Computer Network Information Security Monitoring System Based on Big Data Era

With the rapid advancement of society and the level of programming and the rapid development of computer technology, networking and information are playing an increasingly important role in the social life of the masses. Creating and developing a network information security monitoring system have b...

Celý popis

Uložené v:
Podrobná bibliografia
Vydané v:Security and communication networks Ročník 2022; s. 1 - 11
Hlavní autori: Sun, Yu, Liu, Xiaorong, Shen, Xiaoli
Médium: Journal Article
Jazyk:English
Vydavateľské údaje: London Hindawi 18.11.2022
John Wiley & Sons, Inc
Predmet:
ISSN:1939-0114, 1939-0122
On-line prístup:Získať plný text
Tagy: Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
Abstract With the rapid advancement of society and the level of programming and the rapid development of computer technology, networking and information are playing an increasingly important role in the social life of the masses. Creating and developing a network information security monitoring system have become one of the most important ways to keep a computer running smoothly. Traditional information security systems cannot adapt to the ever-changing network environment. If only relying on it to maintain network security, it will be far from effective monitoring and defense. Based on the theory of network information security, this study analyzes the characteristics of network information and the information security monitoring technology at the current stage. Based on the background of big data era, a new type of computer network information security monitoring system is proposed. This system is compared with the traditional network information security monitoring system, and the performance and stability of the system are investigated, respectively. The experimental data show that the network information security monitoring system designed in this study can achieve more than 99% detection rate of external attacks in a network environment with a background traffic of 10M. Its false alarm rate is lower than 4%, and the false alarm rate is lower than 7%. The qualitative mean reaches 93.02%, indicating its good monitoring accuracy and stability. By popularizing it in the current network environment, it can effectively identify and defend information attacks and maintain the development of network information security.
AbstractList With the rapid advancement of society and the level of programming and the rapid development of computer technology, networking and information are playing an increasingly important role in the social life of the masses. Creating and developing a network information security monitoring system have become one of the most important ways to keep a computer running smoothly. Traditional information security systems cannot adapt to the ever-changing network environment. If only relying on it to maintain network security, it will be far from effective monitoring and defense. Based on the theory of network information security, this study analyzes the characteristics of network information and the information security monitoring technology at the current stage. Based on the background of big data era, a new type of computer network information security monitoring system is proposed. This system is compared with the traditional network information security monitoring system, and the performance and stability of the system are investigated, respectively. The experimental data show that the network information security monitoring system designed in this study can achieve more than 99% detection rate of external attacks in a network environment with a background traffic of 10M. Its false alarm rate is lower than 4%, and the false alarm rate is lower than 7%. The qualitative mean reaches 93.02%, indicating its good monitoring accuracy and stability. By popularizing it in the current network environment, it can effectively identify and defend information attacks and maintain the development of network information security.
