Cyber Potential Metaphorical Map Method Based on GMap
Abstract
:1. Introduction
2. Research Approach
3. Materials and Methods
3.1. Graph Embedding in Cyberspace Data
Algorithm 1: AS Connection Data Graph Embedding |
Input: AS connection graph G (V, E) |
Window size ω |
Output dimension d |
Number of paths starting from each node γ |
Length of each path t |
Output: Matrix representing hidden information Φ ∈ R∣V∣ × d |
1. Randomly initialize Φ. |
2. Construct hierarchical softmax. |
3. Perform γ random walks for each node. |
4. Shuffle the nodes in the network. |
5. Generate random walks of length t starting from each node. |
6. Update parameters using the skip-gram model with gradient methods based on the generated random walks. |
3.2. Cyberspace Graph Clustering Algorithm
3.2.1. Country AS Clustering Based on k-Means
3.2.2. National Node Modularity Optimization Algorithm
3.3. Spatial Layout Algorithm of Comprehensive Cyber Potential Indicators
3.3.1. Construction of the Cyber Potential Indicator System
3.3.2. Force-Directed National Cyber Potential Map Layout
4. Experiment and Discussion
4.1. Experiment Data
- (1)
- Cyberspace connection data
- ➢
- IP. The IP version used in this study was IPv6. The study focused on the actual usage and connectivity of these addresses rather than their mere allocation. Changes in the number of IP addresses indicate the development status of cyberspace and the region’s competitiveness in the global digital landscape [49].
- ➢
- AS. It is a collection of one or more networks that are centrally managed and controlled by a single governing entity. Each AS usually has an independent routing policy and can autonomously decide how to exchange data with other ASs. An AS communicates and routes with other AS systems through the Border Gateway Protocol (BGP) [50]. The experiment utilized AS connectivity data, which consists of 6842 entries representing the AS connectivity across various countries.
- ➢
- DNS. It is responsible for converting domain names into corresponding IP addresses. A higher number of DNS servers means that a country or organization can build a more robust and efficient domain name resolution infrastructure [51].
- ➢
- Domain Names. It is a human-readable address used to identify resources on the internet. It serves as a convenient substitute for IP addresses, allowing users to access websites and online services more easily. The registration and management of domain names are governed by various domain registries, and the availability of domain names reflects the level of digital infrastructure and online presence in a region. A larger number of registered domain names indicates a more active and established presence in the global digital economy
- (2)
- Data on national cyber power
- ➢
- Internet Penetration. The expansion of internet penetration directly influences a country’s prominence in global cyberspace. Greater internet access enables a larger portion of the population to connect to information networks, thereby facilitating the flow of information and social interaction. This, in turn, bolsters the nation’s digital economy and cultural dissemination. As internet penetration increases, so does the country’s influence and voice within the global cyberspace system.
- ➢
- Secure Internet Servers. A robust presence of secure internet servers strengthens a country’s cybersecurity defenses, minimizing the risk of data breaches and cyberattacks. Countries with advanced cybersecurity technologies and effective defense measures can enhance their standing in global cyber governance. Secure servers not only safeguard national data but also foster trust in the country’s cyber capabilities, thereby promoting international cooperation.
- ➢
- CVE Vulnerabilities. Cyber vulnerabilities pose significant risks to a country’s cyber power. When national information systems are riddled with vulnerabilities, they become potential targets for hackers, leading to data breaches and system disruptions. An increased number of vulnerabilities weakens a country’s cyber defenses, undermining its international reputation and trust in cybersecurity. This, in turn, can diminish its influence in global cyber affairs. The experiment utilized CVE vulnerability data, including 302 vulnerabilities that reflect the security flaws identified in each country. CVE refers to security vulnerabilities identified and managed by the globally standardized CVE numbering system, with each vulnerability assigned a unique number [52].
