浏览全部资源
扫码关注微信
[ "侯艳芳(1990-),女,移动互联网系统与应用安全国家工程实验室安全研究员,主要研究方向为大数据安全相关技术。" ]
[ "王锦华(1982-),男,现就职于移动互联网系统与应用安全国家工程实验室,主要研究方向为云计算、大数据安全相关技术。" ]
网络出版日期:2018-03,
纸质出版日期:2018-03-20
移动端阅览
侯艳芳, 王锦华. 基于自更新威胁情报库的大数据安全分析方法[J]. 电信科学, 2018,34(3):50-58.
Yanfang HOU, Jinhua WANG. Big data security analysis method based on self-update threat intelligence database[J]. Telecommunications science, 2018, 34(3): 50-58.
侯艳芳, 王锦华. 基于自更新威胁情报库的大数据安全分析方法[J]. 电信科学, 2018,34(3):50-58. DOI: 10.11959/j.issn.1000-0801.2018127.
Yanfang HOU, Jinhua WANG. Big data security analysis method based on self-update threat intelligence database[J]. Telecommunications science, 2018, 34(3): 50-58. DOI: 10.11959/j.issn.1000-0801.2018127.
大数据安全分析方法一般是基于已有的特征库对恶意行为进行匹配检测,该方法只能检测到已知攻击,不能对新型的未知攻击与复杂变种攻击进行分析判断。通过大数据分析技术,对采集数据进行安全价值提炼,实现从采集数据、威胁信息、威胁知识,再到威胁情报的价值转换,形成具有隐蔽性、价值选择性、对抗性、预测性、决策性、可举证性、时效性的高价值威胁情报。首先分析了已有安全分析方法的局限性,然后详细介绍了威胁情报库的构建方法,最后阐述了基于自更新威胁情报库的大数据安全分析方法。基于自更新的威胁情报库进行大数据安全分析,可以有效地挖掘出互联网数据中潜藏的威胁,强化互联网企业已有的安全防护能力,以便在安全博弈过程中掌握事前防御的主动权。
Big data security analysis method is generally based on the existing signature database to detect and match malicious behaviors.This method can only detect known attacks and can't analyze and judge new types of unknown attacks and complex variant attacks.Through the big data analysis technology
the collected data was extracted for safety value
and the value conversion from the collected data
threat information
threat knowledge to threat intelligence was realized
high-value threat intelligence of forming hidden
value selective
adversarial
predictive
and decision-making
evidence-based
time-sensitive was formed.Firstly
the limitations of the existing security analysis methods were analyzed.Then the construction method of threat intelligence database was introduced in detail.Finally
the security analysis method of big data based on self-renewing threat information database was described.The analysis of big data security based on the self-updated threat intelligence database could mine the hidden threats in internet data effectively and strengthen the existing security protection capabilities of internet companies so that the preemptive defense initiative could be mastered during the security game.
张繁 , 谢凡 , 江颉 . 网络威胁安全数据可视化综述 [J ] . 网络与信息安全学报 , 2018 , 4 ( 2 ): 34 - 39 .
ZHANG F , XIE F , JIANG X . Survey on the visualization technologies of threatening security data in cyber space [J ] . Chinese Journal of Network and Information Security , 2018 , 4 ( 2 ): 34 - 39 .
方滨兴 . 定义网络空间安全 [J ] . 网络与信息安全学报 , 2018 , 4 ( 1 ): 1 - 5 .
FANG B X . cyberspace security [J ] . Chinese Journal of Network and Information Security , 2018 , 4 ( 1 ): 1 - 5 .
ISLAM J , XU K , WONG W . Analytic provenance for criminal intelligence analysis [J ] . Chinese Journal of Network and Information Security , 2018 , 4 ( 2 ): 18 - 33 .
MITNICK K D , SIMON W L . 欺骗的艺术 [M ] . 潘爱民 ,译. 北京 : 清华大学出版社 2014 .
MITNICK K D , SIMON W L . The art of deception [M ] .Translated by PAN A M . Beijing : Tsinghua University Press 2014 .
张云勇 . 电信运营商大数据发展建议 [J ] . 电信科学 , 2018 , 34 ( 1 ): 103 - 108 .
ZHANG Y Y . Suggestions for telecom operators' big data development [J ] . Telecommunications Science , 2018 , 34 ( 1 ): 103 - 108 .
Gartner . 威胁情报的定义 [EB/OL ] . ( 2013 - 05 - 16 ).[ 2018 - 01 - 08 ] . https://www.gartner.com/doc/2487216/definition-threat-intelligence https://www.gartner.com/doc/2487216/definition-threat-intelligence .
Gartner . Gartner.Definition:threat intelligence [EB/OL ] . ( 2013 - 05 - 16 ).[ 2018 - 01 - 08 ] . https://www.gartner.com/doc/2487216/definition-threat-intelligence https://www.gartner.com/doc/2487216/definition-threat-intelligence .
0
浏览量
1639
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构