skip to main content
10.1145/3444370.3444574acmotherconferencesArticle/Chapter ViewAbstractPublication PagesciatConference Proceedingsconference-collections
research-article

Research on Situation Analysis Technology of Network Security Incidents

Authors Info & Claims
Published:04 January 2021Publication History

ABSTRACT

With the rapid development of computer technology and Internet, the process of global informatization has been accelerated. The Internet is entering thousands of households and plays an indispensable role in our production and life. Network and network: users are growing exponentially, and the scale of the network is also growing. Therefore, there are more and more malicious activities against the network. How to effectively ensure the normal operation of the network has become a very critical issue. In order to prevent malicious intrusion from causing damage to the network and the loss of information resources, network managers need to be able to accurately and timely understand the current status and future security trend of the whole network, timely discover attacks and harmful behaviors, and make emergency response, so as to make reasonable emergency strategies for network security settings and resource allocation, so as to achieve advance prediction. The purpose of defense and defense in depth requires timely evaluation of network security status and prediction of future development trend, and timely understanding of network status. More and more people pay attention to network security situation assessment and prediction, which has become a hot issue in the field of network security management.

References

  1. Chen Juan, Chen Haidong, Wu Huimin, et al. Research on Big Data Technology in Network Security Analysis. Digital Technology and Applications, 2018(7), 218--219.Google ScholarGoogle Scholar
  2. Tian Hanfeng. Research on application of Big Data Technology in Network Security Analysis. Front Drawing, 2020, 000(002), 234--234.Google ScholarGoogle Scholar
  3. Fu Weizu, Ma Biao. Application Research of Big Data Technology in Network Security Analysis. China Hi-tech, 2019, 000(003), 53--55.Google ScholarGoogle Scholar
  4. Sun Weixi. Application Research of SVM-PSO in Network Security Situation Prediction. Information Technology, 2019(02), 66--69.Google ScholarGoogle Scholar
  5. Chen Shanxue, Yang Zheng, Zhu Jiang, et al. A Network Security Situation Prediction Model Based on Cumulative PSO-SVM. Computer Application Research, 2015(06), 1778--1781.Google ScholarGoogle Scholar
  6. Liu Junnan, Chen Zhanfang, Jiang Xiaoming, et al. Research on SAGPSO-SVM Model for Network Security Situation Prediction. Journal of Changchun University of Science and Technology (Natural Science), 2019, 042(006), 126--128.Google ScholarGoogle Scholar
  7. Yu Wenfang, Ao Yuntao. Application Research of an RF-SVM Based Network Security Situational Awareness Algorithm. Wireless Internet Technology, 2014, 000(010), 1--2.Google ScholarGoogle Scholar
  8. Shi Feng. Analysis of Computer Network Security Technology. Information and Computer (Theoretical Edition), 2017, 000(022), 191--192.Google ScholarGoogle Scholar

Index Terms

  1. Research on Situation Analysis Technology of Network Security Incidents

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      CIAT 2020: Proceedings of the 2020 International Conference on Cyberspace Innovation of Advanced Technologies
      December 2020
      597 pages
      ISBN:9781450387828
      DOI:10.1145/3444370

      Copyright © 2020 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 4 January 2021

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

      Acceptance Rates

      CIAT 2020 Paper Acceptance Rate94of232submissions,41%Overall Acceptance Rate94of232submissions,41%
    • Article Metrics

      • Downloads (Last 12 months)11
      • Downloads (Last 6 weeks)1

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader