电信科学 ›› 2020, Vol. 36 ›› Issue (11): 127-133.doi: 10.11959/j.issn.1000-0801.2020301

• 专栏:信息安全 • 上一篇    下一篇

基于大数据分析的安全威胁情报在电信运营商的落地应用

薄明霞,唐洪玉,马晨,张鉴   

  1. 中国电信股份有限公司研究院,北京 102200
  • 修回日期:2020-11-10 出版日期:2020-11-20 发布日期:2020-12-09
  • 作者简介:薄明霞(1978- ),女,博士,中国电信股份有限公司研究院高级工程师,主要研究方向为威胁情报、态势感知、云网融合安全等|唐洪玉(1977- ),男,中国电信股份有限公司研究院运营支撑部主任,主要研究方向为云安全、威胁检测、态势感知|马晨(1993- ),男,中国电信股份有限公司研究院工程师,主要研究方向为云安全、威胁检测、态势感知|张鉴(1976- ),男,中国电信股份有限公司研究院高级工程师,主要研究方向为云安全、安全攻防、5G安全

Application of security threat intelligence based on big data analysis in telecom operators

Mingxia BO,Hongyu TANG,Chen MA,Jian ZHANG   

  1. Research Institute of China Telecom Co.,Ltd.,Beijing 102200,China
  • Revised:2020-11-10 Online:2020-11-20 Published:2020-12-09

摘要:

威胁情报作为运营商应对新的攻击手段和变化多端的安全威胁的利器,也是将传统的被动防御转为主动防御的核心动力。介绍了威胁情报对于运营商的重要性,详细分析了威胁情报的生产流程,最后给出威胁情报的典型应用场景,可为电信运营商威胁情报的落地实践提供技术参考。

关键词: 威胁情报, 主动防御, 情报生产, 情报应用

Abstract:

As a powerful tool for operators to deal with means of new attack and ever-changing security threats,threat intelligence is also the core power to transform traditional passive defense into active defense.The importance of threat intelligence to operators was introduced,the productive process of threat intelligence was analyzed in detail,and finally the typical application scenarios of threat intelligence were given,which could provide technical reference for telecom operators in the practice of threat intelligence.

Key words: threat intelligence, active defense, productive process of threat intelligence, application scenarios of threat intelligence

中图分类号: 

No Suggested Reading articles found!