• Corpus ID: 204786112

Analysis and Research of Computer Network Security Emergency Response Technology Based on Large Data Mining

  title={Analysis and Research of Computer Network Security Emergency Response Technology Based on Large Data Mining},
  author={Chenglong Du},
With the continuous development of the Internet, computer network security issues have become increasingly prominent, in this case, data mining technology is particularly important. Information on the Internet has brought great convenience to human life, but the characteristics of the network itself, such as openness, freedom and interconnection, have led to the unavoidable security risks of the network. The interests of the vast number of network users have been seriously damaged. This paper… 


Big Data Analytics for Information Security
This special issue is to analyze how the latest trends in this area help learn more about cyberspace and new threats using big data approaches.
Mathematical Differential Models and Methods for Assessing the Cybersecurity of Intelligent Computer Networks for Control of Technological Processes of Railway Power Supply
A method of predictive search for an optimal cybersecurity strategy by the extremum analysis of a functional for the case of stochastic intensity of flows of cyberattacks is developed.
Application of Feature Selection Methods and Ensembles on Network Security Dataset
Results show that significant feature selection is very important in the design of a lightweight and efficient intrusion detection system and Random Forests are better than Single Decision Tree and Decision Tree with Bagging for the current dataset.
A secure key establishment protocol for zigbee wireless sensor networks
It is shown that the End-to-End Application Key Establishment Protocol is flawed and a secure protocol is proposed instead, which is presented by using formal verification techniques based on static program analysis and process algebras.
Trends toward real-time network data steganography
This paper challenges the security community by introducing an entirely new network dat hiding methodology, which it refers to as real-time network data steganography, and provides the groundwork for this fundamental change of covert network data embedding.
Game-Model-Based Network Security Risk Control
Using game theory, the authors propose an optimum attack-defense decision-making algorithm that considers the interaction between attackers and defenders.