- ➢
- GDP. Countries with higher GDP typically have greater resources to allocate toward information technology and cyberspace infrastructure. Such nations can invest more in strengthening cybersecurity, improving infrastructure, and driving digital transformation, thereby enhancing their position in the global digital economy. The stronger a country’s economic power, the greater its influence in global cyber governance and digital competition.
4.2. Visualizations of Cybers Potential Metaphor Map
4.3. Experimental Analysis
4.3.1. Analysis of Cyberspace Sphere of Influence and Links
4.3.2. Thematic Information Expression Based on the Cyber Potential Map
5. Conclusions and Prospects
5.1. Conclusions
5.2. Prospects
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Zhang, L.; Wang, G.X.; You, X.; Liu, Z.; Ma, L.; Tian, J.; Su, M. Research on the cyberspace map and its conceptual model. ISPRS Int. J. Geo-Inf. 2023, 12, 353. [Google Scholar] [CrossRef]
- Tsou, M.H. Mapping cyberspace: Tracking the spread of ideas on the Internet. In Proceedings of the 25th International Cartographic Conference, Paris, France, 3–8 July 2011. [Google Scholar]
- Tsou, M.H.; Kim, I.H.; Wandersee, S.; Lusher, D.; An, L.; Spitzberg, B.; Gupta, D.; Gawron, J.M.; Smith, J.; Yang, J.A.; et al. Mapping ideas from cyberspace to realspace: Visualizing the spatial context of keywords from web page search results. Int. J. Digit. Earth 2014, 7, 316–335. [Google Scholar] [CrossRef]
- Han, S.Y.; Tsou, M.H.; Clarke, K.C. Revisiting the death of geography in the era of Big Data: The friction of distance in cyberspace and real space. Int. J. Digit. Earth 2018, 11, 451–469. [Google Scholar] [CrossRef]
- Yang, J.A.; Tsou, M.H.; Spitzberg, B.; An, L.; Gawron, J.M.; Gupta, D. Mapping spatial information landscape in cyberspace with social media. In CyberGIS for Geospatial Discovery and Innovation; Springer: Berlin/Heidelberg, Germany, 2019; pp. 71–86. [Google Scholar] [CrossRef]
- Wu, A.X.; Taneja, H. Reimagining internet geographies: A user-centric ethnological mapping of the World Wide Web. J. Comput. Mediated Commun. 2016, 21, 230–246. [Google Scholar] [CrossRef]
- Lu, Z.; Chi, F.; Wang, R.; Han, B.; Wu, S.F.; Han, R.L. Comparison of realistic geo-space and virtual cyberspace in China. Sci. Geogr. Sin. 2008, 5, 601–606. [Google Scholar]
- The Internet Map. Available online: http://internet-map.net/ (accessed on 21 May 2024).
- Holmquist, L.E.; Fagrell, H.; Busso, R. Navigating cyberspace with cybergeo maps. In Proceedings of the IRIS, Sæby, Denmark, 8–11 August 1998; Volume 21. [Google Scholar]
- Chen, S.; Li, S.H.; Chen, S.M.; Yuan, X. R-map: A map metaphor for visualizing information reposting process in social media. IEEE Trans. Vis. Comput. Graph. 2020, 26, 1204–1214. [Google Scholar] [CrossRef] [PubMed]
- Wise, J.A.; Thomas, J.J.; Pennock, K.; Lantrip, D.; Pottier, M.; Schur, A.; Crow, V. Visualizing the non-visual: Spatial analysis and interaction with information from text documents. In Proceedings of the Visualization 1995 Conference, Atlanta, GA, USA, 29 October–3 November 1995; IEEE Publications: New York, NY, USA, 2009; pp. 51–58. [Google Scholar] [CrossRef]
- Xin, R.; Ai, T.H.; He, Y.K. Visualisation and analysis of nonspatial hierarchical data of gasper map. Acta Geod. Cartogr. Sin. 2017, 46, 2006–2015. [Google Scholar] [CrossRef]
- Liu, W.; Liu, G.; Fu, Z. Nonlinear least squares phase unwrapping based on topographic slopes. Geogr. Inf. Sci. 2013, 15, 137–143. [Google Scholar] [CrossRef]
- Qi, K.; Zhang, H.; Zhou, Y.; Liu, Y.F.; Li, Q.X. Metaphor representation of resource nodes in cyberspace based on local Moran index and PageRank algorithm. Geogr. Inf. Sci. 2024, 26, 1283–1295. [Google Scholar]
- Voo, J.; Hemani, I.; Cassidy, D. National Cyber Power Index; Belfer Center for Science and International Affairs, Harvard University: Cambridge, MA, USA, 2022. [Google Scholar]
- Global Cybersecurity Index; International Telecommunication Union: Geneva, Switzerland, 2021.
