信息网络安全 ›› 2024, Vol. 24 ›› Issue (7): 1129-1137.doi: 10.3969/j.issn.1671-1122.2024.07.014

• 技术研究 • 上一篇    下一篇

隐私保护体系下网络威胁情报共享的研究现状和方案设计

问闻, 刘钦菊(), 邝琳, 任雪静   

  1. 北京市公安局关键信息基础设施保护中心,北京 100029
  • 收稿日期:2023-12-25 出版日期:2024-07-10 发布日期:2024-08-02
  • 通讯作者: 刘钦菊 15611529581@163.com
  • 作者简介:问闻(1980—),男,河南,硕士,主要研究方向为网络空间安全执法技术|刘钦菊(1993—),女,山东,博士,主要研究方向为密码学、隐私计算技术|邝琳(1980—),女,北京,硕士,主要研究方向为网络空间安全|任雪静(1999—),女,北京,主要研究方向为网络空间安全。

Research and Scheme Design of Cyber Threat Intelligence Sharing under Privacy Protection System

WEN Wen, LIU Qinju(), KUANG Lin, REN Xuejing   

  1. Beijing Municipal Public Security Bureau Critical Information Infrastructre Protection Center, Beijing 100029, China
  • Received:2023-12-25 Online:2024-07-10 Published:2024-08-02

摘要:

网络威胁情报共享有利于实现网络安全态势感知以应对网络威胁,但网络威胁情报高度敏感,处理不当极易导致共享者利益受损或暴露安全防护弱点等严重后果。因此,网络威胁情报共享的前提是保证数据安全和用户隐私。文章聚焦隐私保护体系下的网络威胁情报共享研究,首先对网络威胁情报、网络威胁情报共享、隐私计算技术等相关内容进行总结分析;然后从网络威胁情报共享面临的安全隐私问题出发,对近年的网络威胁情报共享技术路径和研究现状进行梳理和分析;最后设计一个基于隐私计算技术的网络威胁情报共享平台方案。

关键词: 网络安全, 网络威胁情报共享, 隐私计算

Abstract:

Cyber threat intelligence sharing is beneficial for achieving cyber security situational awareness to deal with cyber threats. However, the cyber threat intelligence is highly sensitive, improper handling can easily lead to damage interests of sharers or expose the weakness of security protection. Therefore, the premise of cyber threat intelligence sharing is to ensure data security and user privacy. This paper focused on the analysis and research of cyber threat intelligence sharing under the privacy protection system. First of all, we summarized and analyzed the cyber threat intelligence, cyber threat intelligence sharing and privacy computing technology. Then, starting from the security and privacy issues faced by cyber threat intelligence sharing, we carefully combed and deeply analyzed the technical path and research status of cyber threat intelligence sharing in recent years. Finally, based on the privacy computing, we designed the framework of cyber threat intelligence sharing scheme.

Key words: cyberspace security, cyber threat intelligence sharing, privacy computing

中图分类号: