Research on the protection strategy of network security

被引:0
|
作者
Ji, Hong [1 ]
机构
[1] Xian Univ Sci & Technol, Network Ctr, Xian 710054, Shaanxi, Peoples R China
来源
ADVANCED RESEARCH ON INFORMATION SCIENCE, AUTOMATION AND MATERIAL SYSTEMS III | 2013年 / 703卷
关键词
network technology; network security; firewall; intrusion detection;
D O I
10.4028/www.scientific.net/AMR.703.236
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The global information has become the human development trend with the development of network technology. People enjoy the convenience brought by the network technology and confront many network security issues. Because the network attack behavior has concealment, complexity and permeability, the network security issues become increasingly prominent and the network security protection become more difficult. Based on the analysis of the threatening factors to the network security, such as hacking, computer viruses, computer system vulnerabilities, security issues of the network protocol, weak authentication and logic bombs, the firewall technology, intrusion detection technology, access control technology and computer virus protection technology are proposed to ensure safe and stable operation and use of network.
引用
收藏
页码:236 / 239
页数:4
相关论文
共 50 条
  • [1] Research on Network Security Protection Strategy
    Ye Yalin
    Yan Lina
    Ren Shuai
    Zhang Qian
    2019 INTERNATIONAL CONFERENCE ON ROBOTS & INTELLIGENT SYSTEM (ICRIS 2019), 2019, : 152 - 154
  • [2] The Research of Computer Network Security and Protection Strategy
    He, Jian
    MATERIALS SCIENCE, ENERGY TECHNOLOGY, AND POWER ENGINEERING I, 2017, 1839
  • [3] Research on Security Issues and Protection Strategy of Computer Network
    Zhu, Min
    Luo, Yong-jian
    Yang, Jun-qiang
    Xing, Ming-shun
    Zhao, Jing
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN MECHANICAL ENGINEERING AND INDUSTRIAL INFORMATICS (AMEII 2016), 2016, 73 : 284 - 287
  • [4] Study on Security and Protection Strategy of Computer Network Information
    Zhang, Chenxiang
    Proceedings of the 2nd International Conference on Electronics, Network and Computer Engineering (ICENCE 2016), 2016, 67 : 74 - 77
  • [5] The Research of Network Security Technologies
    Wang, Zhen
    Liu, Zhijie
    Xie, Xiaoyao
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION IN COMMUNICATION, 2009, : 585 - 587
  • [6] Research on the Network Technology Security
    Rong, Wang
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT, COMPUTER AND SOCIETY, 2016, 37 : 1739 - 1741
  • [7] Discussion and Practice of Computer Network Information and Network Security Protection Strategy
    Liu, Li
    2020 5TH INTERNATIONAL CONFERENCE ON MECHANICAL, CONTROL AND COMPUTER ENGINEERING (ICMCCE 2020), 2020, : 1810 - 1813
  • [8] Research on Computer Network Security Protection Technology Incorporating Full Convolutional Networks
    Duan X.
    Zhang S.
    Feng L.
    Zhang L.
    Applied Mathematics and Nonlinear Sciences, 2023,
  • [9] A technique research of intrusion detection on network security
    Yang, QX
    Han, X
    ISTM/2003: 5TH INTERNATIONAL SYMPOSIUM ON TEST AND MEASUREMENT, VOLS 1-6, CONFERENCE PROCEEDINGS, 2003, : 4721 - 4724
  • [10] Protection System for Network Boundary Security
    Huang, Xiaobo
    Zhang, Mingxue
    Wang, Xiaoyan
    PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 6, 2010, : 620 - 623