并一起分配给s个物理服务器。任务在服务器上执行时,它可能与AVM共存,这期间攻击者会尝试建立侧信道进行信息窃取。为了避免这种信息泄露的风险,管理节点在任务执行期间,会将其DVM在服务器之间动态迁移。Figure 12 illustrates the virtualization system of a cloud computing platform. This system comprises a management node and multiple servers. Whenever a new task is received, the system creates a corresponding virtual machine (VM) and assigns it to a physical server. The management node is responsible for creating VMs, collecting information from each server, and allocating VMs to specific servers according to the allocation policy. If the management node receives n′ tasks from a user and m requests containing malware from an attacker, it has difficulty distinguishing them. Therefore, requests arriving in the same batch will all be assigned to corresponding VMs for task processing. The management node will create n′ Defender's VMs (DVMs) and m Attacker's VMs (AVMs), and assign them to s physical servers. While a task is executing on a server, it may coexist with an AVM, during which time the attacker may attempt to establish a side channel for information theft. To avoid this risk of information leakage, the management node dynamically migrates its DVMs between servers during task execution.
在虚拟机分配方面,已有的策略可分为以下两类:堆叠和分散。堆叠策略将创建的虚拟机集中在部分物理服务器上,降低服务器集群的总功耗。常用的堆叠策略包括优先适合、工作负载堆叠、能量/成本消耗策略及其变体。而分散策略则是将虚拟机离散地分布在整个数据中心,来实现负载平衡和提高系统可靠性。常用的分散策略包括随机、下一个匹配、负载平衡策略以及它们的变体。In terms of virtual machine allocation, existing strategies can be divided into two categories: stacking and distribution. Stacking strategies concentrate created virtual machines on a subset of physical servers, reducing the overall power consumption of the server cluster. Common stacking strategies include priority matching, workload stacking, energy/cost consumption strategies, and their variations. Distribution strategies, on the other hand, distribute virtual machines discretely throughout the data center to achieve load balancing and improve system reliability. Common distribution strategies include random, next-match, load balancing strategies, and their variations.
考虑一个多任务场景,系统可能同时被分配多个任务,他们在系统中被独立执行。每个进入系统的任务在离开时有可能出现两种结果:一种是顺利在几个服务器之间迁移,最终被执行完;或者在迁移过程中与攻击者共居,并被窃取信息,任务执行失败。图13描述了每个任务在离开系统之前的执行过程。Consider a multi-tasking scenario where the system may be assigned multiple tasks simultaneously, which are executed independently. Each task entering the system may have two possible outcomes upon leaving: either it successfully migrates between several servers and is eventually completed, or it encounters an attacker during migration, has its information stolen, and fails to execute. Figure 13 illustrates the execution process of each task before leaving the system.
更为具体的,本实施例采用自适应防御网络架构,每个任务在离开虚拟化系统之前的执行过程包括以下步骤:More specifically, this embodiment adopts an adaptive defense network architecture, and the execution process of each task before leaving the virtualization system includes the following steps:
步骤E1,管理节点接到来自用户的请求,创建VM,即创建虚拟机;Step E1: The management node receives a request from the user and creates a VM, i.e., creates a virtual machine.
步骤E2,根据分配策略,将这个VM分配给某个服务器;如果被选择的服务器还有足够的空间,那么跳转至步骤E3;否则,返回重新选择服务器;Step E2: According to the allocation policy, assign this VM to a server; if the selected server has enough space, then proceed to step E3; otherwise, return to select a server again.
步骤E3,选择到合适的服务器后,这个VM会在该服务器停留tserver时间;在停留过程中,如果与攻击者的VM共居超过建立侧信道需要的时间tattack,那么该DVM将受到攻击并导致信息泄露;如果对应攻击获得了该DVM的某些机密信息,则认为攻击成功;如果DVM被成功破坏,对应的任务将立即失败;未攻击成功则跳转至步骤E4;Step E3: After selecting a suitable server, the VM will stay on that server for t server time. During this stay, if it coexists with the attacker's VM for longer than the time t attack required to establish a side channel, the DVM will be attacked and information will be leaked. If the corresponding attack obtains some confidential information of the DVM, the attack is considered successful. If the DVM is successfully destroyed, the corresponding task will fail immediately. If the attack is unsuccessful, proceed to step E4.
