

World Regional Studies ›› 2025, Vol. 34 ›› Issue (9): 59-72.DOI: 10.3969/j.issn.1004-9479.2025.09.20240431
Previous Articles Next Articles
Received:2024-06-14
Revised:2025-03-18
Online:2025-09-15
Published:2025-09-30
作者简介:孙阳(1988—),男,博士后,研究方向为城市发展与区域规划,E-mail: yangsun.chn@hotmail.com。
基金资助:Yang SUN. Research on the spatial distribution characteristics and influencing factors of global cyber-attack[J]. World Regional Studies, 2025, 34(9): 59-72.
孙阳. 全球网络攻击的空间分布特征与影响因素研究[J]. 世界地理研究, 2025, 34(9): 59-72.
Add to citation manager EndNote|Ris|BibTeX
URL: https://sjdlyj.ecnu.edu.cn/EN/10.3969/j.issn.1004-9479.2025.09.20240431
| 解释变量 | lnCFS为被解释变量 | lnCAF为被解释变量 | ||||||||
|---|---|---|---|---|---|---|---|---|---|---|
| OLS | FE | GMM | FGLS | PCSE | OLS | FE | GMM | FGLS | PCSE | |
| L.logCAF | 1.073*** | 0.521*** | 1.021*** | 0.455*** | 0.512*** | 0.945*** | 0.372*** | 0.617*** | 0.345*** | 0.309*** |
| L.logCFS | -72.580 | 13.320 | 148.74 | -12.920 | -5.750 | -73.120 | -8.250 | -30.980 | -16.72 | -4.15 |
| logGDP | 0.081** | -0.462* | 0.227*** | -0.624*** | -0.487* | 0.0382 | -0.145 | 0.467*** | -0.089 | -0.138 |
| (-2.450) | (-1.920) | (-7.120) | (-7.320) | (-1.850) | (-1.520) | (-0.920) | (-8.320) | (-0.950) | (-0.930) | |
| logGDSB | 0.008 | -0.171 | 0.012*** | -0.169*** | -0.190 | -0.008 | -0.212*** | 0.003** | -0.148*** | -0.178** |
| (-1.020) | (-1.680) | (-22.560) | (-6.070) | (-1.330) | (-1.420) | (-3.070) | (-2.150) | (-4.600) | (-2.690) | |
| logRD | -0.019 8 | 0.126*** | -0.087*** | 0.134*** | 0.121*** | 0.015 2 | 0.009 | 0.025*** | -0.004 | 0.009 |
| (-0.650) | (-3.780) | (-3.850) | (-17.890) | (-3.700) | (-0.770) | (-0.32) | (-3.450) | (-0.940) | (-0.980) | |
| logPOP | 0.045*** | 0.024 5 | 0.096*** | -0.007 | 0.023 | 0.021 5 | 0.008 | 0.035*** | 0.007 | 0.007 |
| (-3.480) | (-1.170) | (-11.230) | (-0.220) | (-1.580) | (-3.100) | (-0.860) | (-9.650) | (-0.790) | (-0.810) | |
| 常数 | -0.415 | 8.111*** | -1.522*** | 10.238*** | 9.517*** | -0.280 | 4.246*** | -2.912*** | 4.681*** | 5.432*** |
| (-1.840) | (-3.100) | (-7.780) | (-11.200) | (-3.120) | (-1.720) | (-2.580) | (-7.520) | (-7.75) | (-3.80) | |
| R² | 0.965 | 0.891 | ― | ― | 0.973 | 0.962 | 0.281 | ― | ― | 0.972 |
| F | 2 654.120 | 98.110 | ― | ― | 2 112.750 | 8.450 | ― | ― | ― | ― |
| WALD | ― | ― | 117 385 | 106 544.300 | 52.920 | ― | ― | 2 393.350 | 60 321.540 | 198 |
| ― | ― | 0 | 0 | 0 | ― | ― | 0 | 0 | 0 | |
| Hansen-J | ― | ― | 31.500 | ― | ― | ― | 30.880 | ― | ― | ― |
| ― | -0.948 | ― | ― | ― | ― | -0.963 | ― | ― | ― | |
| AR(1) | ― | ― | -3.400*** | ― | ― | ― | -4.210*** | ― | ― | ― |
| AR(2) | ― | ― | 1.120 | ― | ― | ― | 1.280 | ― | ― | ― |
Tab.1 Regression analysis of the main factors affecting network attack frequency and network attack intensity
| 解释变量 | lnCFS为被解释变量 | lnCAF为被解释变量 | ||||||||
