Key Points of Research and Construction Based on Network Security Big Data Target System

Yunguo Hong
{"title":"Key Points of Research and Construction Based on Network Security Big Data Target System","authors":"Yunguo Hong","doi":"10.1109/CCNS53852.2021.00041","DOIUrl":null,"url":null,"abstract":"Up to now, the popularization and application of computers have caused great changes in people’s lives. However, as computer technology needs to store various information during application, such as public information, confidential information, etc., relevant staff need to pay more attention to its cyber security issues. This article summarizes the design content of the target system based on previous work experience. The author discusses the realization of a big data target system based on network security from five aspects: network security data collection, vulnerability data cleaning, realization of standard vulnerability database construction, extraction of elements of construction target environment, and construction of target environment given Docker virtual technology.","PeriodicalId":142980,"journal":{"name":"2021 2nd International Conference on Computer Communication and Network Security (CCNS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 2nd International Conference on Computer Communication and Network Security (CCNS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCNS53852.2021.00041","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Up to now, the popularization and application of computers have caused great changes in people’s lives. However, as computer technology needs to store various information during application, such as public information, confidential information, etc., relevant staff need to pay more attention to its cyber security issues. This article summarizes the design content of the target system based on previous work experience. The author discusses the realization of a big data target system based on network security from five aspects: network security data collection, vulnerability data cleaning, realization of standard vulnerability database construction, extraction of elements of construction target environment, and construction of target environment given Docker virtual technology.
基于网络安全的大数据目标体系研究与构建要点
到目前为止,计算机的普及和应用已经给人们的生活带来了巨大的变化。然而,由于计算机技术在应用过程中需要存储各种信息,如公共信息、机密信息等,相关人员需要更加关注其网络安全问题。本文结合以往的工作经验,总结了目标系统的设计内容。笔者从网络安全数据采集、漏洞数据清洗、标准漏洞数据库构建的实现、构建目标环境要素的提取、基于Docker虚拟技术的目标环境构建等五个方面探讨了基于网络安全的大数据目标体系的实现。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信