{"title":"面向工业数据流场景的可配置规则引擎","authors":"Fangning Shi, Zhong Na, Zhifeng Gao","doi":"10.1109/BMSB58369.2023.10211632","DOIUrl":null,"url":null,"abstract":"With the integration of new generation information technology and industry, the value of industrial data has been highly valued. Meanwhile, enterprises are also facing various data security threats and urgently need to establish a trusted and controllable industrial data circulation platform and ecosystem, to eliminate enterprise concerns, unleash the vitality of data element sharing and circulation. This paper uses principal component analysis to classify, filter, transform or process the dataset, supporting the configuration of warning rules. Subsequently, based on a configurable rule engine, security policy verification and abnormal behavior warning are executed to achieve real-time supervision and tracking of the entire data circulation process, timely discover and warn of risk behaviors, avoid the risk of data leakage and protect data circulation security.","PeriodicalId":13080,"journal":{"name":"IEEE international Symposium on Broadband Multimedia Systems and Broadcasting","volume":"51 1","pages":"1-5"},"PeriodicalIF":0.0000,"publicationDate":"2023-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Configurable Rule Engine for Industrial Data Flow Scenarios\",\"authors\":\"Fangning Shi, Zhong Na, Zhifeng Gao\",\"doi\":\"10.1109/BMSB58369.2023.10211632\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the integration of new generation information technology and industry, the value of industrial data has been highly valued. Meanwhile, enterprises are also facing various data security threats and urgently need to establish a trusted and controllable industrial data circulation platform and ecosystem, to eliminate enterprise concerns, unleash the vitality of data element sharing and circulation. This paper uses principal component analysis to classify, filter, transform or process the dataset, supporting the configuration of warning rules. Subsequently, based on a configurable rule engine, security policy verification and abnormal behavior warning are executed to achieve real-time supervision and tracking of the entire data circulation process, timely discover and warn of risk behaviors, avoid the risk of data leakage and protect data circulation security.\",\"PeriodicalId\":13080,\"journal\":{\"name\":\"IEEE international Symposium on Broadband Multimedia Systems and Broadcasting\",\"volume\":\"51 1\",\"pages\":\"1-5\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-06-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE international Symposium on Broadband Multimedia Systems and Broadcasting\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/BMSB58369.2023.10211632\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE international Symposium on Broadband Multimedia Systems and Broadcasting","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/BMSB58369.2023.10211632","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Configurable Rule Engine for Industrial Data Flow Scenarios
With the integration of new generation information technology and industry, the value of industrial data has been highly valued. Meanwhile, enterprises are also facing various data security threats and urgently need to establish a trusted and controllable industrial data circulation platform and ecosystem, to eliminate enterprise concerns, unleash the vitality of data element sharing and circulation. This paper uses principal component analysis to classify, filter, transform or process the dataset, supporting the configuration of warning rules. Subsequently, based on a configurable rule engine, security policy verification and abnormal behavior warning are executed to achieve real-time supervision and tracking of the entire data circulation process, timely discover and warn of risk behaviors, avoid the risk of data leakage and protect data circulation security.