首页|社交媒体中开源网络威胁情报挖掘技术分析

社交媒体中开源网络威胁情报挖掘技术分析

扫码查看
威胁情报是网络安全防御的重要信息资源,其准确性、时效性直接决定了系统对于外来未知威胁的感知发现能力。目前,除威胁情报自生产及商业购买外,从社交媒体(如网络安全博客、技术论坛、安全报告发布平台等)中直接提取挖掘开源情报的方式因具有高时效、低成本等特点,受到了业界的广泛关注。文章结合近年来代表性研究梳理归纳了从社交媒体中采集及提取挖掘开源网络威胁情报的主要技术,并分析了相应的优缺点及适用场景,可为情报提取模型选择及优化设计提供参考。
Analysis of open source cyber threat intelligence mining technology from social media
Threat intelligence(TI)is an important information resource for network security defense.The accuracy and timeliness of TI directly determine the perceive and discover ability to external unknown threats for a network defense system.In addition to the self-production and purchase of TI,the method of extracting open source TI from social media(such as network security blogs,technical forums,security report publishing platforms,etc.)has been widely concerned because of its characteristics of high time-efficient and low cost.Based on the representative research in recent years,this paper summarizes main technologies of collecting and mining open source network TI from social media,and analyzes their applicable scenarios,which can provide references for the selection and optimization design of intelligence extraction model.

social medianetwork securityopen source threat intelligencecollection and mining

叶帅辰

展开 >

中国信息通信研究院 安全研究所,北京 100191

社交媒体 网络安全 开源情报 采集挖掘

2024

无线互联科技
江苏省科学技术情报研究所

无线互联科技

影响因子:0.263
ISSN:1672-6944
年,卷(期):2024.21(3)
  • 24