Application of Big Data Analysis and Cloud Computing Technology

While networks bring convenience to people, more attention must be paid to the security of the network platform. This study combines big-data technology and machine learning (ML) to investigate the application of big-data analysis and cloud-computing technology in network security. First, the data-c...

Full description

Saved in:
Bibliographic Details
Published inInternational journal of grid and high performance computing Vol. 16; no. 1; pp. 1 - 19
Main Author Guo, Dajun
Format Journal Article
LanguageEnglish
Published 01.01.2024
Online AccessGet full text
ISSN1938-0259
1938-0267
1938-0267
DOI10.4018/IJGHPC.349891

Cover

Abstract While networks bring convenience to people, more attention must be paid to the security of the network platform. This study combines big-data technology and machine learning (ML) to investigate the application of big-data analysis and cloud-computing technology in network security. First, the data-collection technology of abnormal network behavior is introduced, and the Flume data-collection component and Kafka distributed technology are discussed. Second, the data-processing process of abnormal network behavior and the corresponding algorithm processing are analyzed. Finally, an abnormal network behavior detection model based on big data is constructed and compared with related models based on decision-tree and random-forest (RF) algorithms. The experimental results show that the big-data anomalous network behavior detection technology based on the ML framework can effectively improve the type and efficiency of anomalous network behavior detection, which is of some significance for improving the network security control capability.
AbstractList While networks bring convenience to people, more attention must be paid to the security of the network platform. This study combines big-data technology and machine learning (ML) to investigate the application of big-data analysis and cloud-computing technology in network security. First, the data-collection technology of abnormal network behavior is introduced, and the Flume data-collection component and Kafka distributed technology are discussed. Second, the data-processing process of abnormal network behavior and the corresponding algorithm processing are analyzed. Finally, an abnormal network behavior detection model based on big data is constructed and compared with related models based on decision-tree and random-forest (RF) algorithms. The experimental results show that the big-data anomalous network behavior detection technology based on the ML framework can effectively improve the type and efficiency of anomalous network behavior detection, which is of some significance for improving the network security control capability.
Author Guo, Dajun
Author_xml – sequence: 1
  givenname: Dajun
  surname: Guo
  fullname: Guo, Dajun
BookMark eNplUDtPwzAYtFCRaAsju_9Aih952BMqgT5QJRjKHH1x7NSVa0dJKpR_T1GAheXuhruT7mZo4oPXCN1TsogJFQ_b1_XmPV_wWApJr9CUSi4iwtJs8qcTeYNmXXckJI0ZFVP0uGwaZxX0NngcDH6yNX6GHvDSgxs622HwFc5dOF8wnJpzb32N91odfHChHm7RtQHX6bsfnqOP1cs-30S7t_U2X-4ixTjrI660VGAEUJ7qjJWcS2MENRmDLAWmNU9lXCYlEJloYhJJSlWxyoCqBDOM8TlajL1n38DwCc4VTWtP0A4FJcX3_MIe60OjinH-JRCNAdWGrmu1-ecf7_r1fwEBAV8R
Cites_doi 10.37745/ejcsit2013/vol12n16882
10.1080/08874417.2023.2176946
10.3390/systems12020058
10.51594/csitrj.v5i3.861
10.1007/s11082-023-05715-7
10.54097/astapa66
10.1007/s11082-023-05672-1
10.51594/ijmer.v6i1.711
10.1080/01969722.2022.2103231
10.1002/gch2.202300163
10.47191/ijcsrr/V7-i1-07
10.1007/s11704-022-2193-3
10.54097/0bxv5b71
