Virtual Geo-Cyber Environments Metaphorical Visualization of Virtual Cyberspace With Geographical Knowledge
Virtual Geo-Cyber Environments Metaphorical Visualization of Virtual Cyberspace With Geographical Knowledge
Bingchuan Jiang, Xiong You, Ke Li, Tingting Li, Xiao Wang & Dongyu Si
To cite this article: Bingchuan Jiang, Xiong You, Ke Li, Tingting Li, Xiao Wang & Dongyu Si
(2024) Virtual geo-cyber environments: metaphorical visualization of virtual cyberspace
with geographical knowledge, International Journal of Digital Earth, 17:1, 2324959, DOI:
10.1080/17538947.2024.2324959
RESEARCH LETTER
1. Introduction
Cyberspace, a manmade space built on an information and communication technology (ICT) infra-
structure, (Fang 2018) encompasses the physical space, virtual information space, and knowledge
space, thereby providing support for various activities associated with ICT. Most existing studies
focus on constructing a system for visualizing and expressing cyberspace, emphasizing its connec-
tion and mapping with the geographic space. Cyberspace has gradually emerged as a critical con-
cern for national economic production, military warfare, and national defense security. At present,
various fields are dedicated to modeling, simulating, analyzing, and depicting the complex cyber-
space (Gao et al. 2019; Mohebbi et al. 2020). However, a considerable gap exists between the intan-
gible, intricate, and dynamic nature of cyberspace and its effective expression. This can be primarily
attributed to the limited detection of cyberspace resources and the insufficient description and
(1) Lack of fundamental research on the constituent elements of the network space environment:
As the cyberspace is a relatively unfamiliar space, it may be challenging to understand what it
entails and specifically includes.
(2) Insufficient research on modeling and representation of the network space environment:
Expressing and comprehending sentiment analysis, e-commerce, network security, and social
networks using fixed patterns remain challenging.
(3) Reliance of the research on network-space representation on mapping network-space elements
onto geographic space: The network space environment is portrayed by designing map symbols
INTERNATIONAL JOURNAL OF DIGITAL EARTH 3
and mapping techniques. However, several virtual assets in a network space do not contain pre-
cise geographical locations, rendering it difficult to directly represent them on a map. There-
fore, new approaches are required to create unified virtual environments.
(4) Lack of unified expression for the geographic network relationship: As networks and geo-
graphic spaces are intricately related, a unified modeling and representation approach is
required to accurately describe and analyze the relationship and patterns of the ‘human-
place-network’ phenomenon.
Virtual geo-cyber environments (VGCEs) are based on collaborative cyberspace, the Internet of
Things (IoT), and ICT, enabling users to engage in ‘human-in-the-loop’ experiences. VGCEs con-
nect virtual cyberspace with physical geographic space and harmonize reality and virtual spaces,
focusing on human cognition to correlate, process, and share geographic and cyberspace data.
In this study, VGEs, metaphor theory, knowledge graphs, and 3D DE are integrated to construct
a VGCE, which serves as a platform for perceiving, navigating, analyzing, and predicting cyberspace
environments. The contributions of this study can be summarized as follows.
(1) A framework is proposed for modeling and expressing the correlation between physical geo-
graphic space and cyberspace based on the cognitive demands of cyberspace considering the
theories of VGEs and systems science.
(2) A complex knowledge-graph construction method is introduced based on the ‘Object-Virtua-
lObject-Process-Decision’ (OVPD) layer model for cyberspace. Cyberspace is divided into four
layers and represented as a unified complex knowledge graph using the entity-relationship
logic.
(3) A mapping and expression method is presented for the geo-cyber relationship based on meta-
phor theory, enabling the visualization of geographic knowledge constraints within the virtual
cyberspace. Owing to their highly dynamic and boundless nature, the virtual and process
resource layers of cyberspace are intricately connected with, but not limited to, the geographic
space.
2. Methods
2.1. Overall framework
As illustrated in Figure 1, geographic space achieves the modeling, simulation, and visual represen-
tation of VGEs via the process of ‘geographic space detection → geographic scene digitalization →
geographic scene simulation.’ Related theories and technological systems in this field are relatively
mature and are widely applied in digital cities, geographic environment cognition, virtual geo-
graphic experiments, and autonomous driving.
The extensive research on cyberspace surveying and mapping has led to the establishment of a
technological system encompassing ‘cyberspace detection → cyberspace resources → cyberspace
modeling and expression.’ This system is applied to enhance cyberspace cognition, analyze patterns
of cyberspace behavior, and optimize resource utilization.
The knowledge, approaches, and mature techniques derived from geographic space provide
valuable insights for modeling, understanding, and representing cyberspace. Bridging the gap
between the physical and virtual realms we can offer a more comprehensive understanding of
the interconnectedness and interdependencies between these two spaces.
The important aspects of the framework can be summarized as follows:
(1) Cyberspace surveying encompasses various technologies, such as topology detection, com-
ponent recognition, and analysis of text, audio, video, and websites. It can be broadly categor-
ized into detection channels, platform technology, detection technology, and analysis of
4 B. JIANG ET AL.
Figure 1. Basic framework for modeling and expressing the spatial correlation mapping of geo-cyber spaces.
detection results. Similar to the geodetic triangulation in geographic space, the location detec-
tion of virtual resources, such as servers and Internet protocol (IP) addresses, involves the cal-
culation of positional distances in the cyberspace detection stage. The coordinates of the other
network nodes can be inferred and determined by leveraging the geographic attributes of the
key node IP servers.
(2) Cyberspace resource mapping involves mapping physical resources to geographic space and
virtual resources, such as virtual network characters and virtual communities, to social
space. Cyberspace and geographic space are intertwined because virtual resources in cyber-
space identify relevant mappings in a geographic space. For instance, servers can be mapped
to geographic locations and virtual characters and role accounts can be mapped to specific
areas. Manually built virtual communities and other cyberspaces, such as servers and IP net-
works, also exhibit intricate connections with geographic space.
(3) Cyberspace modeling encompasses complex network modeling and hierarchical modeling, and
cyberspace expression involves mapping and visualization. The modeling and expression of
cyberspace are inspired by geospatial hierarchical modeling, facilitating the hierarchical
classification of cyberspace elements and phenomena. Additionally, virtual reality (VR) and
augmented reality (AR) can be employed to express the correlation and mapping between
cyberspace and VGEs. This approach is essential for analyzing the behavioral patterns and evol-
ution of cyberspace from a geographical perspective.
(4) Based on metaphor theory, the construction of VGCE enables unified modeling and expression
of geographic space and cyberspace, referred to as the unified expression of geo-cyber. This
facilitates a unified correlation between nature, humanity, and the network, providing an
environment for further research on the ternary relationship between humans, space, and
networks.
(5) In terms of the ‘person-geo-cyber’ collaborative computing, the exchange of energy and infor-
mation flow between ‘person-space,’ ‘person-network,’ and ‘space-network’ has expanded the
scope of geographical research into the realm of network space. Collaborative computing
between humans, space, and the network includes three categories: ‘person-space’ information
INTERNATIONAL JOURNAL OF DIGITAL EARTH 5
This study focuses on the metaphorical representation of geographic cyberspace, the modeling of
the VGCE environment, and foundational applications.
(1) Non-coordinate estimation methods: These methods involve the direct measurement of dis-
tances; examples include the IDMaps (Francis et al. 2001), dynamic distance maps (Theilmann
and Rothermel 1999), and Vivaldi (Dabek et al. 2004).
(2) Coordinate estimation methods: These methods map cyberspace to the Euclidean space, repre-
senting network distances as distances between nodes in the Euclidean space; examples include
the GNP algorithm (Ng and Zhang 2002) and the IDES method (Mao, Saul, and Smith 2006).
(3) Network-distance estimation based on high-precision spatiotemporal information: This
method records the distance between network nodes by measuring the time delays between
them. This involves adding a BeiDou receiver to each router and using unified BeiDou time
synchronization to calculate the network node distances (Liu et al. 2016).
Graph. A graph can be defined as a triple G = (V, E, w), where V = {v1 , v2 , · · · , vN } represents
the set of nodes, E = {e1 , e2 , · · · , eM } indicates the set of edges, and w denotes the mapping from
the edge set to the node set, referred to as the association function. The elements vi of V are the
nodes or vertices, and the elements em of E are the edges. The degree of a node refers to the number
of edges connected to that node; in a directed network, the edges associated with a node are directed
and can be classified as out-degree and in-degree.
Attribute Graph. A graph that assigns certain attributes to each node and edge is referred to as
an attribute graph, in which different nodes or edges exhibit different attribute values. For a node set
V = {v1 , v2 , · · · v|V| }, V is represented as VA = {va1 , va2 , · · · va|V| }, where the node identifier is an
attribute of V. The value domain set of VA is LV = Uva[VA Lva ; the attribute set of a node is
VAi = {vai1 , vai2 , · · · vaip }; and the corresponding attribute set of VAi is
LVi = {Lvai1 , Lvai2 , · · · Lvaip }. The node vi is represented as vi (VAi , LVi ), that is,
vi = vi ((vai1 , Lvai1 ), (vai1 , Lvai2 ), · · · (vaip , Lvaip )). For an edge set E = {e1 , e2 , · · · e|E| } with an
attribute set EA = {ea1 , ea2 , · · · ea|EA| } and node attribute (vi , vj ), the value domain set of EA is
E = Uea[EA Lea . If the edge ek (vi , vj ) has both the node attribute (vi , vj )and the attribute(EAk , LEk ),
6 B. JIANG ET AL.
the edge ek is represented as ek ((vi , vj ), Upl), where pl = (EAkl , LEkl ). The set of edges is represented
as E = Uek ((vi , vj ), Upl), and vi and vj are nodes with the attributes vi (VAi , LVi ) and vj (VAj , LVj ),
respectively. Therefore, the attribute graph is denoted as GA = (V(VA, LV), E(EA, LE)).
In a complex cyberspace knowledge graph, each node and edge possesses unique attributes, and
their importance and relationships within the graph may differ. For instance, backbone nodes rep-
resent highly important and influential nodes in a network. They serve as key connectors and are
critical for information transmission and communication. By contrast, general nodes refer to regu-
lar nodes that, although not as prominent, contribute to connecting and transmitting information
in the network.
By examining the attributes and levels of importance associated with the nodes and edges, we can
gain a deeper understanding of the intricate knowledge of networks in cyberspace. This analysis
helps in understanding the relationships between nodes, the pathways through which information
flows, and the overall structure and functionality of the network.
(1) Physical Resources Layer: This layer encompasses interconnected devices and physical logical
networks that form a network infrastructure. It comprises communication channels, com-
munication facilities, network equipment, electromagnetic devices, and other physical
resources.
(2) Virtual Resources Layer: This layer comprises operating systems, application software, soft-
ware configurations on devices, and logical connections between networked devices. It includes
elements such as IP addresses, operating systems, application software, firewalls, malicious pro-
cesses, various information services, virtual entities, social accounts, network roles, virtual
roles, and virtual information resources, including data and spectrum resources.
(3) Process Resources Layer: This layer involves the activities and patterns of virtual roles within
cyberspace. It encompasses process-related resources, such as cyberspace attacks, defense,
operational and maintenance events, and security-related phenomena.
