Application of Big Data Analysis and Cloud Computing Technology
While networks bring convenience to people, more attention must be paid to the security of the network platform. This study combines big-data technology and machine learning (ML) to investigate the application of big-data analysis and cloud-computing technology in network security. First, the data-c...
Saved in:
| Published in | International journal of grid and high performance computing Vol. 16; no. 1; pp. 1 - 19 |
|---|---|
| Main Author | |
| Format | Journal Article |
| Language | English |
| Published |
01.01.2024
|
| Online Access | Get full text |
| ISSN | 1938-0259 1938-0267 1938-0267 |
| DOI | 10.4018/IJGHPC.349891 |
Cover
| Abstract | While networks bring convenience to people, more attention must be paid to the security of the network platform. This study combines big-data technology and machine learning (ML) to investigate the application of big-data analysis and cloud-computing technology in network security. First, the data-collection technology of abnormal network behavior is introduced, and the Flume data-collection component and Kafka distributed technology are discussed. Second, the data-processing process of abnormal network behavior and the corresponding algorithm processing are analyzed. Finally, an abnormal network behavior detection model based on big data is constructed and compared with related models based on decision-tree and random-forest (RF) algorithms. The experimental results show that the big-data anomalous network behavior detection technology based on the ML framework can effectively improve the type and efficiency of anomalous network behavior detection, which is of some significance for improving the network security control capability. |
|---|---|
| AbstractList | While networks bring convenience to people, more attention must be paid to the security of the network platform. This study combines big-data technology and machine learning (ML) to investigate the application of big-data analysis and cloud-computing technology in network security. First, the data-collection technology of abnormal network behavior is introduced, and the Flume data-collection component and Kafka distributed technology are discussed. Second, the data-processing process of abnormal network behavior and the corresponding algorithm processing are analyzed. Finally, an abnormal network behavior detection model based on big data is constructed and compared with related models based on decision-tree and random-forest (RF) algorithms. The experimental results show that the big-data anomalous network behavior detection technology based on the ML framework can effectively improve the type and efficiency of anomalous network behavior detection, which is of some significance for improving the network security control capability. |
| Author | Guo, Dajun |
| Author_xml | – sequence: 1 givenname: Dajun surname: Guo fullname: Guo, Dajun |
| BookMark | eNplUDtPwzAYtFCRaAsju_9Aih952BMqgT5QJRjKHH1x7NSVa0dJKpR_T1GAheXuhruT7mZo4oPXCN1TsogJFQ_b1_XmPV_wWApJr9CUSi4iwtJs8qcTeYNmXXckJI0ZFVP0uGwaZxX0NngcDH6yNX6GHvDSgxs622HwFc5dOF8wnJpzb32N91odfHChHm7RtQHX6bsfnqOP1cs-30S7t_U2X-4ixTjrI660VGAEUJ7qjJWcS2MENRmDLAWmNU9lXCYlEJloYhJJSlWxyoCqBDOM8TlajL1n38DwCc4VTWtP0A4FJcX3_MIe60OjinH-JRCNAdWGrmu1-ecf7_r1fwEBAV8R |
| Cites_doi | 10.37745/ejcsit2013/vol12n16882 10.1080/08874417.2023.2176946 10.3390/systems12020058 10.51594/csitrj.v5i3.861 10.1007/s11082-023-05715-7 10.54097/astapa66 10.1007/s11082-023-05672-1 10.51594/ijmer.v6i1.711 10.1080/01969722.2022.2103231 10.1002/gch2.202300163 10.47191/ijcsrr/V7-i1-07 10.1007/s11704-022-2193-3 10.54097/0bxv5b71 10.1080/00207543.2023.2179346 10.54097/40w79j67 10.47992/IJAEML.2581.7000.0213 10.4018/IJISSCM.338380 |
