Mobile QR Code QR CODE

2025

Reject Ratio

81.5%

Title Research on Security Evaluation Technology of Active Defense Network Driven by Big Data
Authors (Yunhong Guo) ; (Shihao Zhang)
DOI https://doi.org/10.5573/IEIESPC.2026.15.2.258
Page pp.258-271
ISSN 2287-5255
Keywords Active defense; Big data; Network security; Safety assessment
Abstract In the context of the rapid development of big data technology, the network security environment has become increasingly complex, making traditional passive defense strategies difficult to meet the needs of modern network security. Therefore, active defense network security assessment technology has become the focus of research.
This comprehensive article offers an insightful examination of the intricate challenges confronting network security amidst the proliferation of big data, emphasizing the paramount significance of adopting proactive defense strategies.
It meticulously explores the cornerstone of proactive defense network security evaluation technology, encompassing its fundamental principles, nuanced classification, established standards, and a meticulously crafted indicator system that together form a robust framework for assessing and enhancing cybersecurity posture. Through data comparison, it was found that active defense technology has a significant effect on network security. Out of 10 system paralysis events, organizations using passive defense technology experienced 8 paralysis incidents, with a success rate of up to 80%. In terms of data leakage incidents, passive defense technology has 65 leaks out of 100 incidents with a success rate of 65%, while active defense technology has reduced this rate to 30%, a decrease of about 45%. After adopting proactive defense technology, the average response time for security incidents has been reduced from 3 hours to 1 hour, and the average response time for serious security incidents has been reduced from 5 hours to 2 hours. The malware detection rate has also increased from 70% to 95%. Through case analysis and practical experience, this article can help enterprises develop and implement effective security defense strategies.