Computer Network Information Security Monitoring System Based on Big Data Era
With the rapid advancement of society and the level of programming and the rapid development of computer technology, networking and information are playing an increasingly important role in the social life of the masses. Creating and developing a network information security monitoring system have b...
Uložené v:
| Vydané v: | Security and communication networks Ročník 2022; s. 1 - 11 |
|---|---|
| Hlavní autori: | , , |
| Médium: | Journal Article |
| Jazyk: | English |
| Vydavateľské údaje: |
London
Hindawi
18.11.2022
John Wiley & Sons, Inc |
| Predmet: | |
| ISSN: | 1939-0114, 1939-0122 |
| On-line prístup: | Získať plný text |
| Tagy: |
Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
|
| Abstract | With the rapid advancement of society and the level of programming and the rapid development of computer technology, networking and information are playing an increasingly important role in the social life of the masses. Creating and developing a network information security monitoring system have become one of the most important ways to keep a computer running smoothly. Traditional information security systems cannot adapt to the ever-changing network environment. If only relying on it to maintain network security, it will be far from effective monitoring and defense. Based on the theory of network information security, this study analyzes the characteristics of network information and the information security monitoring technology at the current stage. Based on the background of big data era, a new type of computer network information security monitoring system is proposed. This system is compared with the traditional network information security monitoring system, and the performance and stability of the system are investigated, respectively. The experimental data show that the network information security monitoring system designed in this study can achieve more than 99% detection rate of external attacks in a network environment with a background traffic of 10M. Its false alarm rate is lower than 4%, and the false alarm rate is lower than 7%. The qualitative mean reaches 93.02%, indicating its good monitoring accuracy and stability. By popularizing it in the current network environment, it can effectively identify and defend information attacks and maintain the development of network information security. |
|---|---|
| AbstractList | With the rapid advancement of society and the level of programming and the rapid development of computer technology, networking and information are playing an increasingly important role in the social life of the masses. Creating and developing a network information security monitoring system have become one of the most important ways to keep a computer running smoothly. Traditional information security systems cannot adapt to the ever-changing network environment. If only relying on it to maintain network security, it will be far from effective monitoring and defense. Based on the theory of network information security, this study analyzes the characteristics of network information and the information security monitoring technology at the current stage. Based on the background of big data era, a new type of computer network information security monitoring system is proposed. This system is compared with the traditional network information security monitoring system, and the performance and stability of the system are investigated, respectively. The experimental data show that the network information security monitoring system designed in this study can achieve more than 99% detection rate of external attacks in a network environment with a background traffic of 10M. Its false alarm rate is lower than 4%, and the false alarm rate is lower than 7%. The qualitative mean reaches 93.02%, indicating its good monitoring accuracy and stability. By popularizing it in the current network environment, it can effectively identify and defend information attacks and maintain the development of network information security. |