(4) Decision Control Layer: This layer primarily focuses on decision-making processes within cyber-
space. It encompasses planning, perception, and other control commands, providing authorization
for supervision and initiating, terminating, modifying, or redirecting network operations.
All these layers provide a framework for understanding and categorizing the different elements
within cyberspace, enabling the effective utilization and management of the resources and processes
involved.
As different perspectives lead to different understandings of cyberspace, no consensus exists on
their categorization. Owing to the close connection between cyberspace and physical space, cyber-
space must be viewed from a unified perspective. As indicated in Figure 3, the natural space includes
land, ocean, sky, and outer space, each with different network communication devices. These
devices, such as land-, air-, space-, and sea-based sensors, form the IoT network along with servers,
routers, and IP connections, which constitute the foundational network infrastructure in natural
space. Manmade spaces include political, military, economic, social, infrastructural, and informa-
tional elements. Unlike geographic space, cyberspace cannot be categorized based on spatial
domains; however, it maintains a close relationship with geographic space.
In this study, we focused on modeling and expressing virtual and procedural resource layers.
Although virtual resources, such as IP addresses, autonomous system (AS) connections, and virtual
roles, often lack precise geographical locations, they are dependent on servers or programs and can
reflect real-world social roles. Based on geographic space, we explored the correlation and mapping
of ‘humans-land-network’ by analyzing social networks and online public opinion to reflect human
and societal phenomena and patterns.
Figure 3. Diagram of the interweaving relationship among natural space, cyberspace, and human space.
8 B. JIANG ET AL.
represents the set of relations (including ‘concept-entity,’ ‘entity-entity,’ and ‘entity-property’ relations),
and Property denotes the various attributes of the entity.
An OVPD knowledge cognitive model can be constructed to describe the complex and multiple
relationships within the cyberspace environment. This facilitates the construction of a knowledge
graph for the cyberspace environment based on schema and data layers. The schema layer rep-
resents the concepts and the relationships between them and is divided into four categories, namely,
entities, virtual entities, processes, and decisions. Figure 4 depicts the ontology system, partially
constructed based on this model. Basic classes such as CObject, CVirtualObject, CProcess, and
CDecision are constructed during the implementation, and the relationships between these classes
are established, as shown in Figure 5. Furthermore, entities in a cyberspace environment possess
various properties, (TIME, POS, RGN, STA, ACT), indicating time, position, region, status, and
action. For instance, ‘On xx/xx/20xx, the tower server located at address A is running normally’
can be represented as an attribute graph, as follows: (Towerserver, TIME, xx/xx/20xx) (Towerser-
ver, POS, Address A) (Towerserver, STA, Normal). Figure 6 depicts the OVPD knowledge graph.
The cyberspace environment can be represented as a general graph using a knowledge represen-
tation model (Figure 7). The graph exhibits several key characteristics.
(1) Directed Graph: The graph is directed with edges representing the relationships between enti-
ties. These relationships can be types of attachment (e.g. ‘is-a,’ ‘own,’ ‘act-to,’ and ‘use’), circu-
lation (e.g. ‘link,’ ‘flow-in,’ ‘flow-out,’ and ‘passthrough’), or attribute (e.g. ‘has-time,’ ‘has-pos,’
‘has-rgn,’ and ‘has-state’).
(2) Complex Network Characteristics: The graph exhibits complex network characteristics, where the
importance of nodes can be determined by their in-degree and out-degree within a network.
(3) Complex Attribute Graph: Herein, each node represents a cyberspace entity and is associated
with attribute descriptions. For instance, the entity ‘vulnerability’ may include attributes such
as name, type, CNNVD number, risk level, and release time.
(4) Weighted Edges and Attribute Nodes: Different weights are assigned to edges and attribute
nodes to emphasize the importance of temporal and spatial location information in the attri-
bute properties of various elements within a cyberspace environment. These weights reflect the
significance of node–attribute relationships in entities, virtual entities, processes, and decisions.
Figure 7. Examples of conceptual layers of a complex semantic network for cyberspace environments.
using familiar geographic expressions to metaphorically represent things, events, phenomena, and
their relationships and similarities in non-geographic domains. The metaphorical map is defined as
a spatial text with a synthetic structure generated with a specific intention based on the composition
of map symbols using map language as the carrier. The metaphorical map is used to describe the
network distance (Fabrikant et al. 2004), emotion map (Ma et al. 2020), multi-scale virtual terrain
for hierarchically structured non-location data, and information visualization (Wijayawardena,
Abeysekera, and Maduranga 2023; Xin et al. 2021; Xin, Ai, and Ai 2018), such as distance
model, map projection, feature labeling, and map design (Skupin 2000). Metaphoric maps contrib-
ute to knowledge organization and sharing by matching the ability of humans to perceive space and
environment with the relations linking entities and concepts in the represented domain (Celentano
and Pittarello 2012). Based on the metaphor theory, the cyberspace environment can be represented
as a virtual cyberspace sphere, and the cognitive habits developed in understanding geography can
be applied to understanding cyberspace.
The metaphor mapping of cyberspace includes the following elements, as depicted in Figure 8:
(1) Coordinate Reference: The virtual cyberspace sphere uses a non-Euclidean coordinate system,
such as the graph coordinate systems of Orion and Rigel. This is different from traditional geo-
graphic coordinate systems, such as the centroid and geodetic coordinate systems.
(2) Layers: Similar to maps, the cyberspace environment can be represented using physical, virtual,
process, and decision control layers. This enables a detailed representation of elements within
each layer, similar to the representation of geographic elements, such as residential areas, water
systems, transportation, and vegetation, on a map.
