Open Access

Research on the Impact of Combining Big Data and Deep Learning Technology on Network Security Information Security Protection

  
Mar 19, 2025

Cite
Download Cover

Shiravi, H., Shiravi, A., & Ghorbani, A. A. (2011). A survey of visualization systems for network security. IEEE Transactions on visualization and computer graphics, 18(8), 1313-1329. Shiravi H. Shiravi A. Ghorbani A. A. ( 2011 ). A survey of visualization systems for network security . IEEE Transactions on visualization and computer graphics , 18 ( 8 ), 1313 - 1329 . Search in Google Scholar

Mistry, H. K., Mavani, C., Goswami, A., & Patel, R. (2024). A Survey Visualization Systems For Network Security. Educational Administration: Theory and Practice, 30(7), 805-812. Mistry H. K. Mavani C. Goswami A. Patel R. ( 2024 ). A Survey Visualization Systems For Network Security . Educational Administration: Theory and Practice , 30 ( 7 ), 805 - 812 . Search in Google Scholar

Parvin, S., Hussain, F. K., Hussain, O. K., Han, S., Tian, B., & Chang, E. (2012). Cognitive radio network security: A survey. Journal of Network and Computer Applications, 35(6), 1691-1708. Parvin S. Hussain F. K. Hussain O. K. Han S. Tian B. Chang E. ( 2012 ). Cognitive radio network security: A survey . Journal of Network and Computer Applications , 35 ( 6 ), 1691 - 1708 . Search in Google Scholar

Acemoglu, D., Malekian, A., & Ozdaglar, A. (2016). Network security and contagion. Journal of Economic Theory, 166, 536-585. Acemoglu D. Malekian A. Ozdaglar A. ( 2016 ). Network security and contagion . Journal of Economic Theory , 166 , 536 - 585 . Search in Google Scholar

Kaur, G. (2016). Network Security: Anti-virus. International Journal of Advanced Research in Computer Science, 7(6). Kaur G. ( 2016 ). Network Security: Anti-virus . International Journal of Advanced Research in Computer Science , 7 ( 6 ). Search in Google Scholar

Petrenko, S. A., & Makoveichuk, K. A. (2017). Big data technologies for cybersecurity. In CEUR workshop (pp. 107-111). Petrenko S. A. Makoveichuk K. A. ( 2017 ). Big data technologies for cybersecurity . In CEUR workshop (pp. 107 - 111 ). Search in Google Scholar

Alazab, M., & Tang, M. (Eds.). (2019). Deep learning applications for cyber security. Springer. Alazab M. Tang M. (Eds.). ( 2019 ). Deep learning applications for cyber security . Springer . Search in Google Scholar

Alani, M. M. (2021). Big data in cybersecurity: a survey of applications and future trends. Journal of Reliable Intelligent Environments, 7(2), 85-114. Alani M. M. ( 2021 ). Big data in cybersecurity: a survey of applications and future trends . Journal of Reliable Intelligent Environments , 7 ( 2 ), 85 - 114 . Search in Google Scholar

Mahmood, T., & Afzal, U. (2013, December). Security analytics: Big data analytics for cybersecurity: A review of trends, techniques and tools. In 2013 2nd national conference on Information assurance (ncia) (pp. 129-134). IEEE. Mahmood T. Afzal U. ( 2013 , December ). Security analytics: Big data analytics for cybersecurity: A review of trends, techniques and tools . In 2013 2nd national conference on Information assurance (ncia) (pp. 129 - 134 ). IEEE . Search in Google Scholar

Kotenko, I., Saenko, I., & Branitskiy, A. (2020). Machine learning and big data processing for cybersecurity data analysis. Data science in cybersecurity and cyberthreat intelligence, 61-85. Kotenko I. Saenko I. Branitskiy A. ( 2020 ). Machine learning and big data processing for cybersecurity data analysis . Data science in cybersecurity and cyberthreat intelligence , 61 - 85 . Search in Google Scholar

Ullah, F., & Babar, M. A. (2019). Architectural tactics for big data cybersecurity analytics systems: a review. Journal of Systems and Software, 151, 81-118. Ullah F. Babar M. A. ( 2019 ). Architectural tactics for big data cybersecurity analytics systems: a review . Journal of Systems and Software , 151 , 81 - 118 . Search in Google Scholar

Nwobodo, L. K., Nwaimo, C. S., & Adegbola, A. E. (2024). Enhancing cybersecurity protocols in the era of big data and advanced analytics. GSC Advanced Research and Reviews, 19(3), 203-214. Nwobodo L. K. Nwaimo C. S. Adegbola A. E. ( 2024 ). Enhancing cybersecurity protocols in the era of big data and advanced analytics . GSC Advanced Research and Reviews , 19 ( 3 ), 203 - 214 . Search in Google Scholar

Tang, M., Alazab, M., & Luo, Y. (2017). Big data for cybersecurity: Vulnerability disclosure trends and dependencies. IEEE Transactions on Big Data, 5(3), 317-329. Tang M. Alazab M. Luo Y. ( 2017 ). Big data for cybersecurity: Vulnerability disclosure trends and dependencies . IEEE Transactions on Big Data , 5 ( 3 ), 317 - 329 . Search in Google Scholar

