Network Security Evaluation and Optimal Active Defense Based on Data Mining Technology
DOI: 10.23977/jwsa.2021.030104 | Downloads: 14 | Views: 1414
Author(s)
Wenwen Zhao 1
Affiliation(s)
1 Hotan Normal College, Hetian, Xinjiang 848000, China
Corresponding Author
Wenwen ZhaoABSTRACT
Network security evaluation network security evaluation is a network security technology that judges the behavior of illegal users invading and legal users abusing resources through real-time collection and analysis of key information in computer network and host system, and makes appropriate response. It is another security measure after data encryption, firewall and other measures, With the continuous development of computer network technology, the data to be analyzed expands rapidly. How to improve the detection efficiency has become a top priority, and data mining is a good medicine to solve this problem. Firstly, this paper introduces the related concepts of network security evaluation and data mining, and then analyzes the advantages and disadvantages of the network security evaluation system using data mining technology, Finally, some directions of network defense are put forward.
KEYWORDS
Data mining technology, Network security evaluation, Network defense, Computer network, Big dataCITE THIS PAPER
Wenwen Zhao. Network Security Evaluation and Optimal Active Defense Based on Data Mining Technology. Journal of Web Systems and Applications (2021) 3: 17-21. DOI: http://dx.doi.org/10.23977/jwsa.2021.030104.
REFERENCES
[1] Su Yingying. Network security evaluation and most active defense based on attack defense game model [J]. Network security technology and application, 2017 (4): 2.
[2] Liang Yeyu, Yang Ming, Ning Jianchuang, et al. Research on network security audit technology based on data mining [J]. Guangxi communication technology, 2017 (3): 4.
[3] Li Gen. optimal design of control system based on network security and big data mining technology [J]. Electronic technology and software engineering, 2018, No. 134 (12): 246-247.
[4] Ren Zhen, Hu Xuewen, Zhang Hong. Application of improved FCM algorithm in network intrusion detection [J]. 2021 (2011-5): 42-44.
[5] Liu Ning. Computer network security virus defense based on data mining technology [J]. Computer products and circulation, 2017 (12): 68.
[6] Cai Chang. Research on current situation and defense measures of power network security management [J]. Network security technology and application, 2019, No. 218 (02): 83 + 87.
[7] Zhao fan, Ni Zhimin. Research and application of lightweight Web Intrusion active defense key technology and visual measurement model based on dynamic IP blacklist [J]. China building materials technology, 2018, 027 (001): 70-71.
[8] Zou Weifu, Zhang Yiying, Zhang Suxiang, et al. Research on Trojan virus detection technology based on characteristic behavior analysis [J]. 2021 (2014-11): 105-109.
[9] Li Min, Li Wei, Yu Shi, et al. Research on information security active defense system of power grid enterprises based on big data analysis and unknown threat perception [J]. Science and Technology Plaza, 2016, 000 (008): 82-85.
[10] Du Juan. Application of big data mining technology in network security [J]. Satellite TV and broadband multimedia, 2020, No. 516 (11): 49-50.
[11] Guo Hanke. Discussion on the application of data mining technology in computer network virus defense [J]. China new communications, 2019, 21 (09): 119.
[12] Yu Li. Exploration of computer network virus defense technology based on data mining technology [J]. Modern electronic technology, 2016, 39 (21): 4.
[13] Huang Wei. Design of computer network virus defense system based on data mining technology [J]. Electromechanical information, 2020, No. 629 (23): 146-147.
[14] Zhao Kai, he Wenhai, sun Lili. Computer network security virus defense strategy based on data mining technology [J]. Electronic world, 2018, 000 (023): 53,55.
[15] Du Jingzi, Liu Jiong. Design and implementation of network virus defense system based on data mining technology [J]. Information and computer (theoretical Edition), 2018, No. 400 (06): 60-62.
Downloads: | 1162 |
---|---|
Visits: | 54359 |
Sponsors, Associates, and Links
-
Power Systems Computation
-
Internet of Things (IoT) and Engineering Applications
-
Computing, Performance and Communication Systems
-
Journal of Artificial Intelligence Practice
-
Advances in Computer, Signals and Systems
-
Journal of Network Computing and Applications
-
Journal of Electrotechnology, Electrical Engineering and Management
-
Journal of Wireless Sensors and Sensor Networks
-
Journal of Image Processing Theory and Applications
-
Mobile Computing and Networking
-
Vehicle Power and Propulsion
-
Frontiers in Computer Vision and Pattern Recognition
-
Knowledge Discovery and Data Mining Letters
-
Big Data Analysis and Cloud Computing
-
Electrical Insulation and Dielectrics
-
Crypto and Information Security
-
Journal of Neural Information Processing
-
Collaborative and Social Computing
-
International Journal of Network and Communication Technology
-
File and Storage Technologies
-
Frontiers in Genetic and Evolutionary Computation
-
Optical Network Design and Modeling
-
Journal of Virtual Reality and Artificial Intelligence
-
Natural Language Processing and Speech Recognition
-
Journal of High-Voltage
-
Programming Languages and Operating Systems
-
Visual Communications and Image Processing
-
Journal of Systems Analysis and Integration
-
Knowledge Representation and Automated Reasoning
-
Review of Information Display Techniques
-
Data and Knowledge Engineering
-
Journal of Database Systems
-
Journal of Cluster and Grid Computing
-
Cloud and Service-Oriented Computing
-
Journal of Networking, Architecture and Storage
-
Journal of Software Engineering and Metrics
-
Visualization Techniques
-
Journal of Parallel and Distributed Processing
-
Journal of Modeling, Analysis and Simulation
-
Journal of Privacy, Trust and Security
-
Journal of Cognitive Informatics and Cognitive Computing
-
Lecture Notes on Wireless Networks and Communications
-
International Journal of Computer and Communications Security
-
Journal of Multimedia Techniques
-
Automation and Machine Learning
-
Computational Linguistics Letters
-
Journal of Computer Architecture and Design
-
Journal of Ubiquitous and Future Networks