Computer and Modernization

Previous Articles     Next Articles

Research on Security Situation Awareness and Intrusion Intention#br# Recognition Based on Threat Intelligence Sharing

  

  1. NARI Group Corporation, Nanjing 210003, China
  • Received:2016-07-13 Online:2017-03-29 Published:2017-03-30

Abstract:

With large scale introduction of “Internet +” technology represented by cloud computing, Internet of things, and big data, information security exposure surface of
power grid is rapidly increasing. In order to cope with the severe challenges of security protection of power grid, one of the important means is using the threat intelligence
as the starting point, through sharing important thirdparty security intelligence data on the security situation assessment of power grid to timely detect abnormal behavior,
and finally identify intrusion intention. This paper presents a method for sharing threat intelligence, realizes the design of security threat intelligence sharing system, and
puts forward the security situation awareness and intrusion intention identification method based on threat intelligence sharing.

Key words: data mining, traffic analysis, threat intelligence, security situation, intrusion intention recognition

CLC Number: