New Path of Data Science to Ensure Network Information Security in the Age of Big Data
Abstract
analyzes challenges including explosive data growth, intelligent cyberattack tactics, balancing privacy protection with data utilization, and the
limitations of traditional security frameworks. The study highlights core applications of data science in cybersecurity, such as machine learning-driven anomaly detection, graph analytics for identifying complex attack chains, natural language processing in threat intelligence mining,
and predictive analytics for building proactive defense systems. Key technological breakthroughs are introduced, including federated learning
for privacy-preserving collaborative defense, knowledge graphs for threat intelligence systems, edge computing enabling real-time security responses, and blockchain technology ensuring tamper-proof security logs. The paper further examines industry-specific applications: intelligent
upgrades of anti-fraud systems in finance, situational awareness platforms for critical infrastructure, security solutions for government data
openness, and IoT device cluster protection practices. Finally, it outlines future trends including quantum computings impact on encryption
systems and countermeasures, evolving AI security defense strategies, compliance solutions for cross-border data flows, and the development
of security talent cultivation and technological innovation ecosystems.
Keywords
Full Text:
PDFReferences
[1] Han Wen, Bin Gaoqi. "Reflections on Network Information Security Education in the Internet+ Era". Journal of Qilu Normal University. 2018, 33(01):18-25.
[2] AI Platform for Information Security [P]. Sun Hu. Guangdong Rongtian Century Information Technology Co., Ltd.2025.
[3] Research on the Current Status and Strategies of Cybersecurity Literacy Cultivation for Military Students. Ma Ling; Shen Xin. Chinas
Military-to-Civilian Transition, 2025(18).
[4] Blockchain-based Information Security Contract Signing System [P]. Zhang Guangyu, Wang Chongjing, Yang Lixin, Man Wentao,
Chen Shanshan. Jining Energy Development Group Co., Ltd.2025.
[5] The current list of international information security standards published by ISO/IEC JTC1/SC27. Information Technology and Standardization, 2025(09).
DOI: http://dx.doi.org/10.70711/aitr.v3i5.8352
Refbacks
- There are currently no refbacks.