Library data protection and threat detection system based on network security

被引:0
|
作者
Xiong, Jianxin [1 ]
Wang, Xianping [2 ]
机构
[1] Hunan Univ Arts & Sci, Changde 415000, Hunan, Peoples R China
[2] Chongqing Univ Arts & Sci, Yongchuan 402160, Chongqing, Peoples R China
关键词
library data protection; threat detection; network security; encryption algorithm; security vulnerability scanning; data breach; PRIVACY;
D O I
10.1504/IJICS.2024.140212
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Traditional libraries may have security risks such as data breach, network attack and virus infection, which requires a library data protection and threat detection system based on network security to effectively manage and protect. Based on the premise of network security, this article focused on analysing library data protection and threat detection, constructing a library data protection and threat detection system using encryption algorithms, and testing its performance. According to the experimental results, it can be concluded that the average response time of unknown threats in the library data protection and threat detection system based on network security ranged from 0.4 s to 0.8 s under different test times. It can be seen that the system not only performs well, but also has very good user satisfaction. This article aimed to ensure the security of users' use of library resources and services through effective threat detection and data protection measures.
引用
收藏
页数:18
相关论文
共 50 条
  • [21] A quantitative assessment method of network information security vulnerability detection risk based on the meta feature system of network security data
    Lin, Weiwei
    Yang, Chaofan
    Zhang, Zeqing
    Xue, Xingsi
    Haga, Reiko
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2021, 15 (12): : 4531 - 4544
  • [22] Protection System for Network Boundary Security
    Huang, Xiaobo
    Zhang, Mingxue
    Wang, Xiaoyan
    PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 6, 2010, : 620 - 623
  • [23] Campus Network Security Program Based on Snort Network Security Intrusion Detection System
    Ling, Jia
    MATERIALS SCIENCE AND INFORMATION TECHNOLOGY, PTS 1-8, 2012, 433-440 : 3235 - 3240
  • [24] A data fusion method of wireless sensor network based on security protection
    Li, Li
    Mu, Kun
    Journal of Computational Information Systems, 2013, 9 (17): : 7029 - 7036
  • [25] Network data security sharing system based on blockchain
    Lu, Xinghua
    Liu, Peihao
    Ke, Yiran
    Zhang, Hao
    MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (21-23) : 31887 - 31906
  • [26] Network data security sharing system based on blockchain
    Xinghua Lu
    Peihao Liu
    Yiran Ke
    Hao Zhang
    Multimedia Tools and Applications, 2021, 80 : 31887 - 31906
  • [27] Oversampling Imbalanced Data Based on Convergent WGAN for Network Threat Detection
    Xu, Yanping
    Zhang, Xiaoyu
    Qiu, Zhenliang
    Zhang, Xia
    Qiu, Jian
    Zhang, Hua
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [28] Computer Multimedia Security Protection System Based on the Network Security Active Defense Model
    Shang, Yanhong
    Zhang, Jing
    Zhang, Jing (2016120252@jou.edu.cn), 1600, Hindawi Limited (2021):
  • [29] Toward a monitoring and threat detection system based on stream processing as a virtual network function for big data
    Lopez, Martin Andreoni
    Mattos, Diogo M. F.
    Duarte, Otto Carlos M. B.
    Pujolle, Guy
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 31 (20):
  • [30] Research on the Construction of Network Security Protection System Based on APT Attacks
    Liu, Hai
    2015 SSR INTERNATIONAL CONFERENCE ON SOCIAL SCIENCES AND INFORMATION (SSR-SSI 2015), PT 2, 2015, 11 : 707 - 711