Visible to the public Security situation awareness method of power mobile application based on big data architecture

TitleSecurity situation awareness method of power mobile application based on big data architecture
Publication TypeConference Paper
Year of Publication2022
AuthorsYong, Li, Mu, Chen, ZaoJian, Dai, Lu, Chen
Conference Name2022 5th International Conference on Data Science and Information Technology (DSIT)
KeywordsBig Data, Big Data architecture, component, composability, Law, mobile applications, power mobile application, Predictive Metrics, pubcrawl, Resiliency, security situational awareness, situational awareness, Smart Grid Situational Awareness, Support vector machines, SVR, Terminal threat index, Threat Assessment, Throughput, visualization
Abstract

According to the characteristics of security threats and massive users in power mobile applications, a mobile application security situational awareness method based on big data architecture is proposed. The method uses open-source big data technology frameworks such as Kafka, Flink, Elasticsearch, etc. to complete the collection, analysis, storage and visual display of massive power mobile application data, and improve the throughput of data processing. The security situation awareness method of power mobile application takes the mobile terminal threat index as the core, divides the risk level for the mobile terminal, and predicts the terminal threat index through support vector machine regression algorithm (SVR), so as to construct the security profile of the mobile application operation terminal. Finally, through visualization services, various data such as power mobile applications and terminal assets, security operation statistics, security strategies, and alarm analysis are displayed to guide security operation and maintenance personnel to carry out power mobile application security monitoring and early warning, banning disposal and traceability analysis and other decision-making work. The experimental analysis results show that the method can meet the requirements of security situation awareness for threat assessment accuracy and response speed, and the related results have been well applied in a power company.

DOI10.1109/DSIT55514.2022.9943899
Citation Keyyong_security_2022