Author Sun, Yu
Liu, Xiaorong
Shen, Xiaoli
Author_xml – sequence: 1
  givenname: Yu
  orcidid: 0000-0002-5248-7637
  surname: Sun
  fullname: Sun, Yu
  organization: Chengdu Vocational & Technical College of IndustryChengdu 610000SichuanChina
– sequence: 2
  givenname: Xiaorong
  surname: Liu
  fullname: Liu, Xiaorong
  organization: Chengdu Vocational & Technical College of IndustryChengdu 610000SichuanChina
– sequence: 3
  givenname: Xiaoli
  surname: Shen
  fullname: Shen, Xiaoli
  organization: Chengdu Vocational & Technical College of IndustryChengdu 610000SichuanChina
BookMark eNp9kM9PwjAYhhuDiYDe_AOaeNRJf2xrdxREJQE9oOel6zosshbbLmT_vUOIBxM9fd_hed83eQagZ6xRAFxidItxkowIImREMUM4jU9AH2c0ixAmpPfz4_gMDLxfI5TimMV9sJjYetsE5eCzCjvrPuDMVNbVImhr4FLJxunQwoU1OlinzQouWx9UDcfCqxJ2zFiv4L0IAk6dOAenldh4dXG8Q_D2MH2dPEXzl8fZ5G4eSUpZiGRcKlkWiCvBi0KlCRdlxjOZFLxELCUi44gIUmCF0gKlJYkJo4QTSnlWUaboEFwderfOfjbKh3xtG2e6yZywGNEkzbrEENwcKOms905V-dbpWrg2xyjfC8v3wvKjsA4nv3Cpw7eH4ITe_BW6PoTetSnFTv8_8QW9Hnsg
CitedBy_id crossref_primary_10_3233_KES_230172
crossref_primary_10_3233_JIFS_231351
crossref_primary_10_1155_2023_9795830
crossref_primary_10_3233_KES_230239
crossref_primary_10_3233_KES_230103
crossref_primary_10_3233_JIFS_233181
Cites_doi 10.5815/ijcnis.2021.01.02
10.1155/2021/6667100
10.5815/ijcnis.2018.06.07
10.1155/2021/3998830
10.1109/access.2020.2982779
10.1007/s41870-018-0220-2
10.1109/jas.2017.7510736
10.1016/j.jairtraman.2017.09.011
10.3991/ijet.v12i03.6434
10.1016/j.future.2016.12.036
10.1109/mwc.2018.1700317
ContentType Journal Article
Copyright Copyright © 2022 Yu Sun et al.
Copyright © 2022 Yu Sun et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0
Copyright_xml – notice: Copyright © 2022 Yu Sun et al.
– notice: Copyright © 2022 Yu Sun et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0
DBID RHU
RHW
RHX
AAYXX
CITATION
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
DOI 10.1155/2022/3170164
DatabaseName Hindawi Publishing Complete
Hindawi Publishing Subscription Journals
Hindawi Publishing Open Access
CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
DatabaseTitleList Technology Research Database

CrossRef
Database_xml – sequence: 1
  dbid: RHX
  name: Hindawi Publishing Open Access
  url: http://www.hindawi.com/journals/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1939-0122
Editor Khan, Mohammad Ayoub
Editor_xml – sequence: 1
  givenname: Mohammad Ayoub
  surname: Khan
  fullname: Khan, Mohammad Ayoub
EndPage 11
ExternalDocumentID 10_1155_2022_3170164
GroupedDBID .4S
.DC
05W
0R~
123
1OC
3SF
4.4
52U
5DZ
66C
8-1
8UM
AAESR
AAFWJ
AAJEY
AAONW
ACGFO
ADBBV
ADIZJ
AENEX
AFBPY
AFKRA
AJXKR
ALMA_UNASSIGNED_HOLDINGS
ARAPS
ARCSS
ATUGU
AZVAB
BCNDV
BENPR
BGLVJ
BHBCM
BNHUX
BOGZA
BRXPI
CCPQU
CS3
DR2
DU5
EBS
EIS
F1Z
G-S
GROUPED_DOAJ
HCIFZ
HZ~
IAO
ICD
ITC
IX1
K7-
LITHE
MY.
