Research on the protection strategy of network security

被引:0
作者
Ji, Hong [1 ]
机构
[1] Xian Univ Sci & Technol, Network Ctr, Xian 710054, Shaanxi, Peoples R China
来源
ADVANCED RESEARCH ON INFORMATION SCIENCE, AUTOMATION AND MATERIAL SYSTEMS III | 2013年 / 703卷
关键词
network technology; network security; firewall; intrusion detection;
D O I
10.4028/www.scientific.net/AMR.703.236
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The global information has become the human development trend with the development of network technology. People enjoy the convenience brought by the network technology and confront many network security issues. Because the network attack behavior has concealment, complexity and permeability, the network security issues become increasingly prominent and the network security protection become more difficult. Based on the analysis of the threatening factors to the network security, such as hacking, computer viruses, computer system vulnerabilities, security issues of the network protocol, weak authentication and logic bombs, the firewall technology, intrusion detection technology, access control technology and computer virus protection technology are proposed to ensure safe and stable operation and use of network.
引用
收藏
页码:236 / 239
页数:4
相关论文
共 50 条
  • [31] Research on Network Security Based on IPSec
    Liu, Yanru
    [J]. PROCEEDINGS OF THE 2016 7TH INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT, COMPUTER AND MEDICINE (EMCM 2016), 2017, 59 : 150 - 154
  • [32] Research on Comprehensive Enterprise Network Security
    Li, Wenzheng
    Zhu, Hongdan
    [J]. PROCEEDINGS OF 2021 IEEE 11TH INTERNATIONAL CONFERENCE ON ELECTRONICS INFORMATION AND EMERGENCY COMMUNICATION (ICEIEC 2021), 2021, : 204 - 209
  • [33] Research on the Security Strategy for Wireless Sensor Networks
    Zhang, Jing
    [J]. 2010 THE 3RD INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION (PACIIA2010), VOL V, 2010, : 100 - 103
  • [34] Research on security resilient network systems
    Li, ZH
    Li, WH
    Zhang, L
    [J]. CONCURRENT ENGINEERING: THE WORLDWIDE ENGINEERING GRID, PROCEEDINGS, 2004, : 45 - 49
  • [35] Research of network security and firewalls techniques
    Yang, QX
    [J]. ISTM/2005: 6TH INTERNATIONAL SYMPOSIUM ON TEST AND MEASUREMENT, VOLS 1-9, CONFERENCE PROCEEDINGS, 2005, : 8083 - 8085
  • [36] Research on Network Security and Data Encryption
    Duan, Zhongqi
    Xue, Xiaofeng
    [J]. INTELLIGENT STRUCTURE AND VIBRATION CONTROL, PTS 1 AND 2, 2011, 50-51 : 531 - +
  • [37] Research of Computer Network Security Technology
    Tan, Juan
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON MANAGEMENT, EDUCATION, INFORMATION AND CONTROL, 2015, 125 : 736 - 740
  • [38] Research on the Security Strategy for Wireless Sensor Networks
    Zhang, Jing
    [J]. APPLIED INFORMATICS AND COMMUNICATION, PT 5, 2011, 228 : 157 - 164
  • [39] Research on Network Defense Graph Model in Network Security
    Qi, Feng
    Xu, Haili
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (11): : 23 - 32
  • [40] Research on Campus Network Protection Technology
    Sui, Xin
    [J]. PROCEEDINGS OF THE 2017 7TH INTERNATIONAL CONFERENCE ON MECHATRONICS, COMPUTER AND EDUCATION INFORMATIONIZATION (MCEI 2017), 2017, 75 : 418 - 420