
Research on Autonomous Defense Paradigm for Smart Computing Integration Networks
LIU Ying, XIA Yu, YU Cheng-xiao, ZHANG Wei-ting, WANG Run-hu, ZHANG Hong-ke
ACTA ELECTRONICA SINICA ›› 2024, Vol. 52 ›› Issue (5) : 1432-1441.
Research on Autonomous Defense Paradigm for Smart Computing Integration Networks
With the transformation of the computing power supply pattern in the digital economy era, the new network infrastructure with computing power as the core has become an important driving force to realize the sharing of computing power resources and support the digital economy transformation. In the computing power network, multiple heterogeneous user terminals access the network frequently in various ways to obtain computing power services anytime and anywhere, which increases the openness and dynamics of the network. Hence, the computing power network will face more severe security challenges. However, the traditional network-based security defense pattern usually statically supplements security protection components for specific security issues, which cannot actively adapt to user needs to adjust defense strategies flexibly, which is difficult to deal with security risks in computing-network integration scenarios. Therefore, facing the security requirements of the new computing power network, this paper regards security as the internal attribute of the network and proposes a multi-dimensional collaborative autonomous defense paradigm based on the smart computing integration networks, which combines the design of “three layers” and “three domains” of the network. In the “three layers”, this paper defines the security inherent service at the generalized service layer, adapts the security function at the mapping adaptation layer, and executes the security strategy at the fusion component layer. In the “three domains”, the resource adaptation is guided by the entity domain, the security service process is driven by the knowledge domain, and the specific security technologies are implemented by the sense control domain. It constructs a basic management and control process that integrates “detection”, “trace”, and “defense”, in which security policies and technologies can be flexibly adjusted according to scenario scalability and business security. Finally, the proposed paradigm is verified through simulation experiments, and the results prove the effectiveness of the proposed paradigm and also provide a reference for further research and application of smart computing fusion security in the future.
smart computing integration networks / computing power network / autonomous defense / defense paradigm / network attack {{custom_keyword}} /
1 |
李少鹤, 李泰新, 周旭. 算力网络:以网络为中心的融合资源供给[J]. 中兴通讯技术, 2021, 27(3): 29-34.
{{custom_citation.content}}
{{custom_citation.annotation}}
|
2 |
邱勤, 徐天妮, 张智杰, 等. 算力网络安全应用需求与关键技术研究[J]. 信息技术与标准化, 2022(11): 19-24, 33.
{{custom_citation.content}}
{{custom_citation.annotation}}
|
3 |
曹畅, 唐雄燕. 算力网络关键技术及发展挑战分析[J]. 信息通信技术与政策, 2021, 47(3): 6-11.
{{custom_citation.content}}
{{custom_citation.annotation}}
|
4 |
贾庆民, 丁瑞, 刘辉, 等. 算力网络研究进展综述[J]. 网络与信息安全学报, 2021, 7(5): 1-12.
{{custom_citation.content}}
{{custom_citation.annotation}}
|
5 |
段晓东, 姚惠娟, 付月霞, 等. 面向算网一体化演进的算力网络技术[J]. 电信科学, 2021, 37(10): 76-85.
{{custom_citation.content}}
{{custom_citation.annotation}}
|
6 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
7 |
张宏科, 罗洪斌. 智慧协同网络体系基础研究[J]. 电子学报, 2013, 41(7): 1249-1252, 1254.
{{custom_citation.content}}
{{custom_citation.annotation}}
|
8 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
9 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
10 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
11 |
张宏科, 于成晓, 权伟, 等. 融算网络体系基础研究[J]. 电子学报, 2022, 50(12): 2928-2934.
{{custom_citation.content}}
{{custom_citation.annotation}}
|
12 |
张宏科, 权伟, 刘康. 算力网络研究与探索[J]. 中兴通讯技术, 2023, 29(1): 1-5.
{{custom_citation.content}}
{{custom_citation.annotation}}
|
13 |
The Center for Applied Internet Data Analysis. The CAIDA UCSD IPv4 Routed /24 topology dataset[EB/OL]. (2022)[2024].
{{custom_citation.content}}
{{custom_citation.annotation}}
|
{{custom_ref.label}} |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
/
〈 |
|
〉 |