| ContentType | Journal Article |
| DBID | AAYXX CITATION ADTOC UNPAY |
| DOI | 10.4018/IJGHPC.349891 |
| DatabaseName | CrossRef Unpaywall for CDI: Periodical Content Unpaywall |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | CrossRef |
| Database_xml | – sequence: 1 dbid: UNPAY name: Unpaywall url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/ sourceTypes: Open Access Repository |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 1938-0267 |
| EndPage | 19 |
| ExternalDocumentID | 10.4018/ijghpc.349891 10_4018_IJGHPC_349891 |
| GroupedDBID | 0R~ 4.4 AAYVP AAYXX ABEPT ABJCF ABPHS ACOJC AFKRA ALMA_UNASSIGNED_HOLDINGS ARAPS BAAKF BENPR BGLVJ BTFVE BYHXH CBWLS CCPQU CDTDJ CIGCI CITATION CKMBR CNQXE COVLG CTSEY EBS H13 HCIFZ HZ~ IAO ICD ITC K7- M7S MV1 N95 NEEBM O9- PHGZM PHGZT PQGLB PTHSS PUEGO RIF ADTOC EJD UNPAY |
| ID | FETCH-LOGICAL-c232t-3ce9caf8a136e72b339ff81f72a76a2ee3694b5ba095e0f590bcd2dfacd82f223 |
| IEDL.DBID | UNPAY |
| ISSN | 1938-0259 1938-0267 |
| IngestDate | Tue Aug 19 18:21:50 EDT 2025 Wed Oct 01 02:02:06 EDT 2025 |
| IsDoiOpenAccess | false |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 1 |
| Language | English |
| License | http://creativecommons.org/licenses/by/3.0/deed.en_US cc-by |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c232t-3ce9caf8a136e72b339ff81f72a76a2ee3694b5ba095e0f590bcd2dfacd82f223 |
| OpenAccessLink | https://proxy.k.utb.cz/login?url=https://doi.org/10.4018/ijghpc.349891 |
| PageCount | 19 |
| ParticipantIDs | unpaywall_primary_10_4018_ijghpc_349891 crossref_primary_10_4018_IJGHPC_349891 |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | 2024-01-01 |
| PublicationDateYYYYMMDD | 2024-01-01 |
| PublicationDate_xml | – month: 01 year: 2024 text: 2024-01-01 day: 01 |
| PublicationDecade | 2020 |
| PublicationTitle | International journal of grid and high performance computing |
| PublicationYear | 2024 |
| References | IJGHPC.349891-13 IJGHPC.349891-12 IJGHPC.349891-20 F. T. M.Ayasrah (IJGHPC.349891-4) 2024; 12 A.Mohammed (IJGHPC.349891-8) 2024; 8 IJGHPC.349891-10 E.Omar (IJGHPC.349891-11) 2024; 2 IJGHPC.349891-21 M. S.Namose (IJGHPC.349891-9) 2024; 12 IJGHPC.349891-7 IJGHPC.349891-6 IJGHPC.349891-5 K. R.Reddy (IJGHPC.349891-14) 2024; 12 IJGHPC.349891-19 IJGHPC.349891-3 IJGHPC.349891-17 IJGHPC.349891-2 IJGHPC.349891-18 IJGHPC.349891-1 IJGHPC.349891-15 IJGHPC.349891-0 IJGHPC.349891-16 |
| References_xml | – ident: IJGHPC.349891-0 doi: 10.37745/ejcsit2013/vol12n16882 – ident: IJGHPC.349891-3 doi: 10.1080/08874417.2023.2176946 – ident: IJGHPC.349891-6 doi: 10.3390/systems12020058 – ident: IJGHPC.349891-10 doi: 10.51594/csitrj.v5i3.861 – ident: IJGHPC.349891-13 doi: 10.1007/s11082-023-05715-7 – ident: IJGHPC.349891-18 doi: 10.54097/astapa66 – ident: IJGHPC.349891-5 doi: 10.1007/s11082-023-05672-1 – volume: 8 start-page: 1 issue: 2 year: 2024 ident: IJGHPC.349891-8 article-title: Leveraging big data analytics to drive data-based policy making for improved government services delivery in Nigeria. publication-title: Journal of Empirical Social Science Studies – ident: IJGHPC.349891-12 doi: 10.51594/ijmer.v6i1.711 – volume: 12 start-page: 591 year: 2024 ident: IJGHPC.349891-4 article-title: IoT integration for machine learning system using big data processing. publication-title: International Journal of Intelligent Systems and Applications in Engineering – ident: IJGHPC.349891-17 doi: 10.1080/01969722.2022.2103231 – ident: IJGHPC.349891-20 doi: 10.1002/gch2.202300163 – ident: IJGHPC.349891-1 doi: 10.47191/ijcsrr/V7-i1-07 – volume: 12 start-page: 809 year: 2024 ident: IJGHPC.349891-9 article-title: Exploring unconventional sources in big data: A comprehensive data lifecycle for social and economic analysis. publication-title: International Journal of Intelligent Systems and Applications in Engineering – ident: IJGHPC.349891-15 doi: 10.1007/s11704-022-2193-3 – ident: IJGHPC.349891-21 doi: 10.54097/0bxv5b71 – ident: IJGHPC.349891-7 doi: 10.1080/00207543.2023.2179346 – ident: IJGHPC.349891-16 doi: 10.54097/40w79j67 – ident: IJGHPC.349891-2 doi: 10.47992/IJAEML.2581.7000.0213 – ident: IJGHPC.349891-19 doi: 10.4018/IJISSCM.338380 – volume: 12 start-page: 600 year: 2024 ident: IJGHPC.349891-14 article-title: IoT-driven big data analytic to automate blockchain adaptation. publication-title: International Journal of Intelligent Systems and Applications in Engineering – volume: 2 start-page: 1 issue: 2 year: 2024 ident: IJGHPC.349891-11 article-title: Big data analytics in Libyan healthcare: Potential and challenges. publication-title: Journal of Reproducible Research |
| SSID | ssj0064218 |
| Score | 2.2641394 |
| Snippet | While networks bring convenience to people, more attention must be paid to the security of the network platform. This study combines big-data technology and... |
| SourceID | unpaywall crossref |
| SourceType | Open Access Repository Index Database |
| StartPage | 1 |
| Title | Application of Big Data Analysis and Cloud Computing Technology |
| URI | https://doi.org/10.4018/ijghpc.349891 |
| UnpaywallVersion | publishedVersion |
| Volume | 16 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: http://www.proquest.com/pqcentral?accountid=15518 eissn: 1938-0267 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0064218 issn: 1938-0259 databaseCode: BENPR dateStart: 20230101 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjZ3PT8IwFMcbAwe9iD8j_iA9GD0Vt3br1pMBBJFEQowkeiL9iSgZxGwx-tfbuU1QDnppdnhNmm_avU_7-l4BOFWeotTRGnHH5cjTlCHmY4WY0Y5rlLF_wDRR-LZPu0Ov9-A_5Jdo0lyYpfi9Jf_wYvI8fprLOvFYmOaol6lvkbsEysP-oPGYRYxDZP02W3zTIKuludr_h-9ZT6I5f3_j0-mSQ-lUQKcYSnaP5KWexKIuP35VafxzrFtgM0dK2MjmwDZY09EOqBTPNcB89e6Cy8YiWA1nBjYnY3jFYw6LwiSQRwq2prPEtl-9rVuDi7P3PTDstO9bXZS_n4Ck5aQYEamZ5CbkLqE6wIIQZkzomgDzgHKsNaHME77gFrO0Y3zmCKmwMlyqEBvLDfugFM0ifQCg0paTsCM9w1zPSMEDQiQPAqOVFh4nVXBWKDuaZ2UyRnZ7kcoyuulddwetUSZLFZx_675imQmYWx7-2_IIbGCLGtnByDEoxa-JPrGoEIsaKDfb_cFdLZ8wn3KlvX8 |
| linkProvider | Unpaywall |
| linkToUnpaywall | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjZ3PT8IwFMcbAwe9iD8j_koPRk_Fbe269WQQRSSRcJBET6Q_ESWDmC1G_3o7uwnKQS_NDq9J802792lf3ysAJ4ooSj2tEfd8joimDLEwUIgZ7flGGfsHzBOF73q0MyDdh_ChuEST58IsxO8t-cfn4-fR00w2MGFxnqNepaFF7gqoDnr95qOLGMfI-m02_6aRq6W53P-H71nNkhl_f-OTyYJDaddAuxyKu0fy0shS0ZAfv6o0_jnWDbBeICVsujmwCVZ0sgVq5XMNsFi92-CiOQ9Ww6mBl-MRvOIph2VhEsgTBVuTaWbbr97WrcH52fsOGLSv71sdVLyfgKTlpBRhqZnkJuY-pjoKBMbMmNg3UcAjygOtMWVEhIJbzNKeCZknpAqU4VLFgbHcsAsqyTTRewAqbTkp8CQxzCdGCh5hLHkUGa20IBzXwWmp7HDmymQM7fYil2V4273p9FtDJ0sdnH3rvmTpBCws9_9teQDWAosa7mDkEFTS10wfWVRIxXExUT4Bjou75Q |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Application+of+Big+Data+Analysis+and+Cloud+Computing+Technology&rft.jtitle=International+journal+of+grid+and+high+performance+computing&rft.au=Guo%2C+Dajun&rft.date=2024-01-01&rft.issn=1938-0259&rft.eissn=1938-0267&rft.volume=16&rft.issue=1&rft.spage=1&rft.epage=19&rft_id=info:doi/10.4018%2FIJGHPC.349891&rft.externalDBID=n%2Fa&rft.externalDocID=10_4018_IJGHPC_349891 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1938-0259&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1938-0259&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1938-0259&client=summon |