Research on Defense Model and Detection of Abnormal Characteristics of Network Attack Based on

被引:0
|
作者
Zhao, Xiu Mei [1 ]
机构
[1] Jilin Judicial Police Vocat Coll, Jilin, Peoples R China
关键词
computer network system security integration Introduction;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
With the rapid development of the network, network security issues become increasingly prominent in recent years, spyware hackers, viruses and other network repeatedly been exposed, the relevant state departments have repeatedly demanded, in fact, doing construction and management of network security paper mainly discusses the construction and implementation of computer network security infrastructure as well as relevant aspects of the measures taken.
引用
收藏
页码:577 / 581
页数:5
相关论文
共 50 条
  • [21] Network Attack Defense Awareness based on Dynamic Game
    Li, Man
    Cao, Jinjing
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (07): : 69 - 77
  • [22] Analysis for Ad hoc network attack-defense based on stochastic game model
    1600, International Frequency Sensor Association (173):
  • [23] Attack Detection Research for Software Defined Network
    Zhou, Jianfei
    Liu, Na
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (08): : 343 - 352
  • [24] Biomechanics-based football penalty kick best attack and defense model research
    Chen, Chao, 1600, Trade Science Inc, 126,Prasheel Park,Sanjay Raj Farm House,Nr. Saurashtra Unive, Rajkot, Gujarat, 360 005, India (10):
  • [25] Study on Stochastic Differential Game Model in Network Attack and Defense
    Xu, Xiaotong
    Wang, Gaocai
    Hu, Jintian
    Lu, Yuting
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [26] Research on Network Security Quantitative Model Based on Probabilistic Attack Graph
    Cui, Yimin
    Li, Junmei
    Zhao, Wei
    Luan, Cheng
    AMCSE 2018 - INTERNATIONAL CONFERENCE ON APPLIED MATHEMATICS, COMPUTATIONAL SCIENCE AND SYSTEMS ENGINEERING, 2019, 24
  • [27] Research on network attack situation niching model based on FNN theory
    Tao Y.
    Liu Z.
    Zhang Z.
    Wang P.
    Guo C.
    Gaojishu Tongxin/Chinese High Technology Letters, 2010, 20 (07): : 680 - 684
  • [28] Research on SDN Fingerprint Attack Defense Mechanism Based on Dynamic Disturbance and Information Entropy Detection
    Fang, Xing
    Zhang, Wenhui
    Lin, Jiming
    Liu, Yuming
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [29] Research on Attack Model for Cognitive Network based on Scientific Analysis of Network Material System
    Sun, Yan
    Zhou, XueGuang
    ADVANCED RESEARCH ON MECHANICAL ENGINEERING, INDUSTRY AND MANUFACTURING ENGINEERING, PTS 1 AND 2, 2011, 63-64 : 911 - 914
  • [30] Research on Network Defense Graph Model in Network Security
    Qi, Feng
    Xu, Haili
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (11): : 23 - 32