Geetha, R., & Thilagam, T. (2021). A review on the effectiveness of machine learning and deep learning algorithms for cyber security. Archives of Computational Methods in Engineering, 28(4), 2861-2879. Geetha R. Thilagam T. ( 2021 ). A review on the effectiveness of machine learning and deep learning algorithms for cyber security . Archives of Computational Methods in Engineering , 28 ( 4 ), 2861 - 2879 . Search in Google Scholar

Shaukat, K., Luo, S., Varadharajan, V., Hameed, I. A., & Xu, M. (2020). A survey on machine learning techniques for cyber security in the last decade. IEEE access, 8, 222310-222354. Shaukat K. Luo S. Varadharajan V. Hameed I. A. Xu M. ( 2020 ). A survey on machine learning techniques for cyber security in the last decade . IEEE access , 8 , 222310 - 222354 . Search in Google Scholar

Liu, Q., & Zhang, T. (2023). Deep learning technology of computer network security detection based on artificial intelligence. Computers and Electrical Engineering, 110, 108813. Liu Q. Zhang T. ( 2023 ). Deep learning technology of computer network security detection based on artificial intelligence . Computers and Electrical Engineering , 110 , 108813 . Search in Google Scholar

Salloum, S. A., Alshurideh, M., Elnagar, A., & Shaalan, K. (2020, March). Machine learning and deep learning techniques for cybersecurity: a review. In The International Conference on Artificial Intelligence and Computer Vision (pp. 50-57). Cham: Springer International Publishing. Salloum S. A. Alshurideh M. Elnagar A. Shaalan K. ( 2020 , March ). Machine learning and deep learning techniques for cybersecurity: a review . In The International Conference on Artificial Intelligence and Computer Vision (pp. 50 - 57 ). Cham : Springer International Publishing . Search in Google Scholar

Du, M. (2022). Application of information communication network security management and control based on big data technology. International Journal of Communication Systems, 35(5), e4643. Du M. ( 2022 ). Application of information communication network security management and control based on big data technology . International Journal of Communication Systems , 35 ( 5 ), e4643 . Search in Google Scholar

Zhang, Q., & Ma, D. (2021, February). Research on network security analysis based on big data technology application. In Journal of Physics: Conference Series (Vol. 1744, No. 3, p. 032199). IOP Publishing. Zhang Q. Ma D. ( 2021 , February ). Research on network security analysis based on big data technology application . In Journal of Physics: Conference Series (Vol. 1744 , No. 3 , p. 032199 ). IOP Publishing . Search in Google Scholar

Ning, Y. (2021, June). Research on the Application of Big Data Technology in Network Security Analysis. In Journal of Physics: Conference Series (Vol. 1955, No. 1, p. 012015). IOP Publishing. Ning Y. ( 2021 , June ). Research on the Application of Big Data Technology in Network Security Analysis . In Journal of Physics: Conference Series (Vol. 1955 , No. 1 , p. 012015 ). IOP Publishing . Search in Google Scholar

Wang, L., & Jones, R. (2021). Big data analytics in cyber security: network traffic and attacks. Journal of Computer Information Systems, 61(5), 410-417. Wang L. Jones R. ( 2021 ). Big data analytics in cyber security: network traffic and attacks . Journal of Computer Information Systems , 61 ( 5 ), 410 - 417 . Search in Google Scholar

Bachupally, Y. R., Yuan, X., & Roy, K. (2016, March). Network security analysis using Big Data technology. In SoutheastCon 2016 (pp. 1-4). IEEE. Bachupally Y. R. Yuan X. Roy K. ( 2016 , March ). Network security analysis using Big Data technology . In SoutheastCon 2016 (pp. 1 - 4 ). IEEE . Search in Google Scholar

Wang, L., & Jones, R. (2017). Big data analytics for network intrusion detection: A survey. International Journal of Networks and communications, 7(1), 24-31. Wang L. Jones R. ( 2017 ). Big data analytics for network intrusion detection: A survey . International Journal of Networks and communications , 7 ( 1 ), 24 - 31 . Search in Google Scholar

Cárdenas, A. A., Manadhata, P. K., & Rajan, S. P. (2013). Big data analytics for security. IEEE security & privacy, 11(6), 74-76. Cárdenas A. A. Manadhata P. K. Rajan S. P. ( 2013 ). Big data analytics for security . IEEE security & privacy , 11 ( 6 ), 74 - 76 . Search in Google Scholar

Zeng, H., Liu, Z., & Cai, H. (2020, October). Research on the application of deep learning in computer network information security. In Journal of Physics: Conference Series (Vol. 1650, No. 3, p. 032117). IOP Publishing. Zeng H. Liu Z. Cai H. ( 2020 , October ). Research on the application of deep learning in computer network information security . In Journal of Physics: Conference Series (Vol. 1650 , No. 3 , p. 032117 ). IOP Publishing . Search in Google Scholar

