情报科学 ›› 2022, Vol. 40 ›› Issue (3): 27-32.

• 理论研究 • 上一篇    下一篇

基于知识关联的金融竞争情报保障模式研究

  

  • 出版日期:2022-03-01 发布日期:2022-03-08

  • Online:2022-03-01 Published:2022-03-08

摘要: 【目的/意义】因为一些企业会采用非法手段入侵信息系统,非法获取竞争情报。为了进一步提高用户访问
异常的检测效率,研究了知识关联视角下金融竞争情报保障模式。为了保障情报信息安全,在知识关联视角下研
究金融竞争情报保障模式。【方法/过程】通过构建的两种机制来保护信息安全:第一重构建基于知识关联挖掘建立
情报数据库入侵防护机制,通过入侵检测阻止非法入侵。第二重构建金融竞争情报数据库加密保障机制,给情报
数据库进行 RSA(RSA Public Key System)和 DES(Data Encryption Standard)混合加密。非法用户即使突破第一重
保护,也能保障数据不被窃取。【结果/结论】结果表明:第一重防护下,检测结果与实际情况大部分吻合,仅有1名入
侵者成功登录。第二重加密保障下,该入侵者破解金融企业情报密文失败,证明此次研究模式成功阻止了情报泄
露,保障了情报安全。【创新/局限】但由于本次测试攻击类型较少,而实际情况所使用的攻击方式要更多,因此有待
进一步分析和测试,扩大模式适用性和应用性。

Abstract: 【Purpose/significance】Due to some enterprises will use illegal means to invade information systems and illegally obtain
competitive intelligence. In order to further improve the detection efficiency of user access exceptions, the financial competitive intelli‐
gence guarantee model from the perspective of knowledge association is studied.【Method/process】Two mechanisms are constructed to protect information security: the first is to build an intelligence database intrusion prevention mechanism based on knowledge associa‐tion mining, and prevent illegal intrusion through intrusion detection. The second step is to build an encryption guarantee mechanism for the financial competitive intelligence database, and perform RSA (RSA Public Key System) and DES (Data Encryption Standard) hybrid encryption for the intelligence database. Even if illegal users break through the first protection, they can still protect their data from being stolen. 【Result/conclusion】The results show that under the first protection, the detection results are mostly consistent with the actual situation, and only one intruder successfully logged in. Under the second level of encryption, the intruder failed to crack the ciphertext of financial enterprise intelligence, proving that the research model succeeded in preventing intelligence leakage and ensur‐ing intelligence security.【Innovation/limitation】However, because there are fewer types of attacks in this test, and more attack meth‐ods are used in the actual situation, further analysis and testing are needed to expand the applicability and applicability of the model.