|---|---|---|---|---|---|---|---|---|---|---|
| OLS | FE | GMM | FGLS | PCSE | OLS | FE | GMM | FGLS | PCSE | |
| L.logCAF | 1.073*** | 0.521*** | 1.021*** | 0.455*** | 0.512*** | 0.945*** | 0.372*** | 0.617*** | 0.345*** | 0.309*** |
| L.logCFS | -72.580 | 13.320 | 148.74 | -12.920 | -5.750 | -73.120 | -8.250 | -30.980 | -16.72 | -4.15 |
| logGDP | 0.081** | -0.462* | 0.227*** | -0.624*** | -0.487* | 0.0382 | -0.145 | 0.467*** | -0.089 | -0.138 |
| (-2.450) | (-1.920) | (-7.120) | (-7.320) | (-1.850) | (-1.520) | (-0.920) | (-8.320) | (-0.950) | (-0.930) | |
| logGDSB | 0.008 | -0.171 | 0.012*** | -0.169*** | -0.190 | -0.008 | -0.212*** | 0.003** | -0.148*** | -0.178** |
| (-1.020) | (-1.680) | (-22.560) | (-6.070) | (-1.330) | (-1.420) | (-3.070) | (-2.150) | (-4.600) | (-2.690) | |
| logRD | -0.019 8 | 0.126*** | -0.087*** | 0.134*** | 0.121*** | 0.015 2 | 0.009 | 0.025*** | -0.004 | 0.009 |
| (-0.650) | (-3.780) | (-3.850) | (-17.890) | (-3.700) | (-0.770) | (-0.32) | (-3.450) | (-0.940) | (-0.980) | |
| logPOP | 0.045*** | 0.024 5 | 0.096*** | -0.007 | 0.023 | 0.021 5 | 0.008 | 0.035*** | 0.007 | 0.007 |
| (-3.480) | (-1.170) | (-11.230) | (-0.220) | (-1.580) | (-3.100) | (-0.860) | (-9.650) | (-0.790) | (-0.810) | |
| 常数 | -0.415 | 8.111*** | -1.522*** | 10.238*** | 9.517*** | -0.280 | 4.246*** | -2.912*** | 4.681*** | 5.432*** |
| (-1.840) | (-3.100) | (-7.780) | (-11.200) | (-3.120) | (-1.720) | (-2.580) | (-7.520) | (-7.75) | (-3.80) | |
| R² | 0.965 | 0.891 | ― | ― | 0.973 | 0.962 | 0.281 | ― | ― | 0.972 |
| F | 2 654.120 | 98.110 | ― | ― | 2 112.750 | 8.450 | ― | ― | ― | ― |
| WALD | ― | ― | 117 385 | 106 544.300 | 52.920 | ― | ― | 2 393.350 | 60 321.540 | 198 |
| ― | ― | 0 | 0 | 0 | ― | ― | 0 | 0 | 0 | |
| Hansen-J | ― | ― | 31.500 | ― | ― | ― | 30.880 | ― | ― | ― |
| ― | -0.948 | ― | ― | ― | ― | -0.963 | ― | ― | ― | |
| AR(1) | ― | ― | -3.400*** | ― | ― | ― | -4.210*** | ― | ― | ― |
| AR(2) | ― | ― | 1.120 | ― | ― | ― | 1.280 | ― | ― | ― |
| [1] | World Economic Forum. Global Risks Report 2022. https://cn.weforum.org/publications/global-risks-report-2022/, 2022-11-10. |
| [2] | COMAN V. The use of cyberattacks during traditional armed conflicts. Specific and the Commitment of State Responsibility. Journal of Law and Public Administration, 2022, 8(15): 35-44. |
| [3] | CYBERSECURITY VENTURES. Cyber Security Report 2022. . |
| [4] | 张自力, 解婷, 李文平."东数西算"成渝枢纽战略分析和示范落地. 大数据, 2023, 9(5): 32-47. |
| ZHANG Z, XIE T, Li W. National computing hub built in Chengdu-Chongqing economic circle boosts China's "Channel Computing Resources from the East to the West" project .Big Data Research, 2023, 9(5): 32-47. | |
| [5] | ZHAO G, XU K, XU L. Detecting APT malware infections based on malicious DNS and traffic analysis. IEEE Access, 2015, 3: 1132-1142. |
