Skip to main content

Research on Computer Network Information Security and Protection Countermeasure in Big Data Era

  • Conference paper
  • First Online:
Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1088))

Abstract

Network security is not only related to personal information security, but also to the information security of the whole country. The application of big data technology in network security analysis can not only maximize the data acquisition, storage and analysis capabilities of the network system itself, but also further reduce the storage cost of the network information itself, and provide an important security guarantee for data retrieval and traceability. In this paper, a new idea of network security situational awareness model is proposed, and an effective network security situational awareness model is found from the perspective of network data traffic characteristics. The experimental results show that the machine learning and data mining algorithm in this paper has high accuracy and timeliness in processing large data. This provides a new way of thinking for the research and processing of new problems brought by big data.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Qiu Fangjia. 2016. Analysis of data security and data backup storage technology. Information System Engineering (4): 68 (in Chinese).

    Google Scholar 

  2. Fang XiangDong. 2017. Talking about data security and data backup storage technology. Information Technology (11): 119 (in Chinese).

    Google Scholar 

  3. Chen Xiaobo. 2018. Brief discussion on the application of big data technology in network security analysis. Network Security Technology and Application (04): 102, 106 (in Chinese).

    Google Scholar 

  4. Zhang Shuwen, Liu Xiaowu, and Sun Xueyan. 2016. Hierarchical perception of network security situation based on multi-source integration. Computer Technology and Development 26 (10): 77–82 (in Chinese).

    Google Scholar 

  5. Ramaki, A.A., M. Khosravi-Farmad, and A.G.Bafgh. 2016. Real time alert correlation and prediction using Bayesian networks. International Iranian Society of Cryptology Conference on Information Security & Cryptology.

    Google Scholar 

  6. Leon, M.C., and H. Jukka. 2018. Searching for big data: How incumbents explore a possible adoption of big data technologies. Scandinavian Journal of Management 34 (2): 129–140.

    Google Scholar 

  7. Samiya, K., L. Xiufeng, A.S. Kashish, and A. Mansaf. 2017. A survey on scholarly data: From big data perspective. Information Processing and Management 53 (4): 923–944.

    Google Scholar 

  8. Andreas, K., K. Andreas, and X. Francesc. 2017. A review on the practice of big data analysis in agriculture. Computers and Electronics in Agriculture 143 (2): 23–37.

    Google Scholar 

  9. Robin, G., Pi Jean-Michel, and T. Christine. 2017. Random forests for big data. Big Data Research 9: 28–46.

    Google Scholar 

  10. Ejaz A., Y. Ibrar, A. Ibrahim, and H. Targio. 2017. The role of big data analytics in Internet of Things. Computer Networks 129 (2): 459–471.

    Google Scholar 

  11. Chunming T., H. Xi, S. Zhikang, and J. Fei. 2017. Big data issues in smart grid—A review. Renewable and Sustainable Energy Reviews 79 (2): 1099–1107.

    Google Scholar 

  12. Subbu, Kalyan P., and V. Athanasios. 2017. Big Data for context aware computing—Perspectives and challenges. Big Data Research 10 (7): 33–43.

    Google Scholar 

  13. Shaoyan, C., and X. Yunjian. 2012. Research on application of multimedia technology in college physical education. Procedia Engineering 29 (2): 4213–4217.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yanbin He .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

He, J., He, Y. (2020). Research on Computer Network Information Security and Protection Countermeasure in Big Data Era. In: Huang, C., Chan, YW., Yen, N. (eds) Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019). Advances in Intelligent Systems and Computing, vol 1088. Springer, Singapore. https://doi.org/10.1007/978-981-15-1468-5_217

Download citation

Publish with us

Policies and ethics