{"title":"大数据时代的计算机网络安全与实用技术应用","authors":"Zongxi Feng","doi":"10.1109/WCONF58270.2023.10235165","DOIUrl":null,"url":null,"abstract":"The role of network security in computer networks is very important, but there is a problem that the network environment is not secure. Ordinary methods cannot solve network security problems in computer networks, and the results are not ideal. Therefore, this paper proposes a cloud computing for network security analysis. First of all, the computer is used to analyze the network information, network security in the interfering factor. Then, the computer improves the network security, forms the network security program, and conducts the network security results Comprehensive analysis. MATLAB simulation shows that under certain evaluation criteria, cloud computing has a data confidentiality and network in computer network security Data integrity is superior to common methods.","PeriodicalId":202864,"journal":{"name":"2023 World Conference on Communication & Computing (WCONF)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Computer Network Security and Practical Technology Application in the Era of Big Data\",\"authors\":\"Zongxi Feng\",\"doi\":\"10.1109/WCONF58270.2023.10235165\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The role of network security in computer networks is very important, but there is a problem that the network environment is not secure. Ordinary methods cannot solve network security problems in computer networks, and the results are not ideal. Therefore, this paper proposes a cloud computing for network security analysis. First of all, the computer is used to analyze the network information, network security in the interfering factor. Then, the computer improves the network security, forms the network security program, and conducts the network security results Comprehensive analysis. MATLAB simulation shows that under certain evaluation criteria, cloud computing has a data confidentiality and network in computer network security Data integrity is superior to common methods.\",\"PeriodicalId\":202864,\"journal\":{\"name\":\"2023 World Conference on Communication & Computing (WCONF)\",\"volume\":\"25 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-07-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 World Conference on Communication & Computing (WCONF)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WCONF58270.2023.10235165\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 World Conference on Communication & Computing (WCONF)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WCONF58270.2023.10235165","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Computer Network Security and Practical Technology Application in the Era of Big Data
The role of network security in computer networks is very important, but there is a problem that the network environment is not secure. Ordinary methods cannot solve network security problems in computer networks, and the results are not ideal. Therefore, this paper proposes a cloud computing for network security analysis. First of all, the computer is used to analyze the network information, network security in the interfering factor. Then, the computer improves the network security, forms the network security program, and conducts the network security results Comprehensive analysis. MATLAB simulation shows that under certain evaluation criteria, cloud computing has a data confidentiality and network in computer network security Data integrity is superior to common methods.