skip to main content
10.1145/3672919.3672932acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsaideConference Proceedingsconference-collections
research-article

Survey of cyberspace surveying and mapping

Published: 24 July 2024 Publication History

Abstract

Cyberspace surveying and mapping is a method of observing, measuring, analyzing, and visualizing cyberspace, aimed at revealing the structure, content, behaviors, and characteristics of networks, providing support and guidance for network planning, security management, and decision-making. Firstly, the research background, significance, and historical development of cyberspace surveying and mapping were introduced. The key technologies of the detecting layer, mapping layer, and drawing layer in cyberspace surveying and mapping were summarized, including resource scanning, component recognition, landmark mining, entity positioning, data visualization, topology visualization, etc. Finally, based on the above research, the current challenges and the future development direction faced by cyberspace surveying and mapping were pointed out.

References

[1]
Krämer, N. C., Neubaum, G. and Eimler, S. C. 2017. A brief history of (social) cyberspace. Cyberemotions: Collective emotions in cyberspace, 11-35.
[2]
Qing, C., Han, L., Yuejin, D. and Yirong, Z. 2021. Practice and thinking of cyberspace surveying and mapping technology. Information and Communications Technology and Policy, 47(8), 30.
[3]
Zhao, F., Luo, X. and Liu, F. 2016. Research on cyberspace surveying and mapping technology. Chinese Journal of Network and Information Security, 2(9), 1-11.
[4]
Müller-Maguhn, A., Poitras, L., Rosenbach, M., Sontheimer, M. and Grothoff, C. 2014. Treasure map: the NSA breach of telekom and other German firms. Feedback, 12, 13.
[5]
Rashid, O., Mullins, I., Coulton, P. and Edwards, R. 2006. Extending cyberspace: location based games using cellular phones. Computers in Entertainment (CIE), 4(1), 4-es.
[6]
Wang, J., Zhuang, S., Miao, C. and An C. 2020. Model and application of cyberspace information system. Journal on Communications, 41(02): 74-83.
[7]
Kshetri, N. 2011. Kaspersky Lab: from Russia with anti-virus. Emerald Emerging Markets Case Studies, 1(3), 1-10.
[8]
Zhou, Y., Xu Q., Luo, X., Liu, F., Zhang, L. and Hu, X. 2018. Research on Definition and Technological System of Cyberspace Surveying and Mapping. Computer Science, 45(05): 1-7. (in Chinese)
[9]
Guo, L., Cao, Y., Su, M., Shang, Y., Zhu, Y., Zhang, P. and Zhou, C. 2018. Cyberspace resource mapping: concept and technology[J]. Journal of Information Security, 3(04): 1-14. (in Chinese)
[10]
Sun, W., Jiang, J. and Su, M., 2018. A passive-measurement-guided tree network surveying and mapping model. In 2018 IEEE Third International Conference on Data Science in Cyberspace. Guangzhou. 646-651.
[11]
Gasser, O., Scheitle, Q., Foremski, P., Lone, Q., Korczyński, M., Strowes, S. D., Hendriks L. and Carle, G., 2018. Clusters in the expanse: Understanding and unbiasing IPv6 hitlists. In Proceedings of the Internet Measurement Conference. Boston. 364-378.
[12]
Le, F., Ortiz, J., Verma, D. and Kandlur, D. 2019. Policy-based identification of iot devices’ vendor and type by dns traffic analysis. Policy-Based Autonomic Data Governance, 180-201.
[13]
Jiang, Y., Li, Y. and Sun, Y., 2021. Networked Device Identification: A Survey. In 2021 IEEE Sixth International Conference on Data Science in Cyberspace. Shenzhen. 543-548.
[14]
Miettinen, M., Marchal, S., Hafeez, I., Asokan, N., Sadeghi, A. R. and Tarkoma, S., 2017. Iot sentinel: Automated device-type identification for security enforcement in iot. In 2017 IEEE 37th international conference on distributed computing systems. Atlanta. 2177-2184.
[15]
Donnet, B., and Friedman, T. 2007. Internet topology discovery: a survey. IEEE Communications Surveys and Tutorials, 9(4), 56-69.
[16]
Augustin, B., Friedman, T. and Teixeira, R. 2010. Measuring multipath routing in the internet. IEEE/ACM Transactions on Networking, 19(3), 830-840.
[17]
Dainotti, A., Benson, K., King, A., Claffy, K. C., Kallitsis, M., Glatz, E. and Dimitropoulos, X. 2013. Estimating internet address space usage through passive measurements. ACM SIGCOMM Computer Communication Review, 44(1), 42-49.
[18]
Zamani, H., Dadashkarimi, J., Shakery, A. and Croft, W. B., 2016. Pseudo-relevance feedback based on matrix factorization. In Proceedings of the 25th ACM international on conference on information and knowledge management. Indianapolis. 1483-1492.
[19]
Hu, P., Liu, W., Jiang, W. and Yang, Z. 2014. Latent topic model for audio retrieval. Pattern Recognition, 47(3), 1138-1143.