Zhou, P., & Zhang, W. (2020, September). Research on computer network information security and protection strategy based on deep learning algorithm. In 2020 International Conference on Advance in Ambient Computing and Intelligence (ICAACI) (pp. 181-184). IEEE. Zhou P. Zhang W. ( 2020 , September ). Research on computer network information security and protection strategy based on deep learning algorithm . In 2020 International Conference on Advance in Ambient Computing and Intelligence (ICAACI) (pp. 181 - 184 ). IEEE . Search in Google Scholar

Dushyant, K., Muskan, G., Annu, Gupta, A., & Pramanik, S. (2022). Utilizing machine learning and deep learning in cybesecurity: an innovative approach. Cyber security and digital forensics, 271-293. Dushyant K. Muskan G. Annu Gupta A. Pramanik S. ( 2022 ). Utilizing machine learning and deep learning in cybesecurity: an innovative approach . Cyber security and digital forensics , 271 - 293 . Search in Google Scholar

Sathya, K., Premalatha, J., & Suwathika, S. (2020, July). Reinforcing cyber world security with deep learning approaches. In 2020 international conference on communication and signal processing (ICCSP) (pp. 0766-0769). IEEE. Sathya K. Premalatha J. Suwathika S. ( 2020 , July ). Reinforcing cyber world security with deep learning approaches . In 2020 international conference on communication and signal processing (ICCSP) (pp. 0766 - 0769 ). IEEE . Search in Google Scholar

Liao, X., & Xie, J. (2021, July). Research on network intrusion detection method based on deep learning algorithm. In Journal of Physics: Conference Series (Vol. 1982, No. 1, p. 012121). IOP Publishing. Liao X. Xie J. ( 2021 , July ). Research on network intrusion detection method based on deep learning algorithm. In Journal of Physics: Conference Series (Vol. 1982 , No. 1 , p. 012121 ). IOP Publishing . Search in Google Scholar

Li, G., Sharma, P., Pan, L., Rajasegarar, S., Karmakar, C., & Patterson, N. (2021). Deep learning algorithms for cyber security applications: A survey. Journal of Computer Security, 29(5), 447-471. Li G. Sharma P. Pan L. Rajasegarar S. Karmakar C. Patterson N. ( 2021 ). Deep learning algorithms for cyber security applications: A survey . Journal of Computer Security , 29 ( 5 ), 447 - 471 . Search in Google Scholar

Alsyaibani, O. M. A., Utami, E., & Hartanto, A. D. (2021). Survey on deep learning based intrusion detection system. Telematika, 14(2), 86-100. Alsyaibani O. M. A. Utami E. Hartanto A. D. ( 2021 ). Survey on deep learning based intrusion detection system . Telematika , 14 ( 2 ), 86 - 100 . Search in Google Scholar

Vitalina Holubenko,Diogo Gaspar,Rúben Leal & Paulo Silva. (2024). Autonomous intrusion detection for IoT: a decentralized and privacy preserving approach. International Journal of Information Security(1),7-7. Vitalina Holubenko Diogo Gaspar Rúben Leal Paulo Silva ( 2024 ). Autonomous intrusion detection for IoT: a decentralized and privacy preserving approach . International Journal of Information Security(1) , 7 - 7 . Search in Google Scholar

Mostafa Mahmoud El Gayar,Faheed A. F. Alrslani & Shaker El Sappagh. (2024). Smart Collaborative Intrusion Detection System for Securing Vehicular Networks Using Ensemble Machine Learning Model. Information(10),583-583. Mostafa Mahmoud El Gayar Faheed A. F. Alrslani Shaker El Sappagh ( 2024 ). Smart Collaborative Intrusion Detection System for Securing Vehicular Networks Using Ensemble Machine Learning Model . Information(10) , 583 - 583 . Search in Google Scholar

Abdullah Baihan,Ahmed I. Alutaibi,Mohammed Alshehri & Sunil Kumar Sharma. (2024). Sign language recognition using modified deep learning network and hybrid optimization: a hybrid optimizer (HO) based optimized CNNSa-LSTM approach. Scientific Reports(1),26111-26111. Abdullah Baihan Ahmed I. Alutaibi Mohammed Alshehri Sunil Kumar Sharma ( 2024 ). Sign language recognition using modified deep learning network and hybrid optimization: a hybrid optimizer (HO) based optimized CNNSa-LSTM approach . Scientific Reports(1) , 26111 - 26111 . Search in Google Scholar

Yang B.,Liu Y.,Zhang G.,Dai J. & Men K.. (2023). Prediction of Anatomical Presentation during Radiotherapy of Nasopharyngeal Carcinoma Using GAN-LSTM for Plan Adaption Decision. International Journal of Radiation Oncology, Biology, Physics(2S),S156-S157. Yang B. Liu Y. Zhang G. Dai J. Men K. ( 2023 ). Prediction of Anatomical Presentation during Radiotherapy of Nasopharyngeal Carcinoma Using GAN-LSTM for Plan Adaption Decision . International Journal of Radiation Oncology, Biology, Physics(2S) , S156 - S157 . Search in Google Scholar

Language:
English