信息网络安全 ›› 2016, Vol. 16 ›› Issue (9): 278-284.doi: 10.3969/j.issn.1671-1122.2016.09.053

• • 上一篇    下一篇

美国政企网络威胁情报现状及对我国的启示

徐丽萍(), 郝文江   

  1. 公安部第一研究所,北京 100048
  • 收稿日期:2016-07-25 出版日期:2016-09-20 发布日期:2020-05-13
  • 作者简介:

    作者简介: 徐丽萍(1982—),女,陕西,工程师,硕士,主要研究方向为网络信息安全、计算机犯罪侦查取证;郝文江(1975—),男,山东,副研究员,博士,主要研究方向为网络信息安全、计算机犯罪侦查取证。

Analysis and Enlightenment of US Government and Enterprise Cyber Threat Intelligence

Liping XU(), Wenjiang HAO   

  1. The First Research Institute of Ministry of Public Security, Beijing 100048, China
  • Received:2016-07-25 Online:2016-09-20 Published:2020-05-13

摘要:

随着信息化和网络的高速发展,针对我国关键基础设施及政府网站等攻击事件高发,更为严峻的是各类网络攻击和网络威胁呈现持续性和扩大化的发展趋势。传统的被动式防御手段已经不能适应高级持续性威胁(APT)、0 day等新型网络威胁的防护,而威胁情报的出现弥补了这一不足。美国作为网络安全起步较早的国家,20世纪初就开始关注威胁情报,目前已经逐步建立起一套应对网络威胁的完整体系。文章对美国政府和企业的威胁情报现状进行系统研究,能够为我国政府和行业发展提供有益的参考和借鉴。首先,文章对威胁情报的定义和类型进行了分析。然后,围绕着美国政府针对网络威胁情报出台的相关法案和总统令、“爱因斯坦计划”、共享机制、开展的有关项目等五个方面进行了研究和分析。同时,对美国企业在威胁情报方面的开展的工作进行了概述。最后,文章在对中美网络威胁情报对比分析的基础上,提出了几点启示。

关键词: 网络威胁情报, 信息共享, 网络安全, 美国

Abstract:

With the rapid development of information technology and network, our critical infrastructure and government websites have been attacked frequently. More severe, the various types of network attacks and cyber threats present trend of development of continuity and expansion. The traditional passive means of defense can not meet the advanced persistent threat (APT), 0 day and other new network threat protection.But threat intelligence appeared to make up for this shortfall. As national cybersecurity early start country, in early 20th century the United States began to pay attention to the threat intelligence.Now,it has gradually established a complete system to deal with cyber threats. In this paper, we have provided a present situation with cyber threat intelligence of the US government and businesses. It can provide a useful reference for the threats to our government and industry intelligence. Firstly, the definition and types of threat intelligence has been analyzed. Then five areas has been studied and analyzed,such as the bills and Presidential Decree of the threat intelligence of the US , "Einstein Program", sharing mechanism , the relevant projects. Meanwhile,The work of the US companies of the cyber threat intelligence has been overviewed. Finally, on the basis of comparative and analysis of the US cyber threat intelligence, we put forward some enlightenment.

Key words: cyber threat intelligence, information sharing, cyber security, United States

中图分类号: