• Corpus ID: 204875098

Analysis of Computer Network Security Vulnerabilities and Preventive Measures Based on Big Data Thinking

  title={Analysis of Computer Network Security Vulnerabilities and Preventive Measures Based on Big Data Thinking},
  author={Feijian Xu},
  • Feijian Xu
  • Published 28 August 2019
  • Computer Science
In the era of big data, network technology has been fully popularized and applied, bringing great convenience to people's life and work. However, with the development of network technology, some network security problems follow. Computer network security is also a headache, once there are network vulnerabilities, information leakage or loss will bring us a painful loss. The protection of computer network security vulnerabilities has always been the focus of people's attention. It is necessary… 


Signature Based Vulnerability Detection Over Wireless Sensor Network for Reliable Data Transmission
A signature based detection approach is proposed for detecting the routing attacks and the simulated results show that the proposed signature based approach improves the reliability of data by measuring the parameters such as throughput and packet delivery ratio while detecting the routed attacks.
Data-Driven Cyber-Vulnerability Maintenance Policies
A method based on Markov decision processes (MDP) for the generation and graphical evaluation of relevant maintenance policies for cases with limited data availability and an estimate of the cost benefit of collecting additional data is provided.
BHP flooding vulnerability and countermeasure
This paper studies a specific denial of service attack which is referred to as “BHP flooding attack”, which prevents legitimate traffics from reserving the required resources at intermediate core nodes and proposes the design of a reconfigurable BHP flooding countermeasure module that allows to counter against this type of attacks in an OBS network.
Small data dissemination for wireless sensor networks: The security aspect
The security vulnerabilities of small data dissemination protocols are identified and an enhancement to this solution is suggested to make the security function more efficient.
Vulnerability modelling of crypto-chips against scan-based attacks
A gate-level vulnerability model is proposed to detect the potential security holes of crypto-chips against scan-based attacks and results in comparison with the signal activity and random approaches demonstrate the superiority of the proposed model.
Identifying hot spots of security vulnerability associated with climate change in Africa
Given its high dependence on rainfed agriculture and its comparatively low adaptive capacity, Africa is frequently invoked as especially vulnerable to climate change. Within Africa, there is likely
Survey on Fall Detection and Fall Prevention Using Wearable and External Sensors
This paper surveys the state of the art in FD and FP systems, including qualitative comparisons among various studies, and aims to serve as a point of reference for future research on the mentioned systems.
“I spy, with my little sensor”: fair data handling practices for robots between privacy, copyright and security
It is argued that the discussion on sensor transparency needs to be embedded in a broader discussion of “fair data handling principles” for robots that involve issues of privacy, but also intellectual property rights such as copyright.
A Comparison of Data‐Driven Groundwater Vulnerability Assessment Methods
Groundwater vulnerability probability outputs were similar in spatial patterns and identified similar strong explanatory variables associated with nitrate source (population density as a proxy for sewage systems and septic sources) and nitrate occurrence (groundwater depth).