From Data-Driven to Intelligent-Driven: Technology Evolution of Network Security in Big Data Era
Title | From Data-Driven to Intelligent-Driven: Technology Evolution of Network Security in Big Data Era |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Zhu, Yan, Zhang, Yi, Wang, Jing, Song, Weijing, Chu, Cheng-Chung, Liu, Guowei |
Conference Name | 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC) |
Keywords | Access Control, authentication, authorisation, Big Data, big data era, big data security technologies, Communication networks, compositionality, computer network security, cryptography, data encryption, data privacy, disaster recovery, DT security principles, encryption audits, Human Behavior, Identification, Information systems, information technology, Intelligent Data and Security, Intelligent Data Security, intrusion prevention, network security technology, Organizations, Predictive Metrics, pubcrawl, Resiliency, Scalability, security, security assurance strategy, security audit, Security Audits, security category, security principles, security technology evolution, Standards organizations, System recovery, system virtualization |
Abstract | With the advent of the big data era, information systems have exhibited some new features, including boundary obfuscation, system virtualization, unstructured and diversification of data types, and low coupling among function and data. These features not only lead to a big difference between big data technology (DT) and information technology (IT), but also promote the upgrading and evolution of network security technology. In response to these changes, in this paper we compare the characteristics between IT era and DT era, and then propose four DT security principles: privacy, integrity, traceability, and controllability, as well as active and dynamic defense strategy based on "propagation prediction, audit prediction, dynamic management and control". We further discuss the security challenges faced by DT and the corresponding assurance strategies. On this basis, the big data security technologies can be divided into four levels: elimination, continuation, improvement, and innovation. These technologies are analyzed, combed and explained according to six categories: access control, identification and authentication, data encryption, data privacy, intrusion prevention, security audit and disaster recovery. The results will support the evolution of security technologies in the DT era, the construction of big data platforms, the designation of security assurance strategies, and security technology choices suitable for big data. |
DOI | 10.1109/COMPSAC.2019.10191 |
Citation Key | zhu_data-driven_2019 |
- security assurance strategy
- Identification
- Information systems
- information technology
- intrusion prevention
- network security technology
- Organizations
- Predictive Metrics
- pubcrawl
- security
- Human behavior
- security audit
- Security Audits
- security category
- security principles
- security technology evolution
- Standards organizations
- System recovery
- system virtualization
- big data security technologies
- Intelligent Data Security
- Compositionality
- Resiliency
- Scalability
- Access Control
- authentication
- authorisation
- Big Data
- big data era
- Intelligent Data and Security
- Communication networks
- computer network security
- Cryptography
- data encryption
- data privacy
- disaster recovery
- DT security principles
- encryption audits