Abstract
Traditional network security job service model and single security technology cannot keep up with the changes of complex network structure and different intrusion measures. Network security job service model relying on rough dataset analysis algorithm has many advantages, such as low management cost, high flexibility and wide applicability. Rough dataset analysis algorithm can not only collect data, but also process data, but overcome the shortcomings of traditional network security job service model. It will improve response speed and reduce network burden. This paper introduces the construction of network security job service model, which based on rough dataset analysis algorithm into a new network security framework.
Keywords
Introduction
With the widespread application of the Internet, network security has become one of the main problems in the effective use of Internet technology [1, 2]. Information systems combined many advantages, such as security and confidentiality, availability, authenticity, integrity and availability [3, 4]. The improvement and prevention of computer network security can be achieved through access control policies. The real-time of this policy can effectively prevent network resources from being illegally used and accessed, and further improve the role of security protection. It can strengthen the control of access to the website. The security of network access can be improved by checking the user name, user password and account. Network administrators should limit the number and methods of user account logins, and specify password length, number of changes, and expiration dates. Once it breaks through or through security defenses such as firewalls, it can’t cope with the attack problem [5]. In recent years, the awareness of intellectual property rights in China’s enterprises has gradually increased, and intellectual property management and trade secret protection have gradually become hot issues in corporate management [6, 7]. With the improvement of the national information disclosure system, the security measures of information confidentiality management and information disclosure channels are also particularly important [8]. Due to the wide application of computers and networks, most of the infrastructure that related to the normal operation of society is composed by computers and networks. Therefore, the risks faced by information systems have become a normal and effective operation of social production activities [9, 10].
Many researchers are faced with a lot of information security and network security issues from the network security operation service model, and specific security technologies have done a lot of work to achieved some results, but this is not suitable for various network intrusions. Behavior analysis technology is a new technology used by the IT security industry to prevent hackers. It will leave audit trail records and network traffic when they apply the network. By collecting and processing the information, we can obtain a user behavior baseline. And the application of user behavior analysis technology can more accurately identify entities other than users that threaten network security, focus on network traffic anomalies and deviations from normal operations, to protect computers from internal and external threats, user behavior analysis The big data technology applied in the process is time series data mining analysis technology. It is now very common to complete security and interoperable services at a heterogeneous network level. Multi-application network access control should ensure the autonomy of each domain. It has an independent user collection and effective user role allocation management. It is necessary to formulate safe and efficient mapping rules and mapping methods so that related factors such as permission inheritance and role hierarchy cannot conflict. In this way, policy management finally achieves dynamic access control between domains.
The analysis algorithm of dataset
It is extremely important to ensure the security of data information in a cloud computing environment. The hidden dangers of network security are mainly reflected in users ‘illegal access to confidential data, malicious disclosure of users’ privacy, and illegal operations to infect viruses. If they are not controlled in time, they will cause huge losses and social impacts. Before the emergence of network intrusion detection technology, network security was mostly protected by defensive measures such as access control, firewalls, and keys, but the results were not good, and it was difficult to dynamically adjust security policies based on changes in network behavior, so it was difficult to be timely and effective. To detect network intrusions. Practice has shown that the effect is better and provides a good choice for weight optimization, but the biggest drawback is still the single machine mode. As the network scale becomes larger and larger, the total amount of network data shows a massive growth trend of geometric multiples. If the traditional stand-alone working mode is still used, there must be problems such as poor real-time performance and low work efficiency, and it is difficult to meet network intrusion security detection. Requirements.
Figure 1 is a rough dataset analysis framework. The core model is dynamic to the dataset. Therefore, we propose a framework that relies on the rough dataset analysis algorithm to replace the traditional network security job service model with fixed functions. It will be retained as a mobile to operate environment. In the fixed device, the network security operation service model manager transfers the rough dataset analysis algorithm according to the feedback information and the security policy to have security functions for the device. Therefore, the function of the network security operation service model can be changed according to the device state.

