Loading…
Research on security assessment based on big data and multi-entity profile
Security assessment is one of the important problems, especially in the fields of military training, transportation and network management. The security "related parties" (entities in this paper) have internal relations in the three fields. It is of great significance of constructing the a...
Saved in:
Main Authors: | , , , , , , |
---|---|
Format: | Conference Proceeding |
Language: | English |
Subjects: | |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | 2036 |
container_issue | |
container_start_page | 2028 |
container_title | |
container_volume | 5 |
creator | Liu, Wenfu Pang, Jianmin Yang, Shudan Li, Nan Du, Qiming Sun, Daozhu Liu, Fudong |
description | Security assessment is one of the important problems, especially in the fields of military training, transportation and network management. The security "related parties" (entities in this paper) have internal relations in the three fields. It is of great significance of constructing the attributes of these entities or even designing a unified security assessment method. Security assessment in these areas has been studied and explored for a long time. However, the research is relatively scattered and unilateral. It is no unified and reusable method from data collection to security assessment. Based on the advantages of big data technology in the storage and analysis of massive data, the paper proposed a security risk element acquisition method from data collection and preprocessing, storage and mining to attribute extraction and aggregation. In addition, drawing on the idea of user portraits in other fields, constructed personnel entities, equipment entities and "other" entity labels related to security risks. Finally, a security risk assessment process based on these entities is designed. |
doi_str_mv | 10.1109/IAEAC50856.2021.9391153 |
format | conference_proceeding |
fullrecord | <record><control><sourceid>ieee_CHZPO</sourceid><recordid>TN_cdi_ieee_primary_9391153</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9391153</ieee_id><sourcerecordid>9391153</sourcerecordid><originalsourceid>FETCH-LOGICAL-i118t-22e01528d0cfd0f6fb04e7dc57c71bb60b0303f96d4d67bc509e659869d62ef63</originalsourceid><addsrcrecordid>eNotj8FKAzEURaMgWOp8gQvzAzO-lzSZZDkMVVsKgui6JJMXjcy0ZTJd9O9tsZt7F-dw4TL2hFAhgn1eNcumVWCUrgQIrKy0iEresMLWBmth0MA5btlMaGNLrQXesyLnXwAQCqVSdsbWH5TJjd0P3-94pu44punEXc6U80C7iXuXKVygT988uMlxtwt8OPZTKs_8Yh_GfUw9PbC76PpMxbXn7Otl-dm-lZv311XbbMqEaKZSCAJUwgToYoCoo4cF1aFTdVej9xo8SJDR6rAIuvadAktaWaNt0IKilnP2-L-biGh7GNPgxtP2-l7-AXFITyM</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Research on security assessment based on big data and multi-entity profile</title><source>IEEE Xplore All Conference Series</source><creator>Liu, Wenfu ; Pang, Jianmin ; Yang, Shudan ; Li, Nan ; Du, Qiming ; Sun, Daozhu ; Liu, Fudong</creator><creatorcontrib>Liu, Wenfu ; Pang, Jianmin ; Yang, Shudan ; Li, Nan ; Du, Qiming ; Sun, Daozhu ; Liu, Fudong</creatorcontrib><description>Security assessment is one of the important problems, especially in the fields of military training, transportation and network management. The security "related parties" (entities in this paper) have internal relations in the three fields. It is of great significance of constructing the attributes of these entities or even designing a unified security assessment method. Security assessment in these areas has been studied and explored for a long time. However, the research is relatively scattered and unilateral. It is no unified and reusable method from data collection to security assessment. Based on the advantages of big data technology in the storage and analysis of massive data, the paper proposed a security risk element acquisition method from data collection and preprocessing, storage and mining to attribute extraction and aggregation. In addition, drawing on the idea of user portraits in other fields, constructed personnel entities, equipment entities and "other" entity labels related to security risks. Finally, a security risk assessment process based on these entities is designed.