Research on the protection strategy of network security

被引:0
作者
Ji, Hong [1 ]
机构
[1] Xian Univ Sci & Technol, Network Ctr, Xian 710054, Shaanxi, Peoples R China
来源
ADVANCED RESEARCH ON INFORMATION SCIENCE, AUTOMATION AND MATERIAL SYSTEMS III | 2013年 / 703卷
关键词
network technology; network security; firewall; intrusion detection;
D O I
10.4028/www.scientific.net/AMR.703.236
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The global information has become the human development trend with the development of network technology. People enjoy the convenience brought by the network technology and confront many network security issues. Because the network attack behavior has concealment, complexity and permeability, the network security issues become increasingly prominent and the network security protection become more difficult. Based on the analysis of the threatening factors to the network security, such as hacking, computer viruses, computer system vulnerabilities, security issues of the network protocol, weak authentication and logic bombs, the firewall technology, intrusion detection technology, access control technology and computer virus protection technology are proposed to ensure safe and stable operation and use of network.
引用
收藏
页码:236 / 239
页数:4
相关论文
共 50 条
[41]   Enterprise Network Virus Protection Research [J].
Zhou, Yanjie ;
Ma, Li ;
Wen, Min .
PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON MECHATRONICS, MATERIALS, CHEMISTRY AND COMPUTER ENGINEERING 2015 (ICMMCCE 2015), 2015, 39 :1249-1254
[42]   Research on application of neural network in computer network security evaluation [J].
Jin, Shujuan .
Open Electrical and Electronic Engineering Journal, 2015, 8 (01) :766-771
[43]   Computer Multimedia Security Protection System Based on the Network Security Active Defense Model [J].
Shang, Yanhong ;
Zhang, Jing .
Zhang, Jing (2016120252@jou.edu.cn), 1600, Hindawi Limited (2021)
[44]   Research on Computer Network Security and Its Countermeasures [J].
Jian, Li .
2018 5TH INTERNATIONAL CONFERENCE ON ELECTRICAL & ELECTRONICS ENGINEERING AND COMPUTER SCIENCE (ICEEECS 2018), 2018, :370-373
[45]   Research on Computer Network Security and Encryption Technology [J].
Wang, Yanjun .
PROCEEDINGS OF THE 2016 6TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS, ENVIRONMENT, BIOTECHNOLOGY AND COMPUTER (MMEBC), 2016, 88 :111-114
[46]   The Research of Network Security Based on Cognitive Radio [J].
Mu, Ruihui ;
Li, Junwei .
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (06) :193-203
[47]   Research on Computer Network Security Anti - attack [J].
Liang, Liu Zheng ;
Min, Lai .
PROCEEDINGS OF THE 2017 5TH INTERNATIONAL CONFERENCE ON FRONTIERS OF MANUFACTURING SCIENCE AND MEASURING TECHNOLOGY (FMSMT 2017), 2017, 130 :188-191
[48]   Research for Network Security and Reliability and Performance Assess [J].
Yang Yu-xing .
2013 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND ENGINEERING APPLICATIONS, 2013, :444-447
[49]   Research on Network Security Precaution in Computer Application [J].
Ping, Li .
2018 5TH INTERNATIONAL CONFERENCE ON ELECTRICAL & ELECTRONICS ENGINEERING AND COMPUTER SCIENCE (ICEEECS 2018), 2018, :518-521
[50]   Computer network security and defense technology research [J].
Wang Qing ;
Chen Hongju .
PROCEEDINGS 2016 EIGHTH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION ICMTMA 2016, 2016, :155-157