(3) Domain Boundaries: Cyberspace domain boundaries can be compared to boundaries and
national borders in the geographic space. They describe the jurisdiction and influence of differ-
ent entities in the cyberspace environment, similar to the boundaries of countries.
INTERNATIONAL JOURNAL OF DIGITAL EARTH 11
(4) Layer Zones: The physical, virtual, process, and decision-making resource circles are rep-
resented similar to the atmospheric layers in geographic space. They symbolize different
areas or levels within the cyberspace environment.
(5) Landmarks: In geographic space, a geodetic triangle network is used to represent the positions
of various points (Figure 9). Similarly, in cyberspace, a backbone network is constructed as the
base to identify the positions of various nodes, as indicated in Figure 10. This backbone net-
work follows the triangle inequality concept, which is similar to the geodetic triangle network
used in physical geography.
The application of metaphor theory to represent a cyberspace environment using familiar geo-
graphic concepts has several implications.
(1) Conformity to human cognitive habits: Utilizing metaphorical representations based on geo-
graphic concepts aligns with the human cognitive habits of understanding geographical
environments. This enables individuals to easily comprehend and conceptualize cyberspace.
However, it may introduce cognitive ambiguity owing to the inherent differences between
cyberspace and physical geography.
(2) Unified mapping of cyberspace and geospatial space: The use of metaphorical representations
enables the realization of a unified mapping of cyberspace and geospatial space. This is ben-
eficial for joint operation commanders as they can understand and analyze cyberspace along-
side traditional geospatial information on joint situational awareness maps. This integration
provides a comprehensive view of the operational environment.
(3) Accurate understanding of the cyberspace situation: Incorporating geographical locations into
the representation of cyberspace helps in accurately grasping the cyberspace situation. Consid-
ering the impact of geographical location enables a rapid and precise assessment of the signifi-
cance of situational information associated with actual physical locations. This aids in decision-
making and prioritizing actions in the cyberspace environment.
Overall, the use of metaphor theory to represent cyberspace using geographic concepts
has several advantages, including alignment with cognitive habits, facilitating unified mapping,
and improving situational awareness. However, the generation of potential cognitive ambiguity
from the metaphorical representation of the distinct and complex cyberspace must be
acknowledged.
(1) Representing cyberspace elements. The basic elements of a cyberspace environment are rep-
resented by an attribute graph model. This model is based on an analysis of the composition of
cyberspace elements, ensuring a structured representation of the relationships and attributes of
these elements, as described in Section 2.2.2.
INTERNATIONAL JOURNAL OF DIGITAL EARTH 13
(2) Acquiring cyberspace knowledge graph. A cyberspace knowledge graph is obtained, which
includes nodes representing various elements in the cyberspace environment and relation-
ships between them, as described in Section 2.2.3. Nodes with geographical attributes and
those with high degrees, yet lacking geographical attributes, are selected as control nodes.
The degree of a node is determined by its weight and the weights of the edges connected
to it.
(3) Embedding control nodes. The selected control nodes are embedded into the Euclidean space
to form a cyberspace coordinate system. The initial positioning of the cyberspace coordinate
system is established by calculating the network coordinates of the control nodes.
(4) Calculating network coordinates. The network distances between the normal nodes (nodes
without geographical attributes) and control nodes are calculated using the network coordi-
nates of control nodes and the in- and out-vectors of normal nodes, thereby determining
the network coordinates of normal nodes in the cyberspace coordinate system.
(5) Calculating geographic coordinates. Using a network distance weighting algorithm, the geo-
graphic coordinates of nodes without geographical attributes are calculated in the geographical
coordinate system. This is based on nodes with geographical attributes that serve as reference
14 B. JIANG ET AL.
points. This step enables the mapping of the cyberspace coordinates to the geographic coordi-
nates of nodes that lack geographical information.
(6) Drawing VCE. A VCE is created based on the geographic coordinates of each node in the geo-
graphical coordinate system. This facilitates the metaphorical visualization of the coordinate
system, layers, and domain elements in the cyberspace environment using familiar geographic
representations.
where v denotes the weight; eij indicates the node; and vi and vj represent the edges connected
to the node.
The weight of the edges is assigned when constructing the knowledge graph, as follows:
⎧
⎨ 0.5, edge with geographic location attributes
v(eij ) = 0.5 (2)
⎩ , edge without geographic location attributes; n is the number of edge
n
The weight of a node, indicated as v(vj ), is determined by the number of connected nodes. The
more nodes connected, the higher the weight of the node; for instance, if a node is connected to
five nodes, its weight is five.
nodes in the coordinate system are determined using the MDCC coordinate calculation method,
which is based on robust discrete matrix decomposition. Coordinate allocation follows the shortest
distance approximation (SODA) algorithm (Cheng et al. 2016), as follows:
Un Gn Un Y T
Jn = VnT Y T = (3)
X XVnT Fn
where Gn represents the distance matrix of the control nodes; Dn indicates the distance from a con-
trol node to itself; and X and Y denote the out-vector and in-vector of the nodes, respectively. The
network coordinates of the control nodes can be calculated by iteratively solving this equation and
setting an error function. The out-vector of a node represents the vector pointing from that node to
other nodes, whereas the in-vector represents the vector composed of other nodes pointing to the
node. The matrix representing the out- and in-vectors of all control nodes are denoted as Un and
Vn , respectively (Figure 13).
where U and V denote the out and in coordinates of the reference node iM , respectively; D(in, a)
and D(out, a) represent the in and out matrices, respectively; Q represents the distances between all
Figure 14. Calculation of the distance between the normal and control nodes.
pairs of points in the set formed by node iM and its reference nodes; and ca indicates the distance
between iM and itself, which is typically ca = 0. The matrices U and V are randomly initialized, and
the weight matrix is constructed based on the selected reference node N. The weight matrix of the
normal nodes is obtained, which can be utilized in iterative calculations to determine the network
coordinates of the normal nodes.
