Research on Computer Network Virus Defense Method Based on Data Mining Technology
DOI: 10.23977/cpcs.2025.090105 | Downloads: 7 | Views: 455
Author(s)
Wang Zeding 1
Affiliation(s)
1 North China Electric Power University, Baoding, Hebei, China
Corresponding Author
Wang ZedingABSTRACT
With the rapid development of computer network technology, virus attack methods are becoming increasingly complex and concealed, and traditional defense methods relying on signature database matching have difficulty coping with unknown threats. Data mining technology, with its powerful data processing and pattern discovery capabilities, provides new ideas for network virus defense. By analyzing massive amounts of data such as network traffic and system logs, the potential patterns of virus behavior can be mined, and dynamic detection models can be constructed to achieve a transformation from passive response to active defense. The research combines classification, clustering, and association rule algorithms to explore key technologies for virus feature extraction and behavior prediction, aiming to break through the limitations of traditional methods, improve detection efficiency and accuracy, and lay a foundation for building an intelligent and adaptive network security system.
KEYWORDS
Data Mining Technology; Computer Network Viruses; Defense MethodsCITE THIS PAPER
Wang Zeding, Research on Computer Network Virus Defense Method Based on Data Mining Technology. Computing, Performance and Communication Systems (2025) Vol. 9: 30-35. DOI: http://dx.doi.org/10.23977/cpcs.2025.090105.
REFERENCES
[1] Yin H. Computer Network Virus Defense Technology Based on Data Mining Technology[C]//IOP Conference Series: Materials Science and Engineering. IOP Publishing, 2018, 382(5): 052019.
[2] Hou J, Ding F .Design and Analysis of Network Virus Defense System Based on Multimodal Data Mining Technology [J].Scientific Programming, 2022, 2022(000):11.
[3] Sheng J .Research on SQL Injection Attack and Defense Technology of Power Dispatching Data Network: Based on Data Mining [J].Mobile Information Systems, 2022, 2022(000):8.
[4] Zuo C .Defense of Computer Network Viruses Based on Data Mining Technology [J].Int. J. Netw. Secur. 2018, 20:805-810.
[5] Yin H .Computer Network Virus Defense Technology Based on Data Mining Technology[C]. IOP Conference Series: Materials Science and Engineering, 2018:18. DOI 10.1088/1757-899X/382/5/052019
[6] Lan C .Data Mining Technology Based on Granular Computing in Computer Network Virus Defense [C]//International Conference on Frontier Computing. Springer, Singapore, 2021:12-14.
[7] Jingzi D, Xuangong L .Design and Implementation of Network Virus Defense System Based on Data Mining Technology[J].China Computer & Communication, 2018:13-15.
Downloads: | 3202 |
---|---|
Visits: | 189835 |
Sponsors, Associates, and Links
-
Power Systems Computation
-
Internet of Things (IoT) and Engineering Applications
-
Journal of Artificial Intelligence Practice
-
Advances in Computer, Signals and Systems
-
Journal of Network Computing and Applications
-
Journal of Web Systems and Applications
-
Journal of Electrotechnology, Electrical Engineering and Management
-
Journal of Wireless Sensors and Sensor Networks
-
Journal of Image Processing Theory and Applications
-
Mobile Computing and Networking
-
Vehicle Power and Propulsion
-
Frontiers in Computer Vision and Pattern Recognition
-
Knowledge Discovery and Data Mining Letters
-
Big Data Analysis and Cloud Computing
-
Electrical Insulation and Dielectrics
-
Crypto and Information Security
-
Journal of Neural Information Processing
-
Collaborative and Social Computing
-
International Journal of Network and Communication Technology
-
File and Storage Technologies
-
Frontiers in Genetic and Evolutionary Computation
-
Optical Network Design and Modeling
-
Journal of Virtual Reality and Artificial Intelligence
-
Natural Language Processing and Speech Recognition
-
Journal of High-Voltage
-
Programming Languages and Operating Systems
-
Visual Communications and Image Processing
-
Journal of Systems Analysis and Integration
-
Knowledge Representation and Automated Reasoning
-
Review of Information Display Techniques
-
Data and Knowledge Engineering
-
Journal of Database Systems
-
Journal of Cluster and Grid Computing
-
Cloud and Service-Oriented Computing
-
Journal of Networking, Architecture and Storage
-
Journal of Software Engineering and Metrics
-
Visualization Techniques
-
Journal of Parallel and Distributed Processing
-
Journal of Modeling, Analysis and Simulation
-
Journal of Privacy, Trust and Security
-
Journal of Cognitive Informatics and Cognitive Computing
-
Lecture Notes on Wireless Networks and Communications
-
International Journal of Computer and Communications Security
-
Journal of Multimedia Techniques
-
Automation and Machine Learning
-
Computational Linguistics Letters
-
Journal of Computer Architecture and Design
-
Journal of Ubiquitous and Future Networks