Network Virus and Computer Network Security Detection Technology Optimization

被引:0
|
作者
Hu Z. [1 ]
Zhao F. [1 ]
Qin L. [1 ]
Lin H. [1 ]
机构
[1] Modern Education Technology Center, Wuhan Business University, Hubei, Wuhan
来源
Scalable Computing | 2021年 / 22卷 / 02期
关键词
Automatic security detection; Computer network; Monitoring system; Network virus; Safety technology;
D O I
10.12694:/scpe.v22i2.1881
中图分类号
学科分类号
摘要
With the advancement in communication technology, computer network will become important for information exchange. However, the network has the potential therefore the strong security policy is needed for network security ensuring. To prevent the computer network from the virus invasion, the computer network security technology is ensured, having a clear network virus understanding. In this paper, the structural model of network security detection and monitoring system is established in a proactive way, the function of each component is described, and the design model is introduced to conduct comprehensive and effective automatic security detection on the client and each layer of the network, so as to find and avoid the system from being attacked.Result: The observed example shows that the flow rate of information in and out of the network is relatively stable, with few changes, and the rate of change is close to zero per unit time. In the case of network attