Welcome to Francis Academic Press

Academic Journal of Computing & Information Science, 2023, 6(3); doi: 10.25236/AJCIS.2023.060316.

Network Security Technology and Application in the Era of Big Data

Author(s)

Jiana Bi, Yonghong Guo

Corresponding Author:
Jiana Bi
Affiliation(s)

School of Software and Big Data, Changzhou College of Information Technology, Changzhou, China

Abstract

The network has a strong openness, which can realize the communication and interaction across time and space, but it is also vulnerable to different intrusions and attacks, which leads to the leakage of data information and serious network security problems. Big data increases the complexity of computer network, which makes the security problem of computer network more prominent. Based on a comprehensive analysis of computer network security issues in the era of big data, it is of great significance to deeply explore specific network security technologies. Based on the WPDRRC network security model, this paper studies the network security technology and application in the era of big data, including virus protection technology, intrusion detection technology and access control technology. In practice, it is necessary to formulate a more secure network protection system, create a healthy and green network environment, and meet the needs of network security in the era of big data.

Keywords

Big Data Era; Network Security; Technology and Application; Virus Protection Technology; Intrusion Detection Technology; Access Control Technology

Cite This Paper

Jiana Bi, Yonghong Guo. Network Security Technology and Application in the Era of Big Data. Academic Journal of Computing & Information Science (2023), Vol. 6, Issue 3: 123-128. https://doi.org/10.25236/AJCIS.2023.060316.

References

[1] Y. J. Zhang, H. Y. Sun. Research on manufacturing supply chain management under big data and blockchain technology[J] .China Collective Economy, 2023, 39(05): 101-104.

[2] Y. F. Cao, H. T. Wei. Research on computer network security in the context of big data[J]. Computer Knowledge and Technology, 2022, 18(03): 34-36.

[3] S. B. Yang, L. C. Zheng, X. W. Jing. Research and design of enterprise technology security technology system framework based on WPDRRC model[J]. Secrecy Science and Technology, 2019, 10(05): 50-58.

[4] M. X. Yuan, Z. Wang. Research on security evaluation of hospital information system based on WPDRRC model[J]. Electronic Design Engineering, 2016, 24(11): 11-14.

[5] Z. Yang. Network Security Construction for University Libraries Based on WPDRRC[J]. Journal of Modern Information, 2010, 30(02): 92-94+97.

[6] J. Chen, W. Y. Ye. Study on virus protection technology in computer network[J]. Computer Knowledge and Technology, 2019, 15(01): 30-31.

[7] F. Lu. Discussion on Virus Protection Technology in Computer Network Application[J]. China Computer & Communication, 2019, 13(09): 22-24.

[8] M. P. Xu. Explore the application of intrusion detection technology in computer network security[J]. Computer Knowledge and Technology, 2022, 18(36): 75-77.

[9] K. Guo. Research on Intrusion Detection Technology of Computer Network Security[J]. Network Security Technology & Application, 2023, 23(01): 7-9.

[10] Y. Wang. Application analysis of intrusion detection technology in computer network security[J]. Wireless Internet Technology, 2022, 19(14): 99-101.

[11] T. L. Liu. Access Control Technology in New Network Environment[J]. Computer Knowledge and Technology, 2019, 15(19): 40-41.

[12] W. Q. Yi. Access Control Technology in New Network Environment[J]. Computer Knowledge and Technology, 2018, 14(35): 37-38.