L(vi , vj ) represents the distance from node vi to node vj ; Uvi denotes the out-coordinate of node
vi ; and Uvj indicates the in-coordinate of node vj . These are the network coordinates of the
nodes.
The distance between the control nodes with accurate geographical coordinates and other nodes
can be calculated using Equations (7), (8) and (9). Based on the weighted average of the network
distances between control nodes with accurate geographical coordinates and nodes with unknown
geographical coordinates, the relative geographical coordinates of the latter can be determined as
INTERNATIONAL JOURNAL OF DIGITAL EARTH 17
follows:
Uj
Lj = Li + · Li (7)
D
Vj
Bj = Bi + · Bi (8)
D
Zj = Zi + s · Zi (9)
where (Li , Bi , Zi ) represents the geographical coordinates (known) of nodes with accurate geo-
graphical locations; and (Lj , Bj , Zj ) denotes the geographical coordinates (unknown) of nodes with-
out accurate geographical locations. The Z value of the geographical coordinates is calculated based
on the range of the spatial domain to which the network node belongs using a random number σ.
To avoid excessive disturbance, we considered 0 < σ < 1.0.
3. Application prototype
3.1. Experimental data and platforms
The experimental data were collected via cyberspace mapping, encompassing the domain name sys-
tem (DNS), AS, topo-scamper, topo-routeviews, topo-asnlinks, and topo-asns data; Table 1 sum-
marizes the specific details. A visualization framework was constructed using Cesium and
Three.js. This interactive visualization framework combines the VGE and virtual cyberspace sphere
to facilitate cyberspace analysis.
3.2. VGCE
3.2.1. Visualization of multi-layer knowledge networks in cyberspace
Based on the OVPD model, a network spatial knowledge graph was formed using the experimental
data (Figure 15(a)). A force-directed graph model algorithm was employed to calculate the gravita-
tional and repulsive forces, enabling the movement of nodes to new positions based on these net
forces. Figure 15(b) illustrates the resulting graph layout in the complex network environment.
This visualization of a multilayer knowledge graph in cyberspace offers an intuitive understanding
of the overall scenario, including the presence of attacks and defense nodes. However, accurately
determining the distribution and specificity of cyberspace resources poses a challenge, and it
may be difficult for users to rapidly comprehend cyberspace. Although this approach enables cyber-
space visualization, the existing methods for network coordinate systems and distance measure-
ments in cyberspace hinder its direct mapping to geographic space. Consequently, the obtained
Figure 15. Visualization of a cyberspace knowledge graph. (a) Different colors represent the example nodes from different cyber-
space resource layers. The association between different cyberspace resource layers is realized based on the relationships
between entities. (b) Two-dimensional (2D) node-link visualization of a cyberspace knowledge graph, including 1000 nodes
and 722 edges. All nodes are displayed on a single map.
visualization results do not offer an intuitive understanding of the distribution of cyberspace based
on geographical locations.
Figure 16. Selection of key nodes and visualization of a three-dimensional (3D) virtual cyberspace environment. (a) The deep
blue nodes include geographical information, whereas the light blue nodes exhibit high degrees without geographical infor-
mation. (b) Nodes without geographical information are assigned values based on distance calculations and visualized in a
3D scene.
INTERNATIONAL JOURNAL OF DIGITAL EARTH 19
resulting visualization is depicted in Figure 16(b). The network coordinates of both the control and
normal nodes were calculated using the cyberspace coordinate system. By leveraging the geographical
coordinates of the control nodes with known locations, the geographical coordinates of the other net-
work nodes were determined based on the cyberspace distance between these nodes and control
nodes. The 3D visualization of the geographical coordinates for each network node was accomplished
using node-link representations.
Figure 17. Geo-cyber space metaphorical relevance. (a) Visualization of the virtual geographic environment (VGE), including geo-
graphic coordinate system, geographic layers, and geographic boundaries. (b) Visualization of virtual cyberspace environment
(VCE), including network coordinate system, cyberspace layers, and cyber domains.
20 B. JIANG ET AL.
Figure 18. (a) Representation of network space elements based on a virtual geographic environment (VGE). Most network space
elements that do not contain geographical locations are difficult to model and represent in a VGE. (b) Unified expression of natu-
ral, humanistic, and network space elements based on the virtual geo-cyber environment (VGCE), which displays all layers of
network space elements and achieves the associated modeling of natural, humanistic, and network space elements based on
entity nodes.
network space elements with precise geographical locations; however, displaying numerous net-
work space elements that lack geographic positions is difficult. As illustrated in Figure 18(b), all net-
work space elements can be displayed in the VGCE space using the proposed method. Furthermore,
based on the VGCE, natural, humanistic, and network space elements can be associated and dis-
played in a unified environment. In Figure 19, the red nodes represent the natural geographical
Figure 19. (a) Blue nodes represent entities of network space elements which are shown in 3D globe earth. (b) Red nodes rep-
resent entities of natural geographical elements, such as road entities; green nodes represent entities of human geographical
elements, such as social organizations; blue nodes represent entities of network space elements, such as Internet protocol
(IP) entities.
INTERNATIONAL JOURNAL OF DIGITAL EARTH 21
elements, specifically road entities; the green nodes indicate the human geographical elements, such
as social and cultural organizations; and the blue nodes denote the network space elements, repre-
senting network virtual IPs and other entities.
(1) Interactive navigation through the virtual cyberspace sphere: In this approach, users can inter-
actively navigate through the virtual cyberspace sphere to obtain specific resources; Figure 20
illustrates this process. Users can click on a query in the cyberspace asset vulnerability node to
access detailed information on the right-hand side. This information includes the vulnerability
app name, device manufacturer, asset type, vulnerability count, and protocol. Additionally, the
VGE on the left-hand side enables rapid navigation to the corresponding geographic location
connected to the resource.
