Computer Network Security and Technology Research

被引:7
|
作者
Fan Yan [1 ]
Yang Jian-wen [2 ]
Cheng Lin [1 ]
机构
[1] Jiangxi Sci & Technol Normal Univ, Coll Math & Comp Sci, Nanchang 330038, Jiangxi, Peoples R China
[2] Chinese Unicom Jiangxi Branch, Fuzhou 330000, Jiangxi, Peoples R China
来源
2015 SEVENTH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION (ICMTMA 2015) | 2015年
关键词
Network Security; Authentication; Encryption; Firewall; Intrusion Detection System;
D O I
10.1109/ICMTMA.2015.77
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid development of computer network system brings both a great convenience and new security threats for users. Network security problem generally includes network system security and data security. Specifically, it refers to the reliability of network system, confidentiality, integrity and availability of data information in the system. Network security problem exists through all the layers of the computer network, and the network security objective is to maintain the confidentiality, authenticity, integrity, dependability, availability and audit-ability of the network. This paper introduces the network security technologies mainly in detail, including authentication, data encryption technology, firewall technology, intrusion detection system (IDS), antivirus technology and virtual private network (VPN). Network security problem is related to every network user, so we should put a high value upon network security, try to prevent hostile attacks and ensure the network security.
引用
收藏
页码:293 / 296
页数:4
相关论文
共 50 条
  • [21] Application of computer network security technology for electric power system
    Zhu, Enguo
    Wu, Guoliang
    Yang, Gongxun
    ADVANCING SCIENCE THROUGH COMPUTATION, 2008, : 187 - 190
  • [22] RESEARCH ON NETWORK SECURITY SITUATION AWARENESS TECHNOLOGY BASED ON SECURITY INTELLIGENT MONITORING TECHNOLOGY
    Yang, Bingyu
    SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2024, 25 (02): : 1107 - 1116
  • [23] Research for The Management and Technology of Library Network Information Security
    Feng, Cheng
    PROCEEDINGS OF 2010 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND INDUSTRIAL ENGINEERING, VOLS I AND II, 2010, : 544 - 547
  • [24] Network Security-related Technology Research and Implementation
    Ruan, Jun
    Zhang, Pan
    Ding, Hongbi
    ADVANCES IN MECHATRONICS AND CONTROL ENGINEERING II, PTS 1-3, 2013, 433-435 : 1720 - 1723
  • [25] The Research of Network Database Security Technology Based on WebService
    Meng, Fanxing
    Wen, Xiumei
    Gao, Liting
    Pang, Hui
    Wang, Qinglin
    INTERNATIONAL CONFERENCE ON GRAPHIC AND IMAGE PROCESSING (ICGIP 2012), 2013, 8768
  • [26] Security of Computer Network and Measures of Defense
    何德明
    电脑知识与技术, 2011, 7 (20) : 4819 - 4824+4837
  • [27] Research on co-operative computer network security technologies
    Zhou, LY
    Liu, FY
    Wu, A
    2004 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN & CYBERNETICS, VOLS 1-7, 2004, : 1164 - 1168
  • [28] Research on computer network security evaluation based on image recognition and neural network
    Wang, Zilong
    Shi, Lin
    Chen, Ning
    Chen, Jie
    JOURNAL OF ELECTRONIC IMAGING, 2023, 32 (01)
  • [29] Analysis and Countermeasures Research on the Computer Network Security at the New Stage
    Wang, Qi
    PROCEEDINGS OF THE 2017 5TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND COMPUTING TECHNOLOGY (ICMMCT 2017), 2017, 126 : 658 - 662
  • [30] The Research of Network Security Technologies
    Wang, Zhen
    Liu, Zhijie
    Xie, Xiaoyao
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION IN COMMUNICATION, 2009, : 585 - 587