Construction and Application of Network Security Defense Model

被引:0
|
作者
Li, Juan [1 ]
Wang, Hou-xiang [1 ]
Han, Ruo-fei [1 ]
Jing, Xiao-pei [1 ]
机构
[1] Naval Univ Engn, Dept Comp Engn, Wuhan, Peoples R China
关键词
network security; defense model; security level; E-government;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
To assure network security, the paper constructs a kind of reasonable security defense model based on analyzing security character for physical layer, network layer, system layer, application layer, and management layer of network. Supporting by router, Ethernet switch, firewall, network management, and operational platform, the model is a perfect defense system which composed by aspects of security authentication, access control, filter examination, scan, detection, VPN, audit analysis, policy service. Last, combining E-government application, a practical example is presented to improve security performance of network.
引用
收藏
页码:4518 / 4520
页数:3
相关论文
共 50 条
  • [21] Security of Computer Network and Measures of Defense
    何德明
    电脑知识与技术, 2011, 7 (20) : 4819 - 4824+4837
  • [22] Defense and security of a wireless tactical network
    Younger, M
    Young, S
    DIGITAL WIRELESS COMMUNICATION III, 2001, 4395 : 224 - 232
  • [23] Campus Network Security Defense Strategy
    Zheng, Shiyong
    Li, Zhao
    Li, Biqing
    PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON MECHANICAL, ELECTRONIC, CONTROL AND AUTOMATION ENGINEERING (MECAE 2017), 2017, 61 : 356 - 359
  • [24] Construction and application of water security early-warning model
    Guo, Lishuo
    Wang, Lifang
    WATER AND ENVIRONMENT JOURNAL, 2022, 36 (03) : 458 - 468
  • [25] Design of Network Security Early-Warning System Based on Network Defense in depth Model
    Liu Shengjian
    Yang Haiyan
    Wang Fengni
    PROCEEDINGS OF 2013 2ND INTERNATIONAL CONFERENCE ON MEASUREMENT, INFORMATION AND CONTROL (ICMIC 2013), VOLS 1 & 2, 2013, : 355 - 359
  • [26] Construction of campus network security model with integrated role access control model
    Xiao, Yi
    Fu, Die
    Boletin Tecnico/Technical Bulletin, 2017, 55 (20): : 437 - 442
  • [27] DP-MODEL APPLICATION FOR NETWORK SECURITY ANALYSIS
    Kolegov, D. N.
    PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2008, 1 (01): : 71 - 87
  • [28] Study on Evaluation Model and Method of Network Application Security
    Yao, Honglin
    Cai, Hongliang
    Lu, Yu
    Wang, Yu
    PROCEEDINGS OF 2010 ASIA-PACIFIC YOUTH CONFERENCE ON COMMUNICATION, VOLS 1 AND 2, 2010, : 264 - +
  • [29] Nanomaterials and their application to defense and homeland security
    Reynolds, JG
    Hart, BR
    JOM, 2004, 56 (01) : 36 - 39
  • [30] Nanomaterials and their application to defense and homeland security
    John G. Reynolds
    Bradley R. Hart
    JOM, 2004, 56 : 36 - 39