Research on Computer Big Data Technology in Generative Countermeasures Network Security Protection

被引:0
|
作者
Yin Xuxi [1 ]
机构
[1] Guangzhou Huashang Vocat Coll, Informat Engn Coll, Guangzhou, Peoples R China
关键词
computer; big data; confrontation network; security protection;
D O I
10.1109/EEBDA53927.2022.9744807
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In order to make up for the shortcomings of the current network security situation assessment system, this article proposes a network security situation quantitative assessment algorithm based on the offensive and defensive confrontation environment. Based on in-depth analysis of various factors affecting the security situation, this method combines traditional risk assessment with environmental factors such as network protection status and asset security characteristics, extracts multiple quantitative indicators, and conducts a quantitative assessment of the security situation according to the attack category. The case analysis shows that the method is in line with the actual confrontation network environment, and can accurately predict the attack time and reasonably quantify the attack threat.
引用
收藏
页码:1178 / 1183
页数:6
相关论文
共 50 条
  • [1] Research on computer network data security storage technology in the era of big data
    Zhang, Liying
    Gu, Xin
    Zhao, Qiang
    [J]. REVISTA INTERNACIONAL DE METODOS NUMERICOS PARA CALCULO Y DISENO EN INGENIERIA, 2024, 40 (02):
  • [2] Research on Computer Network Information Security Based on Big Data Technology
    Xiao, Gengyi
    [J]. PROCEEDINGS OF 2020 IEEE INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INFORMATION SYSTEMS (ICAIIS), 2020, : 325 - 329
  • [3] Protection measurements of computer network information security for big data
    Fadhil, Saif Aamer
    Kadhim, Lubna Emad
    Abdurazaq, Sayl Gani
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2021, 24 (07): : 1959 - 1965
  • [4] Big Data Security Management Countermeasures in the Prevention and Control of Computer Network Crime
    Wang, Hongning
    [J]. JOURNAL OF GLOBAL INFORMATION MANAGEMENT, 2022, 30 (07)
  • [5] Research on the Application of Computer Information Technology in Network Security under the Background of "Big Data"
    Ying, Liu
    [J]. 2018 7TH INTERNATIONAL CONFERENCE ON ADVANCED MATERIALS AND COMPUTER SCIENCE (ICAMCS 2018), 2019, : 210 - 214
  • [6] Research on Data Security Protection Method Based on Big Data Technology
    Liu, Donglan
    Wang, Rui
    Zhang, Hao
    Ma, Lei
    Liu, Xin
    Huang, Hua
    Chang, Yingxian
    [J]. 2020 12TH INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN 2020), 2020, : 79 - 83
  • [7] Research on Computer Network Security and Its Countermeasures
    Jian, Li
    [J]. 2018 5TH INTERNATIONAL CONFERENCE ON ELECTRICAL & ELECTRONICS ENGINEERING AND COMPUTER SCIENCE (ICEEECS 2018), 2018, : 370 - 373
  • [8] Security protection of computer network information under the background of big data
    Yang, Wenbin
    [J]. BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2020, 127 : 202 - 202
  • [9] Research on Computer Network Security and Protection
    Liang, Tiantian
    [J]. 2014 2ND INTERNATIONAL CONFERENCE IN HUMANITIES, SOCIAL SCIENCES AND GLOBAL BUSINESS MANAGEMENT (ISSGBM 2014), VOL 29, 2014, 29 : 244 - 247
  • [10] Protection Strategy Exploration for the Computer Network Information Security in the Big Data Age
    Xue, Liang
    Yang, Juan
    Fan, Weiguo
    [J]. PROCEEDINGS OF THE 2016 2ND WORKSHOP ON ADVANCED RESEARCH AND TECHNOLOGY IN INDUSTRY APPLICATIONS, 2016, 81 : 81 - 85