دورية أكاديمية

NETWORK VIRUS AND COMPUTER NETWORK SECURITY DETECTION TECHNOLOGY OPTIMIZATION.

التفاصيل البيبلوغرافية
العنوان: NETWORK VIRUS AND COMPUTER NETWORK SECURITY DETECTION TECHNOLOGY OPTIMIZATION.
المؤلفون: ZHIFENG HU, FENG ZHAO, LINA QIN, HONGKAI LIN
المصدر: Scalable Computing: Practice & Experience; Jun2021, Vol. 22 Issue 2, p161-170, 10p
مصطلحات موضوعية: NETWORK PC (Computer), COMPUTER viruses, COMPUTER network security, INTRUSION detection systems (Computer security), CYBERTERRORISM, TELECOMMUNICATION, COMPUTER networks, INFORMATION networks
مستخلص: With the advancement in communication technology, computer network will become important for information exchange. However, the network has the potential therefore the strong security policy is needed for network security ensuring. To prevent the computer network from the virus invasion, the computer network security technology is ensured, having a clear network virus understanding. In this paper, the structural model of network security detection and monitoring system is established in a proactive way, the function of each component is described, and the design model is introduced to conduct comprehensive and effective automatic security detection on the client and each layer of the network, so as to find and avoid the system from being attacked.Result: The observed example shows that the flow rate of information in and out of the network is relatively stable, with few changes, and the rate of change is close to zero per unit time. In the case of network attack, the amount of data flowing into the target network is far more than the amount of data flowing out of the network.Computer security technology is used to improve the security of the network and prevent network virus from attacking the computer network. [ABSTRACT FROM AUTHOR]
Copyright of Scalable Computing: Practice & Experience is the property of Scalable Computing: Practice & Experience and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
قاعدة البيانات: Complementary Index
الوصف
تدمد:18951767
DOI:10.12694/scpe.v22i2.1881