A Study on Malicious Software Affecting Computer Network Security and Prevailing Techniques in the Big Data Era

Authors

  •   S. Induja Assistant Professor, Department of Computer Science (Artificial Intelligence), Theeran Chinnamalai College of Arts and Science For Women, Avinashi to Mangalam Road, Tirupur - 641 663, Tamil Nadu

DOI:

https://doi.org/10.17010/ijcs/2025/v10/i6/175907

Keywords:

Malicious software, network issues, network security, threats.
Publication Chronology: Paper Submission Date : November 15, 2025 ; Paper sent back for Revision : November 23, 2025 ; Paper Acceptance Date : December 2, 2025 ; Paper Published Online : December 5, 2025.

Abstract

With the coming of the World Wide Web and the rise of e-commerce sites and social media platforms, businesses around the world are creating a huge amount of data every day. Information security is one of the most important things to make sure data is sent safely over the internet. Also, network security is becoming more important as society moves towards a digital age. As more people use the internet, it also brings more chances for cyber attacks. It is necessary to protect computers and networks which are key concerns. Harmful systems can cause problems in the network. They can use resources from different systems to protect their own. The present paper gives an overview of network security and the different methods that can help improve it, such as Cryptography.

Downloads

Download data is not yet available.

Published

2025-12-05

How to Cite

Induja, S. (2025). A Study on Malicious Software Affecting Computer Network Security and Prevailing Techniques in the Big Data Era. Indian Journal of Computer Science, 10(6), 8–12. https://doi.org/10.17010/ijcs/2025/v10/i6/175907

References

[1] Z. Wang, Z. Liu, and X. Xie, “The research of network security technologies,” in Conf. Anti-counterfeiting, Secur., Identification Communication, 2009, doi: 10.1109/ICASID.2009.5277012.

[2] X. Yue, W. Chen, and Y. Wang, “The research of firewall technology in computer network security,” in 2009 2nd Asia-Pacific Conf. Computational Intell. Industrial Applications, vol. 2, 2009, pp. 421–424, College Comput. Information Eng. Heilongjiang Inst. Sci. Technol. Harbin, China. doi: 10.1109/PACIIA.2009.5406566.

[3] A. Hess and G. Schafter, “Realizing a flexible access control mechanism for active nodes based on active networking technology,” in 2004 IEEE Int. Conf. Communications, Paris, France, 2004, pp. 68–72, vol.1, doi: 10.1109/ICC.2004.1312454.

[4] Narangerel, T. S. and Dolgorsuren, T., “Network security and firewall technology,” in Int. J. Comput. Trends Technol., vol. 71, no. 5, pp. 80–84, May 2023, doi: 10.14445/22312803/IJCTT-V71I5P113.

[5]A. Mayer, A. Wool, and E. Ziskind, “Fang: A firewall analysis engine,” in Proc. IEEE Symp. Secur. Privacy, S&P 2000, Berkeley, CA, USA, 2000, pp. 177–187, doi: 10.1109/SECPRI.2000.848455.

[6] Narangerel, T. S. and Dolgorsuren, T., “Computer network security and technology,” Int. J. Comput. Trends Technol., vol. 71, no. 5, pp. 80–84, May 2023, doi: 10.14445/22312803/IJCTT-V71I5P113.

[7] T. Sushma, S. Narkedamilli, M. R. Chunduru, V. S. Lakshmi, G. B. N. Rao, and P. Kandukuri, “Deep learning based malware detection,” J. Theoretical Applied Information Technol., vol. 102, no. 12, pp. 5014–5020, Jun. 2024. [Online]. Available: https://www.jatit.org/volumes/Vol102No12/10Vol102No12.pdf

[8] Y. Sun, X. Liu, and X. Shen, “Computer network information security monitoring system based on Big Data era,” in Security and Communication Networks, Nov. 2022, Art. No. 3170164, 11. doi: 10.1155/2022/3170164.

[9] Z. Dong, J. Wei, X. Chen, and P. Zheng, “Face detection in security monitoring based on artificial intelligence video retrieval technology,” IEEE Access, vol. 8, no. 99, pp. 63421–63433, 2020, doi: 10.1109/ACCESS.2020.2982779.