Journal of Information Security Reserach ›› 2024, Vol. 10 ›› Issue (4): 353-.

Previous Articles     Next Articles

Research on Data Reuse Model of Classified Protection of Cybersecurity Based on Data Mining

Zhao Jialu1, Li Gefei1, Ge Xiaonan1, Zhu Lei2, Wei Yuxing3, Yan Yiheng4, and Ayideng Tabusi5#br#

#br#
  

  1. 1(State Information Center, Beijing 100045)
    2(Guangxi Police College, Nanning 530028)
    3(Information Center of Guangxi Zhuang Autonomous Region, Nanning 530201)
    4(Network Security Corps of Shanghai Municipal Public Security Bureau, Shanghai 200040)
    5(Network Security Corps of Xinjiang Uygur Autonomous Region Public Security Department, Urumqi 830099)

  • Online:2024-04-20 Published:2024-04-20

基于数据挖掘的等级保护测评数据再利用模型研究

赵佳璐1李格菲1葛晓囡1朱磊2韦宇星3严毅恒4阿依登·塔布斯5   

  1. 1(国家信息中心北京100045)
    2(广西警察学院南宁530028)
    3(广西壮族自治区信息中心南宁530201)
    4(上海市公安局网络安全保卫总队上海200040)
    5(新疆维吾尔自治区公安厅网络安全保卫总队乌鲁木齐830099)

  • 通讯作者: 李格菲 硕士,工程师.主要研究方向为数据安全、网络安全等级保护测评. gefeil@sic.gov.cn
  • 作者简介:赵佳璐 硕士,工程师.主要研究方向为政务数据安全、网络安全. zhaojialu@sic.gov.cn 李格菲 硕士,工程师.主要研究方向为数据安全、网络安全等级保护测评. gefeil@sic.gov.cn 葛晓囡 硕士,工程师.主要研究方向为数据安全、信息安全风险评估. gexn@sic.gov.cn 朱磊 硕士,高级工程师.主要研究方向为网络安全管理. 935731127@qq.com 韦宇星 工程师.主要研究方向为政务云、网络安全、数据安全. weiyx@gxi.gov.cn 严毅恒 工程师.主要研究方向为网络安全. djbh@shanghai.gov.cn 阿依登·塔布斯 工程师.主要研究方向为网络安全监管. 491547861@qq.com

Abstract: Addressing the underutilization of the evaluation data in classified cybersecurity protection, this paper presents a model for reusing the evaluation data of classified protection of cybersecurity, comprising three dimensions: data classification, data reuse process and typical application scenarios. Firstly,  the data is classified according to the application scenarios, and basic data is statistically analyzed to draw conclusions from various perspectives. Secondly, utilizing the basic evaluation data and initial analysis conclusions as input, a data reuse model based on data mining is constructed to meet the diverse needs of different stakeholders. This model provides functions such as correlation analysis, classification analysis and cluster analysis, enabling a deeper exploration of the information behind the data. This approach facilitates the safe and effective utilization of data by relevant stakeholders, leveraging data as a strong support to play a more positive role in building a network security system.

Key words: data security, network security classified protection, data mining, data classification, cluster analysis

摘要: 针对网络安全等级保护测评数据资源未有效利用的问题,提出一种包括数据分类、数据再利用流程、典型应用场景3个维度的网络安全等级保护测评数据再利用模型.首先,将数据按照应用场景进行分类,统计分析测评基础数据,形成不同角度的分析结论;其次,利用测评基础数据以及初步分析结论作为输入,根据各方应用需求构建基于数据挖掘的测评数据再利用模型,提供关联分析、分类分析、聚类分析等功能,深入挖掘数据背后的信息.从而帮助相关各方安全有效利用数据,以数据作为一个强力支撑,为构建网络安全体系发挥更大积极作用.

关键词: 数据安全, 网络安全等级保护, 数据挖掘, 数据分类, 聚类分析

CLC Number: