Loading…

Research on security assessment based on big data and multi-entity profile

Security assessment is one of the important problems, especially in the fields of military training, transportation and network management. The security "related parties" (entities in this paper) have internal relations in the three fields. It is of great significance of constructing the a...

Full description

Saved in:
Bibliographic Details
Main Authors: Liu, Wenfu, Pang, Jianmin, Yang, Shudan, Li, Nan, Du, Qiming, Sun, Daozhu, Liu, Fudong
Format: Conference Proceeding
Language:English
Subjects:
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page 2036
container_issue
container_start_page 2028
container_title
container_volume 5
creator Liu, Wenfu
Pang, Jianmin
Yang, Shudan
Li, Nan
Du, Qiming
Sun, Daozhu
Liu, Fudong
description Security assessment is one of the important problems, especially in the fields of military training, transportation and network management. The security "related parties" (entities in this paper) have internal relations in the three fields. It is of great significance of constructing the attributes of these entities or even designing a unified security assessment method. Security assessment in these areas has been studied and explored for a long time. However, the research is relatively scattered and unilateral. It is no unified and reusable method from data collection to security assessment. Based on the advantages of big data technology in the storage and analysis of massive data, the paper proposed a security risk element acquisition method from data collection and preprocessing, storage and mining to attribute extraction and aggregation. In addition, drawing on the idea of user portraits in other fields, constructed personnel entities, equipment entities and "other" entity labels related to security risks. Finally, a security risk assessment process based on these entities is designed.
doi_str_mv 10.1109/IAEAC50856.2021.9391153
format conference_proceeding
fullrecord <record><control><sourceid>ieee_CHZPO</sourceid><recordid>TN_cdi_ieee_primary_9391153</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9391153</ieee_id><sourcerecordid>9391153</sourcerecordid><originalsourceid>FETCH-LOGICAL-i118t-22e01528d0cfd0f6fb04e7dc57c71bb60b0303f96d4d67bc509e659869d62ef63</originalsourceid><addsrcrecordid>eNotj8FKAzEURaMgWOp8gQvzAzO-lzSZZDkMVVsKgui6JJMXjcy0ZTJd9O9tsZt7F-dw4TL2hFAhgn1eNcumVWCUrgQIrKy0iEresMLWBmth0MA5btlMaGNLrQXesyLnXwAQCqVSdsbWH5TJjd0P3-94pu44punEXc6U80C7iXuXKVygT988uMlxtwt8OPZTKs_8Yh_GfUw9PbC76PpMxbXn7Otl-dm-lZv311XbbMqEaKZSCAJUwgToYoCoo4cF1aFTdVej9xo8SJDR6rAIuvadAktaWaNt0IKilnP2-L-biGh7GNPgxtP2-l7-AXFITyM</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Research on security assessment based on big data and multi-entity profile</title><source>IEEE Xplore All Conference Series</source><creator>Liu, Wenfu ; Pang, Jianmin ; Yang, Shudan ; Li, Nan ; Du, Qiming ; Sun, Daozhu ; Liu, Fudong</creator><creatorcontrib>Liu, Wenfu ; Pang, Jianmin ; Yang, Shudan ; Li, Nan ; Du, Qiming ; Sun, Daozhu ; Liu, Fudong</creatorcontrib><description>Security assessment is one of the important problems, especially in the fields of military training, transportation and network management. The security "related parties" (entities in this paper) have internal relations in the three fields. It is of great significance of constructing the attributes of these entities or even designing a unified security assessment method. Security assessment in these areas has been studied and explored for a long time. However, the research is relatively scattered and unilateral. It is no unified and reusable method from data collection to security assessment. Based on the advantages of big data technology in the storage and analysis of massive data, the paper proposed a security risk element acquisition method from data collection and preprocessing, storage and mining to attribute extraction and aggregation. In addition, drawing on the idea of user portraits in other fields, constructed personnel entities, equipment entities and "other" entity labels related to security risks. Finally, a security risk assessment process based on these entities is designed.