Anti-tampering Monitoring Method of Network Sensitive Information Based on Big Data Analysis

  • Yi ShenEmail author
  • Lu Zhang
Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 302)


To improve the security of network sensitive information transmission and storage, it is necessary to design the anti-tampering monitoring of network sensitive information, and a tamper-proof monitoring technology of network sensitive information in big data environment based on big data dimension feature block is proposed. Big data feature space reconstruction method is used to calculate the grid density of network sensitive information distribution, and the network sensitive information to be tampered-proof monitoring is mapped to the divided high-dimensional phase space through the density threshold. The high dimensional phase space of information distribution is divided into dense unit and sparse unit. The coded key is matched to the corresponding network sensitive information block to realize information encryption and covert communication. The simulation results show that the information steganography performance of network sensitive information transmission and storage using this information tampering monitoring technology is better, and the information security transmission ability is improved.


Big data Network sensitive information Tamper-proof monitoring Information security 


  1. 1.
    Han, D., Chen, X., Lei, Y., et al.: Real-time data analysis system based on Spark Streaming and its application. J. Comput. Appl. 37(5), 1263–1269 (2017)Google Scholar
  2. 2.
    Zhu, Y., Zhu, X., Wang, J.: Time series motif discovery algorithm based on subsequence full join and maximum clique. J. Comput. Appl. 39(2), 414–420 (2019)Google Scholar
  3. 3.
    Ma, Y., Zhang, Z., Lin, C.: Research progress in similarity join query of big data. J. Comput. Appl. 38(4), 978–986 (2018)Google Scholar
  4. 4.
    Zheng, N., Wang, J.: Evidence characteristics and attribute reduction of incomplete ordered information system. Comput. Eng. Appl. 54(21), 43–47 (2018)Google Scholar
  5. 5.
    Yang, L., Kong, Z., Shi, H.: Multi-controller dynamic deployment strategy of software defined spatial information network. Comput. Eng. 44(10), 58–63 (2018)Google Scholar
  6. 6.
    Luo, H., Wan, C., Kong, F.: Salient region detection algorithm via KL divergence and multi-scale merging. J. Electron. Inf. 38(7), 1594–1601 (2016)Google Scholar
  7. 7.
    Stoean, C., Preuss, M., Stoean, R., et al.: Multimodal optimization by means of a topological species conservation algorithm. IEEE Trans. Evol. Comput. 14(6), 842–864 (2010)CrossRefGoogle Scholar
  8. 8.
    Liang, J.J., Qu, B.Y., Mao, X.B., et al.: Differential evolution based on fitness Euclidean-distance ratio for multimodal optimization. Neurocomputing 137(8), 252–260 (2014)CrossRefGoogle Scholar
  9. 9.
    Xu, G., Cheng, X.J.: Adaptive reduction algorithm of scattered point clouds based on wavelet technology. J. Tongji Univ. (Nat. Sci.) 41(11), 1738–1743 (2013)Google Scholar
  10. 10.
    Bi, A., Wang, S.: Transfer affinity propagation clustering algorithm based on Kullback-Leiber distance. J. Electron. Inf. 38(8), 2076–2084 (2016)Google Scholar
  11. 11.
    Long, M., Wang, J., Ding, G., et al.: Adaptation regularization, a general framework for transfer learning. IEEE Trans. Knowl. Data Eng. 26(5), 1076–1089 (2014)CrossRefGoogle Scholar
  12. 12.
    Bi, A., Dong, A., Wang, S.: A dynamic data stream clustering algorithm based on probability and exemplar. J. Comput. Res. Dev. 53(5), 1029–1042 (2016)Google Scholar

Copyright information

© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2019

Authors and Affiliations

  1. 1.Anyang Vocational and Technical CollegeAnyangChina

Personalised recommendations