Education, Science, Technology, Innovation and Life
Open Access
Sign In

Network Security Evaluation and Optimal Active Defense Based on Data Mining Technology

Download as PDF

DOI: 10.23977/jwsa.2021.030104 | Downloads: 3 | Views: 217

Author(s)

Wenwen Zhao 1

Affiliation(s)

1 Hotan Normal College, Hetian, Xinjiang 848000, China

Corresponding Author

Wenwen Zhao

ABSTRACT

Network security evaluation network security evaluation is a network security technology that judges the behavior of illegal users invading and legal users abusing resources through real-time collection and analysis of key information in computer network and host system, and makes appropriate response. It is another security measure after data encryption, firewall and other measures, With the continuous development of computer network technology, the data to be analyzed expands rapidly. How to improve the detection efficiency has become a top priority, and data mining is a good medicine to solve this problem. Firstly, this paper introduces the related concepts of network security evaluation and data mining, and then analyzes the advantages and disadvantages of the network security evaluation system using data mining technology, Finally, some directions of network defense are put forward.

KEYWORDS

Data mining technology, Network security evaluation, Network defense, Computer network, Big data

CITE THIS PAPER

Wenwen Zhao. Network Security Evaluation and Optimal Active Defense Based on Data Mining Technology. Journal of Web Systems and Applications (2021) 3: 17-21. DOI: http://dx.doi.org/10.23977/jwsa.2021.030104.

REFERENCES

[1] Su Yingying. Network security evaluation and most active defense based on attack defense game model [J]. Network security technology and application, 2017 (4): 2.
[2] Liang Yeyu, Yang Ming, Ning Jianchuang, et al. Research on network security audit technology based on data mining [J]. Guangxi communication technology, 2017 (3): 4.
[3] Li Gen. optimal design of control system based on network security and big data mining technology [J]. Electronic technology and software engineering, 2018, No. 134 (12): 246-247.
[4] Ren Zhen, Hu Xuewen, Zhang Hong. Application of improved FCM algorithm in network intrusion detection [J]. 2021 (2011-5): 42-44.
[5] Liu Ning. Computer network security virus defense based on data mining technology [J]. Computer products and circulation, 2017 (12): 68.
[6] Cai Chang. Research on current situation and defense measures of power network security management [J]. Network security technology and application, 2019, No. 218 (02): 83 + 87.
[7] Zhao fan, Ni Zhimin. Research and application of lightweight Web Intrusion active defense key technology and visual measurement model based on dynamic IP blacklist [J]. China building materials technology, 2018, 027 (001): 70-71.
[8] Zou Weifu, Zhang Yiying, Zhang Suxiang, et al. Research on Trojan virus detection technology based on characteristic behavior analysis [J]. 2021 (2014-11): 105-109.
[9] Li Min, Li Wei, Yu Shi, et al. Research on information security active defense system of power grid enterprises based on big data analysis and unknown threat perception [J]. Science and Technology Plaza, 2016, 000 (008): 82-85.
[10] Du Juan. Application of big data mining technology in network security [J]. Satellite TV and broadband multimedia, 2020, No. 516 (11): 49-50.
[11] Guo Hanke. Discussion on the application of data mining technology in computer network virus defense [J]. China new communications, 2019, 21 (09): 119.
[12] Yu Li. Exploration of computer network virus defense technology based on data mining technology [J]. Modern electronic technology, 2016, 39 (21): 4.
[13] Huang Wei. Design of computer network virus defense system based on data mining technology [J]. Electromechanical information, 2020, No. 629 (23): 146-147.
[14] Zhao Kai, he Wenhai, sun Lili. Computer network security virus defense strategy based on data mining technology [J]. Electronic world, 2018, 000 (023): 53,55.
[15] Du Jingzi, Liu Jiong. Design and implementation of network virus defense system based on data mining technology [J]. Information and computer (theoretical Edition), 2018, No. 400 (06): 60-62.

Downloads: 187
Visits: 27780

Sponsors, Associates, and Links


All published work is licensed under a Creative Commons Attribution 4.0 International License.

Copyright © 2016 - 2031 Clausius Scientific Press Inc. All Rights Reserved.