Skip to main content

Anti-tampering Monitoring Method of Network Sensitive Information Based on Big Data Analysis

  • Conference paper
  • First Online:
  • 518 Accesses

Abstract

To improve the security of network sensitive information transmission and storage, it is necessary to design the anti-tampering monitoring of network sensitive information, and a tamper-proof monitoring technology of network sensitive information in big data environment based on big data dimension feature block is proposed. Big data feature space reconstruction method is used to calculate the grid density of network sensitive information distribution, and the network sensitive information to be tampered-proof monitoring is mapped to the divided high-dimensional phase space through the density threshold. The high dimensional phase space of information distribution is divided into dense unit and sparse unit. The coded key is matched to the corresponding network sensitive information block to realize information encryption and covert communication. The simulation results show that the information steganography performance of network sensitive information transmission and storage using this information tampering monitoring technology is better, and the information security transmission ability is improved.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Han, D., Chen, X., Lei, Y., et al.: Real-time data analysis system based on Spark Streaming and its application. J. Comput. Appl. 37(5), 1263–1269 (2017)

    Google Scholar 

  2. Zhu, Y., Zhu, X., Wang, J.: Time series motif discovery algorithm based on subsequence full join and maximum clique. J. Comput. Appl. 39(2), 414–420 (2019)

    Google Scholar 

  3. Ma, Y., Zhang, Z., Lin, C.: Research progress in similarity join query of big data. J. Comput. Appl. 38(4), 978–986 (2018)

    Google Scholar 

  4. Zheng, N., Wang, J.: Evidence characteristics and attribute reduction of incomplete ordered information system. Comput. Eng. Appl. 54(21), 43–47 (2018)

    Google Scholar 

  5. Yang, L., Kong, Z., Shi, H.: Multi-controller dynamic deployment strategy of software defined spatial information network. Comput. Eng. 44(10), 58–63 (2018)

    Google Scholar 

  6. Luo, H., Wan, C., Kong, F.: Salient region detection algorithm via KL divergence and multi-scale merging. J. Electron. Inf. 38(7), 1594–1601 (2016)

    Google Scholar 

  7. Stoean, C., Preuss, M., Stoean, R., et al.: Multimodal optimization by means of a topological species conservation algorithm. IEEE Trans. Evol. Comput. 14(6), 842–864 (2010)

    Article  Google Scholar 

  8. Liang, J.J., Qu, B.Y., Mao, X.B., et al.: Differential evolution based on fitness Euclidean-distance ratio for multimodal optimization. Neurocomputing 137(8), 252–260 (2014)

    Article  Google Scholar 

  9. Xu, G., Cheng, X.J.: Adaptive reduction algorithm of scattered point clouds based on wavelet technology. J. Tongji Univ. (Nat. Sci.) 41(11), 1738–1743 (2013)

    Google Scholar 

  10. Bi, A., Wang, S.: Transfer affinity propagation clustering algorithm based on Kullback-Leiber distance. J. Electron. Inf. 38(8), 2076–2084 (2016)

    Google Scholar 

  11. Long, M., Wang, J., Ding, G., et al.: Adaptation regularization, a general framework for transfer learning. IEEE Trans. Knowl. Data Eng. 26(5), 1076–1089 (2014)

    Article  Google Scholar 

  12. Bi, A., Dong, A., Wang, S.: A dynamic data stream clustering algorithm based on probability and exemplar. J. Comput. Res. Dev. 53(5), 1029–1042 (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yi Shen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Shen, Y., Zhang, L. (2019). Anti-tampering Monitoring Method of Network Sensitive Information Based on Big Data Analysis. In: Gui, G., Yun, L. (eds) Advanced Hybrid Information Processing. ADHIP 2019. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 302. Springer, Cham. https://doi.org/10.1007/978-3-030-36405-2_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-36405-2_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-36404-5

  • Online ISBN: 978-3-030-36405-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics