Abstract
In recent years, big data, with its rich value, has been widely concerned by academia and enterprises. Managing and utilizing big data and building big data services are the key ways to tap the value of big data. This paper mainly studies the security testing technology and protection technology analysis of computer software technology under the background of big data. This paper uses the IAAs framework of Cloudstack to build the cloud environment, and uses Apache ode as the trusted combination evaluation engine to implement the trusted combination evaluation method. In this paper, packet collection delay is used to measure the quality of network communication. In this paper, white box test is used to test the code segment of input control structure in the two-stage obfuscation code of core part of CROT, and the code before and after obfuscation is compared and analyzed to verify whether the code function is consistent. Black box test is used to analyze the obfuscation transformation function of CROT, and the code output before and after obfuscation is consistent when different numbers of classes are selected for obfuscation and the number of output classes is different. Data show that for Web Goat, 69% accuracy is achieved in the first 40 items. The results show that the software security testing in this paper has the advantages of high testing efficiency.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Knebel, K., Jokiniemi, J., Bottomley, P.D.: A review of revaporisation behaviour of radioactive Cs deposits and its impact on the source term in severe nuclear accidents from Phébus FP results and single effect testing. J. Nuclear Sci. Technol. 56(9–10), 772–789 (2019)
Asmat, A., Samsudin, S.S., Wahid, S.N.S.: Learning statistics course using computer_aided software: a case study among furniture technology students. Int. J. Mod. Trends Soc. Sci. 3(11), 99–106 (2020)
Sahay, R., Meng, W., Jensen, C.D.: The application of software defined networking on securing computer networks: a survey. J. Netw. Comput. Appl. 131(4), 89–108 (2019)
Ziadat, A.H.: The extent to which autistic student’s special education centers use computer software. TEM J. 9(2), 798–805 (2020)
Adelabu, F., Makgato, M., Ramaligela, S.M.: Teacher and student attitude toward the use of dynamic geometry computer software in teaching and learning mathematics. Int. J. Interdip. Educ. Stud. 15(2), 37–49 (2020)
Motyl, K., Musiaek, F.: A computer software application for the design and simulation of unguided rockets. Probl. Mechatron. Armament Aviat. Saf. Eng. 11(2), 67–80 (2020)
Vovk, M.I., Halian, Y.B., Kutsiak, O.A.: Computer software and hardware complex for personal oral speech restoration after a stroke. Sci. Innov. 16(1), 54–68 (2020)
Kalwasiński, D.: Computer software of virtual overhead crane simulator. Mechanik 92(7), 442–444 (2019)
Fedorko, G., Heinz, D., Molnár, V., et al.: Use of mathematical models and computer software for analysis of traffic noise. Open Eng. 10(1), 129–139 (2020)
Kirin, R.S., Khomenko, V.L.: Formation of legal protection of computer software by the rules of copyright and patent law. Nauka Innov. 15(6), 51–61 (2019)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Li, M. (2021). Security Testing Technology and Protection Technology in Computer Software Technology Under the Background of Big Data. In: Sugumaran, V., Xu, Z., Zhou, H. (eds) Application of Intelligent Systems in Multi-modal Information Analytics. MMIA 2021. Advances in Intelligent Systems and Computing, vol 1384. Springer, Cham. https://doi.org/10.1007/978-3-030-74811-1_55
Download citation
DOI: https://doi.org/10.1007/978-3-030-74811-1_55
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-74810-4
Online ISBN: 978-3-030-74811-1
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)