Library data protection and threat detection system based on network security

被引:0
|
作者
Xiong, Jianxin [1 ]
Wang, Xianping [2 ]
机构
[1] Hunan Univ Arts & Sci, Changde 415000, Hunan, Peoples R China
[2] Chongqing Univ Arts & Sci, Yongchuan 402160, Chongqing, Peoples R China
关键词
library data protection; threat detection; network security; encryption algorithm; security vulnerability scanning; data breach; PRIVACY;
D O I
10.1504/IJICS.2024.140212
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Traditional libraries may have security risks such as data breach, network attack and virus infection, which requires a library data protection and threat detection system based on network security to effectively manage and protect. Based on the premise of network security, this article focused on analysing library data protection and threat detection, constructing a library data protection and threat detection system using encryption algorithms, and testing its performance. According to the experimental results, it can be concluded that the average response time of unknown threats in the library data protection and threat detection system based on network security ranged from 0.4 s to 0.8 s under different test times. It can be seen that the system not only performs well, but also has very good user satisfaction. This article aimed to ensure the security of users' use of library resources and services through effective threat detection and data protection measures.
引用
收藏
页数:18
相关论文
共 50 条
  • [31] Ensemble Learning for Threat Classification in Network Intrusion Detection on a Security Monitoring System for Renewable Energy
    Lin, Hsiao-Chung
    Wang, Ping
    Chao, Kuo-Ming
    Lin, Wen-Hui
    Yang, Zong-Yu
    APPLIED SCIENCES-BASEL, 2021, 11 (23):
  • [32] Big Data Management System Security Threat Model
    Poltavtseva, M. A.
    Zegzhda, D. P.
    Kalinin, M. O.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2019, 53 (08) : 903 - 913
  • [33] Construct Security Network based on Honeypot in Library
    Bai Rujiang
    Wang Xiaoyue
    Liao Junhua
    2010 SECOND ETP/IITA WORLD CONGRESS IN APPLIED COMPUTING, COMPUTER SCIENCE, AND COMPUTER ENGINEERING, 2010, : 70 - 73
  • [34] Towards identifying true threat from network security data
    Li, Zhi-tang
    Lei, Jie
    Wang, Li
    Li, Dong
    Ma, Yang-ming
    INTELLIGENCE AND SECURITY INFORMATICS, 2007, 4430 : 160 - +
  • [35] Big Data Management System Security Threat Model
    M. A. Poltavtseva
    D. P. Zegzhda
    M. O. Kalinin
    Automatic Control and Computer Sciences, 2019, 53 : 903 - 913
  • [36] Bad Data Injection as a Threat for Power System Security
    Farajollahi, M.
    Hosseini, S. H.
    Fotuhi-Firuzabad, M.
    Safdarian, A.
    2015 SMART GRID CONFERENCE (SGC 2015), 2015, : 138 - 144
  • [37] NETWORK SECURITY WITH VIRTUAL REALITY BASED ANTIVIRUS PROTECTION AND REDUCED DETECTION DELAYS
    Song, Chunna
    Cheng, Jinfang
    Zhang, Guoqiu
    SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2024, 25 (01): : 35 - 44
  • [38] Network Security Analysis Based on Consolidated Threat Resources
    Garasym, Oleg
    Chyrun, Liliya
    Chcrnovol, Nadija
    Gazhyj, Aleksandr
    Gozhyj, Victor
    Kalinina, Irina
    Rusyn, Bohdan
    Pohreliuk, Liubomyr
    Korobchynskyi, Maksym
    COMPUTATIONAL LINGUISTICS AND INTELLIGENT SYSTEMS (COLINS 2020), VOL I: MAIN CONFERENCE, 2020, 2604
  • [39] Computer Network Information Security and Protection Strategy Based on Big Data Environment
    Jin, Min
    INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGIES AND SYSTEMS APPROACH, 2023, 16 (02)
  • [40] RETRACTED ARTICLE: Network security threat detection technology based on EPSO-BP algorithm
    Zhu Lan
    EURASIP Journal on Information Security, 2024