Application of security threat intelligence based on big data analysis in telecom operators

As a powerful tool for operators to deal with means of new attack and ever-changing security threats,threat intelligence is also the core power to transform traditional passive defense into active defense.The importance of threat intelligence to operators was introduced,the productive process of thr...

Full description

Saved in:
Bibliographic Details
Main Authors: Mingxia BO, Hongyu TANG, Chen MA, Jian ZHANG
Format: Article
Language:zho
Published: Beijing Xintong Media Co., Ltd 2020-11-01
Series:Dianxin kexue
Subjects:
Online Access:http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2020301/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841528951124525056
author Mingxia BO
Hongyu TANG
Chen MA
Jian ZHANG
author_facet Mingxia BO
Hongyu TANG
Chen MA
Jian ZHANG
author_sort Mingxia BO
collection DOAJ
description As a powerful tool for operators to deal with means of new attack and ever-changing security threats,threat intelligence is also the core power to transform traditional passive defense into active defense.The importance of threat intelligence to operators was introduced,the productive process of threat intelligence was analyzed in detail,and finally the typical application scenarios of threat intelligence were given,which could provide technical reference for telecom operators in the practice of threat intelligence.
format Article
id doaj-art-8ecdf9c6a19e4f2e8bc62a87c1ae1153
institution Kabale University
issn 1000-0801
language zho
publishDate 2020-11-01
publisher Beijing Xintong Media Co., Ltd
record_format Article
series Dianxin kexue
spelling doaj-art-8ecdf9c6a19e4f2e8bc62a87c1ae11532025-01-15T03:32:09ZzhoBeijing Xintong Media Co., LtdDianxin kexue1000-08012020-11-013612713359813344Application of security threat intelligence based on big data analysis in telecom operatorsMingxia BOHongyu TANGChen MAJian ZHANGAs a powerful tool for operators to deal with means of new attack and ever-changing security threats,threat intelligence is also the core power to transform traditional passive defense into active defense.The importance of threat intelligence to operators was introduced,the productive process of threat intelligence was analyzed in detail,and finally the typical application scenarios of threat intelligence were given,which could provide technical reference for telecom operators in the practice of threat intelligence.http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2020301/threat intelligenceactive defenseproductive process of threat intelligenceapplication scenarios of threat intelligence
spellingShingle Mingxia BO
Hongyu TANG
Chen MA
Jian ZHANG
Application of security threat intelligence based on big data analysis in telecom operators
Dianxin kexue
threat intelligence
active defense
productive process of threat intelligence
application scenarios of threat intelligence
title Application of security threat intelligence based on big data analysis in telecom operators
title_full Application of security threat intelligence based on big data analysis in telecom operators
title_fullStr Application of security threat intelligence based on big data analysis in telecom operators
title_full_unstemmed Application of security threat intelligence based on big data analysis in telecom operators
title_short Application of security threat intelligence based on big data analysis in telecom operators
title_sort application of security threat intelligence based on big data analysis in telecom operators
topic threat intelligence
active defense
productive process of threat intelligence
application scenarios of threat intelligence
url http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2020301/
work_keys_str_mv AT mingxiabo applicationofsecuritythreatintelligencebasedonbigdataanalysisintelecomoperators
AT hongyutang applicationofsecuritythreatintelligencebasedonbigdataanalysisintelecomoperators
AT chenma applicationofsecuritythreatintelligencebasedonbigdataanalysisintelecomoperators
AT jianzhang applicationofsecuritythreatintelligencebasedonbigdataanalysisintelecomoperators