- Network Readiness Index; Potomac Institute for Policy Studies: Arlington, VA, USA, 2015.
- Cyber Power Index; Economist Intelligence Unit, Booz Allen Hamilton: Chicago, IL, USA, 2011.
- Teoh, C.S.; Mahmood, A.K. National cyber security strategies for digital economy. In Proceedings of the 2017 International Conference on Research and Innovation in Information Systems (ICRIIS), Langkawi, Malaysia, 16–17 July 2017; pp. 1–6. [Google Scholar]
- Su, C. Study on International Law of Cyberspace Governance. Ph.D. Thesis, Heilongjiang University, Harbin, China, 2021. [Google Scholar]
- Leetaru, K.; Wang, S.; Cao, G.; Padmanabhan, A.; Shook, E. Mapping the global Twitter heartbeat: The geography of Twitter. First Monday 2013, 8. [Google Scholar] [CrossRef]
- Hu, Z.L. Metaphor and Cognition; Peking University Press: Beijing, China, 2004. [Google Scholar]
- Lakoff, G. Women, Fire, and Dangerous Things: What Categories Reveal About the Mind; University of Chicago Press: Chicago, IL, USA, 2008. [Google Scholar]
- Ventalon, G.; Erjavec, G.; Tijus, C. Processing visual metaphors in advertising: An exploratory study of cognitive abilities. J. Cogn. Psychol. 2020, 32, 816–826. [Google Scholar] [CrossRef]
- Su, S.L.; Wang, L.Q.; Du, Q.Y.; Zhang, J.Y.; Kang, M.J.; Weng, M. Fundamental theoretical issues of metaphorical map. Geogr. Inf. Sci. 2024, 72–84. [Google Scholar]
- Wu, C.; Chen, M.; Zhou, L.; Liang, X.; Wang, W. Identifying the spatiotemporal patterns of traditional villages in China: A multiscale perspective. Land 2020, 9, 449. [Google Scholar] [CrossRef]
- Li, A. Study on Combination and Transfer Between High-Speed Railway and Urban Rail Transit. Ph.D. Thesis, Beijing Jiaotong University, Beijing, China, 2011. [Google Scholar]
- Zhang, L.; Wang, G.X.; Jiang, B.C.; Zhang, L.T.; Ma, L. A review of visualization methods of cyberspace map. Geom. Inf. Sci. Wuhan. Univ. 2022, 47, 2113–2122. [Google Scholar] [CrossRef]
- Gansner, E.R.; Hu, Y.; Kobourov, S.G. GMap: Drawing graphs as maps. In Proceedings of the Graph. Drawing: 17th International Symposium, GD 2009, Chicago, IL, USA, 22–25 September 2009; Revised Papers 17. Springer: Berlin/Heidelberg, Germany, 2010; pp. 405–407. [Google Scholar]
- Gansner, E.R.; Hu, Y.; Kobourov, S. GMap: Visualizing graphs and clusters as maps. In Proceedings of the IEEE Pacific Visualization Symposium (PacificVis), Taipei, Taiwan, 2–5 March 2010; IEEE Publications. Volume 2010, pp. 201–208. [Google Scholar] [CrossRef]
- Kobourov, S.G.; Pupyrev, S.; Simonetto, P. Visualizing graphs as maps with contiguous regions. In Proceedings of the Eurovis 2014 Conference (Short Papers), Wales, UK, 9–13 June 2014. [Google Scholar]
- Mashima, D.; Kobourov, S.G.; Hu, Y. Visualizing dynamic data with maps. IEEE Trans. Vis. Comput. Graph. 2012, 18, 1424–1437. [Google Scholar] [CrossRef]