Rough dataset analysis framework.
Network security operation service model construction: The main task of building a network security operation service model is to manage and cooperate with the network security operation service model according to the network security operation service model control protocol. For network security job services, the model needs to provide operations such as create, run, hang up, terminate. This requires building a network security job service model, protecting and verifying the network security job service model. Data encryption technology refers to a technology that uses a computer as a system carrier, uses encryption keys and various algorithms, and combines network information reorganization to properly encrypt data and information to ensure network information security. The basic performance is that when data is encrypted, due to the role of the algorithm, the data information is converted into ciphertext. When this network information is required, a key is required to complete and correctly obtain the corresponding secret. Text information, to a large extent, guarantees the security of network information data. The most direct reason for the emergence of data encryption technology is that when users use the computer, especially during the storage of information data or the use of information data, there will be information leakage and loss due to some bad factors. The problem. This brings great confusion to users, and may even cause some economic losses to users. Therefore, the emergence and use of data encryption technology has become the key to protect users’ information data and interests. It will apply for new resources when the network security job service model is running. When the network security job service model is in a wait state for a long time, can the network security job service model manager hang up or terminate it? When the current network security job service model cannot carry new jobs, can the network security job service model manager create a new network security job service model to complete it? In short, through the network security job service model manager, we can According to any, Resources, history and behavior of external information systems to change the type and number of network operation service model of network security, reconstruction system?
Security Policy Database: An intelligent security system consists of a system administrator or an established security policy consisting of online learning functions. Security network management needs to improve its own security awareness, such as regular virus killing and not using computers to browse risky web pages. Enterprises should establish a system security management system, such as clarifying the computer’s operating authority and regularly performing software upgrades. Network security management personnel should also monitor the network in time to detect potential risk factors in a timely manner and set up interceptions for user violations. In addition, we must strengthen the physical defense of computer networks, such as regular cleaning up of computer waste by users, which can also improve the computer’s operating efficiency and the security of the network’s operating environment to a certain extent.
The network security operation service model is a network security operation service. Network security operations services are independent, active, open and non-blank. In the daily operation process, computer users complete the login and application of multiple network platforms and software clients through the registration of different accounts. These accounts need to be associated and verified with each other to complete the specific operations that take effect. Personal information leakage provides black soil for the transmission of spam. Account password encryption is an important measure to effectively strengthen the security of information and data, ensure the security of user accounts, and prevent the reception of spam caused by information leakage. Under the background of the era of big data, the storage and circulation of computer information and data is widespread. File encryption and digital signature technology are the most direct and simple means to effectively ensure the security of computer information and data. The information data in transmission is mainly operated by data signature technology to avoid computer information damage and data theft caused by malicious information interception. File encryption focuses on strengthening the security of computer information. The application of encryption protection technology can effectively prevent confidential files and information data from being maliciously damaged or stolen. In the context of the era of big data, the rapid development and extensive coverage of network technology and cloud audit network applications, the security risks that interfere with and destroy computer information and data are gradually updated, and the best security guarantee for cloud audit network systems and user information and data. Protective technology and preventive measures are obtained on the premise of continuous improvement. Therefore, we will continue to fully integrate big data resources with network security technology, and based on this, continue to improve the cloud audit network information security protection system. It is the construction of an efficient network information security protection system in the new era.
Different from the above-mentioned general network security operation service model system, considering the actual requirements of the security system, we propose a network security operation service model suitable for the security system. As showing in Fig. 3, the network information security system includes a communication module, an operation request module, an online test module, and a local algorithm database.

The schematic diagram of security framework based on network security job service model.