(2) Interactive navigation through the network logic layer: This approach involves using the node-
link graphical representation method to construct a layered knowledge graph of cyberspace;
Figure 21 illustrates this technique. Users can access linkages with geographic space by clicking
on the network nodes located in different layers. This navigation facilitates a comprehensive
understanding of network connectivity and asset associations between various layers within
cyberspace.
Users can efficiently query and locate network resources in cyberspace using the aforementioned
interactive navigation methods. The combination of the virtual network globe and network logic
layer enhances the overall understanding of the interconnections and associations between different
elements of the cyberspace environment.
Figure 22. Geographical space layers versus the network space logic layers.
INTERNATIONAL JOURNAL OF DIGITAL EARTH 23
IP quantity, and virtual machine registration number. Additionally, the VGE facilitates rapid navi-
gation to the corresponding location. Examining the distribution and connections of the network
virtual resource layer nodes displayed on the right-hand side of Figure 22 can provide insight into
the overall situation of network attacks and defenses. The geographic distribution of the cyberspace
nodes on the left-hand side provides a clear understanding of the distribution of cyberspace
resources associated with the different geographic layers. Based on this approach, the cyberspace
situational awareness enables a comprehensive analysis and understanding of the overall state of
cyberspace, including the interplay between the different resource layers and their geographic
associations.
(1) Cognitive illusion of metaphor: The metaphor-based approach uses the cognitive habits of geo-
graphic space to achieve cognitive understanding of the virtual and dynamic network space
environments; however, this may lead to cognitive illusions. For instance, if users view only
the VGCE without the comparison display of VGE, they may misinterpret the boundaries of
cyberspace as geographical boundaries. Additionally, spherically constraining the boundless
network space environment can cause an unclear understanding of the network space
environment.
(2) Metaphorical problem of the geographical location of virtual assets in cyberspace: To represent
geographical and network information in a unified environment, we performed mapping based
on network and geographical distances to calculate the position attributes of virtual nodes.
However, this deviates from the actual geographical location of virtual IPs (if any), and certain
virtual assets do not comprise specific locations. For instance, geographical locations have no
relevance to virtual IPs or virtual roles, which may lead users to incorrectly interpret that all
virtual nodes have geographical location information.
(3) Integration of natural, humanistic, and cyberspace expressions: The unified association and
expression of the three aspects are realized based on the semantic space, providing a new
method for the unity of the ternary space. However, the actual relationship between the
three aspects is complex and may be biased to achieve their association in the same space
only from a semantic perspective.
24 B. JIANG ET AL.
Despite its effectiveness in studying cyberspace, VGE is a complex artificial space where reality is
intertwined with virtual elements. Therefore, perceiving scene elements, forming boundaries, and
understanding changing dynamics using only our senses are challenging. This implies that compre-
hensible expression is vital for users to comprehend cyberspace and its security landscape. Cross-
domain information mapping is a major concern in the field of cyberspace, which includes the chal-
lenge of mapping between information, geographic, and human environments. In the future, we
intend to introduce dynamic information expression methods in VGEs by employing techniques
such as multi-view collaborative correlation analysis, human–computer collaborative interaction
analysis, and mapping visualization. These techniques can facilitate the analysis and mining of com-
plex high-dimensional network data, achieving a global cognition of cyberspace. Furthermore, user
experiences can be enhanced by immersion in virtual environments using technologies such as VR,
AR, and extended reality, enabling the cognitive integration of geographic space and cyberspace.
Acknowledgements
Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author and
do not necessarily reflect the views of the National Science Foundation.
Disclosure statement
No potential conflict of interest was reported by the author(s).
Funding
This work was supported by National Natural Science Foundation of China [grant number 42171456].
ORCID
Bingchuan Jiang http://orcid.org/0000-0003-1073-094X
References
Celentano, A., and F. Pittarello. 2012. “From Real to Metaphoric Maps: Cartography as a Visual Language for
Organizing and Sharing Knowledge.” Journal of Visual Languages & Computing 23 (2): 63–77. https://doi.org/
10.1016/j.jvlc.2011.11.004.
Chen, M., C. Claramunt, A. Çöltekin, X. Liu, P. Peng, A. C. Robinson, D. Wang, et al. 2023. “Artificial Intelligence
and Visual Analytics in Geographical Space and Cyberspace: Research Opportunities and Challenges.” Earth-
Science Reviews 241: Article 104438. https://doi.org/10.1016/j.earscirev.2023.104438.
Chen, M., and H. Lin. 2018. “Virtual Geographic Environments (VGEs): Originating from or Beyond Virtual Reality
(VR)?” International Journal of Digital Earth 11 (4): 329–333. https://doi.org/10.1080/17538947.2017.1419452.
Chen, M., H. Lin, M. Hu, L. He, and C. Zhang. 2013. “Real-geographic-scenario-based Virtual Social Environments:
Integrating Geography with Social Research.” Environment and Planning B: Planning and Design 40 (6): 1103–
1121. https://doi.org/10.1068/b38160.
Cheng, J., Y. Zhang, Q. Ye, and H. W. Du. 2016. “High-precision Shortest Distance Estimation for Large-scale Social
Networks.” In IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer
Communications. San Francisco, CA, USA, 1–9. https://doi.org/10.1109/INFOCOM.2016.7524580.
Dabek, F., R. Cox, F. Kaashoek, and R. Morris. 2004. “Vivaldi: A Decentralized Network Coordinate System.” ACM
SIGCOMM Computer Communication Review 34 (4): 15–26. https://doi.org/10.1145/1030194.1015471.
