期刊文献+

赛博武器的现状与发展 被引量:18

Status and Development of Cyber Weapons
在线阅读 下载PDF
导出
摘要 随着信息技术的迅速发展,赛博空间已经逐渐成为未来信息化战争中的新作战领域。同时,面对日益增长的赛博威胁对国家安全所带来的挑战,各类新概念赛博武器由于其巨大的军用前景而逐渐得到世界各大军事强国的广泛关注。简要论述了赛博空间与赛博战的概念内涵,比较详细地介绍了赛博武器的类型特点,系统地总结了近几年来各类赛博武器的研究进展和成果,并结合未来赛博空间的作战需求,分析了目前存在的问题和发展趋势,最后提出我国发展新概念赛博武器的迫切需求和措施建议。 With the rapid development and continuous deepening of the research of information technologies,cyberspace has become a new operational domain of the future information warfare.At the same time,in face of challenges to the national security caused by the growing cyber threat,varieties of new concept cyber weapons have attracted extensive attentions of many countries due to the great military application prospects.In this paper,the concepts and connotations of cyberspace and cyber war are briefly discussed,the types and characteristics of cyber weapons are introduced in detail,and the up-to-date research progress of different types of cyber weapons in recent years are summarized systematically.Combining with the future operational requirements in cyberspace,the existing problems and development trend are also analyzed.Finally,the urgent demand and suggestions for developing new concept cyber weapons in our country are proposed.
作者 王源 张博
出处 《中国电子科学研究院学报》 2011年第3期221-225,共5页 Journal of China Academy of Electronics and Information Technology
关键词 信息技术 赛博空间 赛博威胁 赛博武器 赛博战 information technologies cyberspace cyber threat cyber weapons cyber war
作者简介 王源(1968-),男,河南孟津人,博士,高级工程师,主要研究方向为Cyher.space、计算机软件;E-mail:vizn99@126.com 张博(1982-)男,辽宁朝阳人,博士,工程师,主要研究方向为Cyberspace。
  • 相关文献

参考文献10

  • 1TECHNOLYTICS. Cyber Commander's Handbook[ Z].
  • 2THE WHITE HOUSE. Cyberspace Policy Review-Assuring a Trusted and Resilient Information and Communications Infrastructure[ R]. Washington D C, 2009.
  • 3CHAIRMAN OF THE JOINT CHIEFS OF STAFF. National Military Strategy for Cyberspace Operations (NMSCO) [R]. Washington D C, 2006.
  • 4AIR FORCE CYBER COMMAND. Air Force Cyber Command Strategic Vision[ R]. Barksdale AFB, LA:, 2008.
  • 5SHANE P COURVILLE. Air Force and the Cyberspace Mission Defending The Air Force's Computer Network in the Furture [ R]. 2007.
  • 6诸葛建伟,叶志远,邹维.攻击技术分类研究[J].计算机工程,2005,31(21):121-123. 被引量:23
  • 7诸葛建伟,韩心慧,周勇林,叶志远,邹维.僵尸网络研究[J].软件学报,2008,19(3):702-715. 被引量:157
  • 8翁凌雯,侯德亭,牛忠霞,林竟羽,周旺.定向能武器及其应用[J].航天电子对抗,2005,21(5):14-16. 被引量:12
  • 9朱春梅,张旭翔.软杀伤弹药毁伤机理及其毁伤效应[J].华北工学院学报,1998,19(3):247-250. 被引量:1
  • 10DARPA-BAA-08-43, National Cyber Range[ R]. 2008.

二级参考文献13

  • 1诸葛建伟,徐辉,潘爱民.基于面向对象方法的攻击知识模型[J].计算机研究与发展,2004,41(7):1110-1116. 被引量:7
  • 2文伟平,卿斯汉,蒋建春,王业君.网络蠕虫研究与进展[J].软件学报,2004,15(8):1208-1219. 被引量:187
  • 3赖祖武.高功率微波及核电磁脉冲的防护问题[J].微波学报,1995,11(1):1-8. 被引量:18
  • 4孙彦东,李东.僵尸网络综述[J].计算机应用,2006,26(7):1628-1630. 被引量:29
  • 5Amoroso E G. Fundamentals of Computer Security Technology.Englewood Cliffs(New Jersey): Prentice Hail, 1994.
  • 6Lindqvist U, Jonsson E. How to Systematically Classify Computer Security Intrusions. In: Proceedings of the 1997 IEEE Symposium on Security and Privacy, Oakland, CA, IEEE Computer Society Press,1997:154-163.
  • 7Kendall K. A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems[Master Thesis]. Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology, 1999.
  • 8One A. Smashing the Stack for Fun and Profit. Phrack Magazine, 1996,7(49).
  • 9Spyrit D, Jack A B. Win32 Buffer Overflows (Location, Exploitation and Prevention). Phrack Magazine, 2000, 55(I5).
  • 10David AF. Lasers,HPM weapons near operational status[J].Aviation Week & Space Technology,2002(6).

共引文献187

同被引文献200

引证文献18

二级引证文献83

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部