步骤E4,如果在需要迁移前,该DVM没有被有效攻击,则顺利完成了在该服务器的执行。优选的,此时还进一步判断该任务是否已经被完成,如果没有执行完,则跳转到步骤E2,选择下一个服务器进行VM迁移,直到任务被执行完或受到攻击导致失败。Step E4: If the DVM has not been effectively attacked before the migration is required, the execution on that server is successfully completed. Preferably, at this point, it is further determined whether the task has been completed. If not, the process jumps to step E2, selects the next server for VM migration, and continues until the task is completed or fails due to an attack.
在此过程中,任务执行时间Ttask和迁移间隔Tserver是随机的。任务执行时间服从一定的分布,其累积分布函数cdf记为Fta(t),概率密度函数pdf记为Fta(t)。类似地,迁移间隔服从cdf=Fm(t)和pdf=Fm(t)的分布。During this process, the task execution time T <sub>task</sub> and the migration interval T<sub> server </sub> are random. The task execution time follows a certain distribution, with its cumulative distribution function cdf denoted as F <sub>ta</sub> (t) and probability density function pdf denoted as F <sub>ta</sub> (t). Similarly, the migration interval follows the distributions cdf = F <sub>m</sub> (t) and pdf = F <sub>m</sub> (t).
为了提升攻击成功的概率,攻击者有可能向系统注射多个恶意请求,生成多个AVM。进入系统后,恶意AVM随着正常DVM一起在多个服务器之间迁移,直到所有的任务都离开系统。To increase the probability of a successful attack, attackers may inject multiple malicious requests into the system, generating multiple AVMs. Once inside the system, the malicious AVMs migrate between multiple servers along with the normal DVMs until all tasks have left the system.
攻击者在启动AVM时,也有对应的两种策略:堆叠策略和分散策略。堆叠策略即一次性尽可能启动更多的虚拟机,而分散策略则分批次启动虚拟机,尽量使创造的虚拟机被分散到尽可能多的服务器上。图14展示了每个恶意请求对应生成AVM、迁移、展开攻击的过程,具体包括如下步骤:Attackers employ two strategies when launching AVMs: a stacking strategy and a distribution strategy. The stacking strategy launches as many virtual machines as possible at once, while the distribution strategy launches virtual machines in batches, spreading them across as many servers as possible. Figure 14 illustrates the process of generating, migrating, and deploying the attack corresponding to each malicious request, specifically including the following steps:
步骤F1,与步骤E1的DVM的创建过程类似,在步骤F1中,管理节点收到请求后创建AVM,将其分配到寻找合法服务器;Step F1 is similar to the DVM creation process in step E1. In step F1, after receiving the request, the management node creates the AVM and assigns it to a legitimate server.
步骤F2,攻击者获取该合法服务器中的信息,如果有共居的DVM,那么进行步骤F3;如果没有共居的DVM,那么等待被管理节点迁移往其他服务器。In step F2, the attacker obtains information from the legitimate server. If there is a co-habiting DVM, then proceed to step F3; otherwise, wait for the managed node to migrate to another server.
步骤F3,攻击者选择其中一个DVM进行攻击,花费时间tattack后建立侧信道成功。这段时间内,如果该DVM没有进行迁移,那么攻击成功,该DVM中执行的任务失败。否则该DVM躲避了此次攻击,本次攻击失败。In step F3, the attacker selects one of the DVMs to attack, and after time t<sub> attack </sub>, a side channel is successfully established. During this time, if the DVM does not migrate, the attack is successful, and the task executed in that DVM fails. Otherwise, the DVM evades the attack, and the attack fails.
