Design of Intelligent Software Security System Based on Spark Big Data Computing

被引:0
作者
Xu, Chong [1 ]
Li, Jing [2 ]
机构
[1] Shenyang Jianzhu Univ, Sch Comp Sci & Engn, Liaoning Prov Big Data Management & Anal Lab Urban, Shenyang Branch,Natl Special Comp Engn Technol Res, Shenyang 110168, Liaoning, Peoples R China
[2] Hebei Univ Engn, Sch Min & Geomat Engn, Handan 056038, Hebei, Peoples R China
关键词
Spark technology; Software security; Big data; Intelligent decision making; Intelligent decision technology; MANAGEMENT;
D O I
10.1007/s11277-024-11015-4
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
With the rapid development of computer science and technology, the Internet has penetrated into various fields of society and economy. However, there are still many unsatisfactory aspects of software security, such as hackers illegally invading systems and stealing important information, and various software vulnerabilities emerging, which make people have to face unknown risks. Big data computing, as an emerging technology, has largely solved this problem. This article used the Spark platform in big data to evaluate the performance of intelligent software security systems. It discussed the specific implementation methods to improve system acceleration ratio and achieve good data scalability and scalability. Finally, combining encryption and authentication technologies, a design scheme for an intelligent software protection system based on the Spark platform in big data was proposed. The application of Spark big data computing technology in the design and implementation of intelligent software security protection systems has greatly improved the system's recognition speed for software vulnerabilities, increased recognition accuracy, and reduced the data loss rate when facing attacks by approximately 2.14%, effectively reducing the losses caused by software failures. In the era of big data, information security protection still faces many new challenges, and it is necessary to improve network security technology and related products from multiple perspectives to adapt to future social development needs and provide users with better and more comprehensive services.
引用
收藏
页码:785 / 805
页数:21
相关论文
共 31 条
[1]  
Agarwal S., 2020, PRIVACY VULNERABILIT
[2]  
Alenezi M., 2019, International Journal of Recent Technology and Engineering, V8, P7048, DOI [DOI 10.35940/IJRTE.C5374.098319, 10.35940/ijrte.C5374, DOI 10.35940/IJRTE.C5374]
[3]  
Althar RR., 2023, SN COMPUT SCI, V4, P331, DOI [10.1007/s42979-023-01785-2, DOI 10.1007/S42979-023-01785-2]
[4]  
Atif Mashkoor A., 2023, J SOFTW-EVOL PROC, V35, P7
[5]  
Avci Cigdem, 2020, Big Data Analytics, V5, P1, DOI 10.1186/s41044-020-00045-1
[6]   Classification and security assessment of android apps [J].
Caushaj E. ;
Sugumaran V. .
Discover Internet of Things, 2023, 3 (01)
[7]   Metamorphic Testing for Web System Security [J].
Chaleshtari, Nazanin Bayati ;
Pastore, Fabrizio ;
Goknil, Arda ;
Briand, Lionel C. .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2023, 49 (06) :3430-3471
[8]   Big Data Systems: A Software Engineering Perspective [J].
Davoudian, Ali ;
Liu, Mengchi .
ACM COMPUTING SURVEYS, 2020, 53 (05)
[9]   Software security patch management-A systematic literature review of challenges, approaches, tools and practices [J].
Dissanayake, Nesara ;
Jayatilaka, Asangi ;
Zahedi, Mansooreh ;
Babar, M. Ali .
INFORMATION AND SOFTWARE TECHNOLOGY, 2022, 144
[10]  
Eremin O., 2021, CYBER PHYS SYSTEMS D, P385