Telecommunications Science ›› 2020, Vol. 36 ›› Issue (11): 127-133.doi: 10.11959/j.issn.1000-0801.2020301

• Topic:Information Security • Previous Articles     Next Articles

Application of security threat intelligence based on big data analysis in telecom operators

Mingxia BO,Hongyu TANG,Chen MA,Jian ZHANG   

  1. Research Institute of China Telecom Co.,Ltd.,Beijing 102200,China
  • Revised:2020-11-10 Online:2020-11-20 Published:2020-12-09

Abstract:

As a powerful tool for operators to deal with means of new attack and ever-changing security threats,threat intelligence is also the core power to transform traditional passive defense into active defense.The importance of threat intelligence to operators was introduced,the productive process of threat intelligence was analyzed in detail,and finally the typical application scenarios of threat intelligence were given,which could provide technical reference for telecom operators in the practice of threat intelligence.

Key words: threat intelligence, active defense, productive process of threat intelligence, application scenarios of threat intelligence

CLC Number: 

No Suggested Reading articles found!