期刊文献+

媒体融合背景下的网络安全研究 被引量:5

Research on Network Security of Media Convergence
下载PDF
导出
摘要 随着IT变革,以移动互联为特征的信息时代已经到来,电视台深入推进媒体融合发展战略,构建媒体融合平台,以云计算、大数据等现代信息技术为基础打造"媒体融合云平台"。媒体融合平台已从原有全台网有限边界演变为无边界网络状态,利用虚拟化技术,使网络虚拟化,虚拟机置于共享区域。因此,如何保护媒体融合云平台的安全,成为媒体融合平台关注的重要问题。本文针对融合媒体云平台存在的安全隐患,介绍基于大数据分析的高级持续性威胁(APT,Advanced Persistent Threat)防御系统、虚拟机安全解决方案。 With IT revolution, the mobile information age has arrived. TV stations, with great efforts, promote the development strategy of media convergence and build media convergence platform based on cloud computing, big data and other modern information technologies. Media con- vergence platform changes the original whole-station network, from a limited boundary to a borderless virtual network using virtualization technol- ogy. Virtual machines are placed in the sharing area. Therefore, network security is becoming the key issue of media convergence platform. This article introduces the advanced persistent threat (APT) system based on big data analysis and security solutions of virtual machines.
作者 何杰
出处 《广播与电视技术》 2017年第6期16-20,共5页 Radio & TV Broadcast Engineering
关键词 融合媒体 网络安全 APT攻击 虚拟机安全 Media convergence, Network Security, APT, Virtual machine security
  • 相关文献

参考文献1

二级参考文献21

  • 1MANADHATA P K.Big Data for Security:Challenges,Opportunities,and Examples[C]//Proceedings of the 2012 ACM Workshop on Building Analysis Datasets and Gathering Experience Returns for Security,Raleigh,North Carolina,USA,2012.
  • 2YU S C,WANG C,REN K,et al.Achieving Secure,Scalable,and Fine-grained Data Access Control in Cloud Computing[C]//Proceedings of the INFOCOM'10,the 29th conference on Information communication,Piscataway,USA,2010:534-542.
  • 3BELARE M and ROGAWAY P.Introduction to Modern Cryptography[J].Ucsd Cse,2005:207.
  • 4GENTRY C,HALEVI S,SMART N P.Homomorphic Evaluation of The AES Circuit[M].Germany:Springer Berlin Heidelberg,2012.
  • 5CATALANO D.Paillier's Cryptosystem Revisited[C]//in Proceedings of the 8th ACM conference on Computer and Communications Security,PA,USA,2001:206-214.
  • 6BENDLIN R,DAMGARD I,ORLANDI C,et al.Semi-Homomorphic Encryption and Multiparty Computation[M].Germany:Springer Berlin Heidelberg,2011.
  • 7GENTRY C.A Fully Homomorphic Encryption Scheme[D].Standford University,2009.
  • 8ITANI W,KAYSSI A,CHEHAB A.Privacy As a Service:Privacy-Aware Data Storage and Processing in Cloud Computing Architectures[C]//Eighth IEEE International Conference on Dependable,Autonomic and Secure Computing,Washington DC,USA,2009:711-716.doi:10.1109/DASC.2009.139.
  • 9CREESE S,HOPKINS P,PEARSON S,et al.Data Protection-Aware Design for Cloud Services[M].Germany:Springer Berlin Heidelberg,2009.
  • 10PARAKH A,KAK S.Space Efficient Secret Sharing for Implicit Data Security[J].Information Science,2011,181(2):335-341.

共引文献22

同被引文献20

引证文献5

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部