{"title":"基于网络安全的大数据目标体系研究与构建要点","authors":"Yunguo Hong","doi":"10.1109/CCNS53852.2021.00041","DOIUrl":null,"url":null,"abstract":"Up to now, the popularization and application of computers have caused great changes in people’s lives. However, as computer technology needs to store various information during application, such as public information, confidential information, etc., relevant staff need to pay more attention to its cyber security issues. This article summarizes the design content of the target system based on previous work experience. The author discusses the realization of a big data target system based on network security from five aspects: network security data collection, vulnerability data cleaning, realization of standard vulnerability database construction, extraction of elements of construction target environment, and construction of target environment given Docker virtual technology.","PeriodicalId":142980,"journal":{"name":"2021 2nd International Conference on Computer Communication and Network Security (CCNS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Key Points of Research and Construction Based on Network Security Big Data Target System\",\"authors\":\"Yunguo Hong\",\"doi\":\"10.1109/CCNS53852.2021.00041\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Up to now, the popularization and application of computers have caused great changes in people’s lives. However, as computer technology needs to store various information during application, such as public information, confidential information, etc., relevant staff need to pay more attention to its cyber security issues. This article summarizes the design content of the target system based on previous work experience. The author discusses the realization of a big data target system based on network security from five aspects: network security data collection, vulnerability data cleaning, realization of standard vulnerability database construction, extraction of elements of construction target environment, and construction of target environment given Docker virtual technology.\",\"PeriodicalId\":142980,\"journal\":{\"name\":\"2021 2nd International Conference on Computer Communication and Network Security (CCNS)\",\"volume\":\"5 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 2nd International Conference on Computer Communication and Network Security (CCNS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CCNS53852.2021.00041\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 2nd International Conference on Computer Communication and Network Security (CCNS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCNS53852.2021.00041","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Key Points of Research and Construction Based on Network Security Big Data Target System
Up to now, the popularization and application of computers have caused great changes in people’s lives. However, as computer technology needs to store various information during application, such as public information, confidential information, etc., relevant staff need to pay more attention to its cyber security issues. This article summarizes the design content of the target system based on previous work experience. The author discusses the realization of a big data target system based on network security from five aspects: network security data collection, vulnerability data cleaning, realization of standard vulnerability database construction, extraction of elements of construction target environment, and construction of target environment given Docker virtual technology.