隐私保护体系下网络威胁情报共享的研究现状和方案设计  被引量:1

Research and Scheme Design of Cyber Threat Intelligence Sharing under Privacy Protection System

在线阅读下载全文

作  者:问闻[1] 刘钦菊 邝琳 任雪静 WEN Wen;LIU Qinju;KUANG Lin;REN Xuejing(Beijing Municipal Public Security Bureau Critical Information Infrastructre Protection Center,Beijing 100029,China)

机构地区:[1]北京市公安局关键信息基础设施保护中心,北京100029

出  处:《信息网络安全》2024年第7期1129-1137,共9页Netinfo Security

摘  要:网络威胁情报共享有利于实现网络安全态势感知以应对网络威胁,但网络威胁情报高度敏感,处理不当极易导致共享者利益受损或暴露安全防护弱点等严重后果。因此,网络威胁情报共享的前提是保证数据安全和用户隐私。文章聚焦隐私保护体系下的网络威胁情报共享研究,首先对网络威胁情报、网络威胁情报共享、隐私计算技术等相关内容进行总结分析;然后从网络威胁情报共享面临的安全隐私问题出发,对近年的网络威胁情报共享技术路径和研究现状进行梳理和分析;最后设计一个基于隐私计算技术的网络威胁情报共享平台方案。Cyber threat intelligence sharing is beneficial for achieving cyber security situational awareness to deal with cyber threats.However,the cyber threat intelligence is highly sensitive,improper handling can easily lead to damage interests of sharers or expose the weakness of security protection.Therefore,the premise of cyber threat intelligence sharing is to ensure data security and user privacy.This paper focused on the analysis and research of cyber threat intelligence sharing under the privacy protection system.First of all,we summarized and analyzed the cyber threat intelligence,cyber threat intelligence sharing and privacy computing technology.Then,starting from the security and privacy issues faced by cyber threat intelligence sharing,we carefully combed and deeply analyzed the technical path and research status of cyber threat intelligence sharing in recent years.Finally,based on the privacy computing,we designed the framework of cyber threat intelligence sharing scheme.

关 键 词:网络安全 网络威胁情报共享 隐私计算 

分 类 号:TP309[自动化与计算机技术—计算机系统结构]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象