Data-Driven Zero Trust Key Algorithm

In today’s information society, network security is a crucial issue. Network security technology is changing as a result of the development of emerging technologies such as big data, cloud computing, and artificial intelligence. Data-driven (DD) security has emerged as a new network security technol...

Full description

Saved in:
Bibliographic Details
Published inWireless communications and mobile computing Vol. 2022; no. 1
Main Authors Liu, Zhiwei, Li, Xiaoyu, Mu, Dejun
Format Journal Article
LanguageEnglish
Published Oxford Hindawi 2022
John Wiley & Sons, Inc
Subjects
Online AccessGet full text
ISSN1530-8669
1530-8677
1530-8677
DOI10.1155/2022/8659428

Cover

More Information
Summary:In today’s information society, network security is a crucial issue. Network security technology is changing as a result of the development of emerging technologies such as big data, cloud computing, and artificial intelligence. Data-driven (DD) security has emerged as a new network security technology development direction. The key technologies for DD network security are discussed in depth in this paper. A data security protection system is designed from the perspective of ZT, based on advanced security concepts and technologies developed by ZT, as well as a foreign data security governance framework. The number of alarms generated per hour is counted, removal rules are defined, and real-time rule matching is performed to eliminate false alarms based on different combinations of attributes. By analyzing the security data generation rules and internal relations, a security aggregation method can reduce redundant data and improve alarm quality.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:1530-8669
1530-8677
1530-8677
DOI:10.1155/2022/8659428