现代水面舰艇大量使用信息技术,面临严重的网络攻击威胁,深入分析水面舰艇网络攻击威胁,对提高水面舰艇网络安全防护能力至关重要。水面舰艇网络攻击威胁主要来源于敌对势力和我方人员,可分为在线攻击和离线攻击两大类,主要包括边界突破攻击、中间接入攻击、恶意代码代码植入攻击、潜信道攻击等。针对实现各类网络攻击的难点,可采取加强舰艇信息保密、强化网络边界防护、及时封堵安全漏洞等防护措施。
Information technology is heavily used in modern surface warship, so serious problems exist in its Cyberspace security. It is important to analysis modern surface warship's network attack threat for enhancing its self-security. Threats primarily comes from hostile forces and our own personnel , and they can be classified into online attacks and offline attacks, including border breach attacks and Including border breach attacks etc. In view of the difficulties of implementing various types of network attacks, some measures can be taken, incoude enhancing the confidentiality of ship information and strengthening network boundary protection.
2024,46(11): 177-181 收稿日期:2022-10-17
DOI:10.3404/j.issn.1672-7649.2024.11.033
分类号:TP393.0
作者简介:李宏海(1981-),男,工程师,研究方向为武器装备网络安全试验
参考文献:
[1] 薛亮, 孔祥营. 舰艇信息系统基础设施发展回顾及展望[J]. 指挥控制与仿真, 2022, 44(1): 92-96.
XUE Liang, KONG Xiangying. Review and prospect of ship information system infrastructure development[J]. Command Control & Simulation, 2022, 44(1): 92-96.
[2] 白鹏万, 吴胜勇, 李秉. 透过“舒特”系统探析战场网络战[J]. 军队指挥自动化, 2015(1): 74–77.
BAI Peng-wang, WU Shengyong, LI Bing. Analysis of batelfield network Warfare through SUTER[J]. Automation of Military Command, 2015(1): 74–77.
[3] 杨艳萍, 叶锡庆, 张明安, 等. 战场网络战基本模型研究[J]. 系统仿真学报, 2011, 23(5): 1014–1020.
YANG Yanping, YE Xiqing, ZHANG Mingan, et al. Research on basic models for battlefield network war[J]. Journal of System Simulation, 2011, 23(5): 1014–1020.
[4] 王永华. 战场网络空间攻击探析[J]. 军事学术, 2014(8): 44–47.
WANG Yonghua. The analysis of battlefield cyber spaceattacks[J]. Military Atr, 2014(8): 44–47.
[5] 杨红娃. 战场网络攻击综述[J]. 通信对抗, 2005(4): 3–7.
YANG Hongwa. The summarize of battlefield network attack[J]. Communication Countermeasures, 2005(4): 3–7.
[6] 杨红娃, 战场网络攻击效能评估技术[J], 通信对抗, 2006(1): 24–28.
YANG Hongwa. The evaluating technology of battlefield network attacking efficiency [J]. Communication Countermeasures, 2006(1): 24–28.
[7] 李冬, 宋里宏, 王璐, 等. 战场网络攻击效能分析[J]. 网络安全技术与应用, 2007(3): 78–79.
LI Dong, SONG Lihong, WANG Lu, et al. Analyzing the effectiveness of battle field network attacking[J]. Network Security Technology and Application, 2007(3): 78–79.
[8] 闫坤, 陈楚湘, 刘鹏. 基于相似性的战场网络攻击策略[J]. 兵工自动化, 2021, 40(11): 86-91.
YAN Kun, CHEN Chuxiang, LIU Peng. Battlefield network attack strategy based on similarity[J]. Ordnance Industry Automation, 2021, 40(11): 86-91.
[9] 高峰瑞, 朱磊. 海战场网络电磁空间作战需求研究[C]// 第七届中国指挥控制大会论文集, 2019: 655–658.
GAO Fengduan, ZHU Lei. Research on combat requirement of network electromagnetic space for sea battle field[C]//Proceedings of the 7 th China Command and Control Congress. 2019: 655–658.
[10] 王鹏飞. 海战场赛博空间指挥控制和安全防御技术[J]. 舰船电子工程, 2021, 41(9): 20–24.
WANG Pengfei. Research on cyberspace command control and security defense technology of sea battlefield[J]. Ship Electronic Engineering. 2021, 41(9): 20–24.
[11] 汤扣林. 海战场网络空间态势感知与生成[C]// 第六届中国指挥控制大会论文集, 2018, 776–780.
TANG Koulin. Network situation awareness and generation for the sea battlefield[C]// Proceedings of the 6 th China Command and Control Congress, 2018, 776–780.
[12] 付钰, 严博, 吴晓平. 海战场网络空间信息安全防护体系建设对策研究[J]. 海军工程大学学报(综合版), 2019, 16(3): 23–26.
FU Yu, YAN Bo, WU Xiaoping. Strategy of cyberspaceinformation security protection in naval battle field. Journal of Naval University of Engineering, 2019, 16(3): 23–26.
[13] 吴鑫辉, 邹雨, 郑锐. 网电空间作战发展及对海上作战影响分析[J]. 网络安全技术及应用. 2020(12): 173–175.
WU Xinhui, ZHOU Yu, ZHENG Rui. Analysis on the development and influence with maritime iperation of cyberspace operation[J]. Network Security Technology and Application. 2020(12): 173–175.
[14] 杨媚. 嵌入式舰船电子信息系统入侵攻击在线发现方法[J]. 舰船科学技术, 2020, 42(20): 148–150.
YANG Mei. Research on online discovery method of embedded ship electronic information system intrusion attack[J]. Ship Science and Technology, 2020, 42(20): 148–150.
[15] 齐越, 刘金芳, 李宁. 开源软件供应链安全风险分析[J]. 信息安全研究, 2021, 7(9): 790-794.
QI Yue, LIU Jinfang, LI Ning. The analysis of security risk in open source software supply chain[J]. Journal of Information Security Research, 2021, 7(9): 790-794.
[16] 唐士杰, 袁方, 李俊, 等. 工业控制系统关键组件安全风险综述[J]. 网络与信息安全学报, 2022, 8(3): 1–17.
TANG Shijie, YUAN Fang, LI Jun, et al. Review on security risks of key components in industrial control system[J]. Chinese Journal of Network and Information Security, 2022, 8(3): 1–17.