Overview of the technologies of threat intelligence sensing,sharing and analysis in cyber space

With a rapid development of information technologies including big data,cloud computing,Internet of things,etc.,the threats in cyber space also become more ubiquitous and complex.Moreover,more and more persis-tence and hidden features present in all kinds of network attacks.Threat intelligence based...

Full description

Saved in:
Bibliographic Details
Main Author: Jian-hua LI
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2016-02-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2016.00028
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850092370157109248
author Jian-hua LI
author_facet Jian-hua LI
author_sort Jian-hua LI
collection DOAJ
description With a rapid development of information technologies including big data,cloud computing,Internet of things,etc.,the threats in cyber space also become more ubiquitous and complex.Moreover,more and more persis-tence and hidden features present in all kinds of network attacks.Threat intelligence based network defense can analyze the undergoing attacks and predict the threat situation in the future.Furthermore,based on the potential risk,users can define efficient security policy,thus the defense capabilities of the cyber space could be enhanced system-atically.Threat intelligence is a very wide research area.The research works and developments of the sensing,shar-ing and analysis for threat intelligence were studied and reviewed deeply.
format Article
id doaj-art-eaf8f423c3e5437cb47128a05cfb69ff
institution DOAJ
issn 2096-109X
language English
publishDate 2016-02-01
publisher POSTS&TELECOM PRESS Co., LTD
record_format Article
series 网络与信息安全学报
spelling doaj-art-eaf8f423c3e5437cb47128a05cfb69ff2025-08-20T02:42:08ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2016-02-012162959543796Overview of the technologies of threat intelligence sensing,sharing and analysis in cyber spaceJian-hua LIWith a rapid development of information technologies including big data,cloud computing,Internet of things,etc.,the threats in cyber space also become more ubiquitous and complex.Moreover,more and more persis-tence and hidden features present in all kinds of network attacks.Threat intelligence based network defense can analyze the undergoing attacks and predict the threat situation in the future.Furthermore,based on the potential risk,users can define efficient security policy,thus the defense capabilities of the cyber space could be enhanced system-atically.Threat intelligence is a very wide research area.The research works and developments of the sensing,shar-ing and analysis for threat intelligence were studied and reviewed deeply.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2016.00028cyber space securitythreat intelligence perceptionthreatintelligence sharingartificial intelligence
spellingShingle Jian-hua LI
Overview of the technologies of threat intelligence sensing,sharing and analysis in cyber space
网络与信息安全学报
cyber space security
threat intelligence perception
threatintelligence sharing
artificial intelligence
title Overview of the technologies of threat intelligence sensing,sharing and analysis in cyber space
title_full Overview of the technologies of threat intelligence sensing,sharing and analysis in cyber space
title_fullStr Overview of the technologies of threat intelligence sensing,sharing and analysis in cyber space
title_full_unstemmed Overview of the technologies of threat intelligence sensing,sharing and analysis in cyber space
title_short Overview of the technologies of threat intelligence sensing,sharing and analysis in cyber space
title_sort overview of the technologies of threat intelligence sensing sharing and analysis in cyber space
topic cyber space security
threat intelligence perception
threatintelligence sharing
artificial intelligence
url http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2016.00028
work_keys_str_mv AT jianhuali overviewofthetechnologiesofthreatintelligencesensingsharingandanalysisincyberspace