[20]
Shi, L., Du, J. and Liang, M. 2018. Social network bursty topic discovery based on RNN and topic model. J. Commun., 39(4), 189-198.
[21]
Shi, L., Cheng, G., Xie, S. R. and Xie, G. 2019. A word embedding topic model for topic detection and summary in social networks. Measurement and Control, 52(9-10), 1289-1298.
[22]
Carter, D. 2005. Living in virtual communities: An ethnography of human relationships in cyberspace. Information, Community and Society, 8(2), 148-167.
[23]
Gan, Y., Liu, Y., Zhang, H. and Jia, D., 2020. Network Entity Landmark Mining Technology. In 2020 6th International Symposium on System and Software Reliability. Chengdu. 75-82.
[24]
Zhu, G., Luo, X., Liu, F. and Chen, J., 2015. An algorithm of city-level landmark mining based on internet forum. In 2015 18th International Conference on Network-Based Information Systems. Taipei. 294-301.
[25]
Liu, X., Yang, W., Yin, M., Liu, F. and Yun, C. 2021. Street-level Landmark Mining Algorithm Based on Radar Search. Journal of Internet Technology, 22(2), 283-295.
[26]
Maziku, H., Shetty, S., Han, K. and Rogers, T., 2012. Enhancing the classification accuracy of IP geolocation. In MILCOM 2012-2012 IEEE Military Communications Conference. Orlando. 1-6.
[27]
Dan, O., Parikh, V. and Davison, B. D., 2016. Improving IP geolocation using query logs. In Proceedings of the Ninth ACM International Conference on Web Search and Data Mining. San Francisco. 347-356.
[28]
Zhu B., Tian Z. and Duan W., 2014. A survey on IP geolocation. In 2014 IEEE Workshop on Advanced Research and Technology in Industry Applications. Ottawa. 1039-1041.
[29]
Ding, S., Luo, X., Yin, M., Liu, Y. and Liu, F., 2015. An IP geolocation method based on rich-connected sub-networks. In 2015 17th International Conference on Advanced Communication Technology. PyeongChang. 176-181.
[30]
Kostin, V. and Halounová, L. 2019. An analysis of spatial structure of urban regional networks using GIS. Acta Polytechnica, 59(1), 35-41.
[31]
Taha, K. 2018. Disjoint community detection in networks based on the relative association of members. IEEE Transactions on Computational Social Systems, 5(2), 493-507.
[32]
Zhang, Z., Gong, Y., Wang, K. and Gu, J., 2017. A survey of overlapping community detection based on multi-label propagation. In 2017 12th IEEE Conference on Industrial Electronics and Applications. Siem Reap. 995-999.
[33]
Sarswat, A. and Guddeti, R. M. R., 2018. A novel overlapping community detection using parallel CFM and sequential nash equilibrium. In 2018 10th International Conference on Communication Systems and Networks. Bengaluru 649-654.
[34]
Bhargav, M. and Bhargav, A., 2014. Mining relationships from text in social networking sites. In 2014 International Conference on Control, Instrumentation, Communication and Computational Technologies. Kanyakumari District. 31-35.
[35]
Zhou, L., Varadharajan, V., & Hitchens, M. 2013. Achieving secure role-based access control on encrypted data in cloud storage. IEEE transactions on information forensics and security, 8(12), 1947-1960.
[36]
Liang, W., Yuanyuan, S., Wei, M. and Zhonghua, X., 2020. Research on Topology Model of Power System optimization Based on Greedy Algorithm. In 2020 International Conference on Urban Engineering and Management Science. Zhuhai. 245-250.
[37]
Sluter, C. R., Brandalize, M. C. B., VAN ELZAKKER, C. J. P. and Ivánová, I., 2013. Defining standard symbols for street network maps for urban planning based on user requirements. In Annals of the 26th Cartographic Conference–ICC. Dresden. 231-237.
[38]
Yang, J., Yang, C., Yu, Z. and Zhang, L., 2004. Research on high-performance Web GIS system for map symbol dynamic editing and network publishing. In IGARSS 2004. 2004 IEEE International Geoscience and Remote Sensing Symposium. Anchorage. 2971-2974.

Index Terms

  1. Survey of cyberspace surveying and mapping

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    CSAIDE '24: Proceedings of the 2024 3rd International Conference on Cyber Security, Artificial Intelligence and Digital Economy
    March 2024
    676 pages
    ISBN:9798400718212
    DOI:10.1145/3672919
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 24 July 2024

    Permissions

    Request permissions for this article.

    Check for updates

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    CSAIDE 2024

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 57
      Total Downloads
    • Downloads (Last 12 months)57
    • Downloads (Last 6 weeks)5
    Reflects downloads up to 20 Feb 2025

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media