Applicability Analysis and Classification in Network System Security

被引:0
|
作者
Luo Zhuojun [1 ]
机构
[1] Hunan Mass Media Vocat Tech Coll, Changsha 410100, Hunan, Peoples R China
来源
INTELLIGENCE COMPUTATION AND EVOLUTIONARY COMPUTATION | 2013年 / 180卷
关键词
hierarchical network; access control; encryption; firewall;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This article describes five major functions of the hierarchical network, and depicts in detail access control, encryption to protect the data integrity, firewall technology and its applicability, which is the development trend to network security with compositely use of them.
引用
收藏
页码:837 / 840
页数:4
相关论文
共 50 条
  • [1] Network Traffic Classification for Security Analysis
    Boger, Mark
    Liu, Tianyuan
    Ratliff, Jacqueline
    Nick, William
    Yuan, Xiaohong
    Esterline, Albert
    SOUTHEASTCON 2016, 2016,
  • [2] Campus network security analysis and design of security system
    Ji, Song
    Pang, Ling
    Xia, WenYing
    2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (CICN), 2015, : 1064 - 1067
  • [3] The Classification, Design and Placement of Security Sensor for Network Security Situational Awareness System
    Wang Hui-qiang
    Lai Ji-bao
    Liang Ying
    Liu Xiao-wu
    ICICSE: 2008 INTERNATIONAL CONFERENCE ON INTERNET COMPUTING IN SCIENCE AND ENGINEERING, PROCEEDINGS, 2008, : 321 - 324
  • [4] Exploring the Applicability of Membrane Computing to Network Security
    Idowu, Rufai Kazeem
    Chandren, Ravie M.
    Othman, Zulaiha Ali
    5TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING AND INFORMATICS 2015, 2015, : 253 - 258
  • [5] Security Analysis on Exam System Based on Network
    Li Guofang
    Li Guohong
    Qi Yubin
    Wang Tao
    Zou Ping
    ADVANCED TECHNOLOGY IN TEACHING - PROCEEDINGS OF THE 2009 3RD INTERNATIONAL CONFERENCE ON TEACHING AND COMPUTATIONAL SCIENCE (WTCS 2009), VOL 1: INTELLIGENT UBIQUITIOUS COMPUTING AND EDUCATION, 2012, 116 : 421 - +
  • [6] Classification of security properties (Part II: Network security)
    Focardi, Riccardo
    Gorrieri, Roberto
    Martinelli, Fabio
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2004, 2946 : 139 - 185
  • [7] Classification of security properties - (Part II: Network security)
    Focardi, R
    Gorrieri, R
    Martinelli, F
    FOUNDATIONS OF SECURITY ANALYSIS AND DESIGN II, 2004, 2946 : 139 - 185
  • [8] A Framework for Identification and Classification of IoT Devices for Security Analysis in Heterogeneous Network
    Zahid, Hafiz Muhammad
    Saleem, Yasir
    Hayat, Faisal
    Khan, Farrukh Zeeshan
    Alroobaea, Roobaea
    Almansour, Fahad
    Ahmad, Muneer
    Ali, Ihsan
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [9] Network and Information Security, and Intrusion Detection System Analysis
    Wu, Ying
    2013 INTERNATIONAL CONFERENCE ON EDUCATION AND EDUCATIONAL RESEARCH (EER 2013), 2013, 1 : 130 - 134
  • [10] Analysis of Wide Area Network Security Technology System
    Luo, Yiyue
    PROCEEDINGS OF THE 2017 5TH INTERNATIONAL CONFERENCE ON MECHATRONICS, MATERIALS, CHEMISTRY AND COMPUTER ENGINEERING (ICMMCCE 2017), 2017, 141 : 204 - 208