| [6] | 李兆中, 甄峰, 秦萧.长三角地区城市国际化水平研究: 基于来华外国人手机国际漫游信令数据. 地理研究, 2021, 40(4): 1025-1041. |
| LI Z, ZHEN F, QIN X. A study on the level of urban internationalization in the Yangtze River Delta: Based on international roaming mobile signaling data of foreigners in China. Geographical Research, 2021, 40(4): 1025-1041. | |
| [7] | DAS R, GÜNDÜZ M. Analysis of cyber-attacks in IoT-based critical infrastructures . International Journal of Information Security Science, 2020, 8(4): 122-133. |
| [8] | CHEN Y, HUANG Z, XU S, et al. Correction: Spatiotemporal patterns and predictability of cyberattacks. Plos One, 2015, 10(6): e0131501. |
| [9] | GARG V, KOSTER T. CAMP L. Cross-country analysis of spambots. Eurasip Information Security, 2013, 1:1-13 |
| [10] | RUGHINIŞ C. Nothing ventured, nothing gained. Profiles of online activity, cyber-crime exposure, and security measures of end-users in European Union. Computers & Security, 2014, 43: 111-125. |
| [11] | BENDOVSCHI A. Cyber-attacks trends, patterns and security countermeasures. Procedia Economics and Finance, 2015, 28: 24-31. |
| [12] | 修文群. 基于GIS的网络犯罪空间管理系统设计. 地理研究, 2006, 25(5): 939-948. |
| XIU W. The design of cybercrime spatial management system based on GIS. Geographical Research, 2006, 25(5): 939-948. | |
| [13] | 张梅, 张祖勋, 张剑清,等.分布式智能公安GIS 设计.吉林大学学报:工学版, 2007, 37(2): 424- 428. |
| ZHANG M, ZHANG Z, ZHANG J,et al. Designing of distributed intelligence GIS used in public security. Journal of Jilin University (Engineering and Technology Edition), 2007, 37(2): 424-428. | |
| [14] | 张龙, 周杨, 施群山, 等.与地理空间紧关联的网络空间地图模型. 信息安全学报, 2018, 3(4):63-72. |
| ZHANG L, ZHOU Y, SHI Q, et al. Cyberspace map tightly coupled with geographical space. Journal of Cyber Security, 2018, 3(4):63-72. | |
| [15] | 关玉军. 浅谈网络犯罪特点及侦查对策. 网络安全技术与应用, 2015(9): 50. |
| GUAN Y. A brief discussion on the characteristics of cyber crime and its investigative countermeasures. Network Security Technology & Application, 2015(9): 50. | |
| [16] | 郭启全, 高春东, 郝蒙蒙, 等. 发展网络空间可视化技术支撑网络安全综合防控体系建设.中国科学院院刊, 2020, 35(7): 917-924. |
| GUO Q, GAO C, HAO M, et al. Develop visualization technology of cyberspace to support construction of comprehensive prevention and control system of cyber security.Bulletin of Chinese Academy of Sciences, 2020, 35(7): 917-924. | |
| [17] | 卓蓉蓉, 李峦峦, 余斌, 等. 21世纪以来西方犯罪地理研究述评.人文地理, 2017, 32(2): 16-22, 36. |
| ZHUO R, LI L, YU B, et al. A review of studies on geography of crime in western countries since 2000. Human Geography, 2017, 32(2): 16-22, 36. | |
| [18] | 张繁, 谢凡, 江颉. 网络威胁安全数据可视化综述. 网络与信息安全学报, 2018, 4(2):34-39. |
| ZHANG F, XIE F, JIANG J. Survey on the visualization technologies of threatening security data in cyber space. Chinese Journal of Network and Information Security, 2018, 4(2): 34-39. | |
| [19] | 沈逸, 江天骄. 网络空间的攻防平衡与网络威慑的构建. 世界经济与政治, 2018(2): 49-70. |