</description><identifier>EISSN: 2689-6621</identifier><identifier>EISBN: 9781728180281</identifier><identifier>EISBN: 1728180279</identifier><identifier>EISBN: 9781728180274</identifier><identifier>EISBN: 1728180287</identifier><identifier>DOI: 10.1109/IAEAC50856.2021.9391153</identifier><language>eng</language><publisher>IEEE</publisher><subject>Big Data ; Data mining ; entity portrait ; Evaluation process ; Personnel ; Risk management ; Security ; security assessment ; Spark ; Training ; Transportation</subject><ispartof>2021 IEEE 5th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), 2021, Vol.5, p.2028-2036</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9391153$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,27925,54555,54932</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/9391153$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Liu, Wenfu</creatorcontrib><creatorcontrib>Pang, Jianmin</creatorcontrib><creatorcontrib>Yang, Shudan</creatorcontrib><creatorcontrib>Li, Nan</creatorcontrib><creatorcontrib>Du, Qiming</creatorcontrib><creatorcontrib>Sun, Daozhu</creatorcontrib><creatorcontrib>Liu, Fudong</creatorcontrib><title>Research on security assessment based on big data and multi-entity profile</title><title>2021 IEEE 5th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)</title><addtitle>IAEAC</addtitle><description>Security assessment is one of the important problems, especially in the fields of military training, transportation and network management. The security "related parties" (entities in this paper) have internal relations in the three fields. It is of great significance of constructing the attributes of these entities or even designing a unified security assessment method. Security assessment in these areas has been studied and explored for a long time. However, the research is relatively scattered and unilateral. It is no unified and reusable method from data collection to security assessment. Based on the advantages of big data technology in the storage and analysis of massive data, the paper proposed a security risk element acquisition method from data collection and preprocessing, storage and mining to attribute extraction and aggregation. In addition, drawing on the idea of user portraits in other fields, constructed personnel entities, equipment entities and "other" entity labels related to security risks. Finally, a security risk assessment process based on these entities is designed.</description><subject>Big Data</subject><subject>Data mining</subject><subject>entity portrait</subject><subject>Evaluation process</subject><subject>Personnel</subject><subject>Risk management</subject><subject>Security</subject><subject>security assessment</subject><subject>Spark</subject><subject>Training</subject><subject>Transportation</subject><issn>2689-6621</issn><isbn>9781728180281</isbn><isbn>1728180279</isbn><isbn>9781728180274</isbn><isbn>1728180287</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2021</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNotj8FKAzEURaMgWOp8gQvzAzO-lzSZZDkMVVsKgui6JJMXjcy0ZTJd9O9tsZt7F-dw4TL2hFAhgn1eNcumVWCUrgQIrKy0iEresMLWBmth0MA5btlMaGNLrQXesyLnXwAQCqVSdsbWH5TJjd0P3-94pu44punEXc6U80C7iXuXKVygT988uMlxtwt8OPZTKs_8Yh_GfUw9PbC76PpMxbXn7Otl-dm-lZv311XbbMqEaKZSCAJUwgToYoCoo4cF1aFTdVej9xo8SJDR6rAIuvadAktaWaNt0IKilnP2-L-biGh7GNPgxtP2-l7-AXFITyM</recordid><startdate>20210312</startdate><enddate>20210312</enddate><creator>Liu, Wenfu</creator><creator>Pang, Jianmin</creator><creator>Yang, Shudan</creator><creator>Li, Nan</creator><creator>Du, Qiming</creator><creator>Sun, Daozhu</creator><creator>Liu, Fudong</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>20210312</creationdate><title>Research on security assessment based on big data and multi-entity profile</title><author>Liu, Wenfu ; Pang, Jianmin ; Yang, Shudan ; Li, Nan ; Du, Qiming ; Sun, Daozhu ; Liu, Fudong</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i118t-22e01528d0cfd0f6fb04e7dc57c71bb60b0303f96d4d67bc509e659869d62ef63</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Big Data</topic><topic>Data mining</topic><topic>entity portrait</topic><topic>Evaluation process</topic><topic>Personnel</topic><topic>Risk management</topic><topic>Security</topic><topic>security assessment</topic><topic>Spark</topic><topic>Training</topic><topic>Transportation</topic><toplevel>online_resources</toplevel><creatorcontrib>Liu, Wenfu</creatorcontrib><creatorcontrib>Pang, Jianmin</creatorcontrib><creatorcontrib>Yang, Shudan</creatorcontrib><creatorcontrib>Li, Nan</creatorcontrib><creatorcontrib>Du, Qiming</creatorcontrib><creatorcontrib>Sun, Daozhu</creatorcontrib><creatorcontrib>Liu, Fudong</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Liu, Wenfu</au><au>Pang, Jianmin</au><au>Yang, Shudan</au><au>Li, Nan</au><au>Du, Qiming</au><au>Sun, Daozhu</au><au>Liu, Fudong</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Research on security assessment based on big data and multi-entity profile</atitle><btitle>2021 IEEE 5th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)</btitle><stitle>IAEAC</stitle><date>2021-03-12</date><risdate>2021</risdate><volume>5</volume><spage>2028</spage><epage>2036</epage><pages>2028-2036</pages><eissn>2689-6621</eissn><eisbn>9781728180281</eisbn><eisbn>1728180279</eisbn><eisbn>9781728180274</eisbn><eisbn>1728180287</eisbn><abstract>Security assessment is one of the important problems, especially in the fields of military training, transportation and network management. The security "related parties" (entities in this paper) have internal relations in the three fields. It is of great significance of constructing the attributes of these entities or even designing a unified security assessment method. Security assessment in these areas has been studied and explored for a long time. However, the research is relatively scattered and unilateral. It is no unified and reusable method from data collection to security assessment. Based on the advantages of big data technology in the storage and analysis of massive data, the paper proposed a security risk element acquisition method from data collection and preprocessing, storage and mining to attribute extraction and aggregation. In addition, drawing on the idea of user portraits in other fields, constructed personnel entities, equipment entities and "other" entity labels related to security risks. Finally, a security risk assessment process based on these entities is designed.</abstract><pub>IEEE</pub><doi>10.1109/IAEAC50856.2021.9391153</doi><tpages>9</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier EISSN: 2689-6621
ispartof 2021 IEEE 5th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), 2021, Vol.5, p.2028-2036
issn 2689-6621
language eng
recordid cdi_ieee_primary_9391153
source IEEE Xplore All Conference Series
subjects Big Data
Data mining
entity portrait
Evaluation process
Personnel
Risk management
Security
security assessment
Spark
Training
Transportation
title Research on security assessment based on big data and multi-entity profile
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-06T19%3A40%3A26IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_CHZPO&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Research%20on%20security%20assessment%20based%20on%20big%20data%20and%20multi-entity%20profile&rft.btitle=2021%20IEEE%205th%20Advanced%20Information%20Technology,%20Electronic%20and%20Automation%20Control%20Conference%20(IAEAC)&rft.au=Liu,%20Wenfu&rft.date=2021-03-12&rft.volume=5&rft.spage=2028&rft.epage=2036&rft.pages=2028-2036&rft.eissn=2689-6621&rft_id=info:doi/10.1109/IAEAC50856.2021.9391153&rft.eisbn=9781728180281&rft.eisbn_list=1728180279&rft.eisbn_list=9781728180274&rft.eisbn_list=1728180287&rft_dat=%3Cieee_CHZPO%3E9391153%3C/ieee_CHZPO%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i118t-22e01528d0cfd0f6fb04e7dc57c71bb60b0303f96d4d67bc509e659869d62ef63%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=9391153&rfr_iscdi=true