2021 International Conference on Big Data Analysis and Computer Science (BDACS) 2021
DOI: 10.1109/bdacs53596.2021.00009
|View full text |Cite
|
Sign up to set email alerts
|

Construction of Computer Network Security Defense System Based On Big Data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 5 publications
0
1
0
Order By: Relevance
“…Figure 11 suggests that an agent-based system captures the dynamics of a company's network, including interactions between multiple agents such as attackers and defenders. A case study evaluates the proposed approach for assessing security threats in a company's network under various security rules (Zhou, 2021). This research proposes a novel security technique in chips based on industrial wireless network requirements.…”
Section: Resultsmentioning
confidence: 99%
“…Figure 11 suggests that an agent-based system captures the dynamics of a company's network, including interactions between multiple agents such as attackers and defenders. A case study evaluates the proposed approach for assessing security threats in a company's network under various security rules (Zhou, 2021). This research proposes a novel security technique in chips based on industrial wireless network requirements.…”
Section: Resultsmentioning
confidence: 99%
“…In addition, in the era of big data, the security settings of wireless networks also need to take into account the encrypted transmission of data. Enabling WPA2-PSK encryption is just the first step, as they also need to ensure that wireless networks support emerging encryption technologies such as WPA3, which can provide better data protection and prevent data from being stolen or tampered with in transit [7] .…”
Section: Application Of Computer Wireless Network Security Technology...mentioning
confidence: 99%
“…For example, dynamic tracing can be used to monitor reads and writes to specific files, monitor system calls to processes, and so on. Mainly from the system information detection, file reading and writing, process tracking, keystroke capture, network connection and other five aspects to carry on the elaboration [12]. The first is system information detection.…”
Section: Research On Security Application Of Dynamic Tracking Technologymentioning
confidence: 99%