不管攻击有没有成功,攻击者都可以继续攻击系统中还在执行的任务。也就是等待管理节点以固定的迁移周期将其迁移到其他服务器。被迁移后,攻击者回到步骤F1继续攻击。如果所有任务都离开了系统,那么攻击没有意义,攻击停止。Regardless of whether the attack is successful or not, the attacker can continue to attack tasks still running in the system. This means waiting for the management node to migrate these tasks to other servers at a fixed migration cycle. After migration, the attacker returns to step F1 to continue the attack. If all tasks have left the system, the attack becomes meaningless and stops.
攻击需要的时间tattack包含构建侧通道和窃取数据所需的时间,这也是一个随机变量,服从cdf=Fm(t)和pdf=Fm(t)的分布。The attack time t includes the time required to build the side channel and steal data, which is also a random variable that follows the distributions cdf=F m (t) and pdf=F m (t).
因此,本实施例能够以MIN体系组成的未来网络架构为基础,支持顶级标识由各国共同管理支持互联互通,下级标识由各国独立管理,并利用数字海关保障跨国数据安全。此外,还采用拟态防御、鞅量化模型、自适应防御网络架构、高性能区块链、量子技术、内嵌身份认证、多标识共存、数字护照以及数字签证等技术特性协同构成整体的技术方案,可以在此基础上结合各个主体系统管理、及各国内部及全球国际法律仲裁体系提出了一种确保网络空间可信安全有序法治和平的方法与系统。Therefore, this embodiment, based on a future network architecture composed of the MIN system, supports top-level identifiers to be jointly managed and interconnected by various countries, while lower-level identifiers are managed independently by each country, and utilizes digital customs to ensure cross-border data security. Furthermore, it employs a synergistic technical solution combining mimicry defense, martingale quantization models, adaptive defense network architecture, high-performance blockchain, quantum technology, embedded identity authentication, multi-identifier coexistence, digital passports, and digital visas. Based on this, and combined with the management of various entity systems, as well as national and global legal arbitration systems, it proposes a method and system to ensure a trustworthy, secure, orderly, law-abiding, and peaceful cyberspace.
数学模型分析表明,通过多标识网络来实现的未来网络可以比传统IP网络有1020- 30的指数级的安全提升,不安全的概率非常小。即使是发生了被攻击的行为,主动攻击者的身份及行为日志也将被全球多边共管的区块链日志所记录锁定,被攻击方可以在国际网络法庭或国内网络法庭的网络空间法院上起诉,国内/国际网络法庭基于不可篡改的日志记录对攻击者的攻击行为进行判决。通过技术实现线上和线下的结合,可以确保基于规则法律及技术系统支持的网络空间做到安全可信,网络空间在技术方案的基础上得以维持有序和法治。Mathematical model analysis shows that future networks implemented through multi-identifier networks can achieve an exponential security improvement of 10-20-30 % compared to traditional IP networks, with a very low probability of insecurity. Even if an attack occurs, the identity and activity logs of the active attacker will be recorded and locked in a globally multilaterally managed blockchain log. The attacked party can file a lawsuit in international or domestic cyber courts, and the domestic/international cyber courts will make judgments on the attacker's actions based on the immutable log records. By combining online and offline methods through technology, it is possible to ensure that cyberspace, supported by rules, laws, and technological systems, is secure and trustworthy, maintaining order and the rule of law in cyberspace based on technological solutions.
因此,为了提供一种确保网络空间可信且安全的方法与系统,如图2和图15所示,本实施例还优选包括步骤S7,用于建立网络空间管理体系;在网络空间管理体系中进行AI检测管理,当网络空间受到干扰或攻击时,通过数据分析、深度学习、强化学习以及模型训练中的至少一项对网络流量、用户行为和系统日志进行监测分析,并存储至区块链日志记录中。Therefore, in order to provide a method and system for ensuring the trustworthiness and security of cyberspace, as shown in Figures 2 and 15, this embodiment preferably includes step S7, which is used to establish a cyberspace management system; AI detection and management are carried out in the cyberspace management system, and when cyberspace is interfered with or attacked, network traffic, user behavior and system logs are monitored and analyzed through at least one of data analysis, deep learning, reinforcement learning and model training, and stored in the blockchain log record.