- Miller, J.; Kobourov, S.; Huroyan, V. Browser-based hyperbolic visualization of graphs. In Proceedings of the 15th Pacific Visualization Symposium (PacificVis), Tsukuba, Japan, 11–14 April 2022; IEEE Publications. Volume 2022, pp. 71–80. [Google Scholar] [CrossRef]
- Goyal, P.; Ferrara, E. Graph embedding techniques, applications, and performance: A survey. Knowl. Based Syst. 2018, 151, 78–94. [Google Scholar] [CrossRef]
- Perozzi, B.; Al-Rfou, R.; Skiena, S. DeepWalk: Online learning of social representations. In Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, New York, NY, USA, 24–27 August 2014; pp. 701–710. [Google Scholar] [CrossRef]
- Grover, A.; Leskovec, J. node2vec: Scalable feature learning for networks. In Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Francisco, CA, USA, 13–17 August 2016; pp. 855–864. [Google Scholar] [CrossRef]
- MacQueen, J. Some methods for classification and analysis of multivariate observations. In Proceedings of the Fifth Berkeley Symposium on Mathematical Statistics and Probability, Los Angeles, CA, USA, 27 December–7 January 1966; Volume 1, pp. 281–297. [Google Scholar]
- Newman, M.E.J. Fast algorithm for detecting community structure in networks. Phys. Rev. E Stat. Nonlin Soft Matter Phys. 2004, 69, 066133. [Google Scholar] [CrossRef]
- Newman ME, J. Modularity and community structure in networks. Proc. Natl. Acad. Sci. USA 2006, 103, 8577–8582. [Google Scholar] [CrossRef]
- DayDayMap. Available online: https://www.daydaymap.com/home/ (accessed on 21 December 2024).
- Wang, Z.Y. Discussion on the Interaction Between Geo-Potential and Bilateral Relations—Take China and the United States INTHE 10 ASEAN Countries as an Example. Ph.D. Thesis, Yunnan Normal University, Kunming, China, 2021. [Google Scholar]
- Sun, H.J. On division of weight and weighting approach. J. Dongbei Univ. Fin. Econ. 2009, 4, 3–7. [Google Scholar]
- Wang, X.M. Analysis of Geo-Potential on Countries Involved in the South China Sea Disputes. Ph.D. Thesis, Liaoning Normal University, Dalian, China, 2015. [Google Scholar]
- Altman, E.I. Financial ratios, discriminant analysis and the prediction of corporate bankruptcy. J. Fin. 1968, 23, 589–609. [Google Scholar] [CrossRef]
- Fruchterman, T.M.J.; Reingold, E.M. Graph drawing by force-directed placement. Softw. Pract. Exp. 1991, 21, 1129–1164. [Google Scholar] [CrossRef]
- Global National and Regional IP Address Segments. Available online: http://ipblock.chacuo.net/ (accessed on 21 May 2024).
- Index Mundi. Available online: https://www.indexmundi.com/ (accessed on 21 May 2024).
- International Bank for Reconstruction and Development. Available online: https://www.worldbank.org/ (accessed on 21 December 2024).
- Hinden, R.; Haberman, B. Unique Local IPv6 Unicast Addresses; No.RFC4193. 2005. Available online: https://www.rfc-editor.org/rfc/rfc4193.html (accessed on 21 December 2024).
