Construction and Application of Network Security Defense Model

被引:0
|
作者
Li, Juan [1 ]
Wang, Hou-xiang [1 ]
Han, Ruo-fei [1 ]
Jing, Xiao-pei [1 ]
机构
[1] Naval Univ Engn, Dept Comp Engn, Wuhan, Peoples R China
关键词
network security; defense model; security level; E-government;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
To assure network security, the paper constructs a kind of reasonable security defense model based on analyzing security character for physical layer, network layer, system layer, application layer, and management layer of network. Supporting by router, Ethernet switch, firewall, network management, and operational platform, the model is a perfect defense system which composed by aspects of security authentication, access control, filter examination, scan, detection, VPN, audit analysis, policy service. Last, combining E-government application, a practical example is presented to improve security performance of network.
引用
收藏
页码:4518 / 4520
页数:3
相关论文
共 50 条
  • [41] Security evaluation on urban flood control system: model construction and application
    Wang, Xingju
    Hao, Yuwei
    Lu, Yue
    Journal of Information and Computational Science, 2010, 7 (14): : 3193 - 3200
  • [42] Application of an Improved BP Neural Network Model in Enterprise Network Security Forecasting
    Chen, Xun
    Xu, Lisheng
    Xu, Meng
    IAEDS15: INTERNATIONAL CONFERENCE IN APPLIED ENGINEERING AND MANAGEMENT, 2015, 46 : 1261 - 1266
  • [43] Application of Neural Network Model Combined with Fuzzy Theory in Computer Network Security
    Liu, Xiaotian
    Proceedings of the 2nd International Conference on Electronics, Network and Computer Engineering (ICENCE 2016), 2016, 67 : 139 - 143
  • [44] Trust extended dynamic security model and its application in network
    Zhang, Xiaofei
    Xu, Fang
    Liu, Yi
    Zhang, Xing
    Shen, Changxiang
    MOBILE AD-HOC AND SENSOR NETWORKS, PROCEEDINGS, 2006, 4325 : 404 - +
  • [45] Markov Differential Game Model and Its Application in Network Security
    Zhang H.-W.
    Huang S.-R.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2019, 47 (03): : 606 - 612
  • [46] Application with Neural Network Model to Evaluating Social Security Fund
    Liu Zijun
    CALL OF PAPER PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE AND ENGINEERING, 2008, : 39 - 42
  • [47] Effectiveness Evaluation of Moving Network Defense Based on Host Security State Transition Model
    Liu J.
    Zhang H.
    Yang Y.
    Wang Y.
    Liu, Jiang (liujiang2333@163.com), 1600, Science Press (39): : 509 - 517
  • [48] Wireless sensor network security defense strategy based on Bayesian reputation evaluation model
    Teng, Zhijun
    Zhu, Sian
    Li, Mingzhe
    Yu, Libo
    Gu, Jinliang
    Guo, Liwen
    IET COMMUNICATIONS, 2024, 18 (01) : 55 - 62
  • [49] Study on Network Security Proactive Defense. Model Based on Honey Pot Technology
    Zhang, Haicheng
    INFORMATION COMPUTING AND APPLICATIONS, PT 2, 2012, 308 : 9 - 14
  • [50] Application of network cybernetics in network attack and Defense
    He, Ning
    Lu, Yu
    Wang, Lei
    DYNAMICS OF CONTINUOUS DISCRETE AND IMPULSIVE SYSTEMS-SERIES B-APPLICATIONS & ALGORITHMS, 2006, 13E : 1967 - 1971