题名

網路作戰安全與管理主題實證探索之研究-使用GHSOM技術

并列篇名

The Study on Exploring the Topics of Cyber Warfare Security and Management: Using Growing Hierarchical Self-Organizing Map

作者

陳良駒(Liang-Chu Chen);范俊平(Chiun-Ping Fan);謝佳容(Chia-Jung Hsieh)

关键词

網路作戰 ; 文字探勘 ; 增長階層式自組織映射圖 ; cyber warfare ; text mining ; growing hierarchical self-organizing map

期刊名称

資訊管理學報

卷期/出版年月

23卷1期(2016 / 01 / 01)

页次

99 - 128

内容语文

繁體中文

中文摘要

網際空間係由相互依存的資訊技術與網路基礎建設所構成的複雜環境,西方國家紛紛推出網際空間戰略,以加強對網際網路的控制與主導,制網路權也是我方近年不斷推動國防現代化與軍事事務革新的重要目標。面對中國「網軍」強大的威脅,本研究目的希望「以敵為師」了解對岸在網際空間作戰的攻防技術與支援規劃。研究中蒐整共計1358篇中國網路作戰相關文獻,據以建構「網路作戰安全與管理」概念詞彙,透過增長階層式自組織映射圖(growing hierarchicalself-organizing map; GHSOM)的分群技術來建構詞彙的主題類別與層級關係,再進行成果歸納及實證分析。研究成果不僅了解中國大陸在網路作戰安全與管理議題上的重要發展及趨勢,也提供各國政府在網路空間戰略策進之參考。

英文摘要

Purpose-In resistance to the enormous threats from the "Cyber Force" over the Internet, this research aims to examine both attacking and defending techniques, as well as the supporting plans from the People's Republic of China (ROC). This study employs the growing hierarchical self-organizing map (GHSOM) to construct the topic categories and hierarchy of vocabularies as a reference for enhancing the cyberspace war-fighting strategy. Design/methodology/approach-The framework of this study can be divided into 3 phases, "Data Collection," "Terminology Process," and "Cluster Analysis." In this research, based on 1,358 PRC's articles focusing on the cyber warfare from 2000 to 2010, a set of terminologies regarding "cyber warfare security and management" was constructed. The topic categories and hierarchy of vocabularies were constructed by using the clustering technique of the GHSOM. The results were then concluded and verified. Findings-The results point out 16 important categories of the cyber warfare, such as "Network Attack Techniques," "Intrusion Detection Security Management," "Network Defense Strategy and Technology," and "Cyber Warfare Strategy and Benefits," etc. The fundamental contributions of this paper can be considered at three different levels: (1)providing a better knowledge representation strategy for the current military observers; (2)discussing progress on the implementation of 5 integrative viewpoints of cyber warfare; and (3)providing 6 cyberspace war-fighting strategies. Practical implications-The results provide an understanding on the subject matter regarding the important development and trend of the cyber warfare security and management, as well as a reference for enhancing the cyberspace war-fighting policies. Originality/value-This paper illustrates a novel application for the military and demonstrates the way to apply the proposed framework to building an objective analysis. The study describes the individual layer of the hierarchy, and identifies means to improving the effectiveness of collective knowledge via practice perspectives. It helps the readers form an understanding on the cyber warfare attacking and defending techniques, as well as the supporting plans.