| SHEN Y, JIANG T. Offense-defense balance in cyberspace and a proposed model of cyber deterrence. World Economics and Politics, 2018(2): 49-70. | |
| [20] | 吴宗柠, 樊瑛. 复杂网络视角下国际贸易研究综述. 电子科技大学学报, 2018, 47(3):469-480. |
| WU Z, FAN Y. Review of international trade: The complex network approach. Journal of University of Electronic Science and Technology of China, 2018, 47(3): 469-480. | |
| [21] | 罗桑扎西, 甄峰, 张姗琪. 复杂网络视角下的城市人流空间概念模型与研究框架. 地理研究, 2021, 40(4): 1195-1208. |
| LUO S, ZHEN F, ZHANG S. A conceptual model and methodological framework for examining urban people flow space based on complex network perspective. Geographical Research, 2021, 40(4): 1195-1208. | |
| [22] | 方叶林, 苏雪晴, 黄震方, 等. 中国东部沿海五大城市群旅游流网络的结构特征及其韧性评估: 基于演化韧性的视角. 经济地理, 2022, 42(2): 203-211. |
| FANG Y, SU X, HUANG Z, et al. Structural characteristics and resilience evaluation of tourism flow networks in five major urban agglomerations in coastal China: From the perspective of evolutionary resilience. Economic Geography, 2022, 42(2): 203-211. | |
| [23] | 朱晓杰. 国家战略叠加下区域发展的空间关联及影响因素. 区域经济评论, 2023(2):120-127. |
| ZHU X. Spatial correlation and influencing factors of regional development under the superposition of national strategies.Regional Economic Review, 2023(2):120-127. | |
| [24] | 陈晨, 杨辰, 贾正哲. 基于跨国电视媒体视角的全球城市文化网络研究.国际城市规划, 2022, 37(1):70-77. |
| CHEN C, YANG C, JIA Z. Study on cultural network of global cities from the perspective of multinational TV media. Urban Planning International, 2022, 37(1):70-77. | |
| [25] | 徐漪, 沈建峰. 网络空间的治理及其演化方向. 产业与科技论坛,2018, 17(11):8-10. |
| XU Y, SHEN J. Governance of cyberspace and its evolution .Industrial & Science Tribune, 2018, 17(11):8-10. | |
| [26] | 韩梦瑶, 熊焦, 刘卫东. 中国光伏发电的时空分布、竞争格局及减排效益. 自然资源学报, 2022, 37(5): 1338-1351. |
| HAN M, XIONG J, LIU W. Spatio-temporal distribution, competitive development and emission reduction of China's photovoltaic power generation. Journal of Natural Resources, 2022, 37(5): 1338-1351. | |
| [27] | 杜人淮.新时代优化国防科技工业布局研究.南京政治学院学报,2020, 36(1):17-22. |
| DU R. Research on optimizing the layout of national defense science and technology industry in the new era. Front of Thought and Theory, 2020, 36(1):17-22. | |
| [28] | 陶锋, 杨文婷, 孙大卫. 地方产业集群、全球生产网络与企业生产率: 基于双重网络嵌入视角.国际经贸探索, 2018, 34(5): 19-34. |
| TAO F, YANG W, SUN D. Local industrial cluster,global production network and enterprise productivity: From the perspective of double network embeddedness. International Economics and Trade Research, 2018, 34(5): 19-34. | |
| [29] | 蒋海兵, 李业锦. 京津冀地区制造业空间格局演化及其驱动因素. 地理科学进展, 2021, 40(5): 721-735. |
| JIANG H, LI Y. Change of spatial structure of manufacturing industry in the Beijing-Tianjin-Hebei region and its driving factors. Progress in Geography, 2021, 40(5): 721-735 |
| Viewed | ||||||
|
Full text |
|
|||||
|
Abstract |
|
|||||
