Research on Defense Model and Detection of Abnormal Characteristics of Network Attack Based on

被引:0
|
作者
Zhao, Xiu Mei [1 ]
机构
[1] Jilin Judicial Police Vocat Coll, Jilin, Peoples R China
关键词
computer network system security integration Introduction;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
With the rapid development of the network, network security issues become increasingly prominent in recent years, spyware hackers, viruses and other network repeatedly been exposed, the relevant state departments have repeatedly demanded, in fact, doing construction and management of network security paper mainly discusses the construction and implementation of computer network security infrastructure as well as relevant aspects of the measures taken.
引用
收藏
页码:577 / 581
页数:5
相关论文
共 50 条
  • [31] Research on Real-Time Flow Abnormal Traffic Detection System Based on DDoS Attack
    Yue, Xin
    Mo, Xiuliang
    Wang, Chundong
    Yao, Xin
    RECENT DEVELOPMENTS IN INTELLIGENT SYSTEMS AND INTERACTIVE APPLICATIONS (IISA2016), 2017, 541 : 206 - 212
  • [32] A research on the competitive inhibitory model of network defense based on resource competition
    Li, Jun
    Hu, HanPing
    Pan, Junshan
    Zhao, Yang
    Journal of Computational and Theoretical Nanoscience, 2015, 12 (12) : 5641 - 5653
  • [33] Association rule mining in DoS attack detection and defense in the application of network
    Zheng, Jigang
    Zhang, Jingmei
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT, INFORMATION AND MEDICINE (EMIM 2015), 2015, 8 : 445 - 449
  • [34] Research on application of DDos attack detection technology based on software defined network
    Jing, Guo
    Acta Technica CSAV (Ceskoslovensk Akademie Ved), 2017, 62 (01): : 489 - 498
  • [35] Research on the game of network security attack-defense confrontation through the optimal defense strategy
    Liu, Fei
    Gao, Hongyan
    Wei, Zegang
    SECURITY AND PRIVACY, 2021, 4 (01):
  • [36] A novel detection model for abnormal network traffic based on bidirectional temporal convolutional network
    Chen, Jinfu
    Lv, Tianxiang
    Cai, Saihua
    Song, Luo
    Yin, Shang
    INFORMATION AND SOFTWARE TECHNOLOGY, 2023, 157
  • [37] Network Security Situation Assessment Approach Based on Attack-Defense Stochastic Game Model
    Liu, Jianyi
    Weng, Fangyu
    Zhang, Ru
    Guo, Yunbiao
    CLOUD COMPUTING AND SECURITY, PT III, 2018, 11065 : 161 - 173
  • [38] The Research on the Detection and Defense Method of the Smurf-Type DDos Attack
    Cao, Wantian
    Bao, Xingchuan
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON SOFT COMPUTING TECHNIQUES AND ENGINEERING APPLICATION, ICSCTEA 2013, 2014, 250 : 315 - 324
  • [39] Research on Adversarial Patch Attack Defense Method for Traffic Sign Detection
    Zhang, Yanjing
    Cui, Jianming
    Liu, Ming
    CYBER SECURITY, CNCERT 2022, 2022, 1699 : 199 - 210
  • [40] Research on Ship Abnormal Behavior Detection Method Based on Graph Neural Network
    Liu, Hongdan
    Liu, Yan
    Zong, Zhengcong
    PROCEEDINGS OF 2022 IEEE INTERNATIONAL CONFERENCE ON MECHATRONICS AND AUTOMATION (IEEE ICMA 2022), 2022, : 834 - 838