skip to main content
10.1145/3645279.3645293acmotherconferencesArticle/Chapter ViewAbstractPublication PagesbdmipConference Proceedingsconference-collections
research-article

Application of Internet Big Data in Network Security Situation Assessment

Published:06 May 2024Publication History

ABSTRACT

In recent years, frequent network security attacks have brought great security threats to computer users. Although the security protection system of technical departments is constantly optimized and improved, it is still in a passive position in terms of network attacks. In this article, a network security situation awareness (NSSA) model for big data (BD) environment is proposed, which makes intelligent correlation analysis, context awareness and traceability of security events, and realizes visual management of abnormal behaviors and panoramic display of risk situation. In this article, an NSSA model for BD environment is proposed, which carries out intelligent correlation analysis, context awareness and traceability of security events, and provides technical ideas and solutions for building an NSSA platform driven by BD, which integrates data collection, processing and analysis, security risk monitoring and assessment, active alarm of network threats, pre-judgment and self-defense of network attacks. The test results show that the algorithm can evaluate the network security situation (NSS) accurately and in real time, which provides a new method for the NSS assessment in BD field.

References

  1. Ran Zhang, Min Liu, Qikun Zhang, Yifeng Yin. Prediction Algorithm for NSS based on BP Neural Network Optimized by SA-SOA[J]. International Journal of Performability Engineering. 41, 10 (2020), 2157-2163.Google ScholarGoogle Scholar
  2. Q Liu and M Zeng. NSS detection of internet of things for smart city based on fuzzy neural network[J]. International Journal of Reasoning-based Intelligent Systems. 12, 3 (2020), 222.Google ScholarGoogle Scholar
  3. Zhao Z, Peng Y, Huang J, 2020. An Assessment Method of NSS using Data Fusion Theory[J]. International Journal of Performability Engineering. 7 (2020), 16.Google ScholarGoogle Scholar
  4. Zhu Wei, Xiaofeng Liu, Hao Tian, Baiqing Li, Daowei Li, Guanghui Shao, and Mingcheng Jin. Method of Main Grid Online Security Situation and Operational Experience Acquisition[J]. Proceedings of the Chinese Society of Electrical Engineering. 38, 22 (2018), 6605-6615.Google ScholarGoogle Scholar
  5. B Zhu, Y Chen, and Y Cai. Three Kinds of NSS Awareness Model Based on Big Data[J]. International Journal of Network Security. 21, 1 (2019), 115-121.Google ScholarGoogle Scholar
  6. P. Lin and Y. Chen. 2019. NSS Assessment Based on Text SimHash in Big Data Environment[J]. International Journal of Network Security. 21, 4 (2019), 699-708.Google ScholarGoogle Scholar
  7. Ronghua Xu, Yu Chen, Erik Blasch, and Genshe Chen. 2019. Exploration of blockchain-enabled decentralized capability-based access control strategy for space situation awareness. Optical Engineering 58, 04 (February 2019), 1. DOI:https://doi.org/10.1117/1.oe.58.4.041609.Google ScholarGoogle ScholarCross RefCross Ref
  8. Wenhua Zheng. 2020. Research on situation awareness of network security assessment based on dempster-shafer. MATEC Web of Conferences 309, (January 2020), 02004. DOI:https://doi.org/10.1051/matecconf/202030902004.Google ScholarGoogle ScholarCross RefCross Ref
  9. H. Wang, D. Zhao and X. Li. 2020. Research on NSS Assessment and Forecasting Technology[J]. Journal of web engineering. 2020, 19.Google ScholarGoogle Scholar
  10. Cong Huang and Chao Wang. 2018. NSS Awareness Based on the Optimized Dynamic Wavelet Neural Network[J]. International Journal of Network Security. 20, 8 (2018), 593-600.Google ScholarGoogle Scholar
  11. Xiaojiang Du, Meng Shen, Zheng Chang and Zhao Cao. 2020. Recent Advances in Security and Privacy for Future Intelligent Networks[J]. IEEE Network. 34, 2 (2020), 4-5.Google ScholarGoogle ScholarCross RefCross Ref
  12. J. Ren. 2020. NSS Assessment Model based on Information Quality Control[J]. International Journal of Performability Engineering. 16, 4 (2020), 673.Google ScholarGoogle ScholarCross RefCross Ref
  13. Quan Yu, Jing Ren, Jiyan Zhang, Siyang Liu, Yinjin Fu, Ying Liu, Lina Ma, Jian Jing, and Wei Zhang. 2020. An Immunology-Inspired network security architecture. IEEE Wireless Communications 27, 5 (October 2020), 168–173. DOI:https://doi.org/10.1109/mwc.001.2000046.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Application of Internet Big Data in Network Security Situation Assessment

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      BDMIP '23: Proceedings of the 2023 International Conference on Big Data Mining and Information Processing
      November 2023
      223 pages
      ISBN:9798400709166
      DOI:10.1145/3645279

      Copyright © 2023 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 6 May 2024

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited
    • Article Metrics

      • Downloads (Last 12 months)6
      • Downloads (Last 6 weeks)6

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format