面向卫星通信网络的威胁情报关键技术
Key Technologies of Threat Intelligence for Satellite Communication Network
DOI: 10.12677/SEA.2020.95046, PDF,   
作者: 董 坤, 刘艳梅, 李 洋:中国卫通集团有限公司,北京;李 序, 黄克振:中国科学院软件研究所可信计算与信息保障实验室,北京;中国科学院大学,北京;张海霞:中国科学院软件研究所可信计算与信息保障实验室,北京
关键词: 网络安全威胁情报卫星通信网络数据治理人工智能Cyber Security Threat Intelligence Satellite Communication Network Data Governance Artificial Intelligence
摘要: 随着卫星通信网络的逐步推广应用,如何保障此类新型网络环境的安全性成为业界的关注重点。本文提出将威胁情报相关技术引入卫星通信网络的安全防护工作,分析了卫星通信网络威胁情报面临的技术挑战,提出了面向卫星通信网络的威胁情报技术架构,对其中关键的威胁情报分析挖掘技术进行了阐述,并对未来研究工作进行了展望。
Abstract: With the gradual promotion and application of satellite communication networks, how to ensure the security of this new type of network environment has become the focus of the industry. This paper proposes to introduce threat intelligence related technologies into the security protection work of satellite communication networks, analyzes the technical challenges faced by satellite communication network threat intelligence, and proposes a threat intelligence technology archi-tecture for satellite communication networks, conducts analysis and mining technologies of key threat intelligence, and makes a prospect of the future research work.
文章引用:董坤, 李序, 刘艳梅, 李洋, 张海霞, 黄克振. 面向卫星通信网络的威胁情报关键技术[J]. 软件工程与应用, 2020, 9(5): 403-411. https://doi.org/10.12677/SEA.2020.95046

参考文献

[1] 张更新. 卫星移动通信系统[M]. 北京: 人民邮电出版社, 2001.
[2] 王晓梅, 张铮, 冉崇森. 关于宽带卫星网络安全问题的思考[J]. 电信科学, 2002(12): 38-41.
[3] McMillan, R. (2013) Definition: Threat Intelligence. Gartner Research. G002 49251.
[4] Southern African Neuroscience Society (2016) SANS Information Security Research. http://www.sans.org
[5] Fire Eye Inc. (2016) I SIGHT Parters. http://www.isightpartners.com
[6] Chismon, D. and Ruks, M. (2015) Threat Intelligence: Collecting, Analysing, Evaluating. MWR Infosecurity, UK Cert, United Kingdom.
[7] Graf, R. and King, R. (2018) Neural Network and Blockchain Based Technique for Cyber Threat In-telligence and Situational Awareness. In: 2018 10th International Conference on Cyber Conflict, Tallinn, 29 May-1 June 2018, 409-426. [Google Scholar] [CrossRef
[8] 李建华. 网络空间威胁情报感知、共享与分析技术综述[J]. 网络与信息安全学报, 2016, 2(2): 16-29.
[9] Noor, U., Anwar, Z., Amjad, T., et al. (2019) A Machine Learn-ing-Based FinTech Cyber Threat Attribution Framework Using High-Level Indicators of Compromise. Future Genera-tion Computer Systems, 96, 227-242.
[10] 王通. 威胁情报知识图谱构建技术的研究与实现[D]: [硕士学位论文]. 北京: 中国电子科技集团公司电子科学研究院, 2019.
[11] 吕宗平, 钟友兵, 顾兆军. 基于攻击链和网络流量检测的威胁情报分析研究[J]. 计算机应用研究, 2017, 34(6): 1794-1797, 1804.
[12] 卿斯汉, 文伟平, 蒋建春, 马恒太, 刘雪飞. 一种基于网状关联分析的网络蠕虫预警新方法[J]. 通信学报, 2004(7): 62-70.
[13] Ponemon (2013) Live Threat Intelligence Impact Report 2013. Tech. Rep., Ponemon Institute Research Report.
[14] Ring, T. (2014) Threat Intelligence: Why People Don’t Share. Computer Fraud & Security, 2014, 5-9. [Google Scholar] [CrossRef
[15] 薄明霞, 唐洪玉, 冯晓冬. 基于大数据的安全威胁情报分析与共享平台技术架构研究[J]. 电信技术, 2019(11): 5-9.
[16] 马朝辉, 聂瑞华, 谭昊翔, 林嘉洺, 王欣明, 唐华, 杨晋吉, 赵淦森. 大数据治理的数据模式与安全[J]. 大数据, 2016, 2(3): 83-95.
[17] 郭平, 王可, 罗阿理, 薛明志. 大数据分析中的计算智能研究现状与展望[J]. 软件学报, 2015, 26(11): 3010-3025.