Big data security analysis method based on self-update threat intelligence database

Big data security analysis method is generally based on the existing signature database to detect and match malicious behaviors.This method can only detect known attacks and can't analyze and judge new types of unknown attacks and complex variant attacks.Through the big data analysis technology...

Full description

Saved in:
Bibliographic Details
Main Authors: Yanfang HOU, Jinhua WANG
Format: Article
Language:zho
Published: Beijing Xintong Media Co., Ltd 2018-03-01
Series:Dianxin kexue
Subjects:
Online Access:http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2018127/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841530322243551232
author Yanfang HOU
Jinhua WANG
author_facet Yanfang HOU
Jinhua WANG
author_sort Yanfang HOU
collection DOAJ
description Big data security analysis method is generally based on the existing signature database to detect and match malicious behaviors.This method can only detect known attacks and can't analyze and judge new types of unknown attacks and complex variant attacks.Through the big data analysis technology,the collected data was extracted for safety value,and the value conversion from the collected data,threat information,threat knowledge to threat intelligence was realized,high-value threat intelligence of forming hidden,value selective,adversarial,predictive,and decision-making,evidence-based,time-sensitive was formed.Firstly,the limitations of the existing security analysis methods were analyzed.Then the construction method of threat intelligence database was introduced in detail.Finally,the security analysis method of big data based on self-renewing threat information database was described.The analysis of big data security based on the self-updated threat intelligence database could mine the hidden threats in internet data effectively and strengthen the existing security protection capabilities of internet companies so that the preemptive defense initiative could be mastered during the security game.
format Article
id doaj-art-c98e435b9aa342ef8fee418f09c264f4
institution Kabale University
issn 1000-0801
language zho
publishDate 2018-03-01
publisher Beijing Xintong Media Co., Ltd
record_format Article
series Dianxin kexue
spelling doaj-art-c98e435b9aa342ef8fee418f09c264f42025-01-15T03:04:59ZzhoBeijing Xintong Media Co., LtdDianxin kexue1000-08012018-03-0134505859596403Big data security analysis method based on self-update threat intelligence databaseYanfang HOUJinhua WANGBig data security analysis method is generally based on the existing signature database to detect and match malicious behaviors.This method can only detect known attacks and can't analyze and judge new types of unknown attacks and complex variant attacks.Through the big data analysis technology,the collected data was extracted for safety value,and the value conversion from the collected data,threat information,threat knowledge to threat intelligence was realized,high-value threat intelligence of forming hidden,value selective,adversarial,predictive,and decision-making,evidence-based,time-sensitive was formed.Firstly,the limitations of the existing security analysis methods were analyzed.Then the construction method of threat intelligence database was introduced in detail.Finally,the security analysis method of big data based on self-renewing threat information database was described.The analysis of big data security based on the self-updated threat intelligence database could mine the hidden threats in internet data effectively and strengthen the existing security protection capabilities of internet companies so that the preemptive defense initiative could be mastered during the security game.http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2018127/threat intelligence databasebig data analysisthreat informationthreat knowledgeself-update
spellingShingle Yanfang HOU
Jinhua WANG
Big data security analysis method based on self-update threat intelligence database
Dianxin kexue
threat intelligence database
big data analysis
threat information
threat knowledge
self-update
title Big data security analysis method based on self-update threat intelligence database
title_full Big data security analysis method based on self-update threat intelligence database
title_fullStr Big data security analysis method based on self-update threat intelligence database
title_full_unstemmed Big data security analysis method based on self-update threat intelligence database
title_short Big data security analysis method based on self-update threat intelligence database
title_sort big data security analysis method based on self update threat intelligence database
topic threat intelligence database
big data analysis
threat information
threat knowledge
self-update
url http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2018127/
work_keys_str_mv AT yanfanghou bigdatasecurityanalysismethodbasedonselfupdatethreatintelligencedatabase
AT jinhuawang bigdatasecurityanalysismethodbasedonselfupdatethreatintelligencedatabase