Application of security threat intelligence based on big data analysis in telecom operators
As a powerful tool for operators to deal with means of new attack and ever-changing security threats,threat intelligence is also the core power to transform traditional passive defense into active defense.The importance of threat intelligence to operators was introduced,the productive process of thr...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Beijing Xintong Media Co., Ltd
2020-11-01
|
Series: | Dianxin kexue |
Subjects: | |
Online Access: | http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2020301/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841528951124525056 |
---|---|
author | Mingxia BO Hongyu TANG Chen MA Jian ZHANG |
author_facet | Mingxia BO Hongyu TANG Chen MA Jian ZHANG |
author_sort | Mingxia BO |
collection | DOAJ |
description | As a powerful tool for operators to deal with means of new attack and ever-changing security threats,threat intelligence is also the core power to transform traditional passive defense into active defense.The importance of threat intelligence to operators was introduced,the productive process of threat intelligence was analyzed in detail,and finally the typical application scenarios of threat intelligence were given,which could provide technical reference for telecom operators in the practice of threat intelligence. |
format | Article |
id | doaj-art-8ecdf9c6a19e4f2e8bc62a87c1ae1153 |
institution | Kabale University |
issn | 1000-0801 |
language | zho |
publishDate | 2020-11-01 |
publisher | Beijing Xintong Media Co., Ltd |
record_format | Article |
series | Dianxin kexue |
spelling | doaj-art-8ecdf9c6a19e4f2e8bc62a87c1ae11532025-01-15T03:32:09ZzhoBeijing Xintong Media Co., LtdDianxin kexue1000-08012020-11-013612713359813344Application of security threat intelligence based on big data analysis in telecom operatorsMingxia BOHongyu TANGChen MAJian ZHANGAs a powerful tool for operators to deal with means of new attack and ever-changing security threats,threat intelligence is also the core power to transform traditional passive defense into active defense.The importance of threat intelligence to operators was introduced,the productive process of threat intelligence was analyzed in detail,and finally the typical application scenarios of threat intelligence were given,which could provide technical reference for telecom operators in the practice of threat intelligence.http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2020301/threat intelligenceactive defenseproductive process of threat intelligenceapplication scenarios of threat intelligence |
spellingShingle | Mingxia BO Hongyu TANG Chen MA Jian ZHANG Application of security threat intelligence based on big data analysis in telecom operators Dianxin kexue threat intelligence active defense productive process of threat intelligence application scenarios of threat intelligence |
title | Application of security threat intelligence based on big data analysis in telecom operators |
title_full | Application of security threat intelligence based on big data analysis in telecom operators |
title_fullStr | Application of security threat intelligence based on big data analysis in telecom operators |
title_full_unstemmed | Application of security threat intelligence based on big data analysis in telecom operators |
title_short | Application of security threat intelligence based on big data analysis in telecom operators |
title_sort | application of security threat intelligence based on big data analysis in telecom operators |
topic | threat intelligence active defense productive process of threat intelligence application scenarios of threat intelligence |
url | http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2020301/ |
work_keys_str_mv | AT mingxiabo applicationofsecuritythreatintelligencebasedonbigdataanalysisintelecomoperators AT hongyutang applicationofsecuritythreatintelligencebasedonbigdataanalysisintelecomoperators AT chenma applicationofsecuritythreatintelligencebasedonbigdataanalysisintelecomoperators AT jianzhang applicationofsecuritythreatintelligencebasedonbigdataanalysisintelecomoperators |