Skip to main content

Heterogeneous Network Security Monitoring and Association Algorithm for Big Data

  • Conference paper
  • First Online:
Application of Intelligent Systems in Multi-modal Information Analytics (MMIA 2020)

Abstract

Heterogeneous network layer technology leads to the imbalance of heterogeneous networks, which makes the security problems between networks affect each other, and leads to the security problems of network interconnection more serious. In this paper, the gateway discovery technology and security of this kind of interconnection will be studied in depth. Firstly, the interconnection technology of heterogeneous networks and its security are described. Then the method of heterogeneous network security monitoring is given, and the optimization in the data access architecture is established. The network monitoring system put into use is set to simulate faults according to the test nodes, and then the monitoring effects on different fault nodes and types are statistically calculated. The core algorithm and knowledge representation of the system are analyzed in detail, and the related methods are simulated and analyzed. The system can respond to some typical security events.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Ma, Z., Cao, J., Yao, Y.: Workflow scheduling method using auction example and considering intermediate data storage strategy in cloud environment. J. Comput. Integr. Manuf. Syst. 23(5), 983–992 (2017)

    Google Scholar 

  2. Md Diah, J., Ahmad, J.: The methodology on statistical analysis of data transformation for model development. Int. J. Stat. Appl. 2(6), 7–11 (2012)

    Google Scholar 

  3. Sa, R.: Cloud computing resource scheduling scheme based on ant colony particle swarm optimization algorithm. J. Jilin Univ. Sci. Ed. 55(6), 1518–1522 (2017)

    Google Scholar 

  4. Hamdar, S.H., Khoury, H., Zehtabi, S.: A simulator-based approach for modeling longitudinal driving behavior in construction work zones: exploration and assessment. Simul. Trans. Soc. Modeling Simul. Int. 92(6), 579–594 (2016)

    Google Scholar 

  5. Adly, M., Besheer, A.H.: A meta-heuristics search algorithm as a solution for energy transfer maximization in stand-alone photovoltaic systems. Int. J. Electr. Power Energy Syst. 51(10), 243–254 (2013)

    Article  Google Scholar 

  6. Baier, J.A., Bacchus, F., Mcilraith, S.A.: A heuristic search approach to planning with temporally extended preferences. Artif. Intell. 173(5), 593–618 (2017)

    MathSciNet  MATH  Google Scholar 

  7. Gao, Y., Chen, J., Qiang, Y.: Placement optimization algorithm for virtual machines in large cloud computing systems. Modern Electron. Technol. 40(10), 21–23 (2017)

    Google Scholar 

  8. Zhang, D., Wei, L., Leung, S.C.H., et al.: A binary search heuristic algorithm based on randomized local search for the rectangular strip-packing problem. INFORMS J. Comput. 25(2), 332–345 (2013)

    Article  Google Scholar 

  9. Shila, D.M., Shen, W., Cheng, Y., et al.: AMCloud: toward a secure autonomic mobile ad hoc cloud computing system. IEEE Wirel. Commun. 24(2), 74–81 (2017)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhenqi Liu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Liu, Z., Gao, Y., Shao, D. (2021). Heterogeneous Network Security Monitoring and Association Algorithm for Big Data. In: Sugumaran, V., Xu, Z., Zhou, H. (eds) Application of Intelligent Systems in Multi-modal Information Analytics. MMIA 2020. Advances in Intelligent Systems and Computing, vol 1233. Springer, Cham. https://doi.org/10.1007/978-3-030-51431-0_111

Download citation

Publish with us

Policies and ethics