期刊文献+

面向下一代威胁的安全框架 被引量:1

Security Framework against Next-Generation Threats
原文传递
导出
摘要 网络空间已逐渐演变为一个虚拟战场,网络空间的较量是决定一个国家话语权的重要筹码。下一代威胁从某种意义代表着网络空间较量的重要技术指标。文章论述了下一代威胁的特点和关键属性,分析了其绕过传统的安全防御体系的原因,设计了面向下一代威胁的安全框架。该框架从技术工具、安全服务、数据共享三个维度进行全方面论述,尤其基于未知威胁的识别技术、具有大数据特征的数据共享及持续性的威胁检测是面向下一代威胁框架的关键要素。应用实践表明文中提出的面向下一代威胁的安全框架是应对下一代威胁的有效手段。 Cyberspace gradually becomes an important " chip" in determining the discourse right of a country. In this context,defense technology against next-generation threats, to some extent, is the most important part of cyberspace competition. This article describes the characteristics and key attributes of next-generation threats, analyzes the reasons why these threats can bypass traditional defenses, and presents a security framework against next-generation threats. This framework illustrates clearly the national cyber security from the aspects of technical tool, security service, data sharing, and particularly the key elements including identification technology against unknown threats, data sharing with big-data characteristics, and continuous threat detection. Application practice indicates that the security framework proposed in this article is an effective against next-generation threats.
出处 《信息安全与通信保密》 2014年第6期100-104,共5页 Information Security and Communications Privacy
关键词 网络安全 下一代威胁 高级持续威胁 network security next-generation threat APT
  • 相关文献

参考文献12

  • 1LawrencePingree, Neil MacDonald. Best practices for mitigation advanced persistent threats, G00224682 [ R]. Gartner, 18 January 2012.
  • 2Next generation threat prevention[ OL]. network secur- ity 2011 - 2015 http ://www. soleranetworks, co. jp/re- source/documents/whitepapers/NGTP_wp, pdf.
  • 3ASHIT DALAL. Advanced persisted threat: A Buzzw- ord or an imminent threat.'? [ Z ]. ISACA, November 14,2012.
  • 4JohnPescatore, Greg Young. Defining Next-Generation network intrusion prevention, G00218641 [ R ]. Gart- ner, 7 October 2011.
  • 5李蕊,李仁发.上下文感知计算及系统框架综述[J].计算机研究与发展,2007,44(2):269-276. 被引量:52
  • 6Anind K. Dey, Gregory D. Abowd, Towards a Better Understanding of Context and Context-Aware. Ubiqui- tous Computing/Handheld and Ubiquitous Computing- UbiComp(HUC), 1999: 304-307.
  • 7卢思军,朱宏,李旭伟.深度包检测技术在防火墙中的应用探讨[J].成都信息工程学院学报,2005,20(1):5-8. 被引量:10
  • 8田红月.DPI和DFI带宽管理技术分析[OL].(2007-10-12)[2008-12-10]http://www.CWW.net.cn/tech/html/2007/10/12/200710121445083125.htm.
  • 9王卫东.基于DFI和DPI技术的异常流量监控[J].网络安全技术与应用,2009(1):4-5. 被引量:8
  • 10王超,赵文杰.IP网络带宽管理技术及应用分析[J].电信技术,2007(5):101-103. 被引量:21

二级参考文献67

  • 1卢思军,朱宏,李旭伟.深度包检测技术在防火墙中的应用探讨[J].成都信息工程学院学报,2005,20(1):5-8. 被引量:10
  • 2汤鑫,陈万培,许峰.城域网的宽带接入解决方案[J].现代电子技术,2005,28(14):16-19. 被引量:1
  • 3杨挺,孙雨耕,张聚伟.核心骨干网中基于DiffServ和MPLS技术的混合模型[J].河南科技大学学报(自然科学版),2006,27(6):46-49. 被引量:1
  • 4王超,赵文杰.IP网络带宽管理技术及应用分析[J].电信技术,2007(5):101-103. 被引量:21
  • 5MandyAndress.计算机安全原理[M].机械工业出版社,2002..
  • 6田红月.DPI和DFI带宽管理技术分析[EB/OL].(2007-10-12)[200812-10]http://www.cww.net.cn/tech/html/2007/10/12/200710121445083125.htm.
  • 7Gartner. Deep packet inspection: The next phase of firewall evolution[EB/OL]. http://www, fortinet, com.cn/news/media/techrepublic, html.
  • 8Ia Ibal. Deep Content Inspection- Beyond Deep Packet inspection [ EB/OL ]. http://www, barbedwiretech.com/Wechnology/wp - pdf/DPI - Whitepaper. pdf.
  • 9Ido Dubrawsky. Firewall Evolution-Deep Packet Inspection [ EB/OL]. http://www.securityfocus. com/info-cus/1716.
  • 10Jason Pascoe.Adding generic contextual capabilities to wearable computers[C].The 2nd Int'l Symp on Wearable Computers,Pittsburgh,1998

共引文献96

同被引文献12

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部