Active cybersecurity: vision, model, and key technologies
Xiaosong ZHANG , Yukun ZHU , Xiong LI , Yongzhao ZHANG , Weina NIU , Fenghua XU , Junpeng HE , Ran YAN , Shiping HUANG
Front. Inform. Technol. Electron. Eng ›› 2025, Vol. 26 ›› Issue (8) : 1243 -1278.
Active cybersecurity: vision, model, and key technologies
Noncooperative computer systems and network confrontation present a core challenge in cyberspace security. Traditional cybersecurity technologies predominantly rely on passive response mechanisms, which exhibit significant limitations when addressing real-world complex and unknown threats. This paper introduces the concept of “active cybersecurity,” aiming to enhance network security not only through technical measures but also by leveraging strategy-level defenses. The core assumption of this concept is that attackers and defenders, in the context of network confrontations, act as rational decision-makers seeking to maximize their respective objectives. Building on this observation, this paper integrates game theory to analyze the interdependent relationships between attackers and defenders, thereby optimizing their strategies. Guided by this foundational idea, we propose an active cybersecurity model involving intelligent threat sensing, in-depth behavior analysis, comprehensive path profiling, and dynamic countermeasures, termed SAPC, designed to foster an integrated defense capability encompassing threat perception, analysis, tracing, and response. At its core, SAPC incorporates theoretical analyses of adversarial behavior and the optimization of corresponding strategies informed by game theory. By profiling adversaries and modeling confrontation as a “game,” the model establishes a comprehensive framework that provides both theoretical insights into and practical guidance for cybersecurity. The proposed active cybersecurity model marks a transformative shift from passive defense to proactive perception and confrontation. It facilitates the evolution of cybersecurity technologies toward a new paradigm characterized by active prediction, prevention, and strategic guidance.
Active cybersecurity / Intelligent threat sensing / In-depth behavior analysis / Comprehensive path profiling / Dynamic countermeasures
Zhejiang University Press
/
| 〈 |
|
〉 |