The Study of Network Information Security Based on Information Filtering Technology

Article Preview

Abstract:

It is analysed and summarized the China’s big ten network media events in recent years, and concluded the commonness among the network hot events and the causation that attention by netizens. According to the characteristics of the events, it is extracted keywords, record and statistics the appearing and propagation characteristics of the events in the network, and researched the optimization method for keywords. Finally, the keywords entered in network community warning and tracking system, mainly distributed in the router, the application server, terminal software, and the corresponding application is Forum、network access、email、instant messaging and online community, then conduce to the community network opinion supervision and management, in order to maintain social stability.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2978-2980

Citation:

Online since:

September 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] xiao ke. Reaearch on the responding model of the public opinion event on web[D]. Beijing: Beijing forestry university, (2011).

Google Scholar

[2] zhou jiang hui. The basic law and characteristics of network hot spots events[J]. Youth Journalist, 2011, (33): 32.

Google Scholar

[3] li wan li. Risk analysis and countermeasures for network society, journal of Chongqing university of science and technology(social sciences edition), 2012, (9): 54-56.

Google Scholar

[4] li gang, wang meng. strengthen the construction of network media and innovation virtual social management[J]. News front. 2012, (6): 76-77.

Google Scholar

[5] mei hai yan. Research on information filtering[J]. New technology of library and information service. 2002, (2): 44-47.

Google Scholar

[6] ding zhen fan. IP filtering technology and application of Cisco2501[EB/OL]. http: /mall. cnki. net/magazine/Article/JSJS200008023. htm, 2000-08-15.

Google Scholar