| Author | Sun, Yu Liu, Xiaorong Shen, Xiaoli |
| Author_xml | – sequence: 1 givenname: Yu orcidid: 0000-0002-5248-7637 surname: Sun fullname: Sun, Yu organization: Chengdu Vocational & Technical College of IndustryChengdu 610000SichuanChina – sequence: 2 givenname: Xiaorong surname: Liu fullname: Liu, Xiaorong organization: Chengdu Vocational & Technical College of IndustryChengdu 610000SichuanChina – sequence: 3 givenname: Xiaoli surname: Shen fullname: Shen, Xiaoli organization: Chengdu Vocational & Technical College of IndustryChengdu 610000SichuanChina |
| BookMark | eNp9kM9PwjAYhhuDiYDe_AOaeNRJf2xrdxREJQE9oOel6zosshbbLmT_vUOIBxM9fd_hed83eQagZ6xRAFxidItxkowIImREMUM4jU9AH2c0ixAmpPfz4_gMDLxfI5TimMV9sJjYetsE5eCzCjvrPuDMVNbVImhr4FLJxunQwoU1OlinzQouWx9UDcfCqxJ2zFiv4L0IAk6dOAenldh4dXG8Q_D2MH2dPEXzl8fZ5G4eSUpZiGRcKlkWiCvBi0KlCRdlxjOZFLxELCUi44gIUmCF0gKlJYkJo4QTSnlWUaboEFwderfOfjbKh3xtG2e6yZywGNEkzbrEENwcKOms905V-dbpWrg2xyjfC8v3wvKjsA4nv3Cpw7eH4ITe_BW6PoTetSnFTv8_8QW9Hnsg |
| CitedBy_id | crossref_primary_10_3233_KES_230172 crossref_primary_10_3233_JIFS_231351 crossref_primary_10_1155_2023_9795830 crossref_primary_10_3233_KES_230239 crossref_primary_10_3233_KES_230103 crossref_primary_10_3233_JIFS_233181 |
| Cites_doi | 10.5815/ijcnis.2021.01.02 10.1155/2021/6667100 10.5815/ijcnis.2018.06.07 10.1155/2021/3998830 10.1109/access.2020.2982779 10.1007/s41870-018-0220-2 10.1109/jas.2017.7510736 10.1016/j.jairtraman.2017.09.011 10.3991/ijet.v12i03.6434 10.1016/j.future.2016.12.036 10.1109/mwc.2018.1700317 |
| ContentType | Journal Article |
| Copyright | Copyright © 2022 Yu Sun et al. Copyright © 2022 Yu Sun et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0 |
| Copyright_xml | – notice: Copyright © 2022 Yu Sun et al. – notice: Copyright © 2022 Yu Sun et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0 |
| DBID | RHU RHW RHX AAYXX CITATION 7SC 7SP 8FD JQ2 L7M L~C L~D |
| DOI | 10.1155/2022/3170164 |
| DatabaseName | Hindawi Publishing Complete Hindawi Publishing Subscription Journals Hindawi Publishing Open Access CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
| DatabaseTitle | CrossRef Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | Technology Research Database CrossRef |
| Database_xml | – sequence: 1 dbid: RHX name: Hindawi Publishing Open Access url: http://www.hindawi.com/journals/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 1939-0122 |
| Editor | Khan, Mohammad Ayoub |
| Editor_xml | – sequence: 1 givenname: Mohammad Ayoub surname: Khan fullname: Khan, Mohammad Ayoub |
| EndPage | 11 |
| ExternalDocumentID | 10_1155_2022_3170164 |
| GroupedDBID | .4S .DC 05W 0R~ 123 1OC 3SF 4.4 52U 5DZ 66C 8-1 8UM AAESR AAFWJ AAJEY AAONW ACGFO ADBBV ADIZJ AENEX AFBPY AFKRA AJXKR ALMA_UNASSIGNED_HOLDINGS ARAPS ARCSS ATUGU AZVAB BCNDV BENPR BGLVJ BHBCM BNHUX BOGZA BRXPI CCPQU CS3 DR2 DU5 EBS EIS F1Z G-S GROUPED_DOAJ HCIFZ HZ~ IAO ICD ITC IX1 K7- LITHE MY. MY~ NNB O9- OIG OK1 P2P PIMPY RHU RHW RHX TH9 TUS W99 WBKPD XV2 24P AAMMB AAYXX ACCMX ADMLS AEFGJ AGXDD AIDQK AIDYY ALUQN CITATION H13 7SC 7SP 8FD JQ2 L7M L~C L~D |
| ID | FETCH-LOGICAL-c337t-c4decdb08ea8bbe658ad989c5b8d0762a9802a2b1e06b06d242732823389f37e3 |
| IEDL.DBID | RHX |
| ISICitedReferencesCount | 0 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000891077900003&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1939-0114 |
