Proceedings of the 2nd International Conference on Bigdata Blockchain and Economy Management, ICBBEM 2023, May 19–21, 2023, Hangzhou, China

Research Article

Application of Big Data Analysis Technology in Remote Network Attack Defense

Download139 downloads
  • @INPROCEEDINGS{10.4108/eai.19-5-2023.2334420,
        author={Lili  Gao},
        title={Application of Big Data Analysis Technology in Remote Network Attack Defense},
        proceedings={Proceedings of the 2nd International Conference on Bigdata Blockchain and Economy Management, ICBBEM 2023, May 19--21, 2023, Hangzhou, China},
        publisher={EAI},
        proceedings_a={ICBBEM},
        year={2023},
        month={7},
        keywords={big data remote network attack defense},
        doi={10.4108/eai.19-5-2023.2334420}
    }
    
  • Lili Gao
    Year: 2023
    Application of Big Data Analysis Technology in Remote Network Attack Defense
    ICBBEM
    EAI
    DOI: 10.4108/eai.19-5-2023.2334420
Lili Gao1,*
  • 1: Shandong Agriculture and Engineering University
*Contact email: gaolily@126.com

Abstract

In order to explore the application of remote network attack defense, a research on the application of big data analysis technology in remote network attack defense is put forward. Firstly, this paper describes that big data is a very advanced pattern recognition technology, which can find potential viruses or Trojans from massive network data resources. In this way, anti-virus defense software can be started in time to remove viruses or trojans from the network and ensure the normal operation of the network. Secondly, the basic theory of big data is described in detail, its application process in network security is analyzed, and an advanced network security defense model is constructed to improve the level of network security defense. Finally, using big data analysis technology, a new remote network attack defense software system is constructed, and global systematic attacks are added to the system to deal with them, so that various network threats can be perceived and corresponding interception treatment can be taken. After the defense function test, the response speed and interception rate of the system are ideal, and it can respond to network attacks in time, effectively ensuring network security.