pisco_log
banner

New Path of Data Science to Ensure Network Information Security in the Age of Big Data

Zhiwen Min, Xiaoyi Huang

Abstract


This paper explores innovative approaches to ensuring network information security through data science in the big data era. It
analyzes challenges including explosive data growth, intelligent cyberattack tactics, balancing privacy protection with data utilization, and the
limitations of traditional security frameworks. The study highlights core applications of data science in cybersecurity, such as machine learning-driven anomaly detection, graph analytics for identifying complex attack chains, natural language processing in threat intelligence mining,
and predictive analytics for building proactive defense systems. Key technological breakthroughs are introduced, including federated learning
for privacy-preserving collaborative defense, knowledge graphs for threat intelligence systems, edge computing enabling real-time security responses, and blockchain technology ensuring tamper-proof security logs. The paper further examines industry-specific applications: intelligent
upgrades of anti-fraud systems in finance, situational awareness platforms for critical infrastructure, security solutions for government data
openness, and IoT device cluster protection practices. Finally, it outlines future trends including quantum computings impact on encryption
systems and countermeasures, evolving AI security defense strategies, compliance solutions for cross-border data flows, and the development
of security talent cultivation and technological innovation ecosystems.

Keywords


Big data; Network information; Application

Full Text:

PDF

Included Database


References


[1] Han Wen, Bin Gaoqi. "Reflections on Network Information Security Education in the Internet+ Era". Journal of Qilu Normal University. 2018, 33(01):18-25.

[2] AI Platform for Information Security [P]. Sun Hu. Guangdong Rongtian Century Information Technology Co., Ltd.2025.

[3] Research on the Current Status and Strategies of Cybersecurity Literacy Cultivation for Military Students. Ma Ling; Shen Xin. Chinas

Military-to-Civilian Transition, 2025(18).

[4] Blockchain-based Information Security Contract Signing System [P]. Zhang Guangyu, Wang Chongjing, Yang Lixin, Man Wentao,

Chen Shanshan. Jining Energy Development Group Co., Ltd.2025.

[5] The current list of international information security standards published by ISO/IEC JTC1/SC27. Information Technology and Standardization, 2025(09).




DOI: http://dx.doi.org/10.70711/aitr.v3i5.8352

Refbacks

  • There are currently no refbacks.