Home » knowledge » Xiang Changyu: Relying on Big Data Situational Awareness Technology to Realize Active Defense

Xiang Changyu: Relying on Big Data Situational Awareness Technology to Realize Active Defense

Editor’s note:A few days ago, the Chinese Academy of Engineering released the white paper “16 Major Technical Challenges in the Development of China’s Electronic Information Engineering Science and Technology in 2020″, which described the challenges in the field of “cyber security” as follows: In the face of the fierce competition among countries for network rights, “maintaining network security” Security sovereignty needs to innovate an active and adaptive multi-layer linkage technology system, build a positive defense barrier with fast fighting and wisdom against wisdom, break through the key network border defense technology of “defense and attack outside”, and form a threat that is dominated by me Perception and attack prediction ability” is an important challenge currently faced in this field.

In order to promote the joint discussion of how to deal with this challenge from all circles of industry, academia and research, this magazine interviewed Xiang Changyu, CEO of Hangzhou Wood Chain Internet of Things Technology Co., Ltd.

Xiang Changyu: Relying on Big Data Situational Awareness Technology to Realize Active Defense

Reporter: What are the key technologies of network border defense that “defend attacks from outside”? What are the security technologies that China urgently needs to improve?
Xiang Changyu: “Defending attacks from the outside” mainly relies on border protection technology, fraud defense technology and big data situational awareness technology. At present, big data situational awareness technology is the main way to achieve active defense. The application of situational awareness technology in the field of information security is relatively mature, but there are still misjudgments and omissions relying on existing big data analysis models. Research on offensive and defensive actual combat technology, further enrich and improve the big data situational awareness analysis model, and improve my country’s active defense capabilities.

Reporter: How to realize the initiative to maintain network security sovereignty and innovation, and build an adaptive multi-layer linkage technology system?

Xiang Changyu: Building an innovative, active and adaptive multi-layer linkage technology system is a long-term and gradual process that requires the entire cybersecurity industry to act together to establish the core goal of safeguarding national cybersecurity sovereignty.

Industry competent authorities should further increase policy support to drive social capital investment; colleges and universities should step up to improve the quality and quantity of cybersecurity research-oriented personnel training; scientific research institutes should strengthen cooperation with cybersecurity enterprises to improve the industrial applicability of advanced technologies.

Reporter: At present, when China has not yet completed the establishment of an independent security information industry system, how can we achieve “self-centered”?

Xiang Changyu: At present, my country’s independent security information industry system is under construction. At this stage, policy support is still needed to create a market for the independent security information industry, and use the market demand to promote the development of the independent security industry. At the same time, it will step up the research and development of alternative solutions in the transition stage to solve the performance problems of localized platforms.

Reporter: As we all know, the world today is going through great changes unseen in a century. What kind of new situation and changes do you think my country’s network information security is facing under the changing situation?

Xiang Changyu: Network information security has become the main battlefield of the wrestling between countries, and the means of network information security wrestling are more subtle, more destructive, and more influential.

The cyber attacks launched by foreign hostile forces against my country’s critical information infrastructure have become more and more intensive and have become normalized. At the same time, with the commercialization of 5G technology, the development of Internet of Things and industrial Internet security, will put forward higher requirements for network information security.

postscript:Building a comprehensive security ecosystem requires the joint efforts of all parties in the industry. Under the guidance of Academician Fang Binxing, “Information Technology and Network Security” is becoming an important platform for information dissemination in China’s information security field. It is hoped that this interview will allow the industry to deepen Understand the technological development trends and directions in the field of network security, and make better contributions to the cause of national network security.

Welcome to the public account of “Information Technology and Network Security”

The Links:   LB104S01-TL05 PAF600F24-28T