期刊文献+

算网融合中的网络安全问题浅析 被引量:1

Brief Analysis for Network Security Issues in Computing Power and Network Integration
下载PDF
导出
摘要 网络安全是算网融合的基石,需要全方位提升算网融合中的网络安全感知、监测和评估能力,本文针对算网融合中的安全问题从基础设施层安全、编排管理层安全、运营服务层安全、数据安全、图计算挖掘和应用、安全防护技术及态势感知等维度做了初步分析。面向构筑泛在分布式安全算网大脑,通过A完成数据资产的梳理,支持对元数据全生命周期进行监测,支持对数据资源流转进行管理,支持对数据安全风险进行监测。以图技术方式进行实现数据挖掘和应用。针对算网融合面临的网络攻击和数据隐私泄露等严重安全风险,本文提出引入加密流量监测、可信计算、追踪溯源、智能编排等技术,以实现算网融合的安全可信。 Network security is the cornerstone of computing power and network integration.It is necessary to improve network security awareness,monitoring,and evaluation capabilities in all aspects.It makes a comprehensive analysis on network security issues in computing power and network integration from dimensions of network infrastructure layer security,combination and scheduling layer security,operation service layer security,data security,graph processing mining and application,security prevention technique,situational awareness etc.It is set up gradually evolving security capabilities for building a ubiquitous distributed security network computing brain.It identifies data assets according to AI(artificial intelligence)models,it supports metadata monitoring throughout its life cycle,management of data resource flow,and monitoring of data security risks.It is realized by graph technology for data mining and application.In view of the serious security risks such as network attacks and data privacy leakage faced by computing power and network integration,it proposes to introduce technologies such as encrypted traffic monitoring,trusted computing,tracing,and intelligent orchestration to achieve the security and credibility of computer power and network integration.
作者 黄敏 黄晶 Huang Min;Huang Jing(China Mobile Guangxi branch Co.,Ltd,Nanning Guangxi,530012;EVERSEC(Bei Jing)technology Co.,Ltd,Beijing,100191)
出处 《工业信息安全》 2023年第1期35-41,共7页 Industry Information Security
关键词 算网融合 数据安全 安全算网大脑 图计算 人工智能 Computing Power and Network Integration Date Security Network Security Computing Brain Graph Processing Artificial Intelligence
  • 相关文献

参考文献2

二级参考文献8

  • 1[1]Bray T, Paoli J, Sperberg-McQueen M C. Extensible markup language(XML) 1.0(Sescond Edition)[EB/OL]. W3C, http://www.w3.org/TR/2000/REC-xml-20001006, 2000-10
  • 2[2]Reagle J. XML encryption requirements[EB/OL]. W3C, http://www.w3.org/TR/2001/WD-xml-encryption-req-20011018, 2001-10
  • 3[3]Reagle J. RFC 2807. XML signature requirements[EB/OL]. IETF, http://www.ietf.org/rfc/rfc2807.txt,1999-10
  • 4[4]Eastlake D, Reagle J. XML encryption syntax and processing[EB/OL]. W3C, http://www.w3.org/TR/2001/WD-xmlenc-core-20011018/, 2001-10
  • 5[5]Boyer J. Canonical XML[EB/OL]. IETF, http://www.ietf.org/rfc/rfc3076.txt, 2001-03
  • 6[6]Eastlake D, Reagle J, Solo D. XML signature syntax and processing[EB/OL]. W3C, http://www.w3.org/TR/2001/PR-xmldsig-core-20010820/, 2001-08
  • 7姚惠娟,耿亮.面向计算网络融合的下一代网络架构[J].电信科学,2019,35(9):38-43. 被引量:16
  • 8雷波,刘增义,王旭亮,杨明川,陈运清.基于云、网、边融合的边缘计算新方案:算力网络[J].电信科学,2019,35(9):44-51. 被引量:84

共引文献44

同被引文献7

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部