当前位置>主页 > 期刊在线 > 信息安全 >

信息安全22年7期

基于大数据聚类算法的计算机网络信息安全防护研究
郭畅
(沈阳现代制造服务学校,辽宁 沈阳 110148)

摘  要:针对计算机网络信息存在的黑客攻击与篡改、病毒或木马程序入侵与窃取等风险,提出计算机网络信息安全防护方法。以民航空管部门值班记录数据为样本,采用大数据聚类算法,评估其计算机网络信息安全,并对其模拟仿真进行验证。研究结果表明,所提方法较适用于计算机网络安全的非线性特征,能够准确反映算机网络安全运行的状态,从而为防护工作提供了有效的思路与保障。


关键词:计算机;网络信息;安全防护;聚类算法



DOI:10.19850/j.cnki.2096-4706.2022.07.034


中图分类号:TP18                                          文献标识码:A                                     文章编号:2096-4706(2022)07-0141-03


Research on Computer Network Information Security Protection Based on Big Data Clustering Algorithm

GUO Chang

(Shenyang Modern Manufacturing Service School, Shenyang 110148, China)

Abstract: Aiming at the risks of hacker attack and tampering, virus or Trojan program intrusion and theft exiting in the computer network information, this paper puts forward computer network information security protection methods. It takes the duty record data of the civil aviation air traffic control department as the sample, uses the big data clustering algorithm to evaluate its computer network information security, and verifies it by analog simulation. The research results show that the method proposed in this paper is more suitable for the nonlinear characteristics of computer network security. And it can accurately reflect the safe operation state of computer network, so as to provide effective ideas and guarantee for protection work.

Keywords: computer; network information; safety protection; clustering algorithm


参考文献:

[1] GREAZZA A,DALLARI F,ROSSI T. Applying an integrated logistics network design and optimisation model:the Pirelli tyre case [J].International Journal of Production Research,2012,50(11):3021-3038.

[2] ZHAO Q P,SHI Y,LIU Q,et al. A grid-growing clustering algorithm for geo-spatial data [J].Pattern Recognition Letters,2015,53:77-84.

[3] 郭雯雯,邵全义 . 大数据聚类算法研究 [J]. 无线互联科技,2018,15(4):107-108.

[4] 李沛然,张富强 . 计算机网络信息安全防护策略及评估算法 [J]. 网络安全技术与应用,2021(8):22-23.

[5] 唐博海 . 计算机网络信息安全防护使用大数据聚类算法的策略分析 [J]. 通信电源技术,2021(18):155-157.

[6] 邹佳彬 . 顾及大数据聚类算法的计算机网络信息安全防护策略 [J]. 电子技术与软件工程,2021(18):237-238.


作者简介:郭畅(1981.03—),女,汉族,辽宁沈阳人,高级讲师,本科,研究方向:计算机。