基于大数据业务场景的数据安全分析与标签识别技术研究

Donglan Liu, Deqiu Kong, Xin Liu, Lei Ma, Yingxian Chang, Hao Zhang, Rui Wang, Hao Yu
{"title":"基于大数据业务场景的数据安全分析与标签识别技术研究","authors":"Donglan Liu, Deqiu Kong, Xin Liu, Lei Ma, Yingxian Chang, Hao Zhang, Rui Wang, Hao Yu","doi":"10.1109/ICEIEC49280.2020.9152308","DOIUrl":null,"url":null,"abstract":"Data is the inevitable product of social high informatization, and its security risk is an indispensable part of information security. In the case of accelerating the construction of ubiquitous power Internet of things, this paper deeply studies the data security analysis and label recognition technology based on big data business scenarios. Based on the process of active and passive discovery, a complete catalog of data assets is established by means of database scanning, server scanning, terminal scanning, terminal monitoring, network monitoring and database access monitoring. The threat tree is used to model various threats to data security. On the basis of data asset cataloging and threat modeling, this paper studies the data security risk analysis and quantification method by comprehensively judging the threats faced by the business system, as well as the vulnerability and asset value of the system itself. Based on the heuristic integrated learning strategy of automatic semantic tagging for massive network resources, metadata is extracted through active and passive collection, and the semantic relationship between tags is extracted and processed by natural language processing and machine learning technology. Finally, automatic labels are generated through analysis capabilities such as business correlation analysis, organizational correlation analysis, data distribution analysis, data classification and grade.","PeriodicalId":352285,"journal":{"name":"2020 IEEE 10th International Conference on Electronics Information and Emergency Communication (ICEIEC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Research on Data Security Analysis and Label Recognition Technology Based on Big Data Business Scenario\",\"authors\":\"Donglan Liu, Deqiu Kong, Xin Liu, Lei Ma, Yingxian Chang, Hao Zhang, Rui Wang, Hao Yu\",\"doi\":\"10.1109/ICEIEC49280.2020.9152308\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Data is the inevitable product of social high informatization, and its security risk is an indispensable part of information security. In the case of accelerating the construction of ubiquitous power Internet of things, this paper deeply studies the data security analysis and label recognition technology based on big data business scenarios. Based on the process of active and passive discovery, a complete catalog of data assets is established by means of database scanning, server scanning, terminal scanning, terminal monitoring, network monitoring and database access monitoring. The threat tree is used to model various threats to data security. On the basis of data asset cataloging and threat modeling, this paper studies the data security risk analysis and quantification method by comprehensively judging the threats faced by the business system, as well as the vulnerability and asset value of the system itself. Based on the heuristic integrated learning strategy of automatic semantic tagging for massive network resources, metadata is extracted through active and passive collection, and the semantic relationship between tags is extracted and processed by natural language processing and machine learning technology. Finally, automatic labels are generated through analysis capabilities such as business correlation analysis, organizational correlation analysis, data distribution analysis, data classification and grade.\",\"PeriodicalId\":352285,\"journal\":{\"name\":\"2020 IEEE 10th International Conference on Electronics Information and Emergency Communication (ICEIEC)\",\"volume\":\"7 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 IEEE 10th International Conference on Electronics Information and Emergency Communication (ICEIEC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICEIEC49280.2020.9152308\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE 10th International Conference on Electronics Information and Emergency Communication (ICEIEC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICEIEC49280.2020.9152308","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

数据是社会高度信息化的必然产物,其安全风险是信息安全不可缺少的组成部分。在加快推进泛在电力物联网建设的情况下,本文深入研究了基于大数据业务场景的数据安全分析与标签识别技术。基于主动和被动发现的过程,通过数据库扫描、服务器扫描、终端扫描、终端监控、网络监控、数据库访问监控等手段,建立了完整的数据资产目录。威胁树用于对数据安全的各种威胁进行建模。本文在数据资产分类和威胁建模的基础上,通过综合判断业务系统面临的威胁,以及系统本身的脆弱性和资产价值,研究数据安全风险分析和量化方法。基于海量网络资源自动语义标注的启发式集成学习策略,通过主动和被动采集提取元数据,通过自然语言处理和机器学习技术提取和处理标签之间的语义关系。最后通过业务关联分析、组织关联分析、数据分布分析、数据分类分级等分析能力生成自动标签。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Research on Data Security Analysis and Label Recognition Technology Based on Big Data Business Scenario
Data is the inevitable product of social high informatization, and its security risk is an indispensable part of information security. In the case of accelerating the construction of ubiquitous power Internet of things, this paper deeply studies the data security analysis and label recognition technology based on big data business scenarios. Based on the process of active and passive discovery, a complete catalog of data assets is established by means of database scanning, server scanning, terminal scanning, terminal monitoring, network monitoring and database access monitoring. The threat tree is used to model various threats to data security. On the basis of data asset cataloging and threat modeling, this paper studies the data security risk analysis and quantification method by comprehensively judging the threats faced by the business system, as well as the vulnerability and asset value of the system itself. Based on the heuristic integrated learning strategy of automatic semantic tagging for massive network resources, metadata is extracted through active and passive collection, and the semantic relationship between tags is extracted and processed by natural language processing and machine learning technology. Finally, automatic labels are generated through analysis capabilities such as business correlation analysis, organizational correlation analysis, data distribution analysis, data classification and grade.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信