Paper
16 June 2023 Research on computer network security management based on big data
Qiongyue Ke, Shuai Liang
Author Affiliations +
Proceedings Volume 12702, International Conference on Intelligent Systems, Communications, and Computer Networks (ISCCN 2023); 127021H (2023) https://doi.org/10.1117/12.2680440
Event: International Conference on Intelligent Systems, Communications, and Computer Networks (ISCCN 2023), 2023, Changsha, China
Abstract
With the rapid development of modern information technology, big data technology has become an important technical support in the process of digital development in all walks of life, effectively promoting the efficient reform of work models in different fields. In the management work of local governments, relying on big data technology to build an optimized network security management is to give full play to the core advantages of big data technology in the management work, so that the efficiency of security management can be effectively improved under the background of data. In view of the risks of hacker attack and tampering, virus or Trojan program invasion and theft of computer network information, this paper puts forward a computer network information security management method. This paper uses big data clustering algorithm to evaluate its computer network information security and verify its simulation. The research results show that the proposed method is more suitable for the nonlinear characteristics of computer network security, and can accurately reflect the state of computer network security operation, thus providing an effective idea and guarantee for the protection work.
© (2023) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Qiongyue Ke and Shuai Liang "Research on computer network security management based on big data", Proc. SPIE 12702, International Conference on Intelligent Systems, Communications, and Computer Networks (ISCCN 2023), 127021H (16 June 2023); https://doi.org/10.1117/12.2680440
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Network security

Computer networks

Computer security

Information security

Data modeling

Security technologies

Computing systems

Back to Top