</description><identifier>EISSN: 2689-6621</identifier><identifier>EISBN: 9781728180281</identifier><identifier>EISBN: 1728180279</identifier><identifier>EISBN: 9781728180274</identifier><identifier>EISBN: 1728180287</identifier><identifier>DOI: 10.1109/IAEAC50856.2021.9391153</identifier><language>eng</language><publisher>IEEE</publisher><subject>Big Data ; Data mining ; entity portrait ; Evaluation process ; Personnel ; Risk management ; Security ; security assessment ; Spark ; Training ; Transportation</subject><ispartof>2021 IEEE 5th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), 2021, Vol.5, p.2028-2036</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9391153$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,27925,54555,54932</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/9391153$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Liu, Wenfu</creatorcontrib><creatorcontrib>Pang, Jianmin</creatorcontrib><creatorcontrib>Yang, Shudan</creatorcontrib><creatorcontrib>Li, Nan</creatorcontrib><creatorcontrib>Du, Qiming</creatorcontrib><creatorcontrib>Sun, Daozhu</creatorcontrib><creatorcontrib>Liu, Fudong</creatorcontrib><title>Research on security assessment based on big data and multi-entity profile</title><title>2021 IEEE 5th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)</title><addtitle>IAEAC</addtitle><description>Security assessment is one of the important problems, especially in the fields of military training, transportation and network management. The security "related parties" (entities in this paper) have internal relations in the three fields. It is of great significance of constructing the attributes of these entities or even designing a unified security assessment method. Security assessment in these areas has been studied and explored for a long time. However, the research is relatively scattered and unilateral. It is no unified and reusable method from data collection to security assessment. Based on the advantages of big data technology in the storage and analysis of massive data, the paper proposed a security risk element acquisition method from data collection and preprocessing, storage and mining to attribute extraction and aggregation. In addition, drawing on the idea of user portraits in other fields, constructed personnel entities, equipment entities and "other" entity labels related to security risks. Finally, a security risk assessment process based on these entities is designed.</description><subject>Big Data</subject><subject>Data mining</subject><subject>entity portrait</subject><subject>Evaluation process</subject><subject>Personnel</subject><subject>Risk management</subject><subject>Security</subject><subject>security assessment</subject><subject>Spark</subject><subject>Training</subject><subject>Transportation</subject><issn>2689-6621</issn><isbn>9781728180281</isbn><isbn>1728180279</isbn><isbn>9781728180274</isbn><isbn>1728180287</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2021</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNotj8FKAzEURaMgWOp8gQvzAzO-lzSZZDkMVVsKgui6JJMXjcy0ZTJd9O9tsZt7F-dw4TL2hFAhgn1eNcumVWCUrgQIrKy0iEresMLWBmth0MA5btlMaGNLrQXesyLnXwAQCqVSdsbWH5TJjd0P3-94pu44punEXc6U80C7iXuXKVygT988uMlxtwt8OPZTKs_8Yh_GfUw9PbC76PpMxbXn7Otl-dm-lZv311XbbMqEaKZSCAJUwgToYoCoo4cF1aFTdVej9xo8SJDR6rAIuvadAktaWaNt0IKilnP2-L-biGh7GNPgxtP2-l7-AXFITyM</recordid><startdate>20210312</startdate><enddate>20210312</enddate><creator>Liu, Wenfu</creator><creator>Pang, Jianmin</creator><creator>Yang, Shudan</creator><creator>Li, Nan</creator><creator>Du, Qiming</creator><creator>Sun, Daozhu</creator><creator>Liu, Fudong</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>20210312</creationdate><title>Research on security assessment based on big data and multi-entity profile</title><author>Liu, Wenfu ; Pang, Jianmin ; Yang, Shudan ; Li, Nan ; Du, Qiming ; Sun, Daozhu ; Liu, Fudong</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i118t-22e01528d0cfd0f6fb04e7dc57c71bb60b0303f96d4d67bc509e659869d62ef63</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Big Data</topic><topic>Data mining</topic><topic>entity portrait</topic><topic>Evaluation process</topic><topic>Personnel</topic><topic>Risk management</topic><topic>Security</topic><topic>security assessment</topic><topic>Spark</topic><topic>Training</topic><topic>Transportation</topic><toplevel>online_resources</toplevel><creatorcontrib>Liu, Wenfu</creatorcontrib><creatorcontrib>Pang, Jianmin</creatorcontrib><creatorcontrib>Yang, Shudan</creatorcontrib><creatorcontrib>Li, Nan</creatorcontrib><creatorcontrib>Du, Qiming</creatorcontrib><creatorcontrib>Sun, Daozhu</creatorcontrib><creatorcontrib>Liu, Fudong</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Liu, Wenfu</au><au>Pang, Jianmin</au><au>Yang, Shudan</au><au>Li, Nan</au><au>Du, Qiming</au><au>Sun, Daozhu</au><au>Liu, Fudong</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Research on security assessment based on big data and multi-entity profile</atitle><btitle>2021 IEEE 5th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)</btitle><stitle>IAEAC</stitle><date>2021-03-12</date><risdate>2021</risdate><volume>5</volume><spage>2028</spage><epage>2036</epage><pages>2028-2036</pages><eissn>2689-6621</eissn><eisbn>9781728180281</eisbn><eisbn>1728180279</eisbn><eisbn>9781728180274</eisbn><eisbn>1728180287</eisbn><abstract>Security assessment is one of the important problems, especially in the fields of military training, transportation and network management. The security "related parties" (entities in this paper) have internal relations in the three fields. It is of great significance of constructing the attributes of these entities or even designing a unified security assessment method. Security assessment in these areas has been studied and explored for a long time. However, the research is relatively scattered and unilateral. It is no unified and reusable method from data collection to security assessment. Based on the advantages of big data technology in the storage and analysis of massive data, the paper proposed a security risk element acquisition method from data collection and preprocessing, storage and mining to attribute extraction and aggregation. In addition, drawing on the idea of user portraits in other fields, constructed personnel entities, equipment entities and "other" entity labels related to security risks. Finally, a security risk assessment process based on these entities is designed.</abstract><pub>IEEE</pub><doi>10.1109/IAEAC50856.2021.9391153</doi><tpages>9</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | EISSN: 2689-6621 |
ispartof | 2021 IEEE 5th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), 2021, Vol.5, p.2028-2036 |
issn | 2689-6621 |
language | eng |
recordid | cdi_ieee_primary_9391153 |
source | IEEE Xplore All Conference Series |
subjects | Big Data Data mining entity portrait Evaluation process Personnel Risk management Security security assessment Spark Training Transportation |
title | Research on security assessment based on big data and multi-entity profile |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-06T19%3A40%3A26IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_CHZPO&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Research%20on%20security%20assessment%20based%20on%20big%20data%20and%20multi-entity%20profile&rft.btitle=2021%20IEEE%205th%20Advanced%20Information%20Technology,%20Electronic%20and%20Automation%20Control%20Conference%20(IAEAC)&rft.au=Liu,%20Wenfu&rft.date=2021-03-12&rft.volume=5&rft.spage=2028&rft.epage=2036&rft.pages=2028-2036&rft.eissn=2689-6621&rft_id=info:doi/10.1109/IAEAC50856.2021.9391153&rft.eisbn=9781728180281&rft.eisbn_list=1728180279&rft.eisbn_list=9781728180274&rft.eisbn_list=1728180287&rft_dat=%3Cieee_CHZPO%3E9391153%3C/ieee_CHZPO%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i118t-22e01528d0cfd0f6fb04e7dc57c71bb60b0303f96d4d67bc509e659869d62ef63%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=9391153&rfr_iscdi=true |