Research on the protection strategy of network security

被引:0
作者
Ji, Hong [1 ]
机构
[1] Xian Univ Sci & Technol, Network Ctr, Xian 710054, Shaanxi, Peoples R China
来源
ADVANCED RESEARCH ON INFORMATION SCIENCE, AUTOMATION AND MATERIAL SYSTEMS III | 2013年 / 703卷
关键词
network technology; network security; firewall; intrusion detection;
D O I
10.4028/www.scientific.net/AMR.703.236
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The global information has become the human development trend with the development of network technology. People enjoy the convenience brought by the network technology and confront many network security issues. Because the network attack behavior has concealment, complexity and permeability, the network security issues become increasingly prominent and the network security protection become more difficult. Based on the analysis of the threatening factors to the network security, such as hacking, computer viruses, computer system vulnerabilities, security issues of the network protocol, weak authentication and logic bombs, the firewall technology, intrusion detection technology, access control technology and computer virus protection technology are proposed to ensure safe and stable operation and use of network.
引用
收藏
页码:236 / 239
页数:4
相关论文
共 50 条
  • [21] Analysis and Protection of Computer Network Security Issues
    Ju Jinquan
    Al-Absi, Mohammed Abdulhakim
    Al-Absi, Ahmed Abdulhakim
    Lee, Hoon Jae
    2020 22ND INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT): DIGITAL SECURITY GLOBAL AGENDA FOR SAFE SOCIETY!, 2020, : 577 - 580
  • [22] Research on the game of network security attack-defense confrontation through the optimal defense strategy
    Liu, Fei
    Gao, Hongyan
    Wei, Zegang
    SECURITY AND PRIVACY, 2021, 4 (01)
  • [23] Technology Viewpoint of Network Security Development Strategy
    Hou, Fang-Yong
    Wang, Su-Feng
    2015 INTERNATIONAL CONFERENCE ON SOCIAL SCIENCE AND ENVIRONMENT (ICSSM 2015), 2015, : 102 - 105
  • [24] Evaluation of Network Security Grade Protection Combined With Deep Learning for Intrusion Detection
    Lin, Shaodan
    Feng, Chen
    Jiang, Tao
    Jing, Huasong
    IEEE ACCESS, 2023, 11 : 130990 - 131000
  • [25] Automation for Network Security Configuration: State of the Art and Research Trends
    Bringhenti, Daniele
    Marchetto, Guido
    Sisto, Riccardo
    Valenza, Fulvio
    ACM COMPUTING SURVEYS, 2024, 56 (03)
  • [26] Research on the Security Strategy for Wireless Sensor Networks
    Zhang, Jing
    2010 THE 3RD INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION (PACIIA2010), VOL V, 2010, : 100 - 103
  • [27] Research and Analysis on Network Security Modeling
    Cao, Kehao
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (04): : 135 - 142
  • [28] Network security scientific and research laboratory
    Miloslavskaia, N
    Tolstoi, A
    SECURITY EDUCATION AND CRITICAL INFRASTRUCTURES, 2003, 125 : 231 - 241
  • [29] Research on Comprehensive Enterprise Network Security
    Li, Wenzheng
    Zhu, Hongdan
    PROCEEDINGS OF 2021 IEEE 11TH INTERNATIONAL CONFERENCE ON ELECTRONICS INFORMATION AND EMERGENCY COMMUNICATION (ICEIEC 2021), 2021, : 204 - 209
  • [30] Network security protection technology for a cloud energy storage network controller
    Yan T.
    Liu J.
    Niu Q.
    Chen J.
    Xu S.
    Niu M.
    Yan, Tao (yantao@epri.sgcc.com.cn), 1600, KeAi Publishing Communications Ltd. (03): : 85 - 97