Current location - Education and Training Encyclopedia - Graduation thesis - On the forms and characteristics of current world local wars
On the forms and characteristics of current world local wars
The "nerve center" of war has great influence.

In the information age, the tentacles of the network extend to every corner of society and are everywhere, and the network has become the foundation for the survival and development of human society. As a part of social activities, military activities are branded with the network. Any of the most advanced technologies of mankind is first applied to the military field, and the battlefield Internet has become the military epitome of the Internet. The network has brought two changes to the war: one is "integration"; The second is "expansion". In terms of integration, the network integrates multi-dimensional battlefield spaces such as land, sea, air, sky and electricity; Combine the combat system forces of various services and arms into one. In terms of "expansion", the network extends the combat space and leads the battle to the invisible network field and a broader space.

The influence of network on war is revolutionary. First, the networking of the battlefield has disrupted the past programmed warfare, making the war tend to be dynamic and nonlinear, and the battlefield situation is more complicated and changeable; Second, it improves operational efficiency, cooperates with multidimensional battlefield space operations, and realizes comprehensive strike efficiency; The third is destructive. Once the network is "broken", the consequences are unimaginable. Not only does the state machine fail to operate, such as the stock market stops trading, traffic and communication are interrupted, and war is difficult to carry out.

The vulnerability of attacking "hidden diversity" is very high.

Cyber attacks are "multiple". By intercepting, tampering, controlling, destroying and misusing enemy information, the enemy information system is destroyed, making it lose its combat capability. At the same time, it can also realize the integration of military and civilian operations. In order to reduce investment, enjoy information and increase circuitous routes, "military network" and "civilian network" are increasingly integrated. The second is "concealment". Network attacks use various means to fool the detection of the enemy's "firewall" or find "network loopholes", secretly enter the enemy's network, and then carry out attacks. Or, in peacetime, sell computers with secret "back doors" or set up "chip traps" for use in preparation for war.

It is precisely because of the concealment, diversity and illegibility of network attack means that network defense becomes very difficult. Moreover, if a node in the network system is breached, it can quickly expand and spread to the whole network, which will have a disastrous impact on the enemy network system.

"Congenital deficiency" cannot be prevented.

In the field of network attack and defense, technically speaking, network attack is easier than network defense. In other words, network defense lags behind network attacks, and no defense technology can always be in the leading position in network defense; Only after the emergence of new network attack means can we seek corresponding defense measures. As foreign information experts said: "No matter how many locks there are in the military information system of modern developed countries, there will always be people trying to invade." Therefore, no matter whether the information is developed or not, as long as you have certain cyber attack ability, you can effectively curb the deterrence of information-developed countries. Due to the "congenital deficiency" of network defense, network defense attacks each other.

Security has a long way to go.

Due to the "hidden diversity" of cyber attacks, the "congenital deficiency" of cyber defense and the openness of the network, all countries attach great importance to their own cyber security and invest a lot of manpower and material resources to compete for the initiative of cyber warfare. First, independently develop "hardware" and "software" to avoid being controlled by others. In the long run, in order to avoid being controlled by others in the future cyber war and ensure the victory of the future cyber war, we must develop our own independent information industry and develop our own security products. The second is to do a good job in training network talents. This is one of the foundations of network security. Without understanding network technology, network security is out of the question. The third is to strengthen the development of new network security products, invest capital and technical strength, and strengthen the development of new network security products.

At present, the US Air Force has developed the "Pioneer Network Deception" system, which consists of two sets of defense systems, namely, virtual network and network deception system. Use the virtual network as a trap to induce the enemy to attack and profit from it. Network deception system increases the reliability of network security with deep structure. It can not only detect hackers, but also let the system monitor track their actions and finally let them fall into a trap. It is said that this will become a new weapon to subdue internal and external intruders in cyber warfare.