Construction and Application of Network Security Defense Model

被引:0
|
作者
Li, Juan [1 ]
Wang, Hou-xiang [1 ]
Han, Ruo-fei [1 ]
Jing, Xiao-pei [1 ]
机构
[1] Naval Univ Engn, Dept Comp Engn, Wuhan, Peoples R China
关键词
network security; defense model; security level; E-government;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
To assure network security, the paper constructs a kind of reasonable security defense model based on analyzing security character for physical layer, network layer, system layer, application layer, and management layer of network. Supporting by router, Ethernet switch, firewall, network management, and operational platform, the model is a perfect defense system which composed by aspects of security authentication, access control, filter examination, scan, detection, VPN, audit analysis, policy service. Last, combining E-government application, a practical example is presented to improve security performance of network.
引用
收藏
页码:4518 / 4520
页数:3
相关论文
共 50 条
  • [31] Optimal Network Security Strengthening Using Attack-Defense Game Model
    Jiang, Wei
    Fang, Bin-xing
    Zhang, Hong-li
    Tian, Zhi-hong
    Song, Xin-fang
    PROCEEDINGS OF THE 2009 SIXTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, VOLS 1-3, 2009, : 475 - +
  • [32] Research on network security model based on active and passive defense hybrid strategy
    Zhu, Nan
    AGRO FOOD INDUSTRY HI-TECH, 2017, 28 (01): : 2686 - 2689
  • [33] Construction of smart campus network security model for digital health sectors
    Du J.
    Journal of Commercial Biotechnology, 2020, 25 (03) : 62 - 70
  • [34] Network Attack Chain Security Model Construction Based On Attack Framework
    Hu, Jian
    Wang, Hailin
    Li, Hanruo
    JOURNAL OF ELECTRICAL SYSTEMS, 2023, 19 (04) : 116 - 127
  • [35] European construction, security and defense - French - Maury,JP
    Roussel, S
    CANADIAN JOURNAL OF POLITICAL SCIENCE-REVUE CANADIENNE DE SCIENCE POLITIQUE, 1997, 30 (01): : 171 - 173
  • [36] Computer network security and defense technology research
    Wang Qing
    Chen Hongju
    PROCEEDINGS 2016 EIGHTH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION ICMTMA 2016, 2016, : 155 - 157
  • [37] Malware defense using network security authentication
    Antrosio, JV
    Fulp, EW
    THIRD IEEE INTERNATIONAL WORKSHOP ON INFORMATION ASSURANCE, PROCEEDINGS, 2005, : 43 - 54
  • [38] Construction and Application of a Group-Level Network Security Situational Awareness Platform
    Zhang L.
    Zhang, Lei (rocky0620@163.com), 1600, Yuan Zi Neng Chuban She (41): : 63 - 67
  • [39] Evolving Defense Mechanism for Future Network Security
    Zhou, Haifeng
    Wu, Chunming
    Jiang, Ming
    Zhou, Boyang
    Gao, Wen
    Pan, Tingting
    Huang, Min
    IEEE COMMUNICATIONS MAGAZINE, 2015, 53 (04) : 45 - 51
  • [40] Creating The Computer Network Security Defense System
    Zhang, Huimin
    Wang, Yanping
    Xue, Bo
    PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE OF MANAGEMENT ENGINEERING AND INFORMATION TECHNOLOGY, VOLS 1 AND 2, 2009, : 562 - 565