Research on the application of network security defence in database security services based on deep learning integrated with big data analytics

被引:0
|
作者
Hang F. [1 ]
Xie L. [1 ]
Zhang Z. [1 ]
Guo W. [1 ]
Li H. [1 ]
机构
[1] Information Center of Yunnan Power Grid Co., LTD, Yunnan, Kunming
关键词
Accuracy; Anomaly detection; Big data analysis; Deep learning; FPR; Security information system;
D O I
10.1016/j.ijin.2024.02.006
中图分类号
学科分类号
摘要
Every day, more people use the internet to send and receive sensitive information. A lot of confidential data is being transmitted electronically between people and businesses. Cyber-attacks, which are the inevitable result of our growing reliance on digital technology, are a reality that we must face today. This paper aims to investigate the impact of Big Data Analytics (BDA) on information security and vice versa. Additionally, an Artificial Neural Network (ANN)-based Deep Learning (DL) method for Anomaly Detection (AD) is presented in this work. To improve AD, the proposed method uses a DL-based detection method, which is used to parse through many collected security events to develop individual event profiles. The paper also investigated how BDA can be used to address Information Security (IS) issues and how existing Big Data technologies can be adapted to improve BDA's security. This study developed a DL-based Security Information System (DL-SIS) using a combination of event identification for data preprocessing and different Artificial Neural Network (ANN) methods. The feasibility and impact of implementing a Big Data Analytics (BDA) system for AD are investigated and addressed in this study. From this study, we learn that BDA systems are highly effective in securing Critical Information Setup from several discrete cyberattacks and that they are currently the best method available. By analyzing the False Positive Rate (FPR), the system facilitates quick action by security analysts in response to cyber threats. DL-SIS had the highest AD accuracy of 99.40% but performed poorly in the high-dimensional dataset. © 2024
引用
收藏
页码:101 / 109
页数:8
相关论文
共 50 条
  • [31] Research on Network Security Visualization under Big Data Environment
    Yang, Tingting
    Jia, Shuwen
    2016 INTERNATIONAL COMPUTER SYMPOSIUM (ICS), 2016, : 660 - 662
  • [32] Research on Clothing and Accouterment Security Based on Big Data
    Fei, Xian-hong
    Zhai, Cheng-gong
    Qiao, Han
    PROCEEDINGS OF THE 2018 2ND HIGH PERFORMANCE COMPUTING AND CLUSTER TECHNOLOGIES CONFERENCE (HPCCT 2018), 2018, : 19 - 23
  • [33] The Research on Big Data Security Architecture Based on Hadoop
    Zhuang, Miao
    PROCEEDINGS OF THE 2015 4TH NATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS AND COMPUTER ENGINEERING ( NCEECE 2015), 2016, 47 : 241 - 244
  • [34] Research on the Implementation Method of Database Security in Management Information System Based on Big Data Analysis
    Chen, Qunlin
    2020 INTERNATIONAL CONFERENCE ON ENERGY, ENVIRONMENT AND BIOENGINEERING (ICEEB 2020), 2020, 185
  • [35] Intelligent big data visual analytics based on deep learning
    Guo R.
    Applied Mathematics and Nonlinear Sciences, 2024, 9 (01)
  • [36] Application of information communication network security management and control based on big data technology
    Du, Meiyan
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2022, 35 (05)
  • [37] Big Data Based Security Analytics for Protecting Virtualized Infrastructures in Cloud Computing
    Thu Yein Win
    Tianfield, Huaglory
    Mair, Quentin
    IEEE TRANSACTIONS ON BIG DATA, 2018, 4 (01) : 11 - 25
  • [38] Edge Computing-Based Security Framework for Big Data Analytics in VANETs
    Garg, Sahil
    Singh, Amritpal
    Kaur, Kuljeet
    Aujla, Gagangeet Singh
    Batra, Shalini
    Kumar, Neeraj
    Obaidat, M. S.
    IEEE NETWORK, 2019, 33 (02): : 72 - 81
  • [39] Research on computer network data security storage technology in the era of big data
    Zhang, Liying
    Gu, Xin
    Zhao, Qiang
    REVISTA INTERNACIONAL DE METODOS NUMERICOS PARA CALCULO Y DISENO EN INGENIERIA, 2024, 40 (02):
  • [40] Deep Learning Models: Vulnerability Mining Research for Network Security
    Ban, Lili
    Li, Yan
    International Journal of Network Security, 2023, 25 (05) : 872 - 878