Design and Implementation of Computer Network Vulnerability Assessment System

被引:0
作者
Li, Tianli [1 ]
机构
[1] Dalian Univ Technol, City Inst, Dalian 116600, Peoples R China
来源
2017 INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS, ELECTRONICS AND CONTROL (ICCSEC) | 2017年
关键词
computer network; vulnerability assessment; system design; network topology; routing restoration;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the rapid development of computer technology and network technology, the network speed is increasing fast, the expansion of computer network and data transmission medium can easily lead to network outages, an accurate assessment for the vulnerability of network should be made to ensure the safety and stability of the network. The design method of evaluation system for fragile control with dynamic connection structure of network topology design and bus system based on computer network, the dynamic connection structure of network node routing repair, computer network system and I/O service operations can be upgraded and dynamic connection patch mode. Network applications using the B/S structure of the operating system vulnerability assessment, the system bus control method to configure network reset serial receiver and transmitter configuration, send and receive control register and check the remote network system available on the service And configure, operate directly on the database application using cross compiler, network operating system architecture editor, compiler, connection and debugging, realize the network vulnerability assessment system. Test results show that this method of computer network vulnerability assessment, it can effectively repair the network routing and interrupt node, improve the connectivity, the safety and stability of the network.
引用
收藏
页码:440 / 445
页数:6
相关论文
共 9 条
[1]   Autonomous Deployment of Heterogeneous Mobile Sensors [J].
Bartolini, Novella ;
Calamoneri, Tiziana ;
La Porta, Thomas F. ;
Silvestri, Simone .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2011, 10 (06) :753-766
[2]  
[毕安琪 Bi Anqi], 2016, [计算机研究与发展, Journal of Computer Research and Development], V53, P1029
[3]   Coverage rate calculation in wireless sensor networks [J].
Kashi, Saeed Sedighian ;
Sharifi, Mohsen .
COMPUTING, 2012, 94 (11) :833-856
[4]   Discovering Medical Knowledge using Association Rule Mining in Young Adults with Acute Myocardial Infarction [J].
Lee, Dong Gyu ;
Ryu, Kwang Sun ;
Bashir, Mohamed ;
Bae, Jang-Whan ;
Ryu, Keun Ho .
JOURNAL OF MEDICAL SYSTEMS, 2013, 37 (02)
[5]   Global Sensor Deployment and Local Coverage-Aware Recovery Schemes for Smart Environments [J].
Lin, Ting-Yu ;
Santoso, Hendro Agus ;
Wu, Kun-Ru .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2015, 14 (07) :1382-1396
[6]   An analytical review of XML association rules mining [J].
Moradi, Mohammad ;
Keyvanpour, Mohammad Reza .
ARTIFICIAL INTELLIGENCE REVIEW, 2015, 43 (02) :277-300
[7]  
Xie Hong'an, 2016, Journal of Computer Applications, V36, P2447, DOI 10.11772/j.issn.1001-9081.2016.09.2447
[8]  
Xu Kaiyong, 2016, Journal of Computer Applications, V36, P1847, DOI 10.11772/j.issn.1001-9081.2016.07.1847
[9]  
[张景祥 Zhang Jingxiang], 2014, [自动化学报, Acta Automatica Sinica], V40, P236