Construction of Big Data Information Security Protection System in Industrial Internet Environment

被引:0
|
作者
Na, Rongcui [1 ]
机构
[1] CISDI Information Technology (Chongqing) Co., Ltd., Chongqing,401122, China
关键词
Convolutional neural networks - Cryptography - Data accuracy - Network intrusion;
D O I
10.2478/amns-2024-2710
中图分类号
学科分类号
摘要
With the continuous development and integration of information technology and industrialization-related technologies, industrial Internet control system security attacks occur frequently, and it is more and more important to build an information security protection system. This study focuses on the research improvement from two aspects of access control and intrusion prevention and designs an industrial Internet security access control strategy based on the homomorphic encryption algorithm of the Hyper Elliptic Curve Cryptosystem (HCC) and the key splitting algorithm based on threshold. Meanwhile, the convolutional neural network, two-way gating loop unit, and multi-head attention mechanism are integrated to construct the CMAG intrusion detection model. The encryption algorithm and CMAG model are applied and analyzed. The encryption and decryption times of this paper's algorithm are both relatively smooth, with an average time consumption of about 1.93ms and 0.46ms, respectively, and significantly better than other algorithms with the increase in the number of bits. The throughput of this paper's encryption algorithm is 13.68 KB/s, which is approximately 2 times, 19 times, and 29 times higher than the throughput of GM, ElGamal, and Paillier algorithms, respectively. The other algorithms cannot match its throughput rate during decryption. The CMAG model has an accuracy of 99.14%, which is better than that of the other models, and its average checking accuracy, average recall, and average F1-Score are 0.9889, 0.9783, and 0.9834, respectively, which are 1.25%-5.16%, 4.31%-7.19%, and 3.32%, respectively, compared with that of the other three algorithms. 7.19% and 3.32%-6.76%, respectively. This paper is of great practical significance for the construction and optimization of a big data information security protection system in an industrial Internet environment. © 2024 Rongcui Na, published by Sciendo.
引用
收藏
相关论文
共 50 条
  • [1] Research on Enterprise Information Security and Privacy Protection in Big Data Environment
    Du, Juan
    [J]. 2021 3RD INTERNATIONAL CONFERENCE ON MACHINE LEARNING, BIG DATA AND BUSINESS INTELLIGENCE (MLBDBI 2021), 2021, : 324 - 327
  • [2] Learning to upgrade internet information security and protection strategy in big data era
    Guo, Junjun
    Wang, Le
    [J]. COMPUTER COMMUNICATIONS, 2020, 160 : 150 - 157
  • [3] Computer Network Information Security and Protection Strategy Based on Big Data Environment
    Jin, Min
    [J]. INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGIES AND SYSTEMS APPROACH, 2023, 16 (02)
  • [4] Network Information Security Privacy Protection System in Big Data Era
    Ma, Lei
    Kang, Ying-jian
    Liu, Jian-ping
    [J]. ADVANCED HYBRID INFORMATION PROCESSING, ADHIP 2019, PT I, 2019, 301 : 65 - 73
  • [5] Information Security Monitoring and Management Method Based on Big Data in the Internet of Things Environment
    Liang, Wuchao
    Li, Wenning
    Feng, Lili
    [J]. IEEE ACCESS, 2021, 9 : 39798 - 39812
  • [6] Construction on Information Security System for Internet Finance
    Cao, Wenfang
    [J]. PROCEEDINGS OF THE 2017 2ND INTERNATIONAL CONFERENCE ON MACHINERY, ELECTRONICS AND CONTROL SIMULATION (MECS 2017), 2017, 138 : 919 - 924
  • [7] CDSP: A Solution for Privacy and Security of Multimedia Information Processing in Industrial Big Data and Internet of Things
    Yang, Xu
    Hou, Yumin
    Ma, Junping
    He, Hu
    [J]. SENSORS, 2019, 19 (03):
  • [8] Research on Computer Information Security Protection System Based on Big Data Background
    An, Ziyuan
    Chen, Jiajun
    Song, Kunyu
    Xu, Rui
    [J]. 2023 3RD ASIA-PACIFIC CONFERENCE ON COMMUNICATIONS TECHNOLOGY AND COMPUTER SCIENCE, ACCTCS, 2023, : 207 - 211
  • [9] Protection of Personal Information Security in the Age of Big Data
    Zou, Hui
    [J]. PROCEEDINGS OF 2016 12TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2016, : 586 - 589
  • [10] Research on the Construction of Security System of Big Data
    Cheng, Manling
    Sun, Zhihua
    [J]. INTERNATIONAL CONFERENCE ON ELECTRONIC INFORMATION TECHNOLOGY AND INTELLECTUALIZATION (ICEITI 2016), 2016, : 518 - 523