Education, Science, Technology, Innovation and Life
Open Access
Sign In

Research on Computer Network Virus Defense Method Based on Data Mining Technology

Download as PDF

DOI: 10.23977/cpcs.2025.090105 | Downloads: 7 | Views: 455

Author(s)

Wang Zeding 1

Affiliation(s)

1 North China Electric Power University, Baoding, Hebei, China

Corresponding Author

Wang Zeding

ABSTRACT

With the rapid development of computer network technology, virus attack methods are becoming increasingly complex and concealed, and traditional defense methods relying on signature database matching have difficulty coping with unknown threats. Data mining technology, with its powerful data processing and pattern discovery capabilities, provides new ideas for network virus defense. By analyzing massive amounts of data such as network traffic and system logs, the potential patterns of virus behavior can be mined, and dynamic detection models can be constructed to achieve a transformation from passive response to active defense. The research combines classification, clustering, and association rule algorithms to explore key technologies for virus feature extraction and behavior prediction, aiming to break through the limitations of traditional methods, improve detection efficiency and accuracy, and lay a foundation for building an intelligent and adaptive network security system.

KEYWORDS

Data Mining Technology; Computer Network Viruses; Defense Methods

CITE THIS PAPER

Wang Zeding, Research on Computer Network Virus Defense Method Based on Data Mining Technology. Computing, Performance and Communication Systems (2025) Vol. 9: 30-35. DOI: http://dx.doi.org/10.23977/cpcs.2025.090105.

REFERENCES

[1] Yin H. Computer Network Virus Defense Technology Based on Data Mining Technology[C]//IOP Conference Series: Materials Science and Engineering. IOP Publishing, 2018, 382(5): 052019.
[2] Hou J, Ding F .Design and Analysis of Network Virus Defense System Based on Multimodal Data Mining Technology [J].Scientific Programming, 2022, 2022(000):11.
[3] Sheng J .Research on SQL Injection Attack and Defense Technology of Power Dispatching Data Network: Based on Data Mining [J].Mobile Information Systems, 2022, 2022(000):8.
[4] Zuo C .Defense of Computer Network Viruses Based on Data Mining Technology [J].Int. J. Netw. Secur. 2018, 20:805-810. 
[5] Yin H .Computer Network Virus Defense Technology Based on Data Mining Technology[C]. IOP Conference Series: Materials Science and Engineering, 2018:18. DOI 10.1088/1757-899X/382/5/052019 
[6] Lan C .Data Mining Technology Based on Granular Computing in Computer Network Virus Defense [C]//International Conference on Frontier Computing. Springer, Singapore, 2021:12-14.
[7] Jingzi D, Xuangong L .Design and Implementation of Network Virus Defense System Based on Data Mining Technology[J].China Computer & Communication, 2018:13-15.

Downloads: 3202
Visits: 189835

Sponsors, Associates, and Links


All published work is licensed under a Creative Commons Attribution 4.0 International License.

Copyright © 2016 - 2031 Clausius Scientific Press Inc. All Rights Reserved.