文章摘要
刘勇.科技信息孪生系统分层防御体系研究[J].情报工程,2025,11(5):036-047
科技信息孪生系统分层防御体系研究
Research on Hierarchical Defense System of Science and Technology Information Twin System
  
DOI:
中文关键词: 科技信息孪生系统;防御体系;网络技术;信息监测;跨域
英文关键词: Science and Technology Information Twin System; Defense System; Network Technology; Information Monitoring;Cross-domain
基金项目:福建省科技计划项目“区域科技创新数据监测技术研究——以福建省为例”(2024R1008008)。
作者单位
刘勇 1. 福建省科学信息技术研究所 福州 350003;2. 福建省信息网络重点实验室 福州 350003 
摘要点击次数: 13
全文下载次数: 14
中文摘要:
      [目的/意义]科技信息孪生系统因虚实交互复杂、数据敏感,面临严峻跨域攻击与隐私泄露风险,构建适配防御体系可为后续研究提供参考。[方法/过程] 通过文献调研与概念分析,明确科技信息孪生系统的内涵特征,提炼出科技信息多元融合、信息传递的分层实时适配性、物理—虚拟闭环协同、系统架构协同复杂四方面特征,以及用户需求、网络架构、数据类型、调整能力、技术选型、法律与合规性等六个影响因素,进而分析防御需求与发展趋势。[结果/结论] 提出在“虚实交互—威胁响应—策略优化”循环中实现动态防护,从网络边界、信息收集与分析、数据保护、应用与服务、跨域协同防御五维度构建框架。该框架突破传统模式,打破虚实防护壁垒,融入动态自适应机制,形成多维度分层次立体防御体系。
英文摘要:
      [Objective/Significance] Due to the complex virtual-physical interactions and the sensitivity of data involved, sci-tech information twin systems face significant risks of cross-domain attacks and privacy breaches. Developing an adaptive defense framework can offer valuable guidance for future research. [Methods/Processes] Through literature review and conceptual analysis, this study defines the essential characteristics of sci-tech information twin systems, identifying four core features: multisource integration of technological information, hierarchical real-time adaptability in information transmissionn, closed-loop collaboration between physical and virtual systems, and coordinated complexity within system architectures. It also identifies six key influencing factors: user requirements, network architecture, data types, adaptability, technology choices, and legal and regulatory compliance. Based on these, the study further analyzes defense demands and development trends. [Results/Conclusions] This paper proposes the implementation of dynamic protection in the cycle of “virtual-real interaction-threat response-strategy optimization”, and constructs a framework from five dimensions: network boundary, information collection and analysis, data protection, application and service, and cross-domain collaborative defense. This framework breaks through the traditional model, removes the barriers between virtual and real protection, incorporates a dynamic self-adaptive mechanism, and forms a multi-dimensional, hierarchical and three-dimensional defense system.
查看全文   查看/发表评论  下载PDF阅读器
关闭

分享按钮