{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T10:47:20Z","timestamp":1761130040647},"reference-count":20,"publisher":"Walter de Gruyter GmbH","issue":"1","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,10,27]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>With the rapid development and progress of big data technology, people can already use big data to judge the transmission and distribution of network information and make better decisions in time, but it also faces major network threats such as Trojan horses and viruses. Traditional network security functions generally wait until the network power is turned on to a certain extent before starting, and it is difficult to ensure the security of big data networks. To protect the network security of big data and improve its ability to defend against attacks, this article introduces the deep learning algorithm into the research of big data network security defense mode. The test results show that the introduction of deep learning algorithms into the research of network security model can enhance the security defense capability of the network by 5.12%, proactively detect, and kill cyber attacks that can pose threats. At the same time, the security defense mode will evaluate the network security of big data and analyze potential network security risks in detail, which will prevent risks before they occur and effectively protect the network security in the context of big data.<\/jats:p>","DOI":"10.1515\/comp-2022-0257","type":"journal-article","created":{"date-parts":[[2022,10,27]],"date-time":"2022-10-27T11:05:47Z","timestamp":1666868747000},"page":"345-356","source":"Crossref","is-referenced-by-count":5,"title":["Big data network security defense mode of deep learning algorithm"],"prefix":"10.1515","volume":"12","author":[{"given":"Yingle","family":"Yu","sequence":"first","affiliation":[{"name":"Tandon School of Engineering, New York University , Brooklyn 11201 , New York , USA"}]}],"member":"374","published-online":{"date-parts":[[2022,10,27]]},"reference":[{"key":"2022102711054126091_j_comp-2022-0257_ref_001","unstructured":"S. Wang, \u201cAttack mode and defense mechanism based on computer network security,\u201d IPPTA: Q. J. Indian. Pulp Pap. Technical Assoc., vol. 30, no. 6, pp. 354\u2013359, 2018."},{"key":"2022102711054126091_j_comp-2022-0257_ref_002","doi-asserted-by":"crossref","unstructured":"S. Ding, Z. Zhang, and J. Xie, \u201cNetwork security defense model based on firewall and IPS,\u201d J. Intell. Fuzzy Syst., vol. 39, no. 12, pp. 1\u20139, 2020.","DOI":"10.3233\/JIFS-189294"},{"key":"2022102711054126091_j_comp-2022-0257_ref_003","doi-asserted-by":"crossref","unstructured":"G. Zhao and J. Song, \u201cNetwork security model based on active defense and passive defense hybrid strategy,\u201d J. Intell. Fuzzy Syst., vol. 39, no. 4, pp. 1\u20139, 2020.","DOI":"10.3233\/JIFS-189287"},{"key":"2022102711054126091_j_comp-2022-0257_ref_004","doi-asserted-by":"crossref","unstructured":"N. Wagner, C. S. Sahin, and M. Winterrose, \u201cQuantifying the mission impact of network-level cyber defensive mitigations,\u201d J. Def. Model. Simul., vol. 14, no. 3, pp. 201\u2013216, 2017.","DOI":"10.1177\/1548512916662924"},{"key":"2022102711054126091_j_comp-2022-0257_ref_005","doi-asserted-by":"crossref","unstructured":"J. Zhao, X. Zhang, and F. Di, \u201cExploring the optimum proactive defense strategy for the power systems from an attack perspective,\u201d Secur. Commun. Netw., vol. 2021, no. 6, pp. 1\u201314, 2021.","DOI":"10.1155\/2021\/6699108"},{"key":"2022102711054126091_j_comp-2022-0257_ref_006","doi-asserted-by":"crossref","unstructured":"Y. Li and X. Li, \u201cResearch on multi-target network security assessment with attack graph expert system model,\u201d Sci. Program., vol. 2021, no. 3, pp. 1\u201311, 2021.","DOI":"10.1155\/2021\/9921731"},{"key":"2022102711054126091_j_comp-2022-0257_ref_007","doi-asserted-by":"crossref","unstructured":"D. Bienstock and M. Escobar, \u201cStochastic defense against complex grid attacks,\u201d IEEE Trans. Control. Netw. Syst., vol. 7, no. 2, pp. 842\u2013854, 2020.","DOI":"10.1109\/TCNS.2019.2949908"},{"key":"2022102711054126091_j_comp-2022-0257_ref_008","doi-asserted-by":"crossref","unstructured":"Y. Chen, Z. Lin, and Z. Xing, \u201cDeep learning-based classification of hyperspectral data,\u201d IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., vol. 7, no. 6, pp. 2094\u20132107, 2017.","DOI":"10.1109\/JSTARS.2014.2329330"},{"key":"2022102711054126091_j_comp-2022-0257_ref_009","doi-asserted-by":"crossref","unstructured":"T.Oshea