Big data security analysis method based on self-update threat intelligence database
Big data security analysis method is generally based on the existing signature database to detect and match malicious behaviors.This method can only detect known attacks and can't analyze and judge new types of unknown attacks and complex variant attacks.Through the big data analysis technology...
Saved in:
Main Authors: | , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Beijing Xintong Media Co., Ltd
2018-03-01
|
Series: | Dianxin kexue |
Subjects: | |
Online Access: | http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2018127/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841530322243551232 |
---|---|
author | Yanfang HOU Jinhua WANG |
author_facet | Yanfang HOU Jinhua WANG |
author_sort | Yanfang HOU |
collection | DOAJ |
description | Big data security analysis method is generally based on the existing signature database to detect and match malicious behaviors.This method can only detect known attacks and can't analyze and judge new types of unknown attacks and complex variant attacks.Through the big data analysis technology,the collected data was extracted for safety value,and the value conversion from the collected data,threat information,threat knowledge to threat intelligence was realized,high-value threat intelligence of forming hidden,value selective,adversarial,predictive,and decision-making,evidence-based,time-sensitive was formed.Firstly,the limitations of the existing security analysis methods were analyzed.Then the construction method of threat intelligence database was introduced in detail.Finally,the security analysis method of big data based on self-renewing threat information database was described.The analysis of big data security based on the self-updated threat intelligence database could mine the hidden threats in internet data effectively and strengthen the existing security protection capabilities of internet companies so that the preemptive defense initiative could be mastered during the security game. |
format | Article |
id | doaj-art-c98e435b9aa342ef8fee418f09c264f4 |
institution | Kabale University |
issn | 1000-0801 |
language | zho |
publishDate | 2018-03-01 |
publisher | Beijing Xintong Media Co., Ltd |
record_format | Article |
series | Dianxin kexue |
spelling | doaj-art-c98e435b9aa342ef8fee418f09c264f42025-01-15T03:04:59ZzhoBeijing Xintong Media Co., LtdDianxin kexue1000-08012018-03-0134505859596403Big data security analysis method based on self-update threat intelligence databaseYanfang HOUJinhua WANGBig data security analysis method is generally based on the existing signature database to detect and match malicious behaviors.This method can only detect known attacks and can't analyze and judge new types of unknown attacks and complex variant attacks.Through the big data analysis technology,the collected data was extracted for safety value,and the value conversion from the collected data,threat information,threat knowledge to threat intelligence was realized,high-value threat intelligence of forming hidden,value selective,adversarial,predictive,and decision-making,evidence-based,time-sensitive was formed.Firstly,the limitations of the existing security analysis methods were analyzed.Then the construction method of threat intelligence database was introduced in detail.Finally,the security analysis method of big data based on self-renewing threat information database was described.The analysis of big data security based on the self-updated threat intelligence database could mine the hidden threats in internet data effectively and strengthen the existing security protection capabilities of internet companies so that the preemptive defense initiative could be mastered during the security game.http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2018127/threat intelligence databasebig data analysisthreat informationthreat knowledgeself-update |
spellingShingle | Yanfang HOU Jinhua WANG Big data security analysis method based on self-update threat intelligence database Dianxin kexue threat intelligence database big data analysis threat information threat knowledge self-update |
title | Big data security analysis method based on self-update threat intelligence database |
title_full | Big data security analysis method based on self-update threat intelligence database |
title_fullStr | Big data security analysis method based on self-update threat intelligence database |
title_full_unstemmed | Big data security analysis method based on self-update threat intelligence database |
title_short | Big data security analysis method based on self-update threat intelligence database |
title_sort | big data security analysis method based on self update threat intelligence database |
topic | threat intelligence database big data analysis threat information threat knowledge self-update |
url | http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2018127/ |
work_keys_str_mv | AT yanfanghou bigdatasecurityanalysismethodbasedonselfupdatethreatintelligencedatabase AT jinhuawang bigdatasecurityanalysismethodbasedonselfupdatethreatintelligencedatabase |