skip to main content
10.1145/3448734.3450838acmotherconferencesArticle/Chapter ViewAbstractPublication PagesdtmisConference Proceedingsconference-collections
research-article

Computer Network Security Problems and Solutions Based on Big Data

Published: 17 May 2021 Publication History

Abstract

In recent years, the development speed of big data related technology is extremely rapid, and it gradually penetrates into all fields of society from a more in-depth and broader perspective, which provides an objective data basis for the development of all walks of life, and greatly promotes the development of related fields. At the same time, under the background of big data era, computer network information security has gradually become an important problem perplexing the academic field and computer users. Based on this, this paper discusses the problems and solutions of computer network security based on big data. Starting from the necessity of strengthening the network security of big data, this paper clarifies the influence of various factors, and adopts the form of questionnaire to improve the safety awareness of users, upgrade the fire wall and anti-virus software, strengthen the security guarantee of information storage and transmission, and strengthen the computer network Safety management construction and other aspects of random investigation. Finally, aiming at the problems existing in the network security in the era of big data, the effective countermeasures are constructed. According to the research, the anti-virus software score is as high as 9.4 in the optimization strategy of computer network security. It can be seen that only by creating a good computer network environment guarantee and actively exploring effective ways of computer network security problems can we effectively improve the prevention of computer network security problems and make the computer network better serve human beings.

References

[1]
Zeng, H., Liu, Z., & Cai, H. . (2020). Research on the application of deep learning in computer network information security. Journal of Physics: Conference Series, 1650(3), 032117 (7pp).
[2]
Rao, Y. S., Nayak, P. K., Saini, H., & Panda, T. C. . (2019). Behavioral modeling of malicious objects in a highly infected network under quarantine defence. International Journal of Information Security and Privacy (IJISP), 13.
[3]
Wang, L., & Jones, R. . (2020). Big data analytics in cyber security: network traffic and attacks. Journal of Computer Information Systems(3), 1-8.
[4]
Shakhovska, N., Boyko, N., Zasoba, Y., & Benova, E. . (2019). Big data processing technologies in distributed information systems. Procedia Computer ence, 160(1), 561-566.
[5]
Wang, F. . (2016). Analysis on the construction of computer data processing mode based on era of big data. Journal of Computational and Theoretical Nanoscience, 13(12), 10347-10351.
[6]
Popov, G. A., & Popova, E. A. . (2020). Analysis of time of committing nearest malicious attack in information security system using apparatus of rare regenerating processes. VESTNIK OF ASTRAKHAN STATE TECHNICAL UNIVERSITY SERIES MANAGEMENT COMPUTER ENCE AND INFORMATICS, 2020(2), 34-44.
[7]
Khayyer, M., Farsangi, M. M., & Bijami, E. . (2019). A networked hierarchical control scheme for wide‐area systems: a power system application. Asian Journal of Control(3).
[8]
Malbon, E., Alexander, D., Carey, G., Reeders, D., Green, C., & Dickinson, H., (2019). Adapting to a marketised system: network analysis of a personalisation scheme in early implementation. Health & Social Care in the Community, 27(1).
[9]
Farouk, F., Alkady, Y., & Rizk, R. . (2020). Efficient privacy-preserving scheme for location based services in vanet system. IEEE Access, PP(99), 1-1.
[10]
Ren, J., & Wenxin, X. . (2019). Scheme construction of vr cloud integration intelligent system based on internet of things. Journal of Physics: Conference Series, 1345(5), 052081 (8pp).

Index Terms

  1. Computer Network Security Problems and Solutions Based on Big Data
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Other conferences
        CONF-CDS 2021: The 2nd International Conference on Computing and Data Science
        January 2021
        1142 pages
        ISBN:9781450389570
        DOI:10.1145/3448734
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 17 May 2021

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. Big Data
        2. Computer Network
        3. Security Issues
        4. Solution Strategy

        Qualifiers

        • Research-article
        • Research
        • Refereed limited

        Conference

        CONF-CDS 2021

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • 0
          Total Citations
        • 105
          Total Downloads
        • Downloads (Last 12 months)12
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 20 Feb 2025

        Other Metrics

        Citations

        View Options

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format.

        HTML Format

        Figures

        Tables

        Media

        Share

        Share

        Share this Publication link

        Share on social media