Analysis of Computer Network Security and Countermeasure Based on Big Data-阿里云开发者社区

开发者社区> 无敌小将> 正文

Analysis of Computer Network Security and Countermeasure Based on Big Data

简介: Computer network security has existed since the birth of the network. But when the era of big data comes, this problem not only becomes more and more obvious, but also has a very close relationship with us. If the computer network has security problems

1. Overview of Computer Network Security in Large Data Environment

 (1) Main features of big data

The era of big data is an inevitable stage for the development of computer network technology to a certain extent, and it is also an inevitable trend of social development. In the era of big data, a great deal of information will be generated every day, which embodies the following three characteristics: first, the amount of data is very large, and the number of data stored and applied every day in the era of big data. Data volume is very huge, but also brought about constant changes in data statistics units, from the past MB to today's GB, TB and other data storage is increasing, all sectors of society have been further promoted by these data. Secondly, there are many kinds of data in the era of big data. Big data has no structural characteristics, and its data types are particularly complex. It must be processed by corresponding technical means in order to be effectively utilized. At present, various technical means to deal with large data are still developing, which also proves that large data has not been fully utilized and still has great value to be explored. Finally, the speed of data application in the era of big data is increasing. With the continuous development of technical means of processing and applying large data and the continuous progress of computer network technology, people can mine useful information in large data more quickly by corresponding means. At the same time, these information can be transmitted in real time, which lays a good foundation for the further development of large data1. In addition, in the process of development, social enterprises can quickly process and apply large data to predict the future direction of development, and then formulate more conducive to their own development strategy, so as to achieve the goal of rapidly occupying the market.

 (2) Computer Network Security in Big Data Environment

The computer network security in the big data environment is embodied in the following two aspects: first, the management system, refers to the formulation of corresponding management system for computer network security, so that the actual operation and related personnel can be effectively managed, so as to build a safe development environment for computer network. Secondly, information, refers to a great deal of information generated under the environment of big data every day. Besides promoting the development of computer networks, these information will also bring many security risks. Therefore, from the perspective of content, processing and application of information, we can improve the security of computer networks, so that sufficient guarantee for de development of computer network in the era of big data can be provided.

2. Factors of Network Security in the Age of Big Data

 (1) Computer system factors

In the era of big data, the development of computer network technology is rapid. However, technological means that can threaten computer systems have also developed rapidly, which determines that computer systems must be constantly improved and vulnerabilities patched in order to effectively resist threats. In addition, various kinds of software and hardware used in computer systems are also developing constantly, and these hardware and software installed in the same computer may have incompatible problems. Once these problems occur, it will not only affect the performance of the computer, but also easily lead to the collapse or information damage and loss to the system when dealing with large amounts of data, evidently, this will cause serious losses to users.

 (2) Information and data factors

Through the analysis above, we can see that in the era of big data, a large amount of data will be generated every day. At present, binary system is the main method to process and store these data, but using big data technology requires comprehensive processing and storage of different data. For a large number of mixed data, this method can easily lead to some data being destroyed, and then it cannot be applied any more. What is destroyed is some high-priced data, which will probably lead to very large losses.

 (3) Human factors

No matter what stage the computer network technology develops to, human factors are the main factors leading to its security problems. In addition to hacker attacks, human factors are also reflected in the following two aspects: first, operation and processing. If we want to make better use of big data, we must have corresponding operation technology. If there are defects in this aspect, we cannot excavate the potential value of big data, but also lead paralysis of computer network, loss and damage of data to it in the process of operation2. Secondly, in the process of people's daily application of computer networks, it is very likely to unintentionally leak some information that has a great impact on us, which is likely to be used by interested people, and then pose a threat to us.

3. Computer Network Security Analysis in the Age of Big Data

Globally speaking, China is the most vulnerable to cyber-attacks. China's cyber-attacks are mainly concentrated in developed coastal areas, such as Shanghai and Guangdong, which are often attacked from home and abroad. According to statistics, attacks on computer networks in 2018 increased by as much as 200% compared with the same year. Among them, medium-sized attacks grew by as much as 120% and large-scale attacks by as much as 80%. Of all the industries that have received cyber-attacks, the gaming and financial industries remain high, while attacks on government websites continue to rise (see table 1).

Table 1 A Brief Introduction to Network Attacks

Types of Network Attacks

Growth ratio



Large-scale attacks


Game and financial industry, government website

Developed coastal areas

Medium-sized attacks


4. Countermeasures for Computer Network Security Based on Big Data

 (1) Optimizing and innovating computer network technology

First of all, the upgrading of computer network technology should be optimized, and the firewall and security protection house arrest in computer network system should be continuously improved. Based on the current computer and network technology, the most effective way to improve security is to improve the function of firewall and the means of security detection. The current computer technology can be used to upgrade the system firewall and security protection software, so that the related factors threatening the computer network system can be found in time and dealt with in time. In addition, in order to ensure the function of firewall and security protection software, it is necessary to update it regularly, and to improve the specific means of defense, so that it can be more targeted to prevent dangerous factors. Secondly, the research and development of computer should be optimized, which means to enhance the compatibility of computer network system both software and hardware, so as to avoid the system crash and data damage caused by incompatibility, and at the same time, we should constantly repair the system vulnerabilities caused by technological progress in this process, so as to make greater security.

