Academic Journal of Computing & Information Science, 2023, 6(3); doi: 10.25236/AJCIS.2023.060316.
Jiana Bi, Yonghong Guo
School of Software and Big Data, Changzhou College of Information Technology, Changzhou, China
The network has a strong openness, which can realize the communication and interaction across time and space, but it is also vulnerable to different intrusions and attacks, which leads to the leakage of data information and serious network security problems. Big data increases the complexity of computer network, which makes the security problem of computer network more prominent. Based on a comprehensive analysis of computer network security issues in the era of big data, it is of great significance to deeply explore specific network security technologies. Based on the WPDRRC network security model, this paper studies the network security technology and application in the era of big data, including virus protection technology, intrusion detection technology and access control technology. In practice, it is necessary to formulate a more secure network protection system, create a healthy and green network environment, and meet the needs of network security in the era of big data.
Big Data Era; Network Security; Technology and Application; Virus Protection Technology; Intrusion Detection Technology; Access Control Technology
Jiana Bi, Yonghong Guo. Network Security Technology and Application in the Era of Big Data. Academic Journal of Computing & Information Science (2023), Vol. 6, Issue 3: 123-128. https://doi.org/10.25236/AJCIS.2023.060316.
[1] Y. J. Zhang, H. Y. Sun. Research on manufacturing supply chain management under big data and blockchain technology[J] .China Collective Economy, 2023, 39(05): 101-104.
[2] Y. F. Cao, H. T. Wei. Research on computer network security in the context of big data[J]. Computer Knowledge and Technology, 2022, 18(03): 34-36.
[3] S. B. Yang, L. C. Zheng, X. W. Jing. Research and design of enterprise technology security technology system framework based on WPDRRC model[J]. Secrecy Science and Technology, 2019, 10(05): 50-58.
[4] M. X. Yuan, Z. Wang. Research on security evaluation of hospital information system based on WPDRRC model[J]. Electronic Design Engineering, 2016, 24(11): 11-14.
[5] Z. Yang. Network Security Construction for University Libraries Based on WPDRRC[J]. Journal of Modern Information, 2010, 30(02): 92-94+97.
[6] J. Chen, W. Y. Ye. Study on virus protection technology in computer network[J]. Computer Knowledge and Technology, 2019, 15(01): 30-31.
[7] F. Lu. Discussion on Virus Protection Technology in Computer Network Application[J]. China Computer & Communication, 2019, 13(09): 22-24.
[8] M. P. Xu. Explore the application of intrusion detection technology in computer network security[J]. Computer Knowledge and Technology, 2022, 18(36): 75-77.
[9] K. Guo. Research on Intrusion Detection Technology of Computer Network Security[J]. Network Security Technology & Application, 2023, 23(01): 7-9.
[10] Y. Wang. Application analysis of intrusion detection technology in computer network security[J]. Wireless Internet Technology, 2022, 19(14): 99-101.
[11] T. L. Liu. Access Control Technology in New Network Environment[J]. Computer Knowledge and Technology, 2019, 15(19): 40-41.
[12] W. Q. Yi. Access Control Technology in New Network Environment[J]. Computer Knowledge and Technology, 2018, 14(35): 37-38.