Browse > Article
http://dx.doi.org/10.9708/jksci.2017.22.10.073

The big data analysis framework of information security policy based on security incidents  

Jeong, Seong Hoon (Graduate School of Information Security, Korea University)
Kim, Huy Kang (Graduate School of Information Security, Korea University)
Woo, Jiyoung (Dept. of Big Data Engineering, Soonchunhyang University)
Abstract
In this paper, we propose an analysis framework to capture the trends of information security incidents and evaluate the security policy based on the incident analysis. We build a big data from news media collecting security incidents news and policy news, identify key trends in information security from this, and present an analytical method for evaluating policies from the point of view of incidents. In more specific, we propose a network-based analysis model that allows us to easily identify the trends of information security incidents and policy at a glance, and a cosine similarity measure to find important events from incidents and policy announcements.
Keywords
big data; information security policy; information security incident; text analysis; policy evaluation;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Ministry of Science, ICT and Future Planning, "2016 Future creation science department R & D project comprehensive plan," 2016.
2 Lee, J.H., "Utilization of big data for realization of Gov. 3.0," KIPA, 2013.
3 Kim, D.J., "A smart and reliable government implementation plan with spatial data," KRIHS, 2013.
4 Lee, Y.H., "Big data and its applications in the health and welfare sectors," Health And Welfare Policy Forum, 2015.
5 Korea Research Institute for Strategy, "Defense data big data utilization plan," 2013.
6 Kim, D.Y., Lee, J.I., Song, M.Y., Kim, H.S., Choi, M.A., "Building and using big data for environmental management in Gyeonggi-Do," Policy Research, pp. 1-152, 2016.
7 Lee, Y.J., "Methodological implications of policy analysis using big data," The Korean Association for Regional Information Society, pp. 95-109, 2015.
8 Song, T.M., Song, J.Y., "Future signals of health and welfare policies and issues using social big data," J Health Info Stat, 41(4), pp. 417-427, 2016.   DOI
9 Kwon, S.H., Moon, H.J., Kim, K.W., "Meaning of the world big data research network analysis based IT policy study," SAPA, pp. 327-343, 2016.
10 Yu, Y.L., "Analysis of media coverage on 2015 revised curriculum policy using Big Data Analysis," Department of Education, The Graduate School of Seoul National University, 2015.
11 Korea Local Information Research &Development Institute, "A study on the big data utilization strategy by analysis of big data utilization case," 2014.
12 Lee, J.H., "A Study of National R&D Big Data based Knowledge Map Application Method," Department of Information and Communication Engineering, Graduate School of Kongju National University, Gong Ju, Korea, 2016.
13 Jeong, G.H., "A Study of foresight method based on textmining and complexity network analysis, KISTEP, 2011.
14 Paul T., von Hippel, "Mean, Median, and Skew: Correcting a Textbook Rule". Journal of Statistics Education. 13 (2), 2005.
15 Singhal, A., "Modern Information Retrieval: A Brief Overview". Bulletin of the IEEE Computer Society Technical Committee on Data Engineering 24 (4), pp. 35-43, 2001.
16 Tan,P.-N., Steinbach M., Kumar,V., "Introduction to Data Mining", Addison-Wesley, ISBN 0-321-32136-7, chapter 8; pp. 500, 2005.
17 Kwon, H., Kim, T., Yu, S. J., Kim, H. K., "Self-similarity based lightweight intrusion detection method for cloud computing," In Proceedings of the Third international conference on Intelligent information and database systems-Volume Part II (pp. 353-362). Springer-Verla, 2011.
18 Schonberg, V.M,, "The world that Big Data creates," 21st century books, 2013.
19 Parko, E.J., Cho, S.Z., "KoNLPy: Korean natural language processing in Python," The 28th Annual Conference on Human & Cognitive Language Technology. 2014.
20 Bastian M., Heymann S., Jacomy M., "Gephi: an open source software for exploring and manipulating networks," International AAAI Conference on Weblogs and Social Media, 2009.
21 KISA, "'16 Randsomware Trend and '17 forecasting report", 2017
22 https://namu.wiki/w/2017%EB%85%84%20%EC%82%B4%EC%B6%A9%EC%A0%9C%20%EA%B3%84%EB%9E%80%20%ED%8C%8C%EB%8F%99