 (2) Preventing attacks

Massive information generated in the era of big data has great potential value, and these values have also attracted the attention of interested people. For example, network hackers can make profits by stealing corresponding information, so network hackers have become a security hazard that must be prevented in the era of big data. In order to resist hackers' network attacks effectively, we can build defense models for different attack modes in computer network system, so that when the system is attacked, we can use corresponding means to stop it quickly and reduce the losses caused by hackers' attacks. In addition, most hacker attacks are caused by Trojan horses or viruses, so the anti-virus software in the system should be updated in real time to ensure that the virus library has the latest Trojan horse and viral information, as well as to scan and alarm potential Trojan horse viruses, so as to eliminate the problem of the system being attacked from the root.

 (3) Dealing with security issues from the perspective of personnel

It is necessary and effective to improve the security of computer network system from the perspective of personnel, it can be done from the following two aspects: First of all, the operator of the computer, if the computer operator's safety awareness is high enough, then it can operate under the requirements of the computer's safety operating rules, and can also improve the computer's defense ability. Computer operators' awareness of network security should be strengthened, so that they can avoid clicking on some automatically pop-up links and pictures in the process of using the network, and also avoid visiting some websites with Trojan horses and viruses3. In addition, to enhance the operator's security awareness, it is also necessary to make them know how to use antivirus software and system firewall effectively, and know how to upgrade relevant software and firewall regularly. Secondly, the training of computer professionals should be strengthened to solve various security problems in computer networks through professionals, which can promote the effective improvement of computer network security and realize the sustainable development of computer network technology in the era of big data.

Conclusion: To sum up, China's network environment is relatively vulnerable, especially in the current era of big data, the explosive growth of information has also increased the probability of computer network system security problems, so it is necessary to improve the security of computer network system, so as to ensure the sustainable development of our society.


[1] Wang Ronghua. Computer network security and Countermeasures Analysis Based on big data [J]. Journal of Jilin Radio and Television University, 2018, 20 (10): 13-14.            

[2] Fu Wei. Computer network security countermeasures based on big data background [J]. Farmer's Staff, 2017, 09 (24): 239-239.            

[3] Wang Qian, Pan Chen. Analysis of network security vulnerabilities and preventive measures based on the era of big data [J]. Network security technology and application, 2017, 18 (2): 56-59.             

[4] He Xiao. Implementation Strategy of Computer Network Information Security and Protection Measures under the Background of Big Data [J]. Art Science and Technology, 2019, 32 (07): 284-285.             

[5] Zhang Xinglin. Research on Computer Network Security and Preventive Measures in Big Data Era [J]. Information and Computer (Theoretical Edition), 2019 (12): 219-220.


如果在创建实例时没有设置密码,或者密码丢失,您可以在控制台上重新设置实例的登录密码。本文仅描述如何在 ECS 管理控制台上修改实例登录密码。
4092 0
阿里云服务器初级使用者可能面临的问题之一. 使用tomcat或者其他服务器软件设置端口号后,比如 一些不是默认的, mysql的 3306, mssql的1433,有时候打不开网页, 原因是没有在ecs安全组去设置这个端口号. 解决: 点击ecs下网络和安全下的安全组 在弹出的安全组中,如果没有就新建安全组,然后点击配置规则 最后如上图点击添加...或快速创建.   have fun!  将编程看作是一门艺术,而不单单是个技术。
4538 0
7946 0
windows server 2008阿里云ECS服务器安全设置
最近我们Sinesafe安全公司在为客户使用阿里云ecs服务器做安全的过程中,发现服务器基础安全性都没有做。为了为站长们提供更加有效的安全基础解决方案,我们Sinesafe将对阿里云服务器win2008 系统进行基础安全部署实战过程! 比较重要的几部分 1.
5492 0
购买阿里云ECS云服务器后如何登录?场景不同,阿里云优惠总结大概有三种登录方式: 登录到ECS云服务器控制台 在ECS云服务器控制台用户可以更改密码、更换系.
5752 0
虽然0.0.0.0/0使用非常方便,但是发现很多同学使用它来做内网互通,这是有安全风险的,实例有可能会在经典网络被内网IP访问到。下面介绍一下四种安全的内网互联设置方法。 购买前请先:领取阿里云幸运券,有很多优惠,可到下文中领取。
9461 0
腾讯云服务器 设置ngxin + fastdfs +tomcat 开机自启动
在tomcat中新建一个可以启动的 .sh 脚本文件 /usr/local/tomcat7/bin/ export JAVA_HOME=/usr/local/java/jdk7 export PATH=$JAVA_HOME/bin/:$PATH export CLASSPATH=.
2188 0
1141 0
网络/信息安全/网络规划设计师、CISP、ACA(全科目)/ACP(云计算/云安全/大数据)/ACE、MVP等。拥有 PRINCE2 专家级、ITIL、ISO27001等多项国际认证。 发表数篇学术文章在国内/国际期刊、书籍,拥有多项发明专利。主要研究DevSecOps、信息安全及区块链。