| IngestDate | Fri Jul 25 20:52:45 EDT 2025 Sat Nov 29 02:59:42 EST 2025 Tue Nov 18 22:33:49 EST 2025 Sun Jun 02 18:53:03 EDT 2024 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Language | English |
| License | This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. https://creativecommons.org/licenses/by/4.0 |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c337t-c4decdb08ea8bbe658ad989c5b8d0762a9802a2b1e06b06d242732823389f37e3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0002-5248-7637 |
| OpenAccessLink | https://dx.doi.org/10.1155/2022/3170164 |
| PQID | 2740356927 |
| PQPubID | 1046363 |
| PageCount | 11 |
| ParticipantIDs | proquest_journals_2740356927 crossref_primary_10_1155_2022_3170164 crossref_citationtrail_10_1155_2022_3170164 hindawi_primary_10_1155_2022_3170164 |
| PublicationCentury | 2000 |
| PublicationDate | 2022-11-18 |
| PublicationDateYYYYMMDD | 2022-11-18 |
| PublicationDate_xml | – month: 11 year: 2022 text: 2022-11-18 day: 18 |
| PublicationDecade | 2020 |
| PublicationPlace | London |
| PublicationPlace_xml | – name: London |
| PublicationTitle | Security and communication networks |
| PublicationYear | 2022 |
| Publisher | Hindawi John Wiley & Sons, Inc |
| Publisher_xml | – name: Hindawi – name: John Wiley & Sons, Inc |
| References | 22 12 14 N. S. Kumar (3) 2019; 11 17 R. Mamlook (16) 2017; 15 Y. R. . Bhandayker (19) 2018; 12 I. M. Abutu (4) 2018; 10 A. Tayal (1) 2017; 6 X. Qiao (13) 2017; 55 2 A. M. Ali (20) 2020; 6 5 6 M. Peng (11) 2019; 2 7 A. Ali (9) 2019; 19 B. Shen (8) 2017; 34 S. S. Kendaganna (15) 2018; 8 Z. Tao (18) 2017; 36 10 21 |
| References_xml | – ident: 10 doi: 10.5815/ijcnis.2021.01.02 – ident: 21 doi: 10.1155/2021/6667100 – volume: 10 start-page: 68 issue: 6 year: 2018 ident: 4 article-title: Real time universal scalable wireless sensor network for environmental monitoring application[J] publication-title: International Journal of Computer Network and Information Security doi: 10.5815/ijcnis.2018.06.07 – volume: 34 start-page: 136 issue: 1 year: 2017 ident: 8 article-title: Forecast information sharing for managing supply chains in the big data era: recent development and future research[J] publication-title: Asia Pacific Journal of Operational Research – volume: 12 start-page: 193 issue: 1 year: 2018 ident: 19 article-title: Security mechanisms for providing security to the network[J] publication-title: International Journal of Information Technology and Management – volume: 6 start-page: 2229 issue: 3 year: 2020 ident: 20 article-title: Remote wireless automation and monitoring of large farm using wireless sensors networks and Internet[J] publication-title: International Journal of Computer Science and Applications – ident: 14 doi: 10.1155/2021/3998830 – ident: 12 doi: 10.1109/access.2020.2982779 – ident: 17 doi: 10.1007/s41870-018-0220-2 – ident: 5 doi: 10.1109/jas.2017.7510736 – volume: 6 start-page: 49 issue: 1 year: 2017 ident: 1 article-title: Active monitoring & postmortem forensic analysis of network threats: a survey[J] publication-title: International Journal of Electronics and Information Engineering – volume: 15 start-page: 86 issue: 2 year: 2017 ident: 16 article-title: Controlling future intelligent smart homes using wireless integrated network systems[J] publication-title: International Journal of Computer Science and Information Security – volume: 19 start-page: 179 issue: 12 year: 2019 ident: 9 article-title: Health monitoring and management system by using wireless sensor network and Internet of things (IoT)[J] publication-title: International Journal of Computer Network and Information Security – ident: 2 doi: 10.1016/j.jairtraman.2017.09.011 – ident: 