期刊文献+

考虑不对称性的网络安全威胁情报共享模型研究 被引量:1

Research on Network Security Threat Intelligence Sharing Model Considering Asymmetry
下载PDF
导出
摘要 为了提高网络信息在共享中的安全性,开展考虑信息不对称性条件的网络安全威胁情报共享模型设计研究。首先,引进情报节点注册算法,将接入公共网络的组织机构网络绘制成有序的区块网络,提取网络节点异常信息;其次,通过对网络身份安全威胁情报进行有效调度与传输,生成一个完整的网络身份安全威胁情报;最后,引进分布式账本技术,将其与IP网络进行匹配,在信息链上通过构建数据结构进行私有链与数据的提取,实现情报信息共享模型生成与运作。实例应用分析证明,提出的共享模型在实际应用中能够实现对用户情报信息的安全共享,在共享过程中用户隐私情报信息不会被泄露,降低了网络安全威胁程度。 In order to improve the security of network information sharing, the design of network security threat intelligence sharing model considering the condition of information asymmetry is studied. Firstly, the intelligence node registration algorithm is introduced to draw the organizational network connected to the public network into an orderly block network to extract the abnormal information of network nodes;Secondly, through the effective scheduling and transmission of network identity security threat intelligence, a complete network identity security threat intelligence is generated;Finally, the distributed ledger technology is introduced to match it with the IP network. Through the construction of data structure on the information chain, the private chain and data are extracted to realize the generation and operation of intelligence information sharing model. The example application analysis shows that the proposed sharing model can realize the secure sharing of user intelligence information in practical application, and the user privacy intelligence information will not be leaked in the sharing process, which reduces the degree of network security threat.
作者 程兵 CHENG Bing(Sillcon Lake Vocational&Technical Institute,Network Information Technology Center,Kunshan Jiangsu 215000,China)
出处 《信息与电脑》 2021年第23期219-221,共3页 Information & Computer
关键词 不对称性 网络安全 情报共享 分布式账本技术 asymmetry cyber security information sharing distributed ledger technology
  • 相关文献

参考文献10

二级参考文献74

共引文献103

同被引文献6

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部