检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:陈剑锋[1,2] CHEN Jianfeng(No.30 Institute of CETC,Chengdu Sichuan 610041,China;China Electronics Technology Cyber Security Co.,Ltd.,Chengdu Sichuan 610041,China)
机构地区:[1]中国电子科技集团公司第三十研究所,四川成都610041 [2]中国电子科技网络信息安全有限公司,四川成都610041
出 处:《信息安全与通信保密》2022年第7期17-24,共8页Information Security and Communications Privacy
基 金:国家重点研发计划项目(No.2019YFB2101701)。
摘 要:网络空间开源威胁情报是开源情报的一个子集,主要关注与网络空间对抗战术、技术、程序、行为、事件和所有其他元素相关的信息。随着网络空间规模和复杂性的提升,网络空间攻防力量不对等、优势非对称、信息不透明等矛盾逐渐突出,信息量迅速增加到人类难以及时处理的程度,防御者必须通过人机协同方式提升能力。当前,人机协同效能尚存在极大的优化空间,通过剖析网络空间威胁情报分析需求,提出开源威胁情报的应用模型,给出四象限的人机工作分工与职责优先级,为提高情报分析的准确性、洞察力和人机协同效率谋划发展进路。Open source threat intelligence in cyberspace is a subset of open source intelligence that focuses on information related to cyberspace countermeasure tactics,techniques,procedures,behaviors,events,and all other elements.With the increase in the scale and complexity of cyberspace,contradictions such as unequal offensive and defensive forces,asymmetric advantages,and opaque information in cyberspace have gradually become prominent,meanwhile the amount of information has rapidly increased to the extent that it is difficult for ability-constrained humans to deal with in proper time.At present,there is still a great distance for optimization of human-machine collaboration efficiency.By analyzing the demand for cyberspace threat intelligence analysis,an application model of open source threat intelligence is proposed,and the four-quadrant human-machine work division and responsibility priority are given.Further plan development paths are purposed to increase accuracy,insight and human-machine synergy efficiency.
分 类 号:TP309[自动化与计算机技术—计算机系统结构]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.145