Research on the protection strategy of network security

被引:0
|
作者
Ji, Hong [1 ]
机构
[1] Xian Univ Sci & Technol, Network Ctr, Xian 710054, Shaanxi, Peoples R China
关键词
network technology; network security; firewall; intrusion detection;
D O I
10.4028/www.scientific.net/AMR.703.236
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The global information has become the human development trend with the development of network technology. People enjoy the convenience brought by the network technology and confront many network security issues. Because the network attack behavior has concealment, complexity and permeability, the network security issues become increasingly prominent and the network security protection become more difficult. Based on the analysis of the threatening factors to the network security, such as hacking, computer viruses, computer system vulnerabilities, security issues of the network protocol, weak authentication and logic bombs, the firewall technology, intrusion detection technology, access control technology and computer virus protection technology are proposed to ensure safe and stable operation and use of network.
引用
收藏
页码:236 / 239
页数:4
相关论文
共 50 条
  • [21] Research on Security Protection Method in IP over WDM Network
    Zhang, Ning
    Bao, Hong
    IEEC 2009: FIRST INTERNATIONAL SYMPOSIUM ON INFORMATION ENGINEERING AND ELECTRONIC COMMERCE, PROCEEDINGS, 2009, : 626 - +
  • [22] Research on Network Security Protection System based on Dynamic Modeling
    Shu, Fei
    Li, Ming
    Chen, ShuTing
    Wang, Xu
    Li, Feng
    PROCEEDINGS OF 2017 IEEE 2ND INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC), 2017, : 1602 - 1605
  • [23] Research on Information Security Protection Strategy Optimization for Intelligent Connected Vehicles
    Ren, Yilong
    Zhao, Fuxia
    Xu, Chi
    Yu, Haiyang
    CICTP 2021: ADVANCED TRANSPORTATION, ENHANCED CONNECTION, 2021, : 1587 - 1596
  • [24] Research on network security strategy of artificial intelligence equipment in telemedicine
    Li, Huabo
    Li, Jiaying
    Huang, Kangyu
    Hong, Zheng
    Lan, Fei
    BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2021, 128 : 48 - 48
  • [25] Research and implementation of security strategy for wireless industry control network
    Wei, Min
    Wang, Ping
    Wang, Quan
    Yi Qi Yi Biao Xue Bao/Chinese Journal of Scientific Instrument, 2009, 30 (04): : 679 - 684
  • [26] Computer Network Information Security and Protection Strategy Based on Big Data Environment
    Jin, Min
    INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGIES AND SYSTEMS APPROACH, 2023, 16 (02)
  • [27] Protection Strategy Exploration for the Computer Network Information Security in the Big Data Age
    Xue, Liang
    Yang, Juan
    Fan, Weiguo
    PROCEEDINGS OF THE 2016 2ND WORKSHOP ON ADVANCED RESEARCH AND TECHNOLOGY IN INDUSTRY APPLICATIONS, 2016, 81 : 81 - 85
  • [28] Research on computer network security protection technology based on a superiority algorithm
    Wang Z.
    Applied Mathematics and Nonlinear Sciences, 2024, 9 (01):
  • [29] Research on Security and Protection of Users' Privacy Information in Mobile Social Network
    He, Wen
    Huang, Tao
    PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT, INFORMATION AND COMPUTER SCIENCE (ICEMC 2017), 2017, 73 : 456 - 462
  • [30] Research on Privacy Protection with Weak Security Network Coding for Mobile Computing
    Zhang, Yang
    Chen, Pengfei
    Long, Hao
    2019 SEVENTH INTERNATIONAL CONFERENCE ON ADVANCED CLOUD AND BIG DATA (CBD), 2019, : 174 - 179