网络安全策略及其应用的结构化研究

Shanti Makka, Tripti Misra, Rajesh Deorari, D. Kumar, Vikas Kumar, Bhaker Pant
{"title":"网络安全策略及其应用的结构化研究","authors":"Shanti Makka, Tripti Misra, Rajesh Deorari, D. Kumar, Vikas Kumar, Bhaker Pant","doi":"10.1109/IC3I56241.2022.10072695","DOIUrl":null,"url":null,"abstract":"Organizations can utilize big data to spread information over a network, analyses vast amounts of complex data, and find hidden trends and correlations. The deployment of a platform that is both effective and secure is required since the information that moves across the networking of an institution is frequently important. Entire network has thus been promoted to the early stages of evaluation in the context of big data. computer protection technologies are created to recognize and thwart possible attacks in a real-time environment. must manage a significant volume of data that is both complex and varied. Unfortunately, because these systems are usually created using outdated techniques, securing vast volumes of information can be difficult. In this post, we’ll mostly talk about information protection for massive volumes of data and network security solutions. We start by talking about the variables that affect network security design in the Big Data environment. Then, we’ll talk about a few big data solutions that provide network-wide data protection in addition to current study findings.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"A Structured Investigation of Network Security Strategies and its Applications\",\"authors\":\"Shanti Makka, Tripti Misra, Rajesh Deorari, D. Kumar, Vikas Kumar, Bhaker Pant\",\"doi\":\"10.1109/IC3I56241.2022.10072695\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Organizations can utilize big data to spread information over a network, analyses vast amounts of complex data, and find hidden trends and correlations. The deployment of a platform that is both effective and secure is required since the information that moves across the networking of an institution is frequently important. Entire network has thus been promoted to the early stages of evaluation in the context of big data. computer protection technologies are created to recognize and thwart possible attacks in a real-time environment. must manage a significant volume of data that is both complex and varied. Unfortunately, because these systems are usually created using outdated techniques, securing vast volumes of information can be difficult. In this post, we’ll mostly talk about information protection for massive volumes of data and network security solutions. We start by talking about the variables that affect network security design in the Big Data environment. Then, we’ll talk about a few big data solutions that provide network-wide data protection in addition to current study findings.\",\"PeriodicalId\":274660,\"journal\":{\"name\":\"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)\",\"volume\":\"82 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-12-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IC3I56241.2022.10072695\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IC3I56241.2022.10072695","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

组织可以利用大数据在网络上传播信息,分析大量复杂数据,并发现隐藏的趋势和相关性。部署一个既有效又安全的平台是必需的,因为在机构的网络中移动的信息通常是重要的。因此,整个网络被提升到大数据背景下的早期评估阶段。创建计算机保护技术是为了在实时环境中识别和阻止可能的攻击。必须管理大量复杂多变的数据。不幸的是,由于这些系统通常是使用过时的技术创建的,因此保护大量信息可能很困难。在这篇文章中,我们将主要讨论海量数据的信息保护和网络安全解决方案。我们首先讨论影响大数据环境下网络安全设计的变量。然后,我们将讨论一些提供网络范围数据保护的大数据解决方案,以及当前的研究结果。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
A Structured Investigation of Network Security Strategies and its Applications
Organizations can utilize big data to spread information over a network, analyses vast amounts of complex data, and find hidden trends and correlations. The deployment of a platform that is both effective and secure is required since the information that moves across the networking of an institution is frequently important. Entire network has thus been promoted to the early stages of evaluation in the context of big data. computer protection technologies are created to recognize and thwart possible attacks in a real-time environment. must manage a significant volume of data that is both complex and varied. Unfortunately, because these systems are usually created using outdated techniques, securing vast volumes of information can be difficult. In this post, we’ll mostly talk about information protection for massive volumes of data and network security solutions. We start by talking about the variables that affect network security design in the Big Data environment. Then, we’ll talk about a few big data solutions that provide network-wide data protection in addition to current study findings.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信