检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:问闻[1] 刘钦菊 邝琳 任雪静 WEN Wen;LIU Qinju;KUANG Lin;REN Xuejing(Beijing Municipal Public Security Bureau Critical Information Infrastructre Protection Center,Beijing 100029,China)
机构地区:[1]北京市公安局关键信息基础设施保护中心,北京100029
出 处:《信息网络安全》2024年第7期1129-1137,共9页Netinfo Security
摘 要:网络威胁情报共享有利于实现网络安全态势感知以应对网络威胁,但网络威胁情报高度敏感,处理不当极易导致共享者利益受损或暴露安全防护弱点等严重后果。因此,网络威胁情报共享的前提是保证数据安全和用户隐私。文章聚焦隐私保护体系下的网络威胁情报共享研究,首先对网络威胁情报、网络威胁情报共享、隐私计算技术等相关内容进行总结分析;然后从网络威胁情报共享面临的安全隐私问题出发,对近年的网络威胁情报共享技术路径和研究现状进行梳理和分析;最后设计一个基于隐私计算技术的网络威胁情报共享平台方案。Cyber threat intelligence sharing is beneficial for achieving cyber security situational awareness to deal with cyber threats.However,the cyber threat intelligence is highly sensitive,improper handling can easily lead to damage interests of sharers or expose the weakness of security protection.Therefore,the premise of cyber threat intelligence sharing is to ensure data security and user privacy.This paper focused on the analysis and research of cyber threat intelligence sharing under the privacy protection system.First of all,we summarized and analyzed the cyber threat intelligence,cyber threat intelligence sharing and privacy computing technology.Then,starting from the security and privacy issues faced by cyber threat intelligence sharing,we carefully combed and deeply analyzed the technical path and research status of cyber threat intelligence sharing in recent years.Finally,based on the privacy computing,we designed the framework of cyber threat intelligence sharing scheme.
分 类 号:TP309[自动化与计算机技术—计算机系统结构]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.211