Skip to main content

Modeling Analysis of Network Spatial Sensitive Information Detection Driven by Big Data

  • Conference paper
  • First Online:
Advanced Hybrid Information Processing (ADHIP 2019)

Abstract

The dissemination of sensitive information has become a serious social content. In order to effectively improve the detection accuracy of sensitive information in cyberspace, a sensitive information detection model in cyberspace is established under the drive of big data. By using word segmentation and feature clustering, the text features and image features of current spatial data information are extracted, the dimension of the data is reduced, the document classifier is built, and the obtained feature documents are input into the classifier. Using the open source database of support vector machine (SVM) and LIBSVM, the probability ratio of current information belongs to two categories is judged, and the probability ratio of classification is obtained to realize information detection. The experimental data show that, after the detection model is applied, the accuracy of the text-sensitive information detection in the network space is improved by 35%, the accuracy of the image information detection is improved by 29%, and the detection model has the advantages of obvious advantages and strong feasibility.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bi, J., Li, H., Xing, M.: Analysis on talent training mechanism and mode of cyberspace security under the background of big data. Mod. Vocat. Educ. 7, 159 (2018)

    Google Scholar 

  2. Liu, S., Bai, W., Liu, G., et al.: Parallel fractal compression method for big video data. Complexity 2016976 (2018)

    Google Scholar 

  3. Wang, W.: Research on the current situation and countermeasures of cyberspace security under the background of big data. China Strateg. Emerg. Ind. 156(24), 100+102 (2018)

    Google Scholar 

  4. Miao, L., Shuai, L., Weina, F., et al.: Distributional escape time algorithm based on generalized fractal sets in cloud environment. Chin. J. Electron. 24(1), 124–127 (2015)

    Article  Google Scholar 

  5. Tang, W., Wang, Y., Wang, J., et al.: Research on alienation control model of network public opinion information in the context of big data. China New Commun. 20(10), 140 (2018)

    Google Scholar 

  6. Bing, J., Shuai, L., Yongjian, Y.: Fractal cross-layer service with integration and interaction in internet of things. Int. J. Distrib. Sensor Networks 10(3), 760248 (2018)

    Google Scholar 

  7. Wu, J.: Research on college students’ virtual cyberspace behavior management from the perspective of big data. Inf. Comput. (Theory Ed.) 7, 223–224 (2018)

    Google Scholar 

  8. Lu, M., Liu, S., Sangaiah, A.K., et al.: Nucleosome positioning with fractal entropy increment of diversity in telemedicine. IEEE Access 6, 33451–33459 (2018)

    Article  Google Scholar 

  9. Xia, Y., Lan, Y., Zhao, Y.: Research on alienation control model of online public opinion information in the context of big data. Mod. Intell. 38(2), 3–11 (2018)

    Google Scholar 

  10. Shu, X., Yao, D., Bertino, E.: Privacy-preserving detection of sensitive data exposure. IEEE Trans. Inf. Forensics Secur. 10(5), 1092–1103 (2017)

    Article  Google Scholar 

  11. Liu, S., Bai, W., Zeng, N., et al.: A fast fractal based compression for MRI images. IEEE Access 7, 62412–62420 (2019)

    Article  Google Scholar 

  12. Fan, P.: Analysis on network information security protection strategy in the era of big data. China New Commun. 20(09), 134 (2018)

    Google Scholar 

  13. Zheng, X.: Promoting the construction of network trust system under the condition of big data intelligence. China Nat. People’s Congr. 455(11), 51 (2018)

    Google Scholar 

  14. Zhang, Y.: Development trend of information technology and network space security. Farm-staff 580(08), 240 (2018)

    Google Scholar 

  15. Wei, W., Shuai, L., Wenjia, L., et al.: Fractal intelligent privacy protection in online social network using attribute-based encryption schemes. IEEE Trans. Comput. Soc. Syst. 5(3), 736–747 (2018)

    Article  Google Scholar 

Download references

Acknowledgment

The authors would like to thank State Key Laboratory of Complex Electromagnetic Environment Effects on Electronics and Information System Director Fund (CEMEE2019K0104B).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ruijuan Liu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Liu, R., Yang, B., Liu, S. (2019). Modeling Analysis of Network Spatial Sensitive Information Detection Driven by Big Data. In: Gui, G., Yun, L. (eds) Advanced Hybrid Information Processing. ADHIP 2019. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 301. Springer, Cham. https://doi.org/10.1007/978-3-030-36402-1_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-36402-1_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-36401-4

  • Online ISBN: 978-3-030-36402-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics