KEYWORDS: Information security, Artificial intelligence, Analytical research, Visualization, Visual analytics, Network security, Evolutionary algorithms, Telecommunications, Internet of things, Algorithm development
With the advent of the information age, people are paying more and more attention to the security of information, and information security is already a more mature field. The advancement of artificial intelligence technology in recent years has brought about a considerable breakthrough in this field. At present, the research papers on AI in the field of information security are relatively scattered, and there are few papers analysing the hot spots and trends in this field. In this paper, we use Biblimetric, Citespace and VOSviewer to analyse 933 papers downloaded from WOS (Web of Science), summarise them and generate a visual knowledge graph to visualise and analyse the application of AI in the field of information security, through literature volume analysis, co-citation analysis and keyword co-occurrence visualisation, the current research hotspots and possible future development trends are further analysed.
KEYWORDS: Systems modeling, Operating systems, Data modeling, Design and modelling, Databases, Windows, Elasticity, Performance modeling, Data storage, Telecommunications
With the rapid development of science and technology, the world has accelerated into the network information era, and the high sustained and high intensity attack and defense confrontation in cyberspace has become the new normal of the game between countries, the organization of attackers, the standardization of attack equipment, and the automation of attack methods have evolved. The research on APT attack detection has become a hot and difficult issue for academia and industry. To address these challenges, this paper proposes a system-level origin graph model for APT attack detection, analyzes and discusses the advantages and disadvantages of different granularity of origin graphs, selects a reasonable granularity of origin graph models, and focuses on multi-operating system origin graph models to determine different origin graph models for the respective characteristics of different operating system platforms, specifically, to build different entity objects, and elaborates on the technical details. The technical details are elaborated. Finally, the validity and feasibility of the system-level origin graph model are clarified to provide model support for the subsequent research on effective APT attack detection.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.