Research and application exploration of threat intelligence system of telecom operators
With the increasing inequality of network attack and defense in the Internet era, threat intelligence has become one of the important tools to narrow this gap.Based on the analysis of the research status of threat intelligence at home and abroad, a set of construction methods of threat intelligence...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Beijing Xintong Media Co., Ltd
2022-12-01
|
Series: | Dianxin kexue |
Subjects: | |
Online Access: | http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2022293/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841530737424072704 |
---|---|
author | Haitao ZHANG Yi JIANG Shijie ZHU Qi CHEN |
author_facet | Haitao ZHANG Yi JIANG Shijie ZHU Qi CHEN |
author_sort | Haitao ZHANG |
collection | DOAJ |
description | With the increasing inequality of network attack and defense in the Internet era, threat intelligence has become one of the important tools to narrow this gap.Based on the analysis of the research status of threat intelligence at home and abroad, a set of construction methods of threat intelligence systems suitable for telecom operators were proposed, including six steps: intelligence planning, intelligence production, intelligence analysis, intelligence management, intelligence sharing and intelligence application.Meanwhile a set of multi-source intelligence fusion assessment mechanisms was presented, and the technologies and methods were systematically expounded involved in the four stages of intelligence aggregation analysis, intelligence reputation analysis, intelligence correlation analysis and intelligence aging analysis, so as to help the telecom operators build the ability of intelligence fusion analysis.At the same time, the principles of intelligence production and synchronous application were given for intrusion and loss intelligence, which provided a useful reference for telecom operators to apply threat intelligence technology to build a security protection system. |
format | Article |
id | doaj-art-492416ab941e40729e6e1be69cbe2be2 |
institution | Kabale University |
issn | 1000-0801 |
language | zho |
publishDate | 2022-12-01 |
publisher | Beijing Xintong Media Co., Ltd |
record_format | Article |
series | Dianxin kexue |
spelling | doaj-art-492416ab941e40729e6e1be69cbe2be22025-01-15T02:59:48ZzhoBeijing Xintong Media Co., LtdDianxin kexue1000-08012022-12-013812113259574690Research and application exploration of threat intelligence system of telecom operatorsHaitao ZHANGYi JIANGShijie ZHUQi CHENWith the increasing inequality of network attack and defense in the Internet era, threat intelligence has become one of the important tools to narrow this gap.Based on the analysis of the research status of threat intelligence at home and abroad, a set of construction methods of threat intelligence systems suitable for telecom operators were proposed, including six steps: intelligence planning, intelligence production, intelligence analysis, intelligence management, intelligence sharing and intelligence application.Meanwhile a set of multi-source intelligence fusion assessment mechanisms was presented, and the technologies and methods were systematically expounded involved in the four stages of intelligence aggregation analysis, intelligence reputation analysis, intelligence correlation analysis and intelligence aging analysis, so as to help the telecom operators build the ability of intelligence fusion analysis.At the same time, the principles of intelligence production and synchronous application were given for intrusion and loss intelligence, which provided a useful reference for telecom operators to apply threat intelligence technology to build a security protection system.http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2022293/threat intelligenceintelligence analysisintelligence productionintelligence applicationtelecom operator |
spellingShingle | Haitao ZHANG Yi JIANG Shijie ZHU Qi CHEN Research and application exploration of threat intelligence system of telecom operators Dianxin kexue threat intelligence intelligence analysis intelligence production intelligence application telecom operator |
title | Research and application exploration of threat intelligence system of telecom operators |
title_full | Research and application exploration of threat intelligence system of telecom operators |
title_fullStr | Research and application exploration of threat intelligence system of telecom operators |
title_full_unstemmed | Research and application exploration of threat intelligence system of telecom operators |
title_short | Research and application exploration of threat intelligence system of telecom operators |
title_sort | research and application exploration of threat intelligence system of telecom operators |
topic | threat intelligence intelligence analysis intelligence production intelligence application telecom operator |
url | http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2022293/ |
work_keys_str_mv | AT haitaozhang researchandapplicationexplorationofthreatintelligencesystemoftelecomoperators AT yijiang researchandapplicationexplorationofthreatintelligencesystemoftelecomoperators AT shijiezhu researchandapplicationexplorationofthreatintelligencesystemoftelecomoperators AT qichen researchandapplicationexplorationofthreatintelligencesystemoftelecomoperators |