Research and application exploration of threat intelligence system of telecom operators

With the increasing inequality of network attack and defense in the Internet era, threat intelligence has become one of the important tools to narrow this gap.Based on the analysis of the research status of threat intelligence at home and abroad, a set of construction methods of threat intelligence...

Full description

Saved in:
Bibliographic Details
Main Authors: Haitao ZHANG, Yi JIANG, Shijie ZHU, Qi CHEN
Format: Article
Language:zho
Published: Beijing Xintong Media Co., Ltd 2022-12-01
Series:Dianxin kexue
Subjects:
Online Access:http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2022293/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841530737424072704
author Haitao ZHANG
Yi JIANG
Shijie ZHU
Qi CHEN
author_facet Haitao ZHANG
Yi JIANG
Shijie ZHU
Qi CHEN
author_sort Haitao ZHANG
collection DOAJ
description With the increasing inequality of network attack and defense in the Internet era, threat intelligence has become one of the important tools to narrow this gap.Based on the analysis of the research status of threat intelligence at home and abroad, a set of construction methods of threat intelligence systems suitable for telecom operators were proposed, including six steps: intelligence planning, intelligence production, intelligence analysis, intelligence management, intelligence sharing and intelligence application.Meanwhile a set of multi-source intelligence fusion assessment mechanisms was presented, and the technologies and methods were systematically expounded involved in the four stages of intelligence aggregation analysis, intelligence reputation analysis, intelligence correlation analysis and intelligence aging analysis, so as to help the telecom operators build the ability of intelligence fusion analysis.At the same time, the principles of intelligence production and synchronous application were given for intrusion and loss intelligence, which provided a useful reference for telecom operators to apply threat intelligence technology to build a security protection system.
format Article
id doaj-art-492416ab941e40729e6e1be69cbe2be2
institution Kabale University
issn 1000-0801
language zho
publishDate 2022-12-01
publisher Beijing Xintong Media Co., Ltd
record_format Article
series Dianxin kexue
spelling doaj-art-492416ab941e40729e6e1be69cbe2be22025-01-15T02:59:48ZzhoBeijing Xintong Media Co., LtdDianxin kexue1000-08012022-12-013812113259574690Research and application exploration of threat intelligence system of telecom operatorsHaitao ZHANGYi JIANGShijie ZHUQi CHENWith the increasing inequality of network attack and defense in the Internet era, threat intelligence has become one of the important tools to narrow this gap.Based on the analysis of the research status of threat intelligence at home and abroad, a set of construction methods of threat intelligence systems suitable for telecom operators were proposed, including six steps: intelligence planning, intelligence production, intelligence analysis, intelligence management, intelligence sharing and intelligence application.Meanwhile a set of multi-source intelligence fusion assessment mechanisms was presented, and the technologies and methods were systematically expounded involved in the four stages of intelligence aggregation analysis, intelligence reputation analysis, intelligence correlation analysis and intelligence aging analysis, so as to help the telecom operators build the ability of intelligence fusion analysis.At the same time, the principles of intelligence production and synchronous application were given for intrusion and loss intelligence, which provided a useful reference for telecom operators to apply threat intelligence technology to build a security protection system.http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2022293/threat intelligenceintelligence analysisintelligence productionintelligence applicationtelecom operator
spellingShingle Haitao ZHANG
Yi JIANG
Shijie ZHU
Qi CHEN
Research and application exploration of threat intelligence system of telecom operators
Dianxin kexue
threat intelligence
intelligence analysis
intelligence production
intelligence application
telecom operator
title Research and application exploration of threat intelligence system of telecom operators
title_full Research and application exploration of threat intelligence system of telecom operators
title_fullStr Research and application exploration of threat intelligence system of telecom operators
title_full_unstemmed Research and application exploration of threat intelligence system of telecom operators
title_short Research and application exploration of threat intelligence system of telecom operators
title_sort research and application exploration of threat intelligence system of telecom operators
topic threat intelligence
intelligence analysis
intelligence production
intelligence application
telecom operator
url http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2022293/
work_keys_str_mv AT haitaozhang researchandapplicationexplorationofthreatintelligencesystemoftelecomoperators
AT yijiang researchandapplicationexplorationofthreatintelligencesystemoftelecomoperators
AT shijiezhu researchandapplicationexplorationofthreatintelligencesystemoftelecomoperators
AT qichen researchandapplicationexplorationofthreatintelligencesystemoftelecomoperators