更为具体的,本实施例所述网络空间管理体系也称网络空间安全和平法治管理体系。More specifically, the cyberspace management system described in this embodiment is also known as the cyberspace security and peace rule of law management system.
网络空间是所有信息系统的集合,是人类生存的信息环境,人在其中与信息相互作用相互影响。因此,网络空间存在更加突出的信息安全问题,其核心内涵仍是信息安全。而面对不断增长的网络威胁和违规行为,需要在安全技术的基础上上,建立一个强大的网络空间管理体系。Cyberspace is the collection of all information systems and the information environment in which humans live, interacting and influencing each other with information. Therefore, cyberspace presents more prominent information security challenges, and its core essence remains information security. Faced with ever-increasing cyber threats and violations, a robust cyberspace management system needs to be established based on security technologies.
如图2所示,若网络空间受到干扰和攻击,通过大数据(如数据分析)、深度学习、强化学习和大模型(如模型训练)等技术将监测和分析网络流量、用户行为和系统日志,及时发现潜在的安全威胁和违规行为。可以通过AI系统学习和识别常见的网络攻击模式、恶意软件特征和非法内容,从而能够自动预警和阻止此类活动。此外,还可以分析用户行为模式,识别异常活动并提示管理员进行进一步调查。其次,网络管理团队或管理员负责处理AI预警和其他安全事件。当AI预警触发时,管理员将及时介入,调查并采取适当的措施应对威胁。例如阻止恶意网站、禁用受感染的计算机或网络账户,或与执法机构合作进行进一步调查。此外,人工管理员还可以处理AI无法解决的复杂问题,例如对新型网络攻击的应对、调查内部安全违规行为和协助用户解决安全相关问题等。管理体系将定期进行审查,并根据每次事件处理结果进行改进,以适应不断变化的网络威胁和技术演进,保持对网络安全威胁的敏感性。As shown in Figure 2, if cyberspace is interfered with or attacked, technologies such as big data (e.g., data analytics), deep learning, reinforcement learning, and large models (e.g., model training) will be used to monitor and analyze network traffic, user behavior, and system logs, promptly identifying potential security threats and violations. The AI system can learn and identify common network attack patterns, malware characteristics, and illegal content, thereby automatically issuing warnings and blocking such activities. Furthermore, it can analyze user behavior patterns, identify abnormal activities, and prompt administrators for further investigation. Secondly, the network management team or administrators are responsible for handling AI warnings and other security incidents. When an AI warning is triggered, the administrator will intervene promptly, investigate, and take appropriate measures to address the threat. For example, blocking malicious websites, disabling infected computers or network accounts, or cooperating with law enforcement agencies for further investigation. In addition, human administrators can handle complex problems that AI cannot solve, such as responding to new types of network attacks, investigating internal security violations, and assisting users in resolving security-related issues. The management system will be reviewed regularly and improved based on the results of each incident to adapt to constantly changing network threats and technological evolution, maintaining sensitivity to cybersecurity threats.
在网络空间管理体系中,当查找不到干扰或攻击所对应的攻击方时,通过网络空间中的保险服务公司进行赔偿,或通过网络空间应急部门提供紧急援助和支持,所述网络空间应急部门包括网络空间中的国内应急部门和国际应急部门;所述保险服务公司和网络空间应急部门均基于多标识网络实现内嵌身份认证,并通过多标识寻址访问区块链日志记录,进而为赔偿、紧急援助和支持提供可信且安全的数据基础。In the cyberspace management system, when the attacker corresponding to the interference or attack cannot be found, compensation is provided through insurance service companies in cyberspace, or emergency assistance and support are provided through cyberspace emergency departments, including domestic and international emergency departments in cyberspace. Both insurance service companies and cyberspace emergency departments implement embedded identity authentication based on multi-identifier networks and access blockchain log records through multi-identifier addressing, thereby providing a reliable and secure data foundation for compensation, emergency assistance, and support.