主题分类 基礎與應用科學 > 資訊科學
社會科學 > 管理學
参考文献
  1. 何全德(2013)。從虛擬國境防護趨勢看政府資通安全策進方向。資訊安全通訊,19(2),40-52。
    連結:
  2. 吳嘉龍(2013)。網路科技發展與資訊安全管理研究探討。危機管理學刊,10(2),79-86。
    連結:
  3. 林頌堅(2010)。利用自組織映射圖技術的研究主題視覺呈現及其在資訊傳播學領域的應用。圖書資訊學研究,5(1),23-49。
    連結:
  4. 姜國輝、楊喻翔(2012)。應用增長層級式自我組織映射圖於歷年研究主題圖之呈現。圖書資訊學研究,6(2),1-35。
    連結:
  5. 施東河、黃于爵(2003)。網站入侵偵測系統之分析與研究。中華民國資訊管理學報,9(2),183-214。
    連結:
  6. 梁德昭、朱志平、林凱薰(2012)。國家主權延伸至網路空間之討論。前瞻科技與管理,2(2),1-14。
    連結:
  7. 陳文華、施人英、吳壽山(2004)。探討文字採掘技術在管理者知識地圖之應用。中山管理評論,12(特刊),35-64。
    連結:
  8. 戴元峰、吳騏、薛義誠(2013)。「科技訊息分群圖譜」導入政府決策支援系統之應用。公共行政學報,44,113-160。
    連結:
  9. 簡禎富、李培瑞、彭誠湧(2003)。半導體製程資料特徵萃取與資料挖礦之研究。中華民國資訊管理學報,10(1),63-84。
    連結:
  10. 蘇建源、江琬瑂、阮金聲(2010)。資訊安全政策實施對資訊安全文化與資訊安全有效性影響之研究。資訊管理學報,17(4),61-87。
    連結:
  11. 張景皓(2013),韓國爆發史上最大駭客攻擊:下午2 點硬碟自動銷燬,iThome網站,http://www.ithome.com.tw/node/79400(存取日期2014/06/30)。
  12. 新華網( 2010 ) , 英國智庫稱未來戰爭將從大規模網路攻擊開始,http://mil.eastday.com/m/20100208/u1a5009305.html,(存取日期2014/06/30)
  13. DoD, U.S. (2012), Department of Defense Strategy for Operating in Cyberspace, http://www.defense.gov/news/d20110714cyber.pdf(存取日期2014/06/30)
  14. Air Force, U.S.(2005).Information Operations.Washington DC:Department of the Air Force Doctrine Document 2-5, USA.
  15. Armistead, L.(2010).Information operations matters: Best practices.USA:Potomac Books, Inc..
  16. Börner, K.,Chen, C.,Boyack, K.W.(2003).Visualizing knowledge domains.Annual review of information science and technology,37(1),179-255.
  17. Brett, T.W.(2011)。網際空間作戰的十大論點。國防譯粹,38(8),4-17。
  18. Chen, T.(2010).Stuxnet, the real start of cyber warfare?.IEEE Network,24(6),2-3.
  19. Choo, K.K.R.(2011).The cyber threat landscape: Challenges and future research directions.Computers & Security,30(8),719-731.
  20. Cornish, P.,Livingstone, D.,Clemente, D.,Yorke, C.(2010).On Cyber Warfare.London, UK:Chatham House.
  21. Dittenbach, M.,Rauber, A.,Merkl, D.(2002).Uncovering hierarchical structure in data using the growing hierarchical self-organizing map.Neurocomputing,48(1),199-216.
  22. Falessi, N.,Gavrila, R.,Klejnstrup, M.R.,Moulinos, K.(2012).National cybersecurity strategies: practical guide on development and execution.European Network and Information Security Agency (ENISA), EU.
  23. Giráldez, Raúl(Ed.),Riquelme, José C.(Ed.),Aguilar-Ruiz, Jesús S.(Ed.)(2004).Tendencias de la Minería de Datos en España.Española, USA:Red Espanola de Mineria de Datos..
  24. Ibrahim, L.M.(2010).Artificial neural network for misuse detection.Journal of Communication and Computer,7(6),38-48.
  25. Kohonen, T.(1997).Self-organizing Map.Berlin, Germany:Springer Verlag.
  26. Kohonen, T.(1982).Self-organized formation of topologically correct feature maps.Biological Cybernetics,43(1),59-69.
  27. Libicki, M.C.(1995).What Is Information Warfare?.Washington, D.C., USA:National Defense University Press.
  28. Liles, S.(2007).Cyber warfare compared to fourth and fifth generation warfare as applied to the Internet.Proceedings of the IEEE International Symposium on Technology & Society (ISTAS 2007),Las Vegas, NV:
  29. Luiijf, E.,Besseling, K.,de Graaf, P.(2013).Nineteen national cyber security strategies.International Journal of Critical Infrastructures,9(1),3-31.
  30. Magnuson, S.、宋家駒譯(2006)。網路戰:美國國防部憂心其網路漏洞。國防譯粹,33(12),25-28。
  31. Nicholson, A.,Webber, S.,Dyer, S.,Patel, T.,Janicke, H.(2012).SCADA security in the light of Cyber-Warfare.Computers and Security,31(4),418-436.
  32. Ortiz, A.,Górriz, J. M.,Ramírez, J.,Salas-González, D.(2013).Improving MRI segmentation with probabilistic GHSOM and multiobjective optimization.Neurocomputing,114,118-131.
  33. Pattie, M.(1994).Agents that Reduce Work and Information Overload.Communications ACM,37(7),30-40.
  34. Salton, G.,McGill, M.J.(1986).Introduction to Modern Information Retrieval.New York, NY, USA:McGraw-Hill.
  35. Shi, H.,Hamagami, T.,Xu, H.,Yu, P.,Wu, Y.(2012).A method for classifying packets into network flows based on GHSOM.Mobile Networks and Applications,17(6),730-739.
  36. Shih, J.Y.,Chang, Y.J.,Chen, W.H.(2008).Using GHSOM to construct legal maps for Taiwan's securities and futures markets.Expert Systems with Applications,34(2),850-858.
  37. Williams, B.T.(2011).Ten propositions regarding cyberspace operations.Joint Force Quarterly,61,11-17.
  38. Yang, Y.H.,Bhikshu, H.,Tsaih, R.H.(2011).The topic analysis of hospice care research using co-word analysis and GHSOM.Intelligent Computing and Information Science,134,459-465.
  39. Yen, G.G.,Wu, Z.(2008).Ranked centroid projection: a data visualization approach with self-organizing maps.IEEE Transactions on Neural Networks,19(2),245-259.
  40. 呂登明(2004)。信息化戰爭與信息化軍隊。北京:解放軍版社。
  41. 李承禹(2007)。中國網路作戰之戰略邏輯分析:網路戰與網路中心戰的區隔與應用。復興崗學報,90,245-264。
  42. 梁華傑(2008)。網路戰資訊安全探討與省思。國防雜誌,23(2),103-120。
  43. 陳巍(2010)。黑客攻擊的防範措施和黑客技術應用的思考。湖南科技學院學報,31(7),79-84。
  44. 湯添福(2009)。碩士論文(碩士論文)。高雄市,國立中山大學中國與亞太區域研究所。
  45. 楊喻翔、釋惠敏(2011)。安寧療護文獻之計量研究:1952-2009。安寧療護雜誌,16(1),42-61。
  46. 翟文中(2003)。公開資訊在情報研析之價值。國防雜誌,23(1),126-134。
  47. 蕭懷湘(2010)。中共培育網路對抗人才之規劃及展望。前瞻科技與管理,特刊,105-120。
  48. 簡華慶(2012)。網路資訊戰所扮演角色及因應策略之研究。國防雜誌,27(1),122-138。
被引用次数
  1. 歐陽新宜,陳志成(2020)。中國網路安全法規戰略之探討。遠景基金會季刊,21(3),1-40。