期刊文献+

网络空间安全威胁情报及应用研究 被引量:6

Research on Cyber Threat Intelligence and Applications
下载PDF
导出
摘要 面对当前日益严峻的安全形势,安全专家们需要改变传统的安全防御思路,通过对网络安全威胁特征、方法、模式的追踪、分析,以主动方式实现对网络安全新威胁的及时识别与有效防护。在实现这一转变过程中,安全威胁情报的作用不容忽视。与实体空间的战争冲突类似,网络空间对抗也极度依赖安全威胁情报来开展。网络空间安全威胁情报是基于证据的知识,包括场景、机制、威胁指示和可操作建议等。围绕安全威胁情报的基本特征和面临的挑战,重点从网络防御的视角介绍安全威胁情报的作用和工作流程,设计安全威胁情报即服务(TIaaS)的体系架构图,作为支撑安全威胁情报应用研究的一个创新性的技术和工程框架,并探讨安全威胁情报的应用场景和研究热点。 Facing the increasingly flinty security position, the security security defense, which can realize the timely identification and effective through the active methods, which is through the tracing and analysis for experts need to change the idea of defense for all the new cyber threats the characteristic, method and mode of the cyber threat. The function of the cyber threat intelligence ( CTI ) is very important during the process of change, the Cyber counterwork is also deeply depended on CTI as the battle conflict in the entity space. The CTI is the knowledge based on evidence, including scene, mechanism, indicator of compromise (IOC) and operative suggestions. The paper introduces the function and flow of the CTI in the Cyber security field along with the basic characteristic and challenge of CTI,design a security threat intelligence service (TIaaS) architecture diagram, as an innovative technology and engineering framework for supporting security threat intelligence applications.Meanwhile,discusses the application scene of the CTI and the hotspot of research.
出处 《通信技术》 2016年第6期758-763,共6页 Communications Technology
关键词 网络威胁情报 网络空间安全 威胁指示 威胁情报即服务 Cyber Threat Intelligence Cyberspace Security Indicator of Compromise Threat Intelligence as a Service
  • 相关文献

参考文献9

二级参考文献43

  • 1IATF Document 3. 1. http://www. iatf. net/framework_docs/version-3_1/ index. cfm, 2003-03-20.
  • 2COHEN F. A note on the role of deception in information protection [EB/OL]. http ://all. net/journal/deception/deception. html. 2001-12-29.
  • 3COHEN F. A framework for deception [EB/OL].http://all. net/journal/deception/Framework/Framework. html. 2001-12-29.
  • 4COHEN F. A mathematical structure of simple defensive network deceptions [EB/OL]. http : //all. net /journal/deception/mathdeception/mathdeception.html. 2001-12-29.
  • 5习近平.坚持总体国家安全观走中国特色国家安全道路[EB/OL].新华网,2014—04-15.
  • 6OBAMA B. National security strategy of the United States [ M ]. DIANE Publishing, 2010.
  • 7Intelligence. gov. The structure of IC [ EB/OL ]. [ 2014-10- 20]. http: //www. intelligence, gov/mission/structure, html.
  • 8LAHNEMAN W J. Outsourcing the IC's stovepipes? [ J]. In- ternational Journal of Intelligence and Counterintelligence, 2003, 16 (4): 573-593.
  • 9SHULSKY A N, SCHMITr G J. Silent warfare: understanding the world of intelligence [M].高金虎,等,译.北京:金城出版社,2011:17.
  • 10Defense Technical Information Center. JP 2-0, joint intelligence [EB/OL]. [2014-10-12]. www. dtic. rail/doctrine/new_ pubs/jp2_0, pdf.

共引文献71

同被引文献85

引证文献6

二级引证文献23

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部