Telecommunications Science ›› 2022, Vol. 38 ›› Issue (12): 121-132.doi: 10.11959/j.issn.1000-0801.2022293

• Engineering and Application • Previous Articles     Next Articles

Research and application exploration of threat intelligence system of telecom operators

Haitao ZHANG, Yi JIANG, Shijie ZHU, Qi CHEN   

  1. China Mobile Communications Zhejiang Co., Ltd., Hangzhou 310051, China
  • Revised:2022-12-06 Online:2022-12-20 Published:2022-12-01


With the increasing inequality of network attack and defense in the Internet era, threat intelligence has become one of the important tools to narrow this gap.Based on the analysis of the research status of threat intelligence at home and abroad, a set of construction methods of threat intelligence systems suitable for telecom operators were proposed, including six steps: intelligence planning, intelligence production, intelligence analysis, intelligence management, intelligence sharing and intelligence application.Meanwhile a set of multi-source intelligence fusion assessment mechanisms was presented, and the technologies and methods were systematically expounded involved in the four stages of intelligence aggregation analysis, intelligence reputation analysis, intelligence correlation analysis and intelligence aging analysis, so as to help the telecom operators build the ability of intelligence fusion analysis.At the same time, the principles of intelligence production and synchronous application were given for intrusion and loss intelligence, which provided a useful reference for telecom operators to apply threat intelligence technology to build a security protection system.

Key words: threat intelligence, intelligence analysis, intelligence production, intelligence application, telecom operator

CLC Number: 

No Suggested Reading articles found!