Research on the protection strategy of network security

被引:0
|
作者
Ji, Hong [1 ]
机构
[1] Xian Univ Sci & Technol, Network Ctr, Xian 710054, Shaanxi, Peoples R China
关键词
network technology; network security; firewall; intrusion detection;
D O I
10.4028/www.scientific.net/AMR.703.236
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The global information has become the human development trend with the development of network technology. People enjoy the convenience brought by the network technology and confront many network security issues. Because the network attack behavior has concealment, complexity and permeability, the network security issues become increasingly prominent and the network security protection become more difficult. Based on the analysis of the threatening factors to the network security, such as hacking, computer viruses, computer system vulnerabilities, security issues of the network protocol, weak authentication and logic bombs, the firewall technology, intrusion detection technology, access control technology and computer virus protection technology are proposed to ensure safe and stable operation and use of network.
引用
收藏
页码:236 / 239
页数:4
相关论文
共 50 条
  • [41] Research on network security model based on active and passive defense hybrid strategy
    Zhu, Nan
    AGRO FOOD INDUSTRY HI-TECH, 2017, 28 (01): : 2686 - 2689
  • [42] Advanced security techniques for network protection
    Merabti, M
    Shi, Q
    Oppliger, R
    COMPUTER COMMUNICATIONS, 2000, 23 (17) : 1581 - 1583
  • [43] An Approach of Security Protection for VSAT Network
    Wu, Zhijun
    Pan, Qingbo
    Yue, Meng
    Ma, Shaopu
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 1511 - 1516
  • [44] Protection System for Network Boundary Security
    Huang, Xiaobo
    Zhang, Mingxue
    Wang, Xiaoyan
    PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 6, 2010, : 620 - 623
  • [45] Hidden Danger and Protection Strategy of Cyber Security
    Yang, Guan-ying
    PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON MANUFACTURING ENGINEERING AND INTELLIGENT MATERIALS (ICMEIM 2017), 2017, 100 : 272 - 278
  • [46] Research on Feeder Protection Strategy of Distribution Network Connected with Micro-Grid
    Gu Cailian
    Ji Jianwei
    Xu Aoran
    Liu Li
    2015 27TH CHINESE CONTROL AND DECISION CONFERENCE (CCDC), 2015, : 5060 - 5064
  • [47] Research on protection strategy of interdependent infrastructure network based on incomplete information game
    Li, Yulong
    Su, Hua
    Zhang, Chi
    Li, Huijia
    Lin, Jie
    Li, Guijun
    Xitong Gongcheng Lilun yu Shijian/System Engineering Theory and Practice, 2022, 42 (04): : 1026 - 1042
  • [48] E-commerce network security protection technology based on mixed data encryption strategy
    He, Yuan
    Ou, Liqi
    Pu, Xiaofei
    Li, Yunfei
    Zhao, Yuyuan
    International Journal of Circuits, Systems and Signal Processing, 2019, 13 : 727 - 731
  • [49] Research on Network Security of Campus Network
    Huang, Min
    Luo, Wanbo
    Wan, Xing
    2018 INTERNATIONAL SYMPOSIUM ON POWER ELECTRONICS AND CONTROL ENGINEERING (ISPECE 2018), 2019, 1187
  • [50] The Study on Network Security Strategy based on Security Evaluation
    Bi, Yan
    COMPUTER-AIDED DESIGN, MANUFACTURING, MODELING AND SIMULATION III, 2014, 443 : 446 - 450