DOI QR코드

DOI QR Code

The big data analysis framework of information security policy based on security incidents

  • Jeong, Seong Hoon (Graduate School of Information Security, Korea University) ;
  • Kim, Huy Kang (Graduate School of Information Security, Korea University) ;
  • Woo, Jiyoung (Dept. of Big Data Engineering, Soonchunhyang University)
  • Received : 2017.08.01
  • Accepted : 2017.09.18
  • Published : 2017.10.31

Abstract

In this paper, we propose an analysis framework to capture the trends of information security incidents and evaluate the security policy based on the incident analysis. We build a big data from news media collecting security incidents news and policy news, identify key trends in information security from this, and present an analytical method for evaluating policies from the point of view of incidents. In more specific, we propose a network-based analysis model that allows us to easily identify the trends of information security incidents and policy at a glance, and a cosine similarity measure to find important events from incidents and policy announcements.

Keywords

References

  1. Korea Local Information Research &Development Institute, "A study on the big data utilization strategy by analysis of big data utilization case," 2014.
  2. Ministry of Science, ICT and Future Planning, "2016 Future creation science department R & D project comprehensive plan," 2016.
  3. Lee, J.H., "Utilization of big data for realization of Gov. 3.0," KIPA, 2013.
  4. Kim, D.J., "A smart and reliable government implementation plan with spatial data," KRIHS, 2013.
  5. Lee, Y.H., "Big data and its applications in the health and welfare sectors," Health And Welfare Policy Forum, 2015.
  6. Korea Research Institute for Strategy, "Defense data big data utilization plan," 2013.
  7. Kim, D.Y., Lee, J.I., Song, M.Y., Kim, H.S., Choi, M.A., "Building and using big data for environmental management in Gyeonggi-Do," Policy Research, pp. 1-152, 2016.
  8. Lee, Y.J., "Methodological implications of policy analysis using big data," The Korean Association for Regional Information Society, pp. 95-109, 2015.
  9. Song, T.M., Song, J.Y., "Future signals of health and welfare policies and issues using social big data," J Health Info Stat, 41(4), pp. 417-427, 2016. https://doi.org/10.21032/jhis.2016.41.4.417
  10. Kwon, S.H., Moon, H.J., Kim, K.W., "Meaning of the world big data research network analysis based IT policy study," SAPA, pp. 327-343, 2016.
  11. Yu, Y.L., "Analysis of media coverage on 2015 revised curriculum policy using Big Data Analysis," Department of Education, The Graduate School of Seoul National University, 2015.
  12. Lee, J.H., "A Study of National R&D Big Data based Knowledge Map Application Method," Department of Information and Communication Engineering, Graduate School of Kongju National University, Gong Ju, Korea, 2016.
  13. Jeong, G.H., "A Study of foresight method based on textmining and complexity network analysis, KISTEP, 2011.
  14. Singhal, A., "Modern Information Retrieval: A Brief Overview". Bulletin of the IEEE Computer Society Technical Committee on Data Engineering 24 (4), pp. 35-43, 2001.
  15. Tan,P.-N., Steinbach M., Kumar,V., "Introduction to Data Mining", Addison-Wesley, ISBN 0-321-32136-7, chapter 8; pp. 500, 2005.
  16. Kwon, H., Kim, T., Yu, S. J., Kim, H. K., "Self-similarity based lightweight intrusion detection method for cloud computing," In Proceedings of the Third international conference on Intelligent information and database systems-Volume Part II (pp. 353-362). Springer-Verla, 2011.
  17. Paul T., von Hippel, "Mean, Median, and Skew: Correcting a Textbook Rule". Journal of Statistics Education. 13 (2), 2005.
  18. Schonberg, V.M,, "The world that Big Data creates," 21st century books, 2013.
  19. Parko, E.J., Cho, S.Z., "KoNLPy: Korean natural language processing in Python," The 28th Annual Conference on Human & Cognitive Language Technology. 2014.
  20. Bastian M., Heymann S., Jacomy M., "Gephi: an open source software for exploring and manipulating networks," International AAAI Conference on Weblogs and Social Media, 2009.
  21. KISA, "'16 Randsomware Trend and '17 forecasting report", 2017
  22. https://namu.wiki/w/2017%EB%85%84%20%EC%82%B4%EC%B6%A9%EC%A0%9C%20%EA%B3%84%EB%9E%80%20%ED%8C%8C%EB%8F%99