6 doi: 10.3991/ijet.v12i03.6434 – volume: 55 start-page: 497 issue: 18 year: 2017 ident: 13 article-title: Study on the computer network security evaluation based on GABP algorithm[J] publication-title: Boletin Tecnico/Technical Bulletin – volume: 8 start-page: 4164 issue: 6 year: 2018 ident: 15 article-title: Reconfigurable high performance secured NoC design using hierarchical agent-based monitoring system[J] publication-title: International Journal of Electrical and Computer Engineering – volume: 36 start-page: 1649 issue: 7 year: 2017 ident: 18 article-title: Frame structure and engineering applications of multi-source system cloud service platform for landslide monitoring[J] publication-title: Chinese Journal of Rock Mechanics & Engineering – volume: 2 start-page: 176 issue: 2 year: 2019 ident: 11 article-title: Research on computer network security monitoring based on extreme learning machine[J] publication-title: Paper Asia – ident: 22 doi: 10.1016/j.future.2016.12.036 – volume: 11 start-page: 137 issue: 2 year: 2019 ident: 3 article-title: A study on security for adaptive periodic threshold sensitive energy efficient protocol based on elliptic curve cryptology in wireless sensor network[J] publication-title: International Journal of Computing & Information Technology – ident: 7 doi: 10.1109/mwc.2018.1700317 |
| SSID | ssj0061474 |
| Score | 2.2464805 |
| Snippet | With the rapid advancement of society and the level of programming and the rapid development of computer technology, networking and information are playing an... |
| SourceID | proquest crossref hindawi |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 1 |
| SubjectTerms | Big Data Communication Computer networks Cybersecurity False alarms Internet Linear programming Monitoring Monitoring systems Security systems Social networks Stability Teaching |
| Title | Computer Network Information Security Monitoring System Based on Big Data Era |
| URI | https://dx.doi.org/10.1155/2022/3170164 https://www.proquest.com/docview/2740356927 |
| Volume | 2022 |
| WOSCitedRecordID | wos000891077900003&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVWIB databaseName: Wiley Online Library Open Access customDbUrl: eissn: 1939-0122 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0061474 issn: 1939-0114 databaseCode: 24P dateStart: 20170101 isFulltext: true titleUrlDefault: https://authorservices.wiley.com/open-science/open-access/browse-journals.html providerName: Wiley-Blackwell |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LSwMxEA626EFQfGK1lhzqSRY3yW42OVqt9GIpPqC3Ja_VglRpV_37TrpZUYsoe1qYZGGyM18-MvkGoa5zWWEcBKA0jANBKWQkqFSRJowTXsSWpGrRbCIbDsV4LEdBJGm-fIQPaOfpOT1jXjecJw3UEKmv3LoZjOuECwCThcNjX_pDkrq-_cfYb8iz9ugp7_tkKQUvcOVqC22GDSE-r1ZwG6246Q5a_yITuIuu69YLeFgVbeNwicg7Fd-GDnS4Ck8_BFc65LgHEGUx2PQmD_hSlQr3Z2oP3V_17y4GUWiDEBnGsjIyiXXG6lg4JbR2sGVQVgppUi1sDLlMSRFTRTVxMdcxtwC6XoGHAvmUBcsc20fN6fPUHSBMi5TAFAJwXiYEJk2UdFxq-A6zTpEWOq1dlJugEe5bVTzlC66Qprl3aB4c2kInn9YvlTbGL3bd4O0_zNr1UuQhkOY5kOaYpVzS7PB_sxyhDXj1D6_q9NqoWc5e3TFaNW_lZD7roAZNRp3FL_QBpcu7Ng |
| linkProvider | Hindawi Publishing |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Computer+Network+Information+Security+Monitoring+System+Based+on+Big+Data+Era&rft.jtitle=Security+and+communication+networks&rft.au=Sun%2C+Yu&rft.au=Liu%2C+Xiaorong&rft.au=Shen%2C+Xiaoli&rft.date=2022-11-18&rft.pub=Hindawi&rft.issn=1939-0114&rft.eissn=1939-0122&rft.volume=2022&rft_id=info:doi/10.1155%2F2022%2F3170164&rft.externalDocID=10_1155_2022_3170164 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1939-0114&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1939-0114&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1939-0114&client=summon |