期刊文献+

面向动态防御的大数据安全技术研究 被引量:3

Research on Big Data Security Technology for Dynamic Defense
下载PDF
导出
摘要 大数据环境下,海量数据呈现出主体多样化、处理活动复杂化的特点,数据除了面临传统的安全威胁外,更要面临诸多新型安全威胁,传统的安全手段及体系已不能有效应对大数据环境下的安全威胁。针对大数据的流转复杂、关联融合、蕴含价值等特点,提出了面向动态防御的大数据防御模型。此外,研究了相关的大数据安全技术,这些技术能够构建大数据安全动态防御体系,提供动态防御能力,促进大数据安全全面向动态、主动防御方向转变。 In the environment of big data,massive data presents the characteristics of diversified subjects and complicated processing activities.In addition to traditional security threats,it is also necessary to face many new security threats.Traditional security methods and systems can no longer effectively deal with security threats in the big data environment.In view of the complex circulation,correlation and integration,and the value of the massive data,this paper proposes a dynamic defense model for big data,and researches related big data security techniques,these technologies can build big data security dynamic defense system,which can provide dynamic defense capabilities and promote the comprehensive transformation of big data security to dynamic and active defense.
作者 许杰 张锋军 陈捷 李庆华 牛作元 石凯 XU Jie;ZHANG Fengjun;CHEN Jie;LI Qinghua;NIU Zuoyuan;SHI Kai(No.30 Institute of CETC,Chengdu Sichuan 610041,China)
出处 《通信技术》 2021年第11期2551-2556,共6页 Communications Technology
关键词 大数据 大数据安全 安全威胁 防御模型 动态防御 主动防御 big data big data security security threats defense model dynamic defense active defense
  • 相关文献

参考文献12

二级参考文献92

  • 1陶春,张亮,施伯乐.基于本体的XML数据集成的查询处理[J].计算机研究与发展,2005,42(3):468-477. 被引量:15
  • 2孙凯.科技资源共享可行性分析及对策建议[J].西北大学学报(哲学社会科学版),2005,35(3):109-112. 被引量:35
  • 3姜传贤,孙星明,易叶青,杨恒伏.基于JADE算法的数据库公开水印算法的研究[J].系统仿真学报,2006,18(7):1781-1784. 被引量:9
  • 4刘伟,孟小峰,孟卫一.Deep Web数据集成研究综述[J].计算机学报,2007,30(9):1475-1489. 被引量:136
  • 5X. Feng,J. C. Zhao,K. Xu.Link prediction in complex networks: a clustering perspective[J].The European Physical Journal B.2012(1)
  • 6Vaidya, Jaideep,Atluri, Vijayalakshmi,Warner, Janice,Guo, Qi.Role Engineering via Prioritized Subset Enumeration[J].IEEE Transactions on Dependable and Secure Computing.2010(3)
  • 7Linyuan Lü,Tao Zhou.Link prediction in weighted networks: The role of weak ties[J].EPL (Europhysics Letters).2010(1)
  • 8Huiping Guo,Yingjiu Li,Anyi Liu,Sushil Jajodia.A fragile watermarking scheme for detecting malicious modifications of database relations[J].Information Sciences.2005(10)
  • 9Yingwei Cui,Jennifer Widom,Janet L. Wiener.Tracing the lineage of view data in a warehousing environment[J].ACM Transactions on Database Systems (TODS).2000(2)
  • 10AGRAWAL R, SRIKANT R. Privacy-preserving data mining[ C]//ACM Sigmod Record. ACM, 2000, 29 (2) : 439-450.

共引文献1142

同被引文献49

引证文献3

二级引证文献35

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部