skip to main content
10.1145/3482632.3487444acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiciscaeConference Proceedingsconference-collections
research-article

Research on Computer Network Information Security Protection Strategy and Evaluation Algorithm Based on Data mining

Published: 22 November 2021 Publication History

Abstract

Data mining technology uses brand-new data analysis and reflection to judge and find the potential links in data, so as to ensure that the data runs in a relatively safe state, which is of great help to promote the improvement of computer network security. In order to ensure the security performance of computer network, it is necessary to adopt certain defense measures and defense strategies. Applying data mining technology to computer network can mine, process and analyze the data in computer network. This paper analyzes the relevant strategies of computer network information security protection, and further optimizes the protection work of network information security combined with data mining technology, thus providing certain reference for evaluating the effectiveness of network information security protection.

References

[1]
Yang Pinfang. Research on Computer Network Information Security Protection Strategy and Evaluation Algorithm. Modern Information Technology, vol. 4, no. 8, pp. 148-149+152, 2020.
[2]
Kong Chuiyu. Discussion on Computer Network Information Security Protection Strategy and Evaluation Algorithm. Digital Technology and Application, vol. 37, no. 2, pp. 210-211, 2019.
[3]
Song Junsu. Discussion on the Application of data mining Technology in Computer Network Virus Prevention. Information Technology and Informatization, vol. 240, no. 3, pp. 58-60, 2020.
[4]
Zhang Dapeng. Computer network information security optimization encryption algorithm design. Digital Communication World, vol. 160, no. 4, pp. 128+202, 2018.
[5]
Wu Ruohua. Influencing factors and preventive measures of computer network security technology. Modern Education Forum, vol. 4, no. 4, pp. 23-24, 2021.
[6]
Stojanov, Zeljko, Dobrilovic, Solving Problems in a Physical Laboratory for Computer Networks and Data Security: A Conceptual Framework with Students Experiences. The international journal of engineering education, vol. 32, no. 6, pp. 2517 -2530, 2016.
[7]
Garay J A, Prisco R D. Security and Cryptography for Networks. Lecture Notes in Computer Science, vol. 7485, no. 1, pp. 229–241, 2016.
[8]
Royal, Holloway, University, Cryptographic enforcement of information flow policies without public information via tree partitions1. Journal of Computer Security, vol. 25, no. 6, pp. 511-535, 2017.
[9]
Taglienti C, Cannady J. The User Attribution Problem and the Challenge of Persistent Surveillance of User Activity in Complex Networks. Journal of Computer Security, vol. 24, no. 2, pp. 235-288, 2016.
[10]
El-Bayaa A S, Khedr M E, Aly M H. Android smartphones network implementation in the absence of internet. Computer Applications in Engineering Education, vol. 26, no. 4, pp. 938-946, 2018.
[11]
Patsakis C, Zigomitros A, Papageorgiou A, Privacy and Security for Multimedia Content shared on OSNs: Issues and Countermeasures. The Computer Journal, vol. 58, no. 4, pp. 518-535, 2018.
[12]
Zhao Renfei. Computer Network Information Security Threats and Data Encryption Technology Research. Network Security Technology and Application, vol. 239, no. 11, pp. 43-44, 2020.
[13]
Xu Hui. Analysis of Computer Network Information Security and Protection Technology in the New Era. Technology and Innovation, vol. 113, no. 17, pp. 92-93, 2018.
[14]
Cui Hai. Research on Threats and Protection Strategies of Network Information Security under Big Data. Information and Communication, vol. 180, no. 12, pp. 138-139, 2017.
  1. Research on Computer Network Information Security Protection Strategy and Evaluation Algorithm Based on Data mining

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Other conferences
        ICISCAE 2021: 2021 4th International Conference on Information Systems and Computer Aided Education
        September 2021
        2972 pages
        ISBN:9781450390255
        DOI:10.1145/3482632
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 22 November 2021

        Permissions

        Request permissions for this article.

        Check for updates

        Qualifiers

        • Research-article
        • Research
        • Refereed limited

        Conference

        ICISCAE 2021

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • 0
          Total Citations
        • 45
          Total Downloads
        • Downloads (Last 12 months)3
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 28 Feb 2025

        Other Metrics

        Citations

        View Options

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format.

        HTML Format

        Figures

        Tables

        Media

        Share

        Share

        Share this Publication link

        Share on social media