在极小概率情况下,如果出现找不到肇事方的事件,或者由于不可抗力因素导致的损害,为了能够合理解决这些问题,在基于多标识网络实现的整体方案之中,还可以依赖网络空间安全保险服务公司或网络空间应急部门(也称网络空间安全应急部门)来提供赔偿和处理。通过多标识网络合法引入的网络空间安全保险服务公司将根据保险合同中约定的条件和条款给予相应的赔偿,为受害方提供一种补救机制。而网络空间应急部门可以提供紧急援助和支持,促进受影响方的恢复和重建工作;所述网络空间应急部门包括网络空间中的国内应急部门和国际应急部门,如果是国内的干扰或攻击事件,则默认通过国内应急部门来提供紧急援助和支持;如果是跨国的干扰或攻击事件,则默认通过国际应急部门来提供紧急援助和支持,比如联合国的安全应急部门等。这样的设计可以确保在面对无法确定责任方的情况下,受损害方依然能够得到适当的补偿和支持。In extremely rare cases, such as incidents where the perpetrator cannot be found, or damage caused by force majeure, the overall solution based on a multi-identifier network can rely on cybersecurity insurance companies or cybersecurity emergency response departments (also known as cybersecurity emergency response agencies) for compensation and handling to reasonably resolve these issues. Cybersecurity insurance companies legally introduced through the multi-identifier network will provide corresponding compensation according to the conditions and terms stipulated in the insurance contract, providing a remedial mechanism for the victim. Cybersecurity emergency response departments can provide emergency assistance and support to facilitate the recovery and reconstruction efforts of the affected parties. These departments include domestic and international emergency response departments in cyberspace. For domestic interference or attacks, emergency assistance and support are provided by default through domestic emergency response departments; for transnational interference or attacks, emergency assistance and support are provided by default through international emergency response departments, such as the United Nations' security emergency response department. This design ensures that even when the responsible party cannot be identified, the injured party can still receive appropriate compensation and support.
如图2和图15所示,本实施例还包括步骤S8,用于建立网络空间裁判体系;在网络空间裁判体系中,当涉及到数据资产、数据隐私或网络空间的纠纷和冲突时,根据区块链日志记录进行调查,将调查结果发送至对应的国内网络法庭或国际网络法庭;并将相关的判决记录公布在区块链网络空间之中。As shown in Figures 2 and 15, this embodiment also includes step S8, which is used to establish a cyberspace adjudication system. In the cyberspace adjudication system, when disputes and conflicts involving data assets, data privacy, or cyberspace are involved, an investigation is conducted based on blockchain log records, and the investigation results are sent to the corresponding domestic or international cyber courts. The relevant judgment records are also published in the blockchain cyberspace.
本实施例所述步骤S7和步骤S8并不属于顺序步骤,而是并行实现,以便从管理层面和法律层面来共同提供完整的安全和平法治的网络空间,如图2所示。Steps S7 and S8 in this embodiment are not sequential steps, but are implemented in parallel to jointly provide a complete safe, peaceful and law-based cyberspace from both management and legal perspectives, as shown in Figure 2.
本实施例所述网络空间裁判体系也称网络空间安全和平法治法律法庭裁判体系。The cyberspace adjudication system described in this embodiment is also known as the cyberspace security, peace, rule of law, and court adjudication system.
未来,随着网络的发展,网络安全问题复杂程度也将显著提升,因网络数据及数据交易产生的纠纷数量势必将继续呈现不断上升的趋势。对于管理员无法解决的涉及网络数据的相关纠纷,需要利用网络上的法律法庭裁判体系解决争议。当涉及到数据资产、数据隐私或其他网络空间的纠纷和冲突时,纠纷的相关方可以通过报警、仲裁或诉讼来解决。In the future, with the development of the internet, the complexity of cybersecurity issues will significantly increase, and the number of disputes arising from network data and data transactions will inevitably continue to rise. For disputes involving network data that administrators cannot resolve, it is necessary to utilize the online legal court system to resolve the disputes. When disputes and conflicts involve data assets, data privacy, or other cyberspace issues, the parties involved can resolve them through police intervention, arbitration, or litigation.
为了确定可能涉及争议的参与方,网络警察将依据区块链系统记录的日志进行调查。若当事人属于同一个国家,案件就交由该国的国内网络法庭审判。若存在境外主体、境外国家地区/当地法律规定、国际双边/多边协定/条约、涉外合同等涉外要素时,该案件可以转交给国际网络法庭审理。通过多标识网络实现的确保网络空间可信且安全的方法与系统之中,司法机关可以将按照相关法律条款进行司法实践,以确保审判的公正和及时性,使得犯有过失或犯罪行为的个人或组织受到法律制裁、经济赔偿或监禁等惩罚,并且相关的判决记录将被执行并公布在区块链网络空间中。To identify potential parties involved in a dispute, cyber police will conduct investigations based on logs recorded by the blockchain system. If the parties belong to the same country, the case will be tried in that country's domestic cyber court. If there are foreign entities, foreign country/region/local laws, international bilateral/multilateral agreements/treaties, foreign-related contracts, or other foreign-related elements, the case can be transferred to an international cyber court. Through methods and systems implemented via multi-identifier networks to ensure the trustworthiness and security of cyberspace, judicial authorities can conduct judicial practice according to relevant legal provisions to ensure the fairness and timeliness of trials, ensuring that individuals or organizations committing negligence or crimes are subject to legal sanctions, economic compensation, or imprisonment, and that relevant judgment records are executed and published in the blockchain cyberspace.
在实际应用中,还可以基于多标识网络进行功能扩展,可以根据司法实践和已有立法经验对法律进行完善,以填补法律的漏洞并修正过时的条款,确立新的规则。这样的完善过程将不断进行,以适应不断变化的网络环境和技术发展的需求,为网络空间的安全和公正提供更加可靠的保障。In practical applications, functionality can be extended based on multi-identifier networks. Laws can be improved based on judicial practice and existing legislative experience to fill legal loopholes, amend outdated clauses, and establish new rules. This improvement process will continue to adapt to the ever-changing network environment and technological development needs, providing more reliable guarantees for the security and fairness of cyberspace.
如图1至图14所示,本实施例还提供一种确保网络空间可信且安全的系统,采用了如上所述的确保网络空间可信且安全的方法,并包括:As shown in Figures 1 to 14, this embodiment also provides a system for ensuring the trustworthiness and security of cyberspace, employing the method described above for ensuring the trustworthiness and security of cyberspace, and including:
身份认证和多标识寻址模块,基于多标识网络实现内嵌身份认证和包签名的多标识寻址,用户在注册完成后,先对发布的每个数据包以自己的私钥进行签名,写入多标识网络包的签名区,中间路由器定期维护从多标识管理系统得到的用户信息表,在收到报文后从中提取对应用户的签名信息,然后通过从多标识管理系统中获得的公钥信息,对收到的多标识网络包进行身份认证;并在身份认证通过后,通过支持可变报文长度的报文格式进行对应的多标识寻址;The identity authentication and multi-identity addressing module implements embedded identity authentication and packet signing multi-identity addressing based on a multi-identity network. After registration, users first sign each published data packet with their private key and write it into the signature area of the multi-identity network packet. Intermediate routers periodically maintain a user information table obtained from the multi-identity management system. Upon receiving a packet, they extract the corresponding user's signature information from the table and then use the public key information obtained from the multi-identity management system to authenticate the received multi-identity network packet. After successful authentication, multi-identity addressing is performed using a packet format that supports variable packet length.
定义模块,定义基于多标识网络的数字海关、数字护照以及数字签证;Define the module to define digital customs, digital passports, and digital visas based on a multi-identifier network;
数字签证模块,对时间数据和数字签证密钥进行按位异或运算,通过哈希函数对按位异或运算后的数据进行单向映射,得到基于多标识网络的数字签证;The digital visa module performs a bitwise XOR operation on the time data and the digital visa key, and then uses a hash function to perform a one-way mapping on the data after the bitwise XOR operation to obtain a digital visa based on a multi-identifier network.
数字护照模块,根据数字签证的哈希值和跨国护照密钥,计算得到基于多标识网络的数字护照;The digital passport module calculates a digital passport based on a multi-identifier network, using the hash value of the digital visa and the cross-border passport key.