Dodge, Martin, and Rob Kitchin. 2000. Mapping Cyberspace. Routledge. https://doi.org/10.4324/9780203279731.
Fabrikant, S. I., D. R. Montello, M. Ruocco, and R. S. Middleton. 2004. “The Distance–Similarity Metaphor in
Network-Display Spatializations.” Cartography and Geographic Information Science 31 (4): 237–252. https://doi.
org/10.1559/1523040042742402.
Fang, B. X. 2018. “Define Cyberspace Security.” Chinese Journal of Network and Information Security 4 (1): 1–5.
Francis, P., S. Jamin, C. Jin, Y. Jin, D. Raz, Y. Shavitt, and L. Zhang. 2001. “IDMaps: A Global Internet Host Distance
Estimation Service.” IEEE/ACM Transactions on Networking 9 (5): 525–540. https://doi.org/10.1109/90.958323.
INTERNATIONAL JOURNAL OF DIGITAL EARTH 25
Gao, J., and X. Cao. 2021. “The new Development Direction of Cartography Promoted by Spatial Cognition.” Acta
Geodaetica et Cartographica Sinica 50 (6): 711–725. https://doi.org/10.11947/j.AGCS.2021.20210043.
Gao, C., Q. Guo, D. Jiang, Z. Wang, C. Fang, and M. Hao. 2019. “Theoretical Basis and Technical Methods of
Cyberspace Geography.” Journal of Geographical Science 29 (12): 1949–1964. https://doi.org/10.1007/s11442-
019-1698-7.
Gonçalves, C. P. 2019. “Cyberspace and Artificial Intelligence: The new Face of Cyber-Enhanced Hybrid Threats.”
Cyberspace, IntechOpen, https://doi.org/10.5772/intechopen.88648.
Guo, R., Y. Chen, S. Ying, G. Lü, and Z. Li. 2018. “Geographic Visualization of pan-map with the Context of Ternary
Spaces.” Geomatics and Information Science of Wuhan University 43 (11): 1603–1610. https://doi.org/10.13203/j.
whugis20180373.
Guo, R., Y. Chen, Z. Zhao, D. Han, D. Ma, S. Ying, P. Ti, W. Ke, and Y. Fan. 2022. “Scientific Concept and
Representation Framework of Maps in the ICT era.” Geomatics and Information Science of Wuhan University
47 (12): 1978–1987. https://doi.org/10.13203/j.whugis20220534.
Guo, Q. Q., C. D. Gao, K. F. Sun, S. Chen, D. Jiang, and M. M. Hao. 2021. “The Construction of Cyberspace Elements
Hierarchical System Based on man-Land-Network Relationship.” Geographic Research 40 (1): 109–118. https://
doi.org/10.11821/dlyj020200867.
Han, S. Y., M. H. Tsou, and K. C. Clarke. 2018. “Revisiting the Death of Geography in the era of Big Data: The
Friction of Distance in Cyberspace and Real Space.” International Journal of Digital Earth 11 (5): 451–469.
https://doi.org/10.1080/17538947.2017.1330366.
Hartford, B. S. 1987. “Women, Fire, and Dangerous Things: What Categories Reveal About the Mind.” Studies in
Second Language Acquisition 11 (4): 462–464. https://doi.org/10.1017/S0272263100008469.
He, Y., B. Hofer, Y. Sheng, Y. Yin, and H. Lin. 2023. “Processes and Events in the Center: A Taxi Trajectory-Based
Approach to Detecting Traffic Congestion and Analyzing its Causes.” International Journal of Digital Earth 16 (1):
509–531. https://doi.org/10.1080/17538947.2023.2182374.
Hu, T., J. Luo, and W. Liu. 2018. “Life in the “Matrix”: Human Mobility Patterns in the Cyber Space.” Proceedings of
the International AAAI Conference on Web and Social Media 12 (1), https://doi.org/10.1609/icwsm.v12i1.15000.
Ji, S., S. Pan, E. Cambria, P. Marttinen, and S. Y. Philip. 2022. “A Survey on Knowledge Graphs: Representation,
Acquisition, and Applications.” IEEE Transactions on Neural Networks and Learning Systems 33 (2): 494–514.
https://doi.org/10.1109/TNNLS.2021.3070843.
Klippel, A., P. Sajjadi, J. Zhao, J. O. Wallgrün, J. Huang, and M. M. Bagher. 2021. “Embodied Digital Twins for
Environmental Applications.” ISPRS Annals of Photogrammetry, Remote Sensing and Spatial Information
Sciences 4: 193–200. https://doi.org/10.5194/isprs-annals-V-4-2021-193-2021.
Kwan, M. P. 2015. “Cyberspatial Cognition and Individual Access to Information: The Behavioral Foundation of
Cybergeography.” Environment & Planning B: Planning & Design 28 (1): 21–37. https://doi.org/10.1068/b2560.
Lin, H., and M. Chen. 2015. “Managing and Sharing Geographic Knowledge in Virtual Geographic Environments
(VGEs).” Annals of GIS 21 (4): 261–263. https://doi.org/10.1080/19475683.2015.1099568.
Lin, H., M. Chen, and G. Lu. 2013. “Virtual Geographic Environment: A Workspace for Computer-Aided
Geographic Experiments.” Annals of the Association of American Geographers 103 (3): 465–482. https://doi.org/
10.1080/00045608.2012.689234.
Lin, H., M. Chen, G. Lu, Q. Zhu, J. Gong, X. You, Y. Wen, B. Xu, and M. Hu. 2013. “Virtual Geographic
Environments (VGEs): A new Generation of Geographic Analysis Tool.” Earth-Science Reviews 126: 74–84.
https://doi.org/10.1016/j.earscirev.2013.08.001.