Network security job service model building structure.
Communication module is the interface layer of the network security operation service model. It is responsible for transmitting various information, including: constructing and receiving control commands from the network security operation service model. The Communication module will feed back the local network security operation service model information to the network security operation. Service model building will exchange information with local monitoring modules.
The monitoring module is the core of the network security operation service model. It is responsible for performing network security operations service model tasks. The monitoring module determines whether the system is invaded according to the information obtained by the environment request module and according to a predefined intrusion model. When the system has security risks, query the local policy database. After the system and the database are successfully matched, corresponding measures are taken. There is no corresponding policy in the local policy database, and the system passes this information to the network security job service model manager through the communication module and waits for new instructions.
There are many security risk factors in the actual use of computer networks. In order to be able to effectively solve the security problems in the computer network, the computer network should establish a complete computer intelligent security monitoring platform. Computer security monitoring, as an important work content, should be carefully divided into security monitoring content. The modules in the computer intelligent security monitoring platform include network security alarm module, network risk assessment module, network remote security intelligent monitoring module and network security emergency module. In the actual application process of the network risk assessment module, it can complete the effective assessment of the risk factors and unsafe factors in the computer, and provide alarm and emergency functions for the intelligent monitoring of the computer. The application of the network security alarm module solves the problems in intelligent computer security monitoring, which improves the computer security emergency response effect, effectively prevents the problem of computer data information damage, avoids the phenomenon of data information damage, and makes the computer intelligent monitoring more visible. The application of the network security emergency module effectively solves the unexpected problems in the intelligent security monitoring of computers, improves the emergency response effect and quality of computers, and prevents serious damage to computer data information. The network remote security intelligent monitoring module can carry out real-time intelligent security monitoring of data information in the area under limited conditions.
This operating environment defines the tasks and tasks required for the network security job service model tasks. The network security operation service model is constructed by the network security operation service model transmission protocol, and the network security operation service model is moved between the hosts. The effective application of network security system technology can ensure that the cloud audit network system can operate safely and normally without being attacked by viruses. The firewall isolation technology is an effective isolation method that completes the virus protection and realizes the safe operation of the computer through the application of the topology structure. It has stable and reliable technical characteristics. With the widespread application of firewall technology in various cloud audit network application fields in society in recent years, while fulfilling certain computer virus isolation and protection measures, the firewall’s own technology is also constantly being updated and strengthened. The firewall application in the context of the big data era uses the latest technology to implement internal and external separation management of information, which obviously produces high-quality and high-intensity security protection for the binning structure divided into internal information, which ensures the core information data of the cloud audit network system Security provides a stable and reliable security environment for the operation of computer systems.
The environment request module is a window of the network security operation service model. It is responsible for the information requested by the monitored device. Information technology generally focuses on the system’s own hardening and protection methods. In this process, if a higher security operating system and data information are used, the data information needs to be encrypted and authenticated. The traditional information system security model is formulated for a special environment and cannot effectively describe the network environment. It is also subject to security threats during use. With the continuous deep development of the network, it has been unable to fully meet the needs of the Internet network security of the dynamic computer system. The environment request module also responds to the security network security job service model. The environment request module prevents the network security operation service model of the monitored device from illegally accessing resources through an access control policy. The environment request module is an illegal authentication that prevents external environment from accessing the network security operation service model through identity.
In the actual application process, the network risk assessment module can effectively evaluate the risk factors and unsafe factors in the computer. It will provide alarm and emergency functions for the computer intelligent monitoring. The application of the network security alarm module solves the problems in computer intelligent security monitoring and improves the computer security emergency treatment effect. It can effectively prevent the problem of computer data information damage and avoids the phenomenon of data information damage. The monitoring system is more visible. The application of the network security emergency module effectively solves the emergent problems in the computer intelligent security monitoring which improves the computer emergency processing effect and quality. The network can carry out real-time intelligent security monitoring on the data information in the area under limited conditions. The intelligent security monitoring of computers is mainly used for security monitoring. The establishment of a computer intelligent platform provides a comprehensive and three-dimensional intelligent security monitoring for computers and promotes the effective development of the computer industry.
The results show that even though some network security job service model building models are in the training phase, the algorithms seem to be good learners; after the quizzing phase, their bodies are too healthy. For example, the multi-class network security job service model building model produced the correct classification value of training way of 72.321%, but its performance dropped to 50.259% in the experimental phase. Similarly, the job service model of network security seems to be so suitable. On the other hand, even if the train pressurization performance of the train and quiz bench and the Dag classification is not over-fitting, their learning performance is not enough to meet the benchmark criteria. Acceptable Inexperience Bayesian performance values are not only related to error value, but also belong to Kappa statistics, F-measurements, and ROC curves. There may be potential over-application threats to the network security operations service model. Even if the correct classification rate of the model is 90.059%, compared with the correct training, the classification rate in the training phase is significantly reduced (95.614%) in the actual quiz. As mentioned in the previous section, it is no alternative quiz data in this study. The overfitting problem is still a problem for the NB tree network security job service model. In the network security job service model used in this study. The LBR and VFI network security job service model produced the most accurate results with low error rate and high kappa. Those two-network security job service model does not seem to be suitable for LBR even during its quizzing phase relative to its train phase. All of these performance results are shown in Table 1. In addition, the ROC curves for LBR and VFI in Fig. 4. It is derived from a 10-fold cross-validation quiz. The results of the network security job service model construction model are given. In these figures, the y-axis represents the tp rate and the x-axis represents the fp rate of the area outside the curve. The weighted average of the plot area is used as a measure of performance, including learning costs. As showing in Fig. 4, the ROC curve of LBR is the curve from tp/fp. In the quiz the value of ROC area is 0.963, Fig. 5 shows the ROC curve of VFI, which is obtained from the tp/fp rate of “risk”. With a ROC area value of 0.9651, five network security job service models were also used to build the model. The purpose of the experiment was to observe whether these network security job service model building models provide a learning curve for the five network security job service model quiz. The results show that the size of dataset in this quiz is increased to 342 instances. The learning ability of the five-network security job service model seems to be The maximum is reached. All of these results are represented in the slope curve progression of Fig. 6 Bayes Net, respectively. However, it should be mentioned that due to the limited size of the data sets set in this study, these results do not guarantee whether these network security job service model building models have reached the maximum limit of their tilt performance.
Comparison of 11 different network security job service model construction methods for 342 instances
Comparison of 11 different network security job service model construction methods for 342 instances

The ROC curve of LazyLBR network security job service model.

The ROC curve of the VFI network security job service model.

The Bayesian network learning performance.
Security has become one of the important indicators for evaluating information systems. How to express the security of information systems. The security framework that relies on the rough dataset analysis algorithm to transfer process functions can bring original data, rather than passing the original data processing function, like the traditional network security job service model, which can bring the complexity of the network security job service model structure. The security problem that leads to the network security operation service model itself? So the new security framework can bring intelligence and agility, and is more suitable for complex network structures. By strictly performing computer network security testing, network information security problems can be effectively solved. At the same time, a comprehensive protection system for computer network security was established. While building a network information security system, computer users should also raise their awareness of security threats to further defend against various security threats from computer networks.