and J.Hoydis, \u201cAn introduction to deep learning for the physical layer,\u201d IEEE Trans. Cognit. Commun. Netw., vol. 3, no. 4, pp. 563\u2013575, 2017.","DOI":"10.1109\/TCCN.2017.2758370"},{"key":"2022102711054126091_j_comp-2022-0257_ref_010","doi-asserted-by":"crossref","unstructured":"D. Ravi, C. Wong, and F. Deligianni, \u201cDeep learning for health informatics,\u201d IEEE J. Biomed. Health Inform., vol. 21, no. 1, pp. 4\u201321, 2017.","DOI":"10.1109\/JBHI.2016.2636665"},{"key":"2022102711054126091_j_comp-2022-0257_ref_011","doi-asserted-by":"crossref","unstructured":"Y. Tom, H. Devamanyu, and P. Soujanya, \u201cRecent trends in deep learning based natural language processing [Review Article],\u201d IEEE Comput. Intell. Mag., vol. 13, no. 3, pp. 55\u201375, 2018.","DOI":"10.1109\/MCI.2018.2840738"},{"key":"2022102711054126091_j_comp-2022-0257_ref_012","doi-asserted-by":"crossref","unstructured":"X. X. Zhu, D. Tuia, and L. Mou, \u201cDeep learning in remote sensing: A comprehensive review and list of resources,\u201d IEEE Geosci. & Remote. Sens. Mag., vol. 5, no. 4, pp. 8\u201336, 2018.","DOI":"10.1109\/MGRS.2017.2762307"},{"key":"2022102711054126091_j_comp-2022-0257_ref_013","doi-asserted-by":"crossref","unstructured":"X. Wang, L. Gao, and S. Mao, \u201cCSI phase fingerprinting for indoor localization with a deep learning approach,\u201d IEEE Internet Things J., vol. 3, no. 6, pp. 1113\u20131123, 2017.","DOI":"10.1109\/JIOT.2016.2558659"},{"key":"2022102711054126091_j_comp-2022-0257_ref_014","doi-asserted-by":"crossref","unstructured":"N. Majumder, S. Poria, and A. Gelbukh, \u201cDeep learning-based document modeling for personality detection from text,\u201d IEEE Intell. Syst., vol. 32, no. 2, pp. 74\u201379, 2017.","DOI":"10.1109\/MIS.2017.23"},{"key":"2022102711054126091_j_comp-2022-0257_ref_015","unstructured":"D. Zhang and Q. He, \u201cSecurity situation awareness method for smart grid,\u201d Int. Core J. Eng., vol. 6, no. 5, pp. 49\u201355, 2020."},{"key":"2022102711054126091_j_comp-2022-0257_ref_016","doi-asserted-by":"crossref","unstructured":"M. Matovic, M. Ravlic, M. Jeremic, S. Jankovic, and M. Vlajkovic, \u201cAlarm system for surveillance of patients receiving high doses of radioiodine (\u223c(131)I) therapy in the case of unauthorised abandoning of a controlled area,\u201d Nucl. Technol. & Radiat. Prot., vol. 33, no. 2, pp. 223\u2013229, 2018.","DOI":"10.2298\/NTRP1802223M"},{"key":"2022102711054126091_j_comp-2022-0257_ref_017","doi-asserted-by":"crossref","unstructured":"X. Zhang, J. Lu, and D. Li, \u201cConfidential information protection method of commercial information physical system based on edge computing,\u201d Neural Comput. Appl., vol. 33, no. 4, pp. 1\u201311, 2021.","DOI":"10.1007\/s00521-020-05272-0"},{"key":"2022102711054126091_j_comp-2022-0257_ref_018","doi-asserted-by":"crossref","unstructured":"A. Vidybida, \u201cOutput stream of leaky integrate-and-fire neuron without diffusion approximation,\u201d J. Stat. Phys., vol. 166, no. 2, pp. 267\u2013281, 2017.","DOI":"10.1007\/s10955-016-1698-2"},{"key":"2022102711054126091_j_comp-2022-0257_ref_019","doi-asserted-by":"crossref","unstructured":"J. Li, F. Ding, and T. Hayat, \u201cA novel nonlinear optimization method for fitting a noisy Gaussian activation function,\u201d Int. J. Adapt. Control. Signal. Process, vol. 36, no. 3, pp. 690\u2013707, 2022.","DOI":"10.1002\/acs.3367"},{"key":"2022102711054126091_j_comp-2022-0257_ref_020","unstructured":"R. Esfandiari, R. Noorossana, and Y. E. Teimour, \u201cAn integrated time, cost, and reliability optimization for supply chain design,\u201d Int. J. Oper. Quant. Manag., vol. 25, no. 2, pp. 75\u201390, 2019."}],"container-title":["Open Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/comp-2022-0257\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/comp-2022-0257\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,27]],"date-time":"2022-10-27T11:05:57Z","timestamp":1666868757000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/comp-2022-0257\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,1]]},"references-count":20,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2022,10,27]]},"published-print":{"date-parts":[[2022,10,27]]}},"alternative-id":["10.1515\/comp-2022-0257"],"URL":"https:\/\/doi.org\/10.1515\/comp-2022-0257","relation":{},"ISSN":["2299-1093"],"issn-type":[{"value":"2299-1093","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,1]]}}}