Research on Cloud Computing Security Technology under Computer Big Data Network
In this paper, a parameter estimation-based security access integration method for computer network smart data is designed. The scale of data clustering is determined according to the distribution and evolution characteristics in the clustering process. Finally, this paper proposes a new security ac...
Uložené v:
| Vydané v: | 2023 IEEE 3rd International Conference on Electronic Technology, Communication and Information (ICETCI) s. 1686 - 1691 |
|---|---|
| Hlavní autori: | , , |
| Médium: | Konferenčný príspevok.. |
| Jazyk: | English |
| Vydavateľské údaje: |
IEEE
26.05.2023
|
| Predmet: | |
| On-line prístup: | Získať plný text |
| Tagy: |
Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
|
| Shrnutí: | In this paper, a parameter estimation-based security access integration method for computer network smart data is designed. The scale of data clustering is determined according to the distribution and evolution characteristics in the clustering process. Finally, this paper proposes a new security access control scheme. The system uses local abnormal factors to judge non-safe data and eliminates abnormal data according to the judgment results. The system sorts and outputs the factors that may have abnormal data points in the current time window. The Java object-oriented programming language is used. The network attack will be divided into fuzzy measures of DoS attack and non-DoS attack, and finally, the results of various attacks will be displayed. Simulation results show that this paper's entire access control scheme is highly feasible. The proposed algorithm has a high recognition rate. |
|---|---|
| DOI: | 10.1109/ICETCI57876.2023.10176710 |