MY~
NNB
O9-
OIG
OK1
P2P
PIMPY
RHU
RHW
RHX
TH9
TUS
W99
WBKPD
XV2
24P
AAMMB
AAYXX
ACCMX
ADMLS
AEFGJ
AGXDD
AIDQK
AIDYY
ALUQN
CITATION
H13
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c337t-c4decdb08ea8bbe658ad989c5b8d0762a9802a2b1e06b06d242732823389f37e3
IEDL.DBID RHX
ISICitedReferencesCount 0
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000891077900003&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1939-0114
IngestDate Fri Jul 25 20:52:45 EDT 2025
Sat Nov 29 02:59:42 EST 2025
Tue Nov 18 22:33:49 EST 2025
Sun Jun 02 18:53:03 EDT 2024
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Language English
License This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
https://creativecommons.org/licenses/by/4.0
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c337t-c4decdb08ea8bbe658ad989c5b8d0762a9802a2b1e06b06d242732823389f37e3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0002-5248-7637
OpenAccessLink https://dx.doi.org/10.1155/2022/3170164
PQID 2740356927
PQPubID 1046363
PageCount 11
ParticipantIDs proquest_journals_2740356927
crossref_primary_10_1155_2022_3170164
crossref_citationtrail_10_1155_2022_3170164
hindawi_primary_10_1155_2022_3170164
PublicationCentury 2000
PublicationDate 2022-11-18
PublicationDateYYYYMMDD 2022-11-18
PublicationDate_xml – month: 11
  year: 2022
  text: 2022-11-18
  day: 18
PublicationDecade 2020
PublicationPlace London
PublicationPlace_xml – name: London
PublicationTitle Security and communication networks
PublicationYear 2022
Publisher Hindawi
John Wiley & Sons, Inc
Publisher_xml – name: Hindawi
– name: John Wiley & Sons, Inc
References 22
12
14
N. S. Kumar (3) 2019; 11
17
R. Mamlook (16) 2017; 15
Y. R. . Bhandayker (19) 2018; 12
I. M. Abutu (4) 2018; 10
A. Tayal (1) 2017; 6
X. Qiao (13) 2017; 55
2
A. M. Ali (20) 2020; 6
5
6
M. Peng (11) 2019; 2
7
A. Ali (9) 2019; 19
B. Shen (8) 2017; 34
S. S. Kendaganna (15) 2018; 8
Z. Tao (18) 2017; 36
10
21
References_xml – ident: 10
  doi: 10.5815/ijcnis.2021.01.02
– ident: 21
  doi: 10.1155/2021/6667100
– volume: 10
  start-page: 68
  issue: 6
  year: 2018
  ident: 4
  article-title: Real time universal scalable wireless sensor network for environmental monitoring application[J]
  publication-title: International Journal of Computer Network and Information Security
  doi: 10.5815/ijcnis.2018.06.07
– volume: 34
  start-page: 136
  issue: 1
  year: 2017
  ident: 8
  article-title: Forecast information sharing for managing supply chains in the big data era: recent development and future research[J]
  publication-title: Asia Pacific Journal of Operational Research
– volume: 12
  start-page: 193
  issue: 1
  year: 2018
  ident: 19
  article-title: Security mechanisms for providing security to the network[J]
  publication-title: International Journal of Information Technology and Management
– volume: 6
  start-page: 2229
  issue: 3
  year: 2020
  ident: 20
  article-title: Remote wireless automation and monitoring of large farm using wireless sensors networks and Internet[J]
  publication-title: International Journal of Computer Science and Applications
– ident: 14
  doi: 10.1155/2021/3998830
– ident: 12
  doi: 10.1109/access.2020.2982779
– ident: 17
  doi: 10.1007/s41870-018-0220-2
– ident: 5
  doi: 10.1109/jas.2017.7510736
– volume: 6
  start-page: 49
  issue: 1
  year: 2017
  ident: 1
  article-title: Active monitoring & postmortem forensic analysis of network threats: a survey[J]
  publication-title: International Journal of Electronics and Information Engineering
– volume: 15
  start-page: 86
  issue: 2
  year: 2017
  ident: 16
  article-title: Controlling future intelligent smart homes using wireless integrated network systems[J]
  publication-title: International Journal of Computer Science and Information Security
– volume: 19
  start-page: 179
  issue: 12
  year: 2019
  ident: 9
  article-title: Health monitoring and management system by using wireless sensor network and Internet of things (IoT)[J]
