Research on the Complex Computer Network Security Defense Strategy based on Cloud Computing Model and Big Data Environment

被引:0
作者
Wang, Xiaoyan [1 ]
机构
[1] Siping Vocat Coll, Siping 136002, Jilin, Peoples R China
来源
2015 2ND INTERNATIONAL SYMPOSIUM ON ENGINEERING TECHNOLOGY, EDUCATION AND MANAGEMENT (ISETEM 2015) | 2015年
关键词
Complex Computer Network; Security Defense Strategy; Cloud Computing; Big Data;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
In this paper, we conduct research on the complex computer network security defense strategy based on cloud computing model and big data environment. Because of the distributed application system design and implementation process the limitation of technology, it can't be one hundred percent perfect, there are hidden holes, with the rising of the hacker technology, software, existing vulnerabilities, has become a target for hackers if distributed application system in use process, can't to patch their these holes, once hacked, intrusion into the system which will produce an immeasurable loss. Due to network application system information data, should be based on the physical and logical network channel, in the process of transmission is very vulnerable to hacker attacks, lead to transport data tampering and theft. Therefore, in view of the network data transmission using encryption measures can effectively prevent data security which is meaningful.
引用
收藏
页码:165 / 170
页数:6
相关论文
共 3 条
  • [1] Chun-Liang L I, 2013, COMPUTER SIMULATION, V30, P1
  • [2] Zhou Y, 2013, COMPUTER SECURITY
  • [3] Zhu Y L, 2013, INFORM SECURITY TECH