DOI QR코드

DOI QR Code

빅데이터를 활용한 국내 보안솔루션 시장 동향 분석

Analysis of Domestic Security Solution Market Trend using Big Data

  • 투고 : 2019.03.28
  • 심사 : 2019.05.03
  • 발행 : 2019.05.31

초록

사이버 공간에서 안전하게 시스템을 사용하기 위해서는 상황에 적합한 보안 솔루션을 사용해야 한다. 사이버 보안을 강화하기 위해 과거부터 현재까지 보안의 흐름을 정확히 파악하고 미래의 다양한 위협에 대비해야 한다. 본 연구에서는 텍스트마이닝을 이용하여 신뢰도가 높은 네이버 뉴스의 보안/해킹 뉴스의 정보보안 단어들을 수집 후 분석하였다. 첫 번째는 지난 7년의 연도별 보안 뉴스 기사수를 확인하고 추이를 분석하였다. 두 번째는 보안/해킹 관련 단어 순위를 확인 후 매년 주요 관심사를 확인하였다. 세 번째는 보안 솔루션별 단어를 분석하여 어느 보안 그룹의 관심도가 높은지 확인하였다. 네 번째는 보안 뉴스의 제목과 본문을 분리 후 보안 관련 단어를 추출 후 분석하였다. 다섯 번째는 세부 보안 솔루션별 추이 및 동향을 확인하였다. 마지막으로 연도별 매출액과 보안 단어 빈도수를 분석하였다. 이러한 빅데이터 뉴스 분석을 통해 보안 솔루션에 대한 전반적인 인식 조사를 수행하고 많은 비정형 데이터를 분석하여 현재 시장 추세를 분석하고 미래를 예측할 수 있는 정보를 제공하는 데 기여하고자 한다.

To use the system safely in cyberspace, you need to use a security solution that is appropriate for your situation. In order to strengthen cyber security, it is necessary to accurately understand the flow of security from past to present and to prepare for various future threats. In this study, information security words of security/hacking news of Naver News which is reliable by using text mining were collected and analyzed. First, we checked the number of security news articles for the past seven years and analyzed the trends. Second, after confirming the security/hacking word rankings, we identified major concerns each year. Third, we analyzed the word of each security solution to see which security group is interested. Fourth, after separating the title and the body of the security news, security related words were extracted and analyzed. The fifth confirms trends and trends by detailed security solutions. Lastly, annual revenue and security word frequencies were analyzed. Through this big data news analysis, we will conduct an overall awareness survey on security solutions and analyze many unstructured data to analyze current market trends and provide information that can predict the future.

키워드

SHGSCZ_2019_v20n5_492_f0001.png 이미지

Fig. 1. Analysis procedure

SHGSCZ_2019_v20n5_492_f0002.png 이미지

Fig. 2. Number of security/hacking articles by year

SHGSCZ_2019_v20n5_492_f0003.png 이미지

Fig. 3. Monthly Security/Hacking Articles

SHGSCZ_2019_v20n5_492_f0004.png 이미지

Fig. 4. Frequency by Monthly Information Security Solution

SHGSCZ_2019_v20n5_492_f0005.png 이미지

Fig. 5. Security Solution Articles (Title/Body) ratio analysis

SHGSCZ_2019_v20n5_492_f0006.png 이미지

Fig. 6. Frequency of network security solutions

SHGSCZ_2019_v20n5_492_f0007.png 이미지

Fig. 7. Frequency of system(terminal) security solution

SHGSCZ_2019_v20n5_492_f0008.png 이미지

Fig. 8. Frequency of content(data) / information leakage prevention solution

SHGSCZ_2019_v20n5_492_f0009.png 이미지

Fig. 9. Frequency of password/authentication solutions

SHGSCZ_2019_v20n5_492_f0010.png 이미지

Fig. 10. Frequency of security management solution

SHGSCZ_2019_v20n5_492_f0011.png 이미지

Fig. 11. Security Solutions Sales and Word Frequency(Network Security)

SHGSCZ_2019_v20n5_492_f0012.png 이미지

Fig. 12. Security Solutions Sales and Word Frequency(System (Terminal) Security)

SHGSCZ_2019_v20n5_492_f0013.png 이미지

Fig. 13. Security Solutions Sales and Word Frequency(Security management)

Table 1. Security/Hacking Articles(Unit: number)

