Browse > Article
http://dx.doi.org/10.5762/KAIS.2019.20.5.492

Analysis of Domestic Security Solution Market Trend using Big Data  

Park, Sangcheon (Defense Agency for Technology and Quality)
Park, Dongsoo (Defense Agency for Technology and Quality)
Publication Information
Journal of the Korea Academia-Industrial cooperation Society / v.20, no.5, 2019 , pp. 492-501 More about this Journal
Abstract
To use the system safely in cyberspace, you need to use a security solution that is appropriate for your situation. In order to strengthen cyber security, it is necessary to accurately understand the flow of security from past to present and to prepare for various future threats. In this study, information security words of security/hacking news of Naver News which is reliable by using text mining were collected and analyzed. First, we checked the number of security news articles for the past seven years and analyzed the trends. Second, after confirming the security/hacking word rankings, we identified major concerns each year. Third, we analyzed the word of each security solution to see which security group is interested. Fourth, after separating the title and the body of the security news, security related words were extracted and analyzed. The fifth confirms trends and trends by detailed security solutions. Lastly, annual revenue and security word frequencies were analyzed. Through this big data news analysis, we will conduct an overall awareness survey on security solutions and analyze many unstructured data to analyze current market trends and provide information that can predict the future.
Keywords
Big Data; Text Mining; Information Security; Cyber Security; Security Solution;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 Defense Agency for Technology and Quality,"Future defense technology linked with the fourth industrial revolution", 2017
2 S. J. Yun,"[Military china - Yoon Seok-joon's 'Chaimil'] Already started US-China version "US naval ship accident, is not it a coincidence?", 2017, [cited 2017 November 24], Avaliable From: https://blog.naver.com/china_lab/221147405605
3 C. Y. Park, Naver News Crawlong, N2H4 R package, Avaliable From: https://github.com/mrchy park/N2H4
4 A. Alexandra, C. Paulo, R. Paulo, M. Sergio, "Research trends on Big Data in Marketing: A text mining and topicmodeling based literature analysis", Vol. 24, Issue 1, pp. 1-7, 2018
5 "K-ICT Strategy 2016", July 1, 2016, Avaliable From: https://blog.naver.com/0mikyoung0/220750945661
6 Cisco Korea Blog,"How many spam do you receive?",February 28, 2017, Avaliable From: http://www.ciscokrblog.com/1169
7 S. J. Kim ,S. W. Lee, 2018, "Social Engineering based Security Requirements Recommendation Framework to Prevent an Advanced Persistent Threat," Journal of KIISE, Vol. 45, No. 10, pp. 1015-1028. DOI: http://dx.doi.org/18-510   DOI
8 B. H. Kim, D. W. Cho, "Network security technology trends and prospects", The Journal of The Korean Institute of Communication Sciences, Vol. 31, No. 4, pp. 99-106, 2014
9 Digital Story,"SK Communications Nate Hack, 2011", 2011, Avaliable From: https://blog.naver.com /hahaseyo/10115157336
10 National Institute of Standards and Technology, Framework for Improving Critical Infrastructure Cybersecurity, 2017
11 "Top 10 vulnerabilities in 2016", January 24, 2017, Avaliable From: http://blog.alyac.co.kr/942
12 J. H. Eom, M. J. Kim, 2016, "Effect of Information Security Incident on Outcome of Investment by Type of Investors: Case of Personal Information Leakage Incident," Journal of the Korea Institute of Information Security & Cryptology, Vol. 26, No. 2, pp. 463-474. DOI: http://dx.doi.org/10.13089/JKIISC.2016.26.2.463   DOI
13 Y. H. Noh, T. Y. Kim, D. K. Jeong, K. H. Lee, "Trend Analysis of Convergence Research based on Social Big Data" JOURNAL OF THE KOREA CONTENTS ASSOCIATION, Vol. 19, No. 2, pp. 135-146, Feb, 2019. DOI: https://10.5392/JKCA.2019.19.02.135   DOI
14 S. W. Jang,"President Trump's signature 'Block Chain Cyber Security Research' bill", 2017,[cited 2017 December 14], Avaliable From: http://bigdata. getnews.co.kr/view.php?ud=201712141002174184d48e16fff2_23
15 Blue house,"Enhanced capacity to respond to asymmetric threats such as North Korea's Nuclear Issue No.85 (Ministry of National Defense)", 2017, Avaliable From: http://www1.president.go.kr/governmentprojects
16 Korea Information Security Industry Association, "National Survey on Information Protection Industry", 2017.
17 M. Song, "Technology Trend Analysis Using Text Mining: Newspaper Article Data," Proceedings of the Korea Information Management Society, pp. 9-30, Nov, 2017.
18 J. H. Kim, S. H. Kim, I. K. Cho, H. S. Cho, B. K. Noh, "Cyber Security Technology Trends Using Big Data", ETRI, pp. 19-29, 28, 2013.
19 M. J. Kim, C. J. Kim, "Trend Analysis of News Articles Regarding Sungnyemun Gate using Text Mining," JOURNAL OF THE KOREA CONTENTS ASSOCIATION, Vol. 17, No. 3, pp. 474-485, Mar, 2017. DOI: https://doi.org/10.5392/JKCA.2017.17.03.474   DOI
20 J.A. Park, Im, H. B. Im, "Understanding Customer's Mind using Big Data Analytics," Korean Psychological Association Conference, pp. 200-200, Aug, 2018.
21 INTERNET TREND, May 3, 2012 - December 31, 2018, Avaliable From: http://trend.logger.co.kr/trendForward.tsp
22 Naver,"Security/Hacking News", May 3, 2012 - December 31, 2018, Avaliable From: http://news.naver.com/main/list.nhn?mode=LS2D &mid=shm&sid1=105&sid2=732
23 Korea Information Security Industry Association, "National Survey on Information Protection Industry", 2018.