10.1080/00207543.2023.2179346
10.54097/40w79j67
10.47992/IJAEML.2581.7000.0213
10.4018/IJISSCM.338380
ContentType Journal Article
DBID AAYXX
CITATION
ADTOC
UNPAY
DOI 10.4018/IJGHPC.349891
DatabaseName CrossRef
Unpaywall for CDI: Periodical Content
Unpaywall
DatabaseTitle CrossRef
DatabaseTitleList CrossRef
Database_xml – sequence: 1
  dbid: UNPAY
  name: Unpaywall
  url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/
  sourceTypes: Open Access Repository
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1938-0267
EndPage 19
ExternalDocumentID 10.4018/ijghpc.349891
10_4018_IJGHPC_349891
GroupedDBID 0R~
4.4
AAYVP
AAYXX
ABEPT
ABJCF
ABPHS
ACOJC
AFKRA
ALMA_UNASSIGNED_HOLDINGS
ARAPS
BAAKF
BENPR
BGLVJ
BTFVE
BYHXH
CBWLS
CCPQU
CDTDJ
CIGCI
CITATION
CKMBR
CNQXE
COVLG
CTSEY
EBS
H13
HCIFZ
HZ~
IAO
ICD
ITC
K7-
M7S
MV1
N95
NEEBM
O9-
PHGZM
PHGZT
PQGLB
PTHSS
PUEGO
RIF
ADTOC
EJD
UNPAY
ID FETCH-LOGICAL-c232t-3ce9caf8a136e72b339ff81f72a76a2ee3694b5ba095e0f590bcd2dfacd82f223
IEDL.DBID UNPAY
ISSN 1938-0259
1938-0267
IngestDate Tue Aug 19 18:21:50 EDT 2025
Wed Oct 01 02:02:06 EDT 2025
IsDoiOpenAccess false
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 1
Language English
License http://creativecommons.org/licenses/by/3.0/deed.en_US
cc-by
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c232t-3ce9caf8a136e72b339ff81f72a76a2ee3694b5ba095e0f590bcd2dfacd82f223
OpenAccessLink https://proxy.k.utb.cz/login?url=https://doi.org/10.4018/ijghpc.349891
PageCount 19
ParticipantIDs unpaywall_primary_10_4018_ijghpc_349891
crossref_primary_10_4018_IJGHPC_349891
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2024-01-01
PublicationDateYYYYMMDD 2024-01-01
PublicationDate_xml – month: 01
  year: 2024
  text: 2024-01-01
  day: 01
PublicationDecade 2020
PublicationTitle International journal of grid and high performance computing
PublicationYear 2024
References IJGHPC.349891-13
IJGHPC.349891-12
IJGHPC.349891-20
F. T. M.Ayasrah (IJGHPC.349891-4) 2024; 12
A.Mohammed (IJGHPC.349891-8) 2024; 8
IJGHPC.349891-10
E.Omar (IJGHPC.349891-11) 2024; 2
IJGHPC.349891-21
M. S.Namose (IJGHPC.349891-9) 2024; 12
IJGHPC.349891-7
IJGHPC.349891-6
IJGHPC.349891-5
K. R.Reddy (IJGHPC.349891-14) 2024; 12
IJGHPC.349891-19
IJGHPC.349891-3
IJGHPC.349891-17
IJGHPC.349891-2
IJGHPC.349891-18
IJGHPC.349891-1
IJGHPC.349891-15
IJGHPC.349891-0
IJGHPC.349891-16
References_xml – ident: IJGHPC.349891-0
  doi: 10.37745/ejcsit2013/vol12n16882
– ident: IJGHPC.349891-3
  doi: 10.1080/08874417.2023.2176946
– ident: IJGHPC.349891-6
  doi: 10.3390/systems12020058
– ident: IJGHPC.349891-10
  doi: 10.51594/csitrj.v5i3.861
– ident: IJGHPC.349891-13
  doi: 10.1007/s11082-023-05715-7
– ident: IJGHPC.349891-18
  doi: 10.54097/astapa66
– ident: IJGHPC.349891-5
  doi: 10.1007/s11082-023-05672-1
– volume: 8
  start-page: 1
  issue: 2
  year: 2024
  ident: IJGHPC.349891-8
  article-title: Leveraging big data analytics to drive data-based policy making for improved government services delivery in Nigeria.
  publication-title: Journal of Empirical Social Science Studies
– ident: IJGHPC.349891-12
  doi: 10.51594/ijmer.v6i1.711
– volume: 12
  start-page: 591
  year: 2024
  ident: IJGHPC.349891-4
  article-title: IoT integration for machine learning system using big data processing.
  publication-title: International Journal of Intelligent Systems and Applications in Engineering
– ident: IJGHPC.349891-17
  doi: 10.1080/01969722.2022.2103231
– ident: IJGHPC.349891-20
  doi: 10.1002/gch2.202300163
– ident: IJGHPC.349891-1
  doi: 10.47191/ijcsrr/V7-i1-07
– volume: 12
  start-page: 809
  year: 2024
  ident: IJGHPC.349891-9
