Application of security threat intelligence based on big data analysis in telecom operators

As a powerful tool for operators to deal with means of new attack and ever-changing security threats,threat intelligence is also the core power to transform traditional passive defense into active defense.The importance of threat intelligence to operators was introduced,the productive process of thr...

Full description

Saved in:
Bibliographic Details
Main Authors: Mingxia BO, Hongyu TANG, Chen MA, Jian ZHANG
Format: Article
Language:zho
Published: Beijing Xintong Media Co., Ltd 2020-11-01
Series:Dianxin kexue
Subjects:
Online Access:http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2020301/
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:As a powerful tool for operators to deal with means of new attack and ever-changing security threats,threat intelligence is also the core power to transform traditional passive defense into active defense.The importance of threat intelligence to operators was introduced,the productive process of threat intelligence was analyzed in detail,and finally the typical application scenarios of threat intelligence were given,which could provide technical reference for telecom operators in the practice of threat intelligence.
ISSN:1000-0801