The best way to conference proceedings by Francis Academic Press

Web of Proceedings - Francis Academic Press
Web of Proceedings - Francis Academic Press

Network Information Security Protection Technology Based on Big Data Technology

Download as PDF

DOI: 10.25236/mmmce.2021.016

Author(s)

Wang Chao, Wang Xiao-hu, Dong Jia-han, Guo Guang-xin , Ren Tian-yu

Corresponding Author

Wang Chao

Abstract

The construction of network information security is not only the development security of network information technology in big data age, but also a significant guarantee to ensure safety and order of network environment. This paper studies the network information security protection technology on the basis of big data technology. It first analyzes the present condition of network information security, and summarizes the hidden dangers of network information security. Secondly, on the basis of data mining in big data technology, this paper proposes a network information security protection technology. To study the network information security protection technology based on big data proposed in this paper, the simulation experiment is carried out on the simulation platform, and the method is compared with the traditional network protection technology and the big data based NAT network security protection technology, and the network defense ability and attack index are studied. The results show that the network defense capability of traditional network protection technology is 72%, and the attack index is 32%. The network defense ability of firewall network security protection technology based on big data is 89%, and the attack index is 13%. The network defense ability of NAT network security protection technology based on big data is 91% and the attack index is 17%. From the simulation results, we can see that the performance of network information security protection technology based on big data is better, and can better enhance network information security protection.

Keywords

Big data technology, Network information security, Information security protection, Data mining