A Multi-Source Data Fusion Model for Real-Time Information Security Incident Analysis and Processing

被引:0
作者
Li, Zhenbo [1 ]
Zhao, Yang [2 ]
机构
[1] Yingkou Inst Technol, Yingkou 115014, Liaoning, Peoples R China
[2] Yingkou Data Ctr, Yingkou 115000, Liaoning, Peoples R China
关键词
Information security; big data fusion and storage; data preprocessing; correlation; time series; BIG DATA; INTERNET;
D O I
10.1142/S0218126625501713
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The problem of information security is instantaneous, which involves the basic problems of science and technology and development. The analysis and integration of traditional information security big data are completed manually, which increases the time cost and labor cost to a certain extent, and greatly prolongs the time problem that information security incidents need to be processed in real time. Based on the above problems, an algorithm model is constructed to deal with the multi-source problem of information security big data with information technology. Quickly analyze and fuse similar data. In order to meet the actual requirements, this paper gives the corresponding algorithm process for data preprocessing, data correlation and other issues, mainly including noise filtering, correlation analysis and logic function for statistical logic problems caused by different amounts of data, and gives solutions to solve the basic data analysis layer problems. In view of the storage problem, it is necessary to judge the fusion degree of information security data, select the data in the form of database, add time series labels and then store them, which makes the security events have natural physical labels, and facilitate database operations such as output and retrieval. The construction of the algorithm can not only make an issue in theory, but also need to gather practice, which is the only and effective way to test the performance of the algorithm. Therefore, this paper puts forward seven simulation perspectives based on the common problems of information security big data, and takes several data evaluation criteria as simulation objects to explore and lay a theoretical foundation and experimental data for the long-term development of the algorithm. The full-text construction data analysis layer algorithm faces not cold data but social information with practical utility. Excellent analysis ability provides favorable and real objective underlying data for social decision makers, and provides substantive help for decision-making.
引用
收藏
页数:17
相关论文
共 28 条
[1]  
Aiming W., 2004, Adm. Forum, V2004, P3
[2]   Gene expression omnibus: Microarray data storage, submission, retrieval, and analysis [J].
Barrett, Tanya ;
Edgar, Ron .
DNA MICROARRAYS, PART B: DATABASES AND STATISTICS, 2006, 411 :352-369
[3]   Mining and Construction of Information Opportunity Cooperation Mode Based on Big Data Fusion Internet of Things [J].
Chen, Difang ;
Xu, Yuhua ;
Luo, Shijun .
IEEE ACCESS, 2021, 9 :29401-29415
[4]  
Chunyan Z., 2014, J. Natl. School Admin, V2014, P5
[5]  
Daqi Z., 2002, J. Electron, V30, P221
[6]  
Editorial E., 2021, Serbian J. Electr. Eng, V18, P137
[7]   Data Mining and Fusion Techniques for WSNs as a Source of the Big Data [J].
Fouad, Mohamed Mostafa ;
Oweis, Nour E. ;
Gaber, Tarek ;
Ahmed, Maamoun ;
Snasel, Vaclav .
INTERNATIONAL CONFERENCE ON COMMUNICATIONS, MANAGEMENT, AND INFORMATION TECHNOLOGY (ICCMIT'2015), 2015, 65 :778-786
[8]  
Jian H., 2011, Commun. Technol, V2011, P163
[9]  
Jung Jeyong, 2020, [Korean Police Studies Review, 한국경찰연구], V19, P115, DOI 10.38084/2020.19.2.6
[10]  
Kai F., 2005, J. Nat. Disasters, V14, P5