Skip to main content
Top

2021 | OriginalPaper | Chapter

Computer Network Security and Preventive Measures Based on Big Data Technology

Authors : Bin Wang, Long Guo, Peng Xu

Published in: Big Data Analytics for Cyber-Physical System in Smart City

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Computer network security (NS) is the most concerned problem of society and people. With the increasing amount of network information, the computer NS management in the era of Big Data (BD) is very important, and has become the primary topic of NS management. This paper studies the computer NS and preventive measures based on BD technology. In this paper, through the method of literature analysis and questionnaire survey, 150 teachers and students majoring in Computer Science in our school were investigated to understand the current situation of computer NS in China and the solutions. The research results show that the computer NS problems in the era of BD are mainly divided into three aspects: the security problems caused by human factors account for about 30%, the security problems in data transmission account for about 45%, and the security problems of computers themselves account for about 25%. In view of these NS problems, this paper details the NS problems, and proposes corresponding solutions to these problems, so as to effectively improve the level of NS management and promote the efficient development of computer network technology(NT).

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Gao, H., Wu, J., Wei, C., et al.: MADM method with interval-valued bipolar uncertain linguistic information for evaluating the computer NS. IEEE Access 7(99), 151506–151524 (2019)CrossRef Gao, H., Wu, J., Wei, C., et al.: MADM method with interval-valued bipolar uncertain linguistic information for evaluating the computer NS. IEEE Access 7(99), 151506–151524 (2019)CrossRef
2.
go back to reference Sadeanit, M.: Guide to computer NS, 4th edn. Comput. Rev. 59(2), 70 (2018) Sadeanit, M.: Guide to computer NS, 4th edn. Comput. Rev. 59(2), 70 (2018)
3.
go back to reference Stojanov, Z., Dobrilovic, D., Zoric, T.: Exploring students’ experiences in using a physical laboratory for computer networks and data security. Comput. Appl. Eng. Educ. 25(2), 290–303 (2017)CrossRef Stojanov, Z., Dobrilovic, D., Zoric, T.: Exploring students’ experiences in using a physical laboratory for computer networks and data security. Comput. Appl. Eng. Educ. 25(2), 290–303 (2017)CrossRef
4.
go back to reference Qi, Y.: Computer real-time location forensics method for network intrusion crimes. Int. J. NS 21(3), 530–535 (2019) Qi, Y.: Computer real-time location forensics method for network intrusion crimes. Int. J. NS 21(3), 530–535 (2019)
5.
go back to reference Zhou, Q., Luo, J.: The study on evaluation method of urban NS in the BD era. Intell. Autom. Soft Comput. 24(1), 133–138 (2018)CrossRef Zhou, Q., Luo, J.: The study on evaluation method of urban NS in the BD era. Intell. Autom. Soft Comput. 24(1), 133–138 (2018)CrossRef
6.
go back to reference Maccari, L., Passerini, A.: A BD and machine learning approach for network monitoring and security. Secur. Priv. 2(1), e53 (2019) Maccari, L., Passerini, A.: A BD and machine learning approach for network monitoring and security. Secur. Priv. 2(1), e53 (2019)
7.
go back to reference Hou, H., Yu, J., Hao, R.: Provable multiple-replica dynamic data possession for BD storage in cloud computing. Int. J. NS 20(3), 575–584 (2018) Hou, H., Yu, J., Hao, R.: Provable multiple-replica dynamic data possession for BD storage in cloud computing. Int. J. NS 20(3), 575–584 (2018)
8.
go back to reference Zhao, G., Qian, X., Kang, C.: Service rating prediction by exploring social mobile users’ geographical locations. IEEE Trans. BD PP(1), 1 (2017) Zhao, G., Qian, X., Kang, C.: Service rating prediction by exploring social mobile users’ geographical locations. IEEE Trans. BD PP(1), 1 (2017)
9.
go back to reference Dong, X..-M.: Learning gradients from nonidentical data. Anziam J. 58(3–4), 1–11 (2017) Dong, X..-M.: Learning gradients from nonidentical data. Anziam J. 58(3–4), 1–11 (2017)
10.
go back to reference Athey, S.: Beyond prediction: using BD for policy problems. Science 355(6324), 483 (2017) Athey, S.: Beyond prediction: using BD for policy problems. Science 355(6324), 483 (2017)
Metadata
Title
Computer Network Security and Preventive Measures Based on Big Data Technology
Authors
Bin Wang
Long Guo
Peng Xu
Copyright Year
2021
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-33-4572-0_94

Premium Partner