| 刘勇.科技信息孪生系统分层防御体系研究[J].情报工程,2025,11(5):036-047 |
| 科技信息孪生系统分层防御体系研究 |
| Research on Hierarchical Defense System of Science and Technology Information Twin System |
| |
| DOI: |
| 中文关键词: 科技信息孪生系统;防御体系;网络技术;信息监测;跨域 |
| 英文关键词: Science and Technology Information Twin System; Defense System; Network Technology; Information Monitoring;Cross-domain |
| 基金项目:福建省科技计划项目“区域科技创新数据监测技术研究——以福建省为例”(2024R1008008)。 |
| 作者 | 单位 | | 刘勇 | 1. 福建省科学信息技术研究所 福州 350003;2. 福建省信息网络重点实验室 福州 350003 |
|
| 摘要点击次数: 13 |
| 全文下载次数: 14 |
| 中文摘要: |
| [目的/意义]科技信息孪生系统因虚实交互复杂、数据敏感,面临严峻跨域攻击与隐私泄露风险,构建适配防御体系可为后续研究提供参考。[方法/过程] 通过文献调研与概念分析,明确科技信息孪生系统的内涵特征,提炼出科技信息多元融合、信息传递的分层实时适配性、物理—虚拟闭环协同、系统架构协同复杂四方面特征,以及用户需求、网络架构、数据类型、调整能力、技术选型、法律与合规性等六个影响因素,进而分析防御需求与发展趋势。[结果/结论] 提出在“虚实交互—威胁响应—策略优化”循环中实现动态防护,从网络边界、信息收集与分析、数据保护、应用与服务、跨域协同防御五维度构建框架。该框架突破传统模式,打破虚实防护壁垒,融入动态自适应机制,形成多维度分层次立体防御体系。 |
| 英文摘要: |
| [Objective/Significance] Due to the complex virtual-physical interactions and the sensitivity of data involved, sci-tech information twin systems face significant risks of cross-domain attacks and privacy breaches. Developing an adaptive defense framework can offer valuable guidance for future research. [Methods/Processes] Through literature review and conceptual analysis, this study defines the essential characteristics of sci-tech information twin systems, identifying four core features: multisource integration of technological information, hierarchical real-time adaptability in information transmissionn, closed-loop collaboration between physical and virtual systems, and coordinated complexity within system architectures. It also identifies six key influencing factors: user requirements, network architecture, data types, adaptability, technology choices, and legal and regulatory compliance. Based on these, the study further analyzes defense demands and development trends. [Results/Conclusions] This paper proposes the implementation of dynamic protection in the cycle of “virtual-real interaction-threat response-strategy optimization”, and constructs a framework from five dimensions: network boundary, information collection and analysis, data protection, application and service, and cross-domain collaborative defense. This framework breaks through the traditional model, removes the barriers between virtual and real protection, incorporates a dynamic self-adaptive mechanism, and forms a multi-dimensional, hierarchical and three-dimensional defense system. |
|
查看全文
查看/发表评论 下载PDF阅读器 |
| 关闭 |
|
|
|