SHGSCZ_2019_v20n5_492_t0001.png 이미지

Table 2. Security Solutions Classify

SHGSCZ_2019_v20n5_492_t0002.png 이미지

Table 3. Security/Hacking News Title Keyword Frequency Rank

SHGSCZ_2019_v20n5_492_t0003.png 이미지

Table 4. Security/Hacking News Body Keyword Frequency Rank

SHGSCZ_2019_v20n5_492_t0004.png 이미지

Table 5. Security solution title Frequency ranking

SHGSCZ_2019_v20n5_492_t0005.png 이미지

Table 6. Security solution body Frequency ranking

SHGSCZ_2019_v20n5_492_t0006.png 이미지

Table 7. Information security solution sales - Solution word frequency

SHGSCZ_2019_v20n5_492_t0007.png 이미지

참고문헌

  1. Defense Agency for Technology and Quality,"Future defense technology linked with the fourth industrial revolution", 2017
  2. S. J. Yun,"[Military china - Yoon Seok-joon's 'Chaimil'] Already started US-China version "US naval ship accident, is not it a coincidence?", 2017, [cited 2017 November 24], Avaliable From: https://blog.naver.com/china_lab/221147405605
  3. S. W. Jang,"President Trump's signature 'Block Chain Cyber Security Research' bill", 2017,[cited 2017 December 14], Avaliable From: http://bigdata. getnews.co.kr/view.php?ud=201712141002174184d48e16fff2_23
  4. Blue house,"Enhanced capacity to respond to asymmetric threats such as North Korea's Nuclear Issue No.85 (Ministry of National Defense)", 2017, Avaliable From: http://www1.president.go.kr/governmentprojects
  5. Korea Information Security Industry Association, "National Survey on Information Protection Industry", 2017.
  6. Y. H. Noh, T. Y. Kim, D. K. Jeong, K. H. Lee, "Trend Analysis of Convergence Research based on Social Big Data" JOURNAL OF THE KOREA CONTENTS ASSOCIATION, Vol. 19, No. 2, pp. 135-146, Feb, 2019. DOI: https://10.5392/JKCA.2019.19.02.135
  7. M. Song, "Technology Trend Analysis Using Text Mining: Newspaper Article Data," Proceedings of the Korea Information Management Society, pp. 9-30, Nov, 2017.
  8. J. H. Kim, S. H. Kim, I. K. Cho, H. S. Cho, B. K. Noh, "Cyber Security Technology Trends Using Big Data", ETRI, pp. 19-29, 28, 2013.
  9. J.A. Park, Im, H. B. Im, "Understanding Customer's Mind using Big Data Analytics," Korean Psychological Association Conference, pp. 200-200, Aug, 2018.
  10. M. J. Kim, C. J. Kim, "Trend Analysis of News Articles Regarding Sungnyemun Gate using Text Mining," JOURNAL OF THE KOREA CONTENTS ASSOCIATION, Vol. 17, No. 3, pp. 474-485, Mar, 2017. DOI: https://doi.org/10.5392/JKCA.2017.17.03.474
  11. INTERNET TREND, May 3, 2012 - December 31, 2018, Avaliable From: http://trend.logger.co.kr/trendForward.tsp
  12. Naver,"Security/Hacking News", May 3, 2012 - December 31, 2018, Avaliable From: http://news.naver.com/main/list.nhn?mode=LS2D &mid=shm&sid1=105&sid2=732
  13. Korea Information Security Industry Association, "National Survey on Information Protection Industry", 2018.
  14. C. Y. Park, Naver News Crawlong, N2H4 R package, Avaliable From: https://github.com/mrchy park/N2H4
  15. A. Alexandra, C. Paulo, R. Paulo, M. Sergio, "Research trends on Big Data in Marketing: A text mining and topicmodeling based literature analysis", Vol. 24, Issue 1, pp. 1-7, 2018
  16. "K-ICT Strategy 2016", July 1, 2016, Avaliable From: https://blog.naver.com/0mikyoung0/220750945661
  17. S. J. Kim ,S. W. Lee, 2018, "Social Engineering based Security Requirements Recommendation Framework to Prevent an Advanced Persistent Threat," Journal of KIISE, Vol. 45, No. 10, pp. 1015-1028. DOI: http://dx.doi.org/18-510 https://doi.org/10.5626/JOK.2018.45.10.1015
  18. B. H. Kim, D. W. Cho, "Network security technology trends and prospects", The Journal of The Korean Institute of Communication Sciences, Vol. 31, No. 4, pp. 99-106, 2014
  19. Digital Story,"SK Communications Nate Hack, 2011", 2011, Avaliable From: https://blog.naver.com /hahaseyo/10115157336
  20. Cisco Korea Blog,"How many spam do you receive?",February 28, 2017, Avaliable From: http://www.ciscokrblog.com/1169
  21. National Institute of Standards and Technology, Framework for Improving Critical Infrastructure Cybersecurity, 2017
  22. "Top 10 vulnerabilities in 2016", January 24, 2017, Avaliable From: http://blog.alyac.co.kr/942
  23. J. H. Eom, M. J. Kim, 2016, "Effect of Information Security Incident on Outcome of Investment by Type of Investors: Case of Personal Information Leakage Incident," Journal of the Korea Institute of Information Security & Cryptology, Vol. 26, No. 2, pp. 463-474. DOI: http://dx.doi.org/10.13089/JKIISC.2016.26.2.463