期刊文献+

论大数据时代的威胁情报 被引量:16

Threat Intelligence in the Era of Big Data
原文传递
导出
摘要 [目的 /意义]初步论述信息安全界理论前沿,论述威胁情报及其相关热点问题,试图引入新的情报概念,开拓情报研究新的领域。[方法 /过程]通过文献调研、内容分析和归纳演绎,梳理出威胁情报的主要特点、基础性技术、实践现状与趋势、重要意义和未来研究方向。[结果 /结论]威胁情报:1将成为情报研究新的热点;2具有应用范围广泛、紧密跟踪和可用于信息安全管理决策的特征;3对国家信息安全管理和国家情报要素研究均具有重要意义;4与其相关的数据管辖与隐私保护、情报共享等问题将成为未来的研究重点。 [ Purpose/significance] This paper primarily discussesthe information security theory frontier, elucidates- the threat intelligence and related hot issues, and introduces a new concept toexplore the new field in intelligence re- search. ~ Method/process] Through literature research, content analysis, induction and deduction, this paper teases out the main characteristics, basic technologies, practical situations and development trends, significance, and future research directions ofthreat intelligence. [ Result/conclusionJ This paper concludes that threat intelligence will become a new re- search hot spot in the intelligence field through analysis. It has features witha wide range of applications, close traceability andusefulness for information security decision. It has a great meaning for national information security management and research on national intelligence elements. The issues of the data jurisdiction and privacy protection, information sharing related with it will become the focuses of future research. It will provide an important reference for intelligence theory re- search and practical exploration.
作者 范佳佳
出处 《图书情报工作》 CSSCI 北大核心 2016年第6期15-20,共6页 Library and Information Service
基金 国家社会科学基金重大项目"大数据与云环境下国家信息安全管理范式及政策路径研究"(项目编号:13&ZD185)研究成果之一
关键词 威胁情报 信息安全 大数据 threat intelligence information security big data
  • 相关文献

参考文献17

  • 1COVAULT C. Cyber threat challenges intelligence capability[J]. Aviation week & space technology, 1997, 146(6):20-21.
  • 2KORZYK A D. Developing intelligence-based threat definitions for global information security management[C]//KHOSROWPOUR M. International conference of the Information-Resources-Management-Association.USA:IDEAGROUP,2003:862-864.
  • 3刘叶婷,唐斯斯.大数据对政府治理的影响及挑战[J].电子政务,2014(6):20-29. 被引量:183
  • 4NTT. 2014 global threat intelligence report[EB/OL].[2015-10-10]. https://nttgroupsecurity.com.
  • 5爱微帮.[科技评论]从"2015年美国RSA大会"看网络安全技术发展趋势[EB/OL].[2015-10-12]. http://www.aiweibang.com/yuedu/29137570.html.
  • 6中国科技网. 美建网络威胁情报整合中心[EB/OL].[2015-10-12]. http://www.wokeji.com/jbsj/seb/201502/t20150217_973459.shtml.
  • 7GARTNER. 中国IT安全硬件、软件和服务2015-2019全景图[EB/OL].[2015-10-12].http://www.idc.com/getdoc.jsp?containerId=CH251005.
  • 8齐鲁晚报. 2015黑帽大会人工智能新突破引全球黑客"关心"[EB/OL].[2015-10-13]. http://news.sina.com.cn/o/2015-06-19/155531970205.shtml?cre=newspagepc&mod=f&loc=8&r=a&rfunc=2.
  • 9MILES C, LAKHOTIA A, LEDOUX C, et al. VirusBattle:State-of-the-art malware analysis for better cyber threat intelligence[C]//20147th international symposium on resilient control systems(ISRCS),New York:IEEE,2014:1-6.
  • 10CAGLAYAN A, TOOTHAKER M, DRAPEAU D, et al. Behavioral analysis of botnets for threat intelligence[J]. Information systems and e-business management, 2012, 10(4):1-29.

二级参考文献29

共引文献183

同被引文献109

引证文献16

二级引证文献94

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部