使用并维护出境表模块,通过多标识网络路由器实现数字海关,通过所述数字海关使用并维护出境表;The exit form module is used and maintained, and digital customs is implemented through a multi-identifier network router. The exit form is used and maintained through the digital customs.
使用并更新入境表模块,通过所述数字海关使用入境表验证所述数字护照,并更新所述入境表。Use and update the entry form module to verify the digital passport through the digital customs and update the entry form.
综上所述,本实施例先基于多标识网络实现内嵌身份认证和包签名的多标识寻址,然后通过基于多标识网络的数字签证、数字护照以及数字海关来实现出境表的使用和维护,实现入境表的使用和更新,进而能够有效地通过多标识网络及多标识网络管理系统提供适应当前发展速度的网络体系、方法与系统,以便更为有效地保障网络空间的可信和安全,为保证网络空间的有序、法治以及和平提供更好的基础。当涉及到数据资产、数据隐私或网络空间的纠纷和冲突时,受害方可以根据区块链日志记录进行调查,将调查结果发送至对应的国内网络法庭或国际网络法庭,为进行国内或国际网络法庭诉讼提供了可靠的基础。本发明能够更好地应用于在全球网络空间中,便于管理各国网络空间边界,保护各国的网络空间主权,打击跨国网络攻击与犯罪。In summary, this embodiment first implements multi-identifier addressing with embedded identity authentication and packet signature based on a multi-identifier network. Then, it realizes the use and maintenance of exit forms and the use and updating of entry forms through digital visas, digital passports, and digital customs based on the multi-identifier network. This effectively provides a network system, method, and framework adapted to the current pace of development through the multi-identifier network and its management system, thereby more effectively ensuring the trustworthiness and security of cyberspace and providing a better foundation for ensuring order, rule of law, and peace in cyberspace. When disputes and conflicts involving data assets, data privacy, or cyberspace arise, the victim can conduct investigations based on blockchain log records and send the investigation results to the corresponding domestic or international cyber courts, providing a reliable basis for domestic or international cyber court litigation. This invention can be better applied in global cyberspace, facilitating the management of national cyberspace boundaries, protecting national cyberspace sovereignty, and combating transnational cyberattacks and crimes.
在此基础上,本实施例还进一步实现了基于加权中心度算法的拟态防御,以便根据用户安全需求,有侧重地提高网络防护的效率;建立抗攻击的随机过程鞅量化模型,增强网络空间层次化分析结构的灵活性,进一步提高网络完全性;建立网络空间管理体系和网络空间裁判体系,为网络空间的安全和可信提供了保障,为确保网络空间的安全、和平、法治和有序管理提供了很好的基础。Building upon this foundation, this embodiment further implements mimicry defense based on a weighted centrality algorithm, enabling targeted improvement of network protection efficiency according to user security needs; establishes an attack-resistant stochastic process martingale quantization model to enhance the flexibility of the hierarchical analysis structure of cyberspace and further improve network integrity; and establishes a cyberspace management system and a cyberspace adjudication system, providing guarantees for the security and trustworthiness of cyberspace and laying a solid foundation for ensuring the safe, peaceful, rule-of-law, and orderly management of cyberspace.
以上内容是结合具体的优选实施方式对本发明所作的进一步详细说明,不能认定本发明的具体实施只局限于这些说明。对于本发明所属技术领域的普通技术人员来说,在不脱离本发明构思的前提下,还可以做出若干简单推演或替换,都应当视为属于本发明的保护范围。The above description, in conjunction with specific preferred embodiments, provides a further detailed explanation of the present invention. It should not be construed that the specific implementation of the present invention is limited to these descriptions. For those skilled in the art, various simple deductions or substitutions can be made without departing from the concept of the present invention, and all such modifications and substitutions should be considered within the scope of protection of the present invention.
