Application Analysis of Computer Information Security under Big Data
DOI: 10.23977/acss.2024.080310 | Downloads: 21 | Views: 215
Author(s)
Keke Zhang 1
Affiliation(s)
1 Khoury College of Computer Science, Portland 04101, ME, United Stated
Corresponding Author
Keke ZhangABSTRACT
With the wide application of Internet technology, the application scope of big data technology in all walks of life is expanding. The widespread use of the Internet has led to the generation and accumulation of massive data, which is not only a valuable information resource, but also a challenge to information security. In the current big data environment, computer information security faces many key technologies and challenges, such as data privacy protection, network attack prevention, identity authentication, and so on. To address these challenges, this article will focus on exploring the application of big data technology in the field of computer information security. In the big data environment, data storage, transmission, and processing face more complex security issues. At the same time, the application of big data technology also provides new possibilities for information security, such as security event detection and response systems based on big data analysis and network intrusion detection systems based on behavior analysis. Through in-depth analysis and effective protection strategies in this article, the aim is to provide practical references for related research and promote the continuous development and innovation in the field of computer information security. In the research, we will further explore the integration of big data technology with emerging technologies such as artificial intelligence and blockchain to address the increasingly complex challenges in the field of information security and achieve a positive interaction between information security and technological innovation.
KEYWORDS
Internet Technology, Big Data Technology Application, Computer Information SecurityCITE THIS PAPER
Keke Zhang, Application Analysis of Computer Information Security under Big Data. Advances in Computer, Signals and Systems (2024) Vol. 8: 71-75. DOI: http://dx.doi.org/10.23977/acss.2024.080310.
REFERENCES
[1] Lijiang X. Analysis of Computer Network Information Security and Protection Strategy in the Era of Big Data. Foreign Science and Technology Journal Database (Abstract Edition) Engineering Technology, 2021, 89-97.
[2] Jiang L. The Application Analysis of Computer Network Security Data Encryption Technology. 2020 International Conference on Applications and Techniques in Cyber Intelligence: Applications and Techniques in Cyber Intelligence (ATCI 2020). Springer International Publishing, 2021: 137-144.
[3] Wang P, Hu Y, Huo J. Analysis on the Application of Computer Information Processing Technology under the Background of Big Data. Journal of Physics: Conference Series, 2021, 1881(3): 32052-32059. DOI:10.1088/1742-6596/ 1881/3/032052.
[4] Yu X. Analysis of the Security Strategy of Computer Network Data under the Background of Big Data. 2021 4th International Conference on Artificial Intelligence and Big Data (ICAIBD). 2021. DOI: 10.1109/ICAIBD51990. 2021. 9459026.
[5] Xing L L. Computer Network Security Maintenance and Management in the Era of Big Data. International Journal of Frontiers in Sociology, 2021. DOI:10.25236/IJFS.2021.030113.
[6] Wang Z, Wang J. Applications of Machine Learning in Public Security Information and Resource Management. Hindawi Limited, 2021. DOI:10.1155/2021/4734187.
[7] Li X. Research on Network Information Security Service Model Based on User Requirements under Artificial Intelligence Technology. 2023 IEEE 3rd International Conference on Power, Electronics and Computer Applications (ICPECA), 2023, 1568-1572. DOI:10.1109/ICPECA56706.2023.10075946.
[8] He X. Analysis of Network Intrusion Detection Technology Based on Computer Information Security Technology. Journal of Physics: Conference Series, 2021, 1744(4): 42038. DOI:10.1088/1742-6596/1744/4/042038.
Downloads: | 19517 |
---|---|
Visits: | 297722 |
Sponsors, Associates, and Links
-
Power Systems Computation
-
Internet of Things (IoT) and Engineering Applications
-
Computing, Performance and Communication Systems
-
Journal of Artificial Intelligence Practice
-
Journal of Network Computing and Applications
-
Journal of Web Systems and Applications
-
Journal of Electrotechnology, Electrical Engineering and Management
-
Journal of Wireless Sensors and Sensor Networks
-
Journal of Image Processing Theory and Applications
-
Mobile Computing and Networking
-
Vehicle Power and Propulsion
-
Frontiers in Computer Vision and Pattern Recognition
-
Knowledge Discovery and Data Mining Letters
-
Big Data Analysis and Cloud Computing
-
Electrical Insulation and Dielectrics
-
Crypto and Information Security
-
Journal of Neural Information Processing
-
Collaborative and Social Computing
-
International Journal of Network and Communication Technology
-
File and Storage Technologies
-
Frontiers in Genetic and Evolutionary Computation
-
Optical Network Design and Modeling
-
Journal of Virtual Reality and Artificial Intelligence
-
Natural Language Processing and Speech Recognition
-
Journal of High-Voltage
-
Programming Languages and Operating Systems
-
Visual Communications and Image Processing
-
Journal of Systems Analysis and Integration
-
Knowledge Representation and Automated Reasoning
-
Review of Information Display Techniques
-
Data and Knowledge Engineering
-
Journal of Database Systems
-
Journal of Cluster and Grid Computing
-
Cloud and Service-Oriented Computing
-
Journal of Networking, Architecture and Storage
-
Journal of Software Engineering and Metrics
-
Visualization Techniques
-
Journal of Parallel and Distributed Processing
-
Journal of Modeling, Analysis and Simulation
-
Journal of Privacy, Trust and Security
-
Journal of Cognitive Informatics and Cognitive Computing
-
Lecture Notes on Wireless Networks and Communications
-
International Journal of Computer and Communications Security
-
Journal of Multimedia Techniques
-
Automation and Machine Learning
-
Computational Linguistics Letters
-
Journal of Computer Architecture and Design
-
Journal of Ubiquitous and Future Networks