skip to main content
10.1145/3569507.3569514acmotherconferencesArticle/Chapter ViewAbstractPublication PagescciotConference Proceedingsconference-collections
research-article

Software Development and Design of a Cybersecurity System Based on Big Data Analysis Technology

Published:09 December 2022Publication History

ABSTRACT

Internet is an emerging technology industry worldwide. With the continuous development of computer technology, although the Internet can provide convenience for people, its security problems are gradually highlighted and are receiving more and more attention. Cyber security issues not only affect personal information, but also endanger national information security. At the same time, in the cyber environment, viruses often threaten the operation of software. There are a number of security risks. How to use software design to enhance virus defense is also a hot issue of current research. Therefore, this paper takes the cybersecurity threat characteristics of software in the big data environment as the basic basis and proposes a software design framework based on cybersecurity system to improve software security in the cyber environment so as to ensure internal data security.

References

  1. Ziyuan Zhao, Hongwei Xing. Design of network security monitoring system of power monitoring system based on big data. China Energy and Environmental Protection, 44 (01), pp.242-247+255, 2022.Google ScholarGoogle Scholar
  2. Lingmei Song. The application of virtual network technology in computer network security. Science & Technology for China's Mass Media, 00(02), pp.105-107, 2021.Google ScholarGoogle Scholar
  3. Wanghong Zhou. Big data technology application in network security analysis. Electronics World, 00(17), pp.108-109, 2020.Google ScholarGoogle Scholar
  4. Ziyang Zhang. Thinking about the application of big data technology in cybersecurity practice. China New Telecommunications, 22(13), pp.152, 2020.Google ScholarGoogle Scholar
  5. Lei Zou, Quanling Mu. Reliability evaluation of wireless communication network security system based on pattern recognition technology. Microelectronics & Computer, 37 (06), pp.79-82, 2020.Google ScholarGoogle Scholar
  6. Chen Xia. Exploring the design of defense system for linked network security system. Network Security Technology & Application, 00(02), pp.13-15, 2020.Google ScholarGoogle Scholar
  7. Qiang Shan. Research on the development of network security system based on software engineering technology. Computer Products and Distribution, 00(02), pp.17+271, 2019.Google ScholarGoogle Scholar
  8. Yu Sun. Introduction to the application of big data technology in network security analysis. Network Security Technology & Application, 00(04), pp.102+106, 2017.Google ScholarGoogle Scholar
  9. Yao Wang. Design and implementation of enterprise information network security system. China Computer & Communication, 00(06), pp.119-120, 2017.Google ScholarGoogle Scholar
  10. Miao Zhu. Research on the design and implementation of campus network security system based on honeynet technology. Management & Technology of SME, 00(11), pp.163-164, 2016.Google ScholarGoogle Scholar

Index Terms

  1. Software Development and Design of a Cybersecurity System Based on Big Data Analysis Technology

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      CCIOT '22: Proceedings of the 2022 7th International Conference on Cloud Computing and Internet of Things
      September 2022
      82 pages
      ISBN:9781450396738
      DOI:10.1145/3569507

      Copyright © 2022 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 9 December 2022

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited
    • Article Metrics

      • Downloads (Last 12 months)27
      • Downloads (Last 6 weeks)0

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format