Research on Cloud Computing Security Technology under Computer Big Data Network

In this paper, a parameter estimation-based security access integration method for computer network smart data is designed. The scale of data clustering is determined according to the distribution and evolution characteristics in the clustering process. Finally, this paper proposes a new security ac...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:2023 IEEE 3rd International Conference on Electronic Technology, Communication and Information (ICETCI) s. 1686 - 1691
Hlavní autoři: Zhou, Qiang, Ou, Wenjisi, Zheng, Wei
Médium: Konferenční příspěvek
Jazyk:angličtina
Vydáno: IEEE 26.05.2023
Témata:
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Popis
Shrnutí:In this paper, a parameter estimation-based security access integration method for computer network smart data is designed. The scale of data clustering is determined according to the distribution and evolution characteristics in the clustering process. Finally, this paper proposes a new security access control scheme. The system uses local abnormal factors to judge non-safe data and eliminates abnormal data according to the judgment results. The system sorts and outputs the factors that may have abnormal data points in the current time window. The Java object-oriented programming language is used. The network attack will be divided into fuzzy measures of DoS attack and non-DoS attack, and finally, the results of various attacks will be displayed. Simulation results show that this paper's entire access control scheme is highly feasible. The proposed algorithm has a high recognition rate.
DOI:10.1109/ICETCI57876.2023.10176710