Lin, H., Q. Zhu, and M. Chen. 2018. “The Being and non-Being Generate Each Other, and the Virtual and the Real are
Mutually Interactive-the Progress of Virtual Geographic Environments (VGE) Studies in Last 20 Years.” Acta
Geodaetica et Cartographica Sinica 47 (8): 1027–1030. https://doi.org/10.11947/j.AGCS.2018.20180202.
Liu, X., M. Chen, C. Claramunt, M. Batty, M. P. Kwan, A. M. Senousi, G. Lü, et al. 2022. “Geographic Information
Science in the era of Geospatial big Data: A Cyberspace Perspective.” The Innovation 3 (5): 100279. https://doi.org/
10.1016/j.xinn.2022.100279.
Liu, H., R. Zhang, J. Liu, and M. Zhang. 2016. “Time Synchronization in Communication Networks Based on the
Beidou Foundation Enhancement System.” Science China Technological Sciences 59 (1): 9–15. https://doi.org/
10.1007/s11431-015-5974-1.
Lü, G., M. Batty, J. Strobl, H. Lin, A. X. Zhu, and M. Chen. 2019. “Reflections and Speculations on the Progress in
Geographic Information Systems (GIS): A Geographic Perspective.” International Journal of Geographic
Information Science 33 (2): 346–367. https://doi.org/10.1080/13658816.2018.1533136.
Lü, G., M. Chen, L. Yuan, L. Zhou, Y. Wen, M. Wu, B. Hu, Z. Yu, S. Yue, and Y. Sheng. 2018. “Geographic Scenario: A
Possible Foundation for Further Development of Virtual Geographic Environments.” International Journal of
Digital Earth 11 (4): 356–368. https://doi.org/10.1080/17538947.2017.1374477.
Ma, C. X., J. C. Song, Q. Zhu, K. Maher, Z. Y. Huang, and H. A. Wang. 2020. “EmotionMap: Visual Analysis of Video
Emotional Content on a map.” Journal of Computer Science and Technology 35 (3): 576–591. https://doi.org/10.
1007/s11390-020-0271-2.
26 B. JIANG ET AL.
MacEachren, A. M., R. Edsall, D. Haug, R. Baxter, G. Otto, R. Masters, S. Fuhrmann, and L. Qian. 1999. “Virtual
Environments for Geographic Visualization: Potential and Challenges.” In: Proceedings of the 1999 Workshop
on New Paradigms in Information Visualization and Manipulation in Conjunction with the Eighth ACM
International Conference on Information and Knowledge Management, November 1999, 35–40. https://doi.org/
10.1145/331770.331781.
Mao, Y., L. K. Saul, and J. M. Smith. 2006. “IDES: An Internet Distance Estimation Service for Large Network.” IEEE
Journal on Selected Areas in Communications 24 (12): 2273–2284. https://doi.org/10.1109/JSAC.2006.884026.
Mekni, M. 2018. “Spatial Simulation Using Abstraction of Virtual Geographic Environments.” International Journal
of Digital Earth 11 (4): 334–355. https://doi.org/10.1080/17538947.2017.1381190.
Mohebbi, S., Q. Zhang, E. C. Wells, T. Zhao, H. Nguyen, M. Li, N. Abdel-Mottaleb, et al. 2020. “Cyber-physical-social
Interdependencies and Organizational Resilience: A Review of Water, Transportation, and Cyber Infrastructure
Systems and Processes.” Sustainable Cities and Society 62: 102327. https://doi.org/10.1016/j.scs.2020.102327.
Ng, T. E., and H. Zhang. 2002. “Predicting Internet Network Distances with Coordinate-Based Approaches.” In
Proceedings of Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies,
New York, USA, 1: 170–179. https://doi.org/10.1109/INFCOM.2002.1019258.
Skupin, A. 2000. “From Metaphor to Method: Cartographic Perspectives on Information Visualization.” In IEEE
Symposium on Information Visualization, Salt Lake City, UT, USA, 91–97. https://doi.org/10.1109/INFVIS.
2000.885095.
Taylor, D. R. F. 2014. Developments in the Theory and Practice of Cybercartography: Applications and Indigenous
Mapping. Amsterdam: Elsevier.
Theilmann, W., and K. Rothermel. 1999. “Dynamic Distance Maps of the Internet.” In Proceedings of the IEEE
INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE
Computer and Communications Societies, Tel Aviv, Israel, 275–284. https://doi.org/10.1109/INFCOM.2000.
832197.
Wijayawardena, A. S., R. Abeysekera, and M. W. Maduranga. 2023. “A Systematic Review of 3D Metaphoric
Information Visualization.” International Journal of Modern Education and Computer Science 15 (1): 73–93.
https://doi.org/10.5815/ijmecs.2023.01.06.
Xin, R., T. Ai, and B. Ai. 2018. “Metaphor Representation and Analysis of non-Spatial Data in map-Like
Visualizations.” ISPRS International Journal of Geo-Information 7 (6): 225. https://doi.org/10.3390/ijgi7060225.
Xin, R., T. Ai, R. Zhu, B. Ai, M. Yang, and L. Meng. 2021. “A Multi-Scale Virtual Terrain for Hierarchically Structured
non-Location Data.” ISPRS International Journal of Geo-Information 10 (6): 379. https://doi.org/10.3390/
ijgi10060379.
Yu, D., L. Tang, F. Ye, and C. Chen. 2021. “A Virtual Geographic Environment for Dynamic Simulation and Analysis
of Tailings dam Failure.” International Journal of Digital Earth 14 (9): 1194–1212. https://doi.org/10.1080/
17538947.2021.1945151.