- Gao, L. On inferring autonomous system relationships in the Internet. IEEE/ACM Trans. Netw. 2001, 9, 733–745. [Google Scholar]
- Liu, C.; Albitz, P. DNS and Bind; O’Reilly Media, Inc.: Newton, MA, USA, 2006. [Google Scholar]
- MITRE Corporation. CVE—Common Vulnerabilities and Exposure. Available online: https://cve.org/ (accessed on 24 December 2024).
Key Factor | Indicators |
---|---|
Cyberspace technical strength | Number of national IPs and ASN quantities. |
Cyberspace security capability | Number of vulnerabilities in the national cyberspace. |
International cooperation and diplomacy | Number of AS connections in the country. |
Economic strength | Gross domestic product (GDP), trade volume, and foreign exchange reserves. |
Military strength | Number of armed forces personnel and military expenditure as a percentage of GDP. |
Population size | Population size. |
Technological level | Number of scientific journal articles, patent applications, education penetration rate, and high-tech industry export value. |
Primary Index | Weight | Secondary Index | Weight |
---|---|---|---|
Cyberspace Strength | 0.7 | IP number | 0.55 |
AS (indicates the number of autonomous domains) | 0.06 | ||
Number of DNS servers | 0.04 | ||
Number of domain names | 0.15 | ||
Internet penetration | 0.11 | ||
Number of secure Internet servers | 0.05 | ||
Number of vulnerabilities | 0.04 | ||
Overall Strength | 0.3 | GDP | 0.73 |
Land area | 0.27 |
Index | Unit | Time |
---|---|---|
IP | Pcs | 2023 |
AS | Pcs | 2023 |
DNS Servers | Pcs | 2023 |
Domain Names | Pcs | 2023 |
Internet Penetration | Percentage | 2021 |
Secure Internet Servers | Per million people | 2020 |
CVE Vulnerabilities | Pcs | 2023 |
GDP | Millions of dollars | 2022 |
Land Area | Square kilometer | 2023 |
Country | Abbreviation | National Power Index |
---|---|---|
United States | US | 0.84 |
China | CN | 0.47 |
Russia | RU | 0.24 |
Germany | DE | 0.23 |
United Kingdom | GB | 0.21 |
Brazil | BR | 0.18 |
Canada | CA | 0.18 |
Japan | JP | 0.17 |
Australia | AU | 0.16 |
France | FR | 0.14 |
Ranking | Cyberspace Comprehensive Strength | NCPI Ranking |
---|---|---|
1 | United States | United States |
2 | China | China |
3 | Russia | Russia |
4 | Germany | United Kingdom |
5 | United Kingdom | Australia |
6 | Brazil | Netherlands |
7 | Canada | Korea |
8 | Japan | Vietnam |
9 | Australia | France |
10 | France | Iran |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Published by MDPI on behalf of the International Society for Photogrammetry and Remote Sensing. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Si, D.; Jiang, B.; Xia, Q.; Li, T.; Wang, X.; Liu, J. Cyber Potential Metaphorical Map Method Based on GMap. ISPRS Int. J. Geo-Inf. 2025, 14, 46. https://doi.org/10.3390/ijgi14020046
Si D, Jiang B, Xia Q, Li T, Wang X, Liu J. Cyber Potential Metaphorical Map Method Based on GMap. ISPRS International Journal of Geo-Information. 2025; 14(2):46. https://doi.org/10.3390/ijgi14020046
Chicago/Turabian StyleSi, Dongyu, Bingchuan Jiang, Qing Xia, Tingting Li, Xiao Wang, and Jingxu Liu. 2025. "Cyber Potential Metaphorical Map Method Based on GMap" ISPRS International Journal of Geo-Information 14, no. 2: 46. https://doi.org/10.3390/ijgi14020046
APA StyleSi, D., Jiang, B., Xia, Q., Li, T., Wang, X., & Liu, J. (2025). Cyber Potential Metaphorical Map Method Based on GMap. ISPRS International Journal of Geo-Information, 14(2), 46. https://doi.org/10.3390/ijgi14020046