Brief Analysis for Network Security Issues in Mega-Projects Approved for Data Clusters

被引:1
作者
Lan, Shizhan [1 ,2 ]
Huang, Jing [3 ]
机构
[1] South China Univ Technol, Sch Software Engn, Guangzhou 510006, Peoples R China
[2] China Mobile Guangxi Branch Co Ltd, Nanning 530012, Peoples R China
[3] EVERSEC Beijing Technol Co Ltd, Beijing 100191, Peoples R China
来源
CYBER SECURITY, CNCERT 2022 | 2022年 / 1699卷
关键词
Mega-projects approved for data clusters; Network security; Network situation awareness; Network security computing brain; Atomic security capability; AI model;
D O I
10.1007/978-981-19-8285-9_3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network security is an important guarantee for Mega-projects approved for data clusters. It is necessary to comprehensively improve the network security awareness, monitoring, earlywarning, disposal and evaluation capabilities of Mega-projects approved for data clusters. It makes a comprehensive analysis on the network security issues in Mega-projects approved for data clusters from dimensions of computing facility security, network facility security, combination and scheduling security, network operation service security, data security, network situation awareness, etc. It is set up gradually evolving atomic power security capabilities for building a ubiquitous security network computing brain. It identifies data assets in an active and passive ways, sorts out data assets through in-depth scanning and information completion, supports the formation of preset templates according to AI (artificial intelligence) models, regular matching, keywords, combination rules, etc., classifies and grades data according to data sensitivity, and visually displays them in the form of charts. It forms a multi-layer architecture system that includes the collaborative scheduling of computing networks on the control side, the perception of network convergence on the data side, management and the scheduling of computing resources on the service side, realizes the interaction and supervision of the whole process, all elements and the whole industry chain of computing scheduling, has functions of security perception, monitoring, early warning, disposal and evaluation, and improves the security perception and linkage monitoring capability of cross data center and clusters. Gradually, it builds a coordinated threat handling capability.
引用
收藏
页码:38 / 50
页数:13
相关论文
共 5 条
[1]  
[Anonymous], 2022, 212 NAT DEV REF COMM, P212
[2]  
[Anonymous], 2021, 202176 MIN IND INF T, P76
[3]  
Kwiecien A, 2013, COMM COM INF SC, V370, P495
[4]  
Lotz V., 1997, THREAT SCENARIOS MEA
[5]  
Zhang Y., 2013, TRUSTWORTHY COMPUTIN, V320, DOI [10.1007/978-3-642-35795-4_83, DOI 10.1007/978-3-642-35795-4_83]