Welcome to Scholar Publishing Group

International Journal of Big Data Intelligent Technology, 2025, 6(2); doi: 10.38007/IJBDIT.2025.060201.

Research on Computer Network Information Security and Protection under the Background of Big Data

Author(s)

Jiayi Sun

Corresponding Author:
Jiayi Sun
Affiliation(s)

Smart Grid Department,Zhi Fang Design Co., Ltd.,Hongshan District 430070, Wuhan , Hubei , China

Abstract

Based on the background of the widespread application of big data technology, the information security of computer networks presents new trends and becomes increasingly complex. The surge in data volume, multi-source heterogeneous data structures and the characteristics of real-time transmission have caused great challenges to traditional security models. Based on the impact of the big data environment on network security, this paper systematically analyzes the security vulnerabilities and evolutionary characteristics of typical attack methods in the current network architecture, and introduces security event big data to carry out clustering and behavior analysis, and then constructs a threat assessment architecture that can realize dynamic identification. From the perspective of protection mechanism, it proposes the use of intrusion detection technology integrated with artificial intelligence, a network situation awareness model based on data-driven thinking, and the application planning of blockchain technology in data traceability and trusted anti-tampering. The research results fully demonstrate that the intelligent, real-time and traceable capabilities of network security systems can be effectively enhanced in a multi-technology collaborative manner. This study provides theoretical support and practical reference for the construction of network information security systems under the background of big data.

Keywords

big data, network information security, situational awareness, intrusion detection

Cite This Paper

Jiayi Sun. Research on Computer Network Information Security and Protection under the Background of Big Data. International Journal of Big Data Intelligent Technology (2025), Vol. 6, Issue 2: 1-10. https://doi.org/10.38007/IJBDIT.2025.060201.

References

[1] Li, Xuan. "Research on the Review Technology of Building Fire Protection Design Drawings Based on BlM." Frontiers in Science and Engineering 5.2 (2025): 113-118.

[2] Li, Bin. "Application of Data Analysis in Climate Policy in Environmental Planning." Frontiers in Science and Engineering 5.2 (2025): 106-112.

[3] Cui, Naizhong. "Optimization Strategies for Traffic Signal and Identification Design." Frontiers in Science and Engineering 5.2 (2025): 92-98.

[4] Shi, Chongwei. "Ovarian Hereditary Diseases: Progress in Prevention and Treatment and Research on Prenatal Diagnosis." Scientific Journal of Technology 7.2 (2025): 125-131.

[5] Hao, Linfeng. "Application of Machine Learning Algorithms in Improving the Performance of Autonomous Vehicles." Scientific Journal of Technology 7.2 (2025): 118-124.

[6] Ding, Maomao. "Design Innovation and User Satisfaction Improvement of AI Video Creation Tools." Scientific Journal of Technology 7.2 (2025): 112-117.

[7] Yan, Jialu. "AI Optimization Strategy for Streaming Financial Advertising Placement." Journal of Computer Science and Artificial Intelligence 2.2 (2025): 40-43.

[8] Chen, Junyu. "Research on Intelligent Data Mining Technology Based on Geographic Information System." Journal of Computer Science and Artificial Intelligence 2.2 (2025): 12-16.

[9] Dishu Yang, Application of Data Privacy Protection Technology in Social Media Platforms, Journal of Computer Science and Artificial Intelligence, 2025, 2(2),53-56

[10] Xu Y. Research on UAV Navigation System Based on Behavioral Programming[C]//2024 IEEE 7th International Conference on Automation, Electronics and Electrical Engineering (AUTEEE). IEEE, 2024: 419-425.

[11] Shi C. Research on Deep Learning Algorithms for Predicting DNA-Binding Proteins Based on Sequence Information[C]//2024 IEEE 2nd International Conference on Electrical, Automation and Computer Engineering (ICEACE). IEEE, 2024: 1566-1570.

[12] Xingwen Guo, Research on the Risk of Local Government Debt in China and the Path of Prevention and Control, International Journal of Social Sciences and Public Administration, 2024, 4(3), 78-83

[13] Yue Xu, Research on Social Live Broadcast pps in Thenew Media Era, International Journal of Education and Humanities, 2024, 17(1), 269-272

[14] Shi, C. (2024). Research on the Application of Computer Technology in Biostatistics. Journal of Computing and Electronic Information Management.Vol. 14, No. 3, 2024,12-15

[15] Xuan Li, Research on integration technology of architectural CAD and budget estimate, Journal of Computing and Electronic Information Management, 2024, 15(1), 20-23

[16] Ma Z. Strategies for Enhancing Customer Lifetime Value through Data Modeling[J]. European Journal of Business, Economics & Management, 2025, 1(1): 1-7.

[17] Liu Z. Application of Machine Learning in Financial Risk Classification and Account Verification Optimization Strategy[J]. Economics and Management Innovation, 2025, 2(2): 64-70.

[18] Li, X.(2025)“Research on the application of GPS, total station and CAD Technology in architectural Grid.” Computer Life (2024),12(3),36-39.

[19] Hao L. Research on Autonomous Driving Path Planning Technology Based on Reinforcement Learning[J]. Journal of Computer, Signal, and System Research, 2025, 2(3): 52-58.

[20] Liu X. Research on Optimizing Virtual Reality User Experience Based on Large Language Models[J]. Journal of Computing and Electronic Information Management, 2025, 16(2): 5-10.

[21] Ma Z. Innovative Application of Reinforcement Learning in User Growth and Behavior Prediction[J]. European Journal of AI, Computing & Informatics, 2025, 1(1): 18-24.

[22] Chen J. Exploration of Intelligent Geographic Information System Development in Big Data Era[J]. Journal of Computer, Signal, and System Research, 2025, 2(3): 24-30.

[23] Cui N. Analysis of the Impact of Autonomous Driving on Road Design and Traffic Control[J]. European Journal of Engineering and Technologies, 2025, 1(1): 1-6.

[24] Ding M. Application of AI Technology in Improving Design Process Efficiency[J]. European Journal of AI, Computing & Informatics, 2025, 1(1): 101-106.

[25] Zhu Z. Research on Parallel Execution Techniques for Improving the Expandability of Database Systems[J]. Journal of Computer, Signal, and System Research, 2025, 2(3): 69-74.

[26] Zou Y. Application of Cross Platform Integration Technology in Modern Communication Systems[J]. European Journal of AI, Computing & Informatics, 2025, 1(1): 64-70.

[27] Zhou Y. Application of Anomaly Detection Mechanism in Large-Scale Data Processing[J]. European Journal of AI, Computing & Informatics, 2025, 1(1): 78-84.

[28] Zhang X. The Application of Machine Learning Combined with Graph Databases in Financial Technology[J]. European Journal of AI, Computing & Informatics, 2025, 1(1): 71-77.

[29] Dishu Yang, Privacy Protection Measures in Large-Scale Data Environments, Frontiersin Science and Engineering, 2025,5(3),140-146

[30] Wang Y. Research on Intelligent Diagnosis Technology of Oil Well Condition Based on Big Data and Deep Learning Model OWDNet[J]. Academic Journal of Architecture and Geotechnical Engineering, 2025, 7(1): 17-22.

[31] Huang, Tianyou "Research on the Marginal Value and Cash Dividend Payment Behavior of Corporate Financial Flexibility under Property Rights Differences Based on Fixed Effects Model." Accounting and Corporate Management (2024), 6(5): 24-29

[32] Wu, Wei "Research on Customer Traffic Value Recognition Model Based on Improved Random Forest Algorithm." Accounting and Corporate Management (2024), 6(5): 30-35

[33] Zhang J. Research on Dynamic Stability Identification and Early Warning System for Engineering Vehicles Integrating Machine Learning and Data Driven Technology[J]. Academic Journal of Computing & Information Science, 2025, 8(2): 51-55.

[34] Zihan Tang, Research on the Application of Joint Optimization Strategy of Energy Storage System and Demand Side Response Based on Tianqun Algorithm in Renewable Energy Grid, Frontiers in Power and Energy Systems, 2024, 3(1), 65-71

[35] Dong P. Research on the Application of Knowledge Graph-Driven Two-Dimensional Convolutional Embedding Methods in Recommender Systems[C]//2025 International Conference on Intelligent Systems and Computational Networks (ICISCN). IEEE, 2025: 1-6.

[36] Tang, Zihan. "Research on Resource Planning and Transmission Line Optimization System of US Power Grid Based on GIS Technology." safety 8.5 (2024): 53-59.

[37] Zhao, Fengyi "Computer System Security and Power Data Network Integrated Security Strategy Analysis and Optimization." Journal of Network Computing and Applications (2025), 10(1): 14-19

[38] Zhang, Jinshuo "Optimization of Highway Engineering Design and Data-Driven Decision Support Based on Machine Learning Algorithm." Journal of Network Computing and Applications (2025), 10(1): 8-13

[39] Huang T. Design and Implementation of a High Concurrency Online Payment Platform Based on Distributed Microservice Architecture[C]//The International Conference on Cyber Security Intelligence and Analytics. Cham: Springer Nature Switzerland, 2024: 551-560.

[40] Wang Y. Design and Implementation of a General Data Collection System Architecture Based on Relational Database Technology[C]//The International Conference on Cyber Security Intelligence and Analytics. Cham: Springer Nature Switzerland, 2024: 561-572.

[41] Chen, H., Zuo, J., Zhu, Y., Kabir, M. R., & Han, A. (2024). Polar-Space Frequency-Domain Filtering for Improved Pulse-echo Speed of Sound Imaging with Convex Probes. In 2024 IEEE Ultrasonics, Ferroelectrics, and Frequency Control Joint Symposium (UFFC-JS) (pp. 1-4). IEEE.

[42] Chen, H., Varatharajah, Y., de Ramirez, S. S., Arnold, P., Frankenberger, C., Hota, B., & Iyer, R. (2020). A retrospective longitudinal study of COVID-19 as seen by a large urban hospital in Chicago. medRxiv, 2020-11.

[43] Cao, Y., Cao, P., Chen, H., Kochendorfer, K. M., Trotter, A. B., Galanter, W. L., ... & Iyer, R. K. (2022). Predicting ICU admissions for hospitalized COVID-19 patients with a factor graph-based model. In Multimodal AI in healthcare: A paradigm shift in health intelligence (pp. 245-256). Cham: Springer International Publishing.

[44] Shanshan Feng, Ke Ma, Gongpin Cheng, Risk Evolution along the Oil and Gas Industry Chain: Insights from Text Mining Analysis, Finance Research Letters, 2025, 106813, ISSN 1544-6123

[45] Ma, K. (2024). Employee Satisfaction and Firm Performance: Evidence from a Company Review Website. International Journal of Global Economics and Management, 4(2), 407-416.

[46] Chen, H., Zhu, Y., Zuo, J., Kabir, M. R., & Han, A. (2024). TranSpeed: Transformer-based Generative Adversarial Network for Speed-of-sound Reconstruction in Pulse-echo Mode. In 2024 IEEE Ultrasonics, Ferroelectrics, and Frequency Control Joint Symposium (UFFC-JS) (pp. 1-4). IEEE.

[47] Chen, H., Yang, Y., & Shao, C. (2021). Multi-task learning for data-efficient spatiotemporal modeling of tool surface progression in ultrasonic metal welding. Journal of Manufacturing Systems, 58, 306-315.