  article-title: Exploring unconventional sources in big data: A comprehensive data lifecycle for social and economic analysis.
  publication-title: International Journal of Intelligent Systems and Applications in Engineering
– ident: IJGHPC.349891-15
  doi: 10.1007/s11704-022-2193-3
– ident: IJGHPC.349891-21
  doi: 10.54097/0bxv5b71
– ident: IJGHPC.349891-7
  doi: 10.1080/00207543.2023.2179346
– ident: IJGHPC.349891-16
  doi: 10.54097/40w79j67
– ident: IJGHPC.349891-2
  doi: 10.47992/IJAEML.2581.7000.0213
– ident: IJGHPC.349891-19
  doi: 10.4018/IJISSCM.338380
– volume: 12
  start-page: 600
  year: 2024
  ident: IJGHPC.349891-14
  article-title: IoT-driven big data analytic to automate blockchain adaptation.
  publication-title: International Journal of Intelligent Systems and Applications in Engineering
– volume: 2
  start-page: 1
  issue: 2
  year: 2024
  ident: IJGHPC.349891-11
  article-title: Big data analytics in Libyan healthcare: Potential and challenges.
  publication-title: Journal of Reproducible Research
SSID ssj0064218
Score 2.2641394
Snippet While networks bring convenience to people, more attention must be paid to the security of the network platform. This study combines big-data technology and...
SourceID unpaywall
crossref
SourceType Open Access Repository
Index Database
StartPage 1
Title Application of Big Data Analysis and Cloud Computing Technology
URI https://doi.org/10.4018/ijghpc.349891
UnpaywallVersion publishedVersion
Volume 16
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVPQU
  databaseName: ProQuest Central
  customDbUrl: http://www.proquest.com/pqcentral?accountid=15518
  eissn: 1938-0267
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0064218
  issn: 1938-0259
  databaseCode: BENPR
  dateStart: 20230101
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjZ3PT8IwFMcbAwe9iD8j_iA9GD0Vt3br1pMBBJFEQowkeiL9iSgZxGwx-tfbuU1QDnppdnhNmm_avU_7-l4BOFWeotTRGnHH5cjTlCHmY4WY0Y5rlLF_wDRR-LZPu0Ov9-A_5Jdo0lyYpfi9Jf_wYvI8fprLOvFYmOaol6lvkbsEysP-oPGYRYxDZP02W3zTIKuludr_h-9ZT6I5f3_j0-mSQ-lUQKcYSnaP5KWexKIuP35VafxzrFtgM0dK2MjmwDZY09EOqBTPNcB89e6Cy8YiWA1nBjYnY3jFYw6LwiSQRwq2prPEtl-9rVuDi7P3PTDstO9bXZS_n4Ck5aQYEamZ5CbkLqE6wIIQZkzomgDzgHKsNaHME77gFrO0Y3zmCKmwMlyqEBvLDfugFM0ifQCg0paTsCM9w1zPSMEDQiQPAqOVFh4nVXBWKDuaZ2UyRnZ7kcoyuulddwetUSZLFZx_675imQmYWx7-2_IIbGCLGtnByDEoxa-JPrGoEIsaKDfb_cFdLZ8wn3KlvX8
linkProvider Unpaywall
linkToUnpaywall http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjZ3PT8IwFMcbAwe9iD8j_koPRk_Fbe269WQQRSSRcJBET6Q_ESWDmC1G_3o7uwnKQS_NDq9J802792lf3ysAJ4ooSj2tEfd8joimDLEwUIgZ7flGGfsHzBOF73q0MyDdh_ChuEST58IsxO8t-cfn4-fR00w2MGFxnqNepaFF7gqoDnr95qOLGMfI-m02_6aRq6W53P-H71nNkhl_f-OTyYJDaddAuxyKu0fy0shS0ZAfv6o0_jnWDbBeICVsujmwCVZ0sgVq5XMNsFi92-CiOQ9Ww6mBl-MRvOIph2VhEsgTBVuTaWbbr97WrcH52fsOGLSv71sdVLyfgKTlpBRhqZnkJuY-pjoKBMbMmNg3UcAjygOtMWVEhIJbzNKeCZknpAqU4VLFgbHcsAsqyTTRewAqbTkp8CQxzCdGCh5hLHkUGa20IBzXwWmp7HDmymQM7fYil2V4273p9FtDJ0sdnH3rvmTpBCws9_9teQDWAosa7mDkEFTS10wfWVRIxXExUT4Bjou75Q
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Application+of+Big+Data+Analysis+and+Cloud+Computing+Technology&rft.jtitle=International+journal+of+grid+and+high+performance+computing&rft.au=Guo%2C+Dajun&rft.date=2024-01-01&rft.issn=1938-0259&rft.eissn=1938-0267&rft.volume=16&rft.issue=1&rft.spage=1&rft.epage=19&rft_id=info:doi/10.4018%2FIJGHPC.349891&rft.externalDBID=n%2Fa&rft.externalDocID=10_4018_IJGHPC_349891
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1938-0259&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1938-0259&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1938-0259&client=summon