Abstract
Heterogeneous network layer technology leads to the imbalance of heterogeneous networks, which makes the security problems between networks affect each other, and leads to the security problems of network interconnection more serious. In this paper, the gateway discovery technology and security of this kind of interconnection will be studied in depth. Firstly, the interconnection technology of heterogeneous networks and its security are described. Then the method of heterogeneous network security monitoring is given, and the optimization in the data access architecture is established. The network monitoring system put into use is set to simulate faults according to the test nodes, and then the monitoring effects on different fault nodes and types are statistically calculated. The core algorithm and knowledge representation of the system are analyzed in detail, and the related methods are simulated and analyzed. The system can respond to some typical security events.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ma, Z., Cao, J., Yao, Y.: Workflow scheduling method using auction example and considering intermediate data storage strategy in cloud environment. J. Comput. Integr. Manuf. Syst. 23(5), 983–992 (2017)
Md Diah, J., Ahmad, J.: The methodology on statistical analysis of data transformation for model development. Int. J. Stat. Appl. 2(6), 7–11 (2012)
Sa, R.: Cloud computing resource scheduling scheme based on ant colony particle swarm optimization algorithm. J. Jilin Univ. Sci. Ed. 55(6), 1518–1522 (2017)
Hamdar, S.H., Khoury, H., Zehtabi, S.: A simulator-based approach for modeling longitudinal driving behavior in construction work zones: exploration and assessment. Simul. Trans. Soc. Modeling Simul. Int. 92(6), 579–594 (2016)
Adly, M., Besheer, A.H.: A meta-heuristics search algorithm as a solution for energy transfer maximization in stand-alone photovoltaic systems. Int. J. Electr. Power Energy Syst. 51(10), 243–254 (2013)
Baier, J.A., Bacchus, F., Mcilraith, S.A.: A heuristic search approach to planning with temporally extended preferences. Artif. Intell. 173(5), 593–618 (2017)
Gao, Y., Chen, J., Qiang, Y.: Placement optimization algorithm for virtual machines in large cloud computing systems. Modern Electron. Technol. 40(10), 21–23 (2017)
Zhang, D., Wei, L., Leung, S.C.H., et al.: A binary search heuristic algorithm based on randomized local search for the rectangular strip-packing problem. INFORMS J. Comput. 25(2), 332–345 (2013)
Shila, D.M., Shen, W., Cheng, Y., et al.: AMCloud: toward a secure autonomic mobile ad hoc cloud computing system. IEEE Wirel. Commun. 24(2), 74–81 (2017)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Liu, Z., Gao, Y., Shao, D. (2021). Heterogeneous Network Security Monitoring and Association Algorithm for Big Data. In: Sugumaran, V., Xu, Z., Zhou, H. (eds) Application of Intelligent Systems in Multi-modal Information Analytics. MMIA 2020. Advances in Intelligent Systems and Computing, vol 1233. Springer, Cham. https://doi.org/10.1007/978-3-030-51431-0_111
Download citation
DOI: https://doi.org/10.1007/978-3-030-51431-0_111
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-51430-3
Online ISBN: 978-3-030-51431-0
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)