Computer Network Security in the Background of Big Data
DOI: 10.23977/jaip.2022.050309 | Downloads: 4 | Views: 153
Author(s)
Dexi Chen 1,2, Juan Wu 1,2, Haiqing Liu 3
Affiliation(s)
1 School of Computer and Big Data, Jining Normal University, Wulanchabu, Inner Mongolia, China
2 Philippine Christian University Center for International Education, Manila, Philippine
3 Jining District Experimental Middle School, Wulanchabu, Inner Mongolia, China
Corresponding Author
Dexi ChenABSTRACT
In the age of big data(BD), with the rapid growth of computer network technology, it plays an indispensable role in people's life. However, due to the immaturity of China's Internet security precautions, loopholes, hacker attacks and other factors, user information and property have been affected, causing serious losses. From the perspective of computer network crime, this paper mainly analyzes the shortcomings of current domestic laws, regulations and policies in this area and the solutions to them, studies and puts forward some suggestions and countermeasures, and discusses the current situation of computer network security(CNS) in the context of BD. After that, we studied the application of encryption algorithm in the context of BD, designed a CNS framework based on the algorithm, and then tested the security of the algorithm. The final test results show that the security protection of BD based encryption algorithm for data is more than 90%, which shows that the CNS requirements can meet the requirements.
KEYWORDS
Big Data, Computer Network, Network Security, Security PrecautionsCITE THIS PAPER
Dexi Chen, Juan Wu, Haiqing Liu, Computer Network Security in the Background of Big Data. Journal of Artificial Intelligence Practice (2022) Vol. 5: 52-57. DOI: http://dx.doi.org/10.23977/jaip.2022.050309.
REFERENCES
[1] AbdAllah A. AlHabshy, Bashar I. Hameed, Kamal Abdelraouf Eldahshan: An Ameliorated Multiattack Network Anomaly Detection in Distributed Big Data System-Based Enhanced Stacking Multiple Binary Classifiers. IEEE Access 10: 52724-52743 (2022).
[2] Negin Alemazkoor, Mazdak Tootkaboni, Roshanak Nateghi, Arghavan Louhghalam: Smart-Meter Big Data for Load Forecasting: An Alternative Approach to Clustering. IEEE Access 10: 8377-8387 (2022).
[3] Turki Ali Alghamdi, Nadeem Javaid: A Survey of Preprocessing Methods Used for Analysis of Big Data Originated From Smart Grids. IEEE Access 10: 29149-29171 (2022).
[4] Hanan E. Alhazmi, Fathy E. Eassa, Suhelah M. Sandokji: Towards Big Data Security Framework by Leveraging Fragmentation and Blockchain Technology. IEEE Access 10: 10768-10782 (2022).
[5] Mohammad Bigdeli, Shahrokh Farahmand, Bahman Abolhassani, Ha H. Nguyen: Globally Optimal Resource Allocation and Time Scheduling in Downlink Cognitive CRAN Favoring Big Data Requests. IEEE Access 10: 27504-27521 (2022).
[6] Dina Fawzy, Sherin M. Moussa, Nagwa L. Badr: The Internet of Things and Architectures of Big Data Analytics: Challenges of Intersection at Different Domains. IEEE Access 10: 4969-4992 (2022).
[7] Ahmad B. A. Hassanat, Hasan N. Ali, Ahmad S. Tarawneh, Malek Q. Alrashidi, Mansoor Alghamdi, Ghada Awad Altarawneh, Mohammad Ali Abbadi:Magnetic Force Classifier: A Novel Method for Big Data Classification. IEEE Access 10: 12592-12606 (2022).
[8] Mohammed Arshad Khan, Mohd Shuaib Siddiqui, Mohammad Khalid Imam Rahmani, Shahid Husain: Investigation of Big Data Analytics for Sustainable Smart City Development: An Emerging Country. IEEE Access 10: 16028-16036 (2022).
[9] Pawel Kowalczyk, Mateusz Komorkiewicz, Pawel Skruch, Marcin Szelest: Efficient Characterization Method for Big Automotive Datasets Used for Perception System Development and Verification. IEEE Access 10: 12629-12643 (2022).
[10] David Chunhu Li, Michael Yu-Ching Lin, Li-Der Chou: Macroscopic Big Data Analysis and Prediction of Driving Behavior with an Adaptive Fuzzy Recurrent Neural Network on the Internet of Vehicles. IEEE Access 10: 47881-47895 (2022).
[11] Magda M. Madbouly, Saad M. Darwish, Noha A. Bagi, Mohamed A. Osman: Clustering Big Data Based on Distributed Fuzzy K-Medoids: An Application to Geospatial Informatics. IEEE Access 10: 20926-20936 (2022).
[12] Sooksan Panichpapiboon, Kavepol Khunsri: A Big Data Analysis on Urban Mobility: Case of Bangkok. IEEE Access 10: 44400-44412 (2022).
Downloads: | 1932 |
---|---|
Visits: | 97140 |
Sponsors, Associates, and Links
-
Power Systems Computation
-
Internet of Things (IoT) and Engineering Applications
-
Computing, Performance and Communication Systems
-
Advances in Computer, Signals and Systems
-
Journal of Network Computing and Applications
-
Journal of Web Systems and Applications
-
Journal of Electrotechnology, Electrical Engineering and Management
-
Journal of Wireless Sensors and Sensor Networks
-
Journal of Image Processing Theory and Applications
-
Mobile Computing and Networking
-
Vehicle Power and Propulsion
-
Frontiers in Computer Vision and Pattern Recognition
-
Knowledge Discovery and Data Mining Letters
-
Big Data Analysis and Cloud Computing
-
Electrical Insulation and Dielectrics
-
Crypto and Information Security
-
Journal of Neural Information Processing
-
Collaborative and Social Computing
-
International Journal of Network and Communication Technology
-
File and Storage Technologies
-
Frontiers in Genetic and Evolutionary Computation
-
Optical Network Design and Modeling
-
Journal of Virtual Reality and Artificial Intelligence
-
Natural Language Processing and Speech Recognition
-
Journal of High-Voltage
-
Programming Languages and Operating Systems
-
Visual Communications and Image Processing
-
Journal of Systems Analysis and Integration
-
Knowledge Representation and Automated Reasoning
-
Review of Information Display Techniques
-
Data and Knowledge Engineering
-
Journal of Database Systems
-
Journal of Cluster and Grid Computing
-
Cloud and Service-Oriented Computing
-
Journal of Networking, Architecture and Storage
-
Journal of Software Engineering and Metrics
-
Visualization Techniques
-
Journal of Parallel and Distributed Processing
-
Journal of Modeling, Analysis and Simulation
-
Journal of Privacy, Trust and Security
-
Journal of Cognitive Informatics and Cognitive Computing
-
Lecture Notes on Wireless Networks and Communications
-
International Journal of Computer and Communications Security
-
Journal of Multimedia Techniques
-
Automation and Machine Learning
-
Computational Linguistics Letters
-
Journal of Computer Architecture and Design
-
Journal of Ubiquitous and Future Networks