Claims (11)
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202410918073.2A CN119155055B (en) | 2024-07-10 | 2024-07-10 | A method and system for ensuring trustworthiness and security in cyberspace |
| CN202410918073.2 | 2024-07-10 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2026011691A1 true WO2026011691A1 (en) | 2026-01-15 |
Family
ID=93814081
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2024/139809 Pending WO2026011691A1 (en) | 2024-07-10 | 2024-12-17 | Method and system for ensuring trustworthiness and security of cyberspace |
Country Status (2)
| Country | Link |
|---|---|
| CN (1) | CN119155055B (en) |
| WO (1) | WO2026011691A1 (en) |
Families Citing this family (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN120321655B (en) * | 2025-06-16 | 2025-08-29 | 北京大学深圳研究生院 | Method and system for constructing trusted master network by expanding SIM card in multi-identification network system |
Family Cites Families (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2020154865A1 (en) * | 2019-01-28 | 2020-08-06 | 北京大学深圳研究生院 | Progressive ip removal method and system supporting multi-mode identifier network addressing and storage medium |
| CN112291295A (en) * | 2020-08-11 | 2021-01-29 | 佛山赛思禅科技有限公司 | High-safety mobile office network based on multi-identification network system |
| CN114785622B (en) * | 2022-06-21 | 2022-09-30 | 深圳赛思鹏科技发展有限公司 | Access control method, device and storage medium for multi-identification network |
| CN116980114A (en) * | 2023-03-13 | 2023-10-31 | 北京大学深圳研究生院 | A multi-identity management and analysis method and system for the metaverse |
-
2024
- 2024-07-10 CN CN202410918073.2A patent/CN119155055B/en active Active
- 2024-12-17 WO PCT/CN2024/139809 patent/WO2026011691A1/en active Pending
Also Published As
| Publication number | Publication date |
|---|---|
| CN119155055B (en) | 2025-12-30 |
| CN119155055A (en) | 2024-12-17 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Lone et al. | A comprehensive study on cybersecurity challenges and opportunities in the IoT world | |
| Shammar et al. | A survey of IoT and blockchain integration: Security perspective | |
| Anita et al. | Blockchain security attack: A brief survey | |
| Meng et al. | Enhancing the security of blockchain-based software defined networking through trust-based traffic fusion and filtration | |
| Bhushan et al. | Security challenges in cloud computing: state-of-art | |
| US9275237B2 (en) | Method and apparatus for privacy and trust enhancing sharing of data for collaborative analytics | |
| Gupta et al. | Taxonomy of DoS and DDoS attacks and desirable defense mechanism in a Cloud computing environment | |
| Zargar et al. | A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks | |
| El-Masri et al. | Blockchain as a mean to secure Internet of Things ecosystems–a systematic literature review | |
| Verma et al. | A detailed survey of denial of service for IoT and multimedia systems: Past, present and futuristic development | |
| US20230254331A1 (en) | Systems and methods for securing devices in a computing environment | |
| Baseri et al. | Blockchain security risk assessment in quantum era, migration strategies and proactive defense | |
| WO2026011691A1 (en) | Method and system for ensuring trustworthiness and security of cyberspace | |
| Gupta et al. | Fog computing and its security challenges | |
| Mohan et al. | Special session: The future of IoT security | |
| Hayawi et al. | A False Positive Resilient Distributed Trust Management Framework for Collaborative Intrusion Detection Systems | |
| Li et al. | Network Security | |
| Sangui et al. | Cloud Security Using Honeypot Network and Blockchain: A Review | |
| Jena et al. | A Pragmatic Analysis of Security Concerns in Cloud, Fog, and Edge Environment | |
| Mahalaxmi et al. | Blockchain solutions for IoT devices against DDoS attacks: A review | |
| Tutuncuoglu | Silent Shields: AI-Powered Behavioral Defense Against Real-Time Cyber Threats in Web Hosting Environments | |
| Lai et al. | Research on Industrial IoT Data Storage and Access Security Countermeasures Based on Solana Blockchain and IPFS Technology | |
| Sakraoui et al. | TL2AB: Trusted lightweight authentication using AI and blockchain for 6G networks | |
| Huang et al. | Construction of switch information security protection system based on software‐defined networking | |
| ALKHDOUR et al. | Cybersecurity risk management in IoT systems: A systematic review |