  publication-title: International Journal of Computer Network and Information Security
– ident: 2
  doi: 10.1016/j.jairtraman.2017.09.011
– ident: 6
  doi: 10.3991/ijet.v12i03.6434
– volume: 55
  start-page: 497
  issue: 18
  year: 2017
  ident: 13
  article-title: Study on the computer network security evaluation based on GABP algorithm[J]
  publication-title: Boletin Tecnico/Technical Bulletin
– volume: 8
  start-page: 4164
  issue: 6
  year: 2018
  ident: 15
  article-title: Reconfigurable high performance secured NoC design using hierarchical agent-based monitoring system[J]
  publication-title: International Journal of Electrical and Computer Engineering
– volume: 36
  start-page: 1649
  issue: 7
  year: 2017
  ident: 18
  article-title: Frame structure and engineering applications of multi-source system cloud service platform for landslide monitoring[J]
  publication-title: Chinese Journal of Rock Mechanics & Engineering
– volume: 2
  start-page: 176
  issue: 2
  year: 2019
  ident: 11
  article-title: Research on computer network security monitoring based on extreme learning machine[J]
  publication-title: Paper Asia
– ident: 22
  doi: 10.1016/j.future.2016.12.036
– volume: 11
  start-page: 137
  issue: 2
  year: 2019
  ident: 3
  article-title: A study on security for adaptive periodic threshold sensitive energy efficient protocol based on elliptic curve cryptology in wireless sensor network[J]
  publication-title: International Journal of Computing & Information Technology
– ident: 7
  doi: 10.1109/mwc.2018.1700317
SSID ssj0061474
Score 2.2464805
Snippet With the rapid advancement of society and the level of programming and the rapid development of computer technology, networking and information are playing an...
SourceID proquest
crossref
hindawi
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 1
SubjectTerms Big Data
Communication
Computer networks
Cybersecurity
False alarms
Internet
Linear programming
Monitoring
Monitoring systems
Security systems
Social networks
Stability
Teaching
Title Computer Network Information Security Monitoring System Based on Big Data Era
URI https://dx.doi.org/10.1155/2022/3170164
https://www.proquest.com/docview/2740356927
Volume 2022
WOSCitedRecordID wos000891077900003&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVWIB
  databaseName: Wiley Online Library Open Access
  customDbUrl:
  eissn: 1939-0122
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0061474
  issn: 1939-0114
  databaseCode: 24P
  dateStart: 20170101
  isFulltext: true
  titleUrlDefault: https://authorservices.wiley.com/open-science/open-access/browse-journals.html
  providerName: Wiley-Blackwell
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LSwMxEA626EFQfGK1lhzqSRY3yW42OVqt9GIpPqC3Ja_VglRpV_37TrpZUYsoe1qYZGGyM18-MvkGoa5zWWEcBKA0jANBKWQkqFSRJowTXsSWpGrRbCIbDsV4LEdBJGm-fIQPaOfpOT1jXjecJw3UEKmv3LoZjOuECwCThcNjX_pDkrq-_cfYb8iz9ugp7_tkKQUvcOVqC22GDSE-r1ZwG6246Q5a_yITuIuu69YLeFgVbeNwicg7Fd-GDnS4Ck8_BFc65LgHEGUx2PQmD_hSlQr3Z2oP3V_17y4GUWiDEBnGsjIyiXXG6lg4JbR2sGVQVgppUi1sDLlMSRFTRTVxMdcxtwC6XoGHAvmUBcsc20fN6fPUHSBMi5TAFAJwXiYEJk2UdFxq-A6zTpEWOq1dlJugEe5bVTzlC66Qprl3aB4c2kInn9YvlTbGL3bd4O0_zNr1UuQhkOY5kOaYpVzS7PB_sxyhDXj1D6_q9NqoWc5e3TFaNW_lZD7roAZNRp3FL_QBpcu7Ng
linkProvider Hindawi Publishing
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Computer+Network+Information+Security+Monitoring+System+Based+on+Big+Data+Era&rft.jtitle=Security+and+communication+networks&rft.au=Sun%2C+Yu&rft.au=Liu%2C+Xiaorong&rft.au=Shen%2C+Xiaoli&rft.date=2022-11-18&rft.pub=Hindawi&rft.issn=1939-0114&rft.eissn=1939-0122&rft.volume=2022&rft_id=info:doi/10.1155%2F2022%2F3170164&rft.externalDocID=10_1155_2022_3170164
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1939-0114&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1939-0114&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1939-0114&client=summon