Research on Key Technology of Network Security Situation Awareness of Private Cloud in Enterprises

被引:0
作者
Liu Qing [1 ]
Zhu Boyu [2 ]
Wan Jinhua [1 ]
Li Qinqian [1 ]
机构
[1] State Nucl Elect Power Planning Design & Res Inst, Info & Document Ctr, Beijing, Peoples R China
[2] Informat Ctr CAAC, Planning & Dev Div, Beijing, Peoples R China
来源
2018 IEEE 3RD INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND BIG DATA ANALYSIS (ICCCBDA) | 2018年
关键词
private cloud; network security situation awareness; big data;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the popularity of private cloud, how to protect the private cloud network security has become the focus of more and more enterprises. The enterprise information security system needs to integrate the information security construction into the infrastructure construction. Enterprise private cloud network security situation is a systematic, overall situation management engineering problems, and any private cloud vulnerabilities may lead to paralysis of the entire network. This paper takes the basic network security situation, big data security, private cloud network security situation as the entry point, analyzes the relevant evaluation indexes, and establishes the evaluation system model and other key technologies, elaborates on the private cloud network security situation in enterprises.
引用
收藏
页码:462 / 466
页数:5
相关论文
共 10 条
[1]  
[Anonymous], 2012, Login: The Usenix Magazine
[2]   Predictive Network Anomaly Detection and Visualization [J].
Celenk, Mehmet ;
Conley, Thomas ;
Willis, John ;
Graham, James .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2010, 5 (02) :288-299
[3]   Artificial immune danger theory based model for network security evaluation [J].
Sun F. .
Journal of Networks, 2011, 6 (02) :255-262
[4]  
FireEye, 2015, CYB MAG LIN REAL WOR
[5]  
Lai JB, 2006, 2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, P1545
[6]   Using the vulnerability information of computer systems to improve the network security [J].
Lai, Yeu-Pong ;
Hsia, Po-Lun .
COMPUTER COMMUNICATIONS, 2007, 30 (09) :2032-2047
[7]  
[韦勇 Wei Yong], 2009, [计算机研究与发展, Journal of Computer Research and Development], V46, P353
[8]  
Zhang J. F, 2013, RES KEY TECHNOLOGIES, P19
[9]   Synthetic security assessment based on variable consistency dominance-based rough set approach [J].
Zhao L. ;
Xue Z. .
High Technology Letters, 2010, 16 (04) :413-421
[10]  
Zhao Y, 2012, IEEE CONF VIS ANAL, P281