A Brief Analysis of the Key Technologies of Power Enterprise Network Perimeter Information Interactive Security Audit
Authors
Hao Yang, Nan Lin, Yongcai Xiao, Lingling Zhang
Corresponding Author
Hao Yang
Available Online December 2015.
- DOI
- 10.2991/icmse-15.2015.51How to use a DOI?
- Keywords
- Network perimeter; massive information; interaction; security audit; key technologies
- Abstract
According to the structures of internal and external information networks of power enterprises and the characteristics of enterprise network perimeter information interactions, the paper designs a security audit model and a security assessment framework based on state graph perception, proposes related technologies of perimeter massive log analysis and deep mining, and gives a specific research direction and research methods, thus providing guidance for the construction of a network perimeter information interactive security audit platform for power enterprises.
- Copyright
- © 2015, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Hao Yang AU - Nan Lin AU - Yongcai Xiao AU - Lingling Zhang PY - 2015/12 DA - 2015/12 TI - A Brief Analysis of the Key Technologies of Power Enterprise Network Perimeter Information Interactive Security Audit BT - Proceedings of the 2015 6th International Conference on Manufacturing Science and Engineering PB - Atlantis Press SP - 272 EP - 277 SN - 2352-5401 UR - https://doi.org/10.2991/icmse-15.2015.51 DO - 10.2991/icmse-15.2015.51 ID - Yang2015/12 ER -