Title | Preventive Measures of Influencing Factors of Computer Network Security Technology |
Publication Type | Conference Paper |
Year of Publication | 2021 |
Authors | Chen, Yefeng, Chen, Zhengxu |
Conference Name | 2021 IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA) |
Date Published | jun |
Keywords | Computer architecture, Computer industry, computer network security, computer networks, Conferences, data encryption, Encryption, influencing factors, Information age, Network Security Architecture, Prevention, Production, pubcrawl, resilience, Resiliency, Security Defense System |
Abstract | How to prevent the computer system from being interfered by external factors and maintain a strong working state is a problem that needs to be solved at present. At present, encryption and network security defense systems are important technical means of security defense. Based on this research background, the paper proposes an AES data encryption scheme in the Hadoop big data environment. The AES algorithm performs several rounds of plaintext encryption through the steps of round key addition, byte replacement, row displacement, column confusion, etc. Under the MapReduce architecture, the plaintext data is divided into multiple data fragments. The Map function is responsible for the AES algorithm encryption operation, and the Reduce function Combine encrypted data information. Finally, the paper designs a computer network security defense system that can actively discover the security threats in the network and effectively prevent them, so as to ensure the normal and safe operation of the network. At the same time, we use the encryption algorithm on the computer network security defense system. Experimental research has proved that this method can safely transmit network data packets. With the increase of computing cluster nodes, its encryption transmission efficiency continues to improve. This solution not only solves the problem of computer network data security encryption, but also realizes the parallel transmission of encrypted data in the information age. |
DOI | 10.1109/ICAICA52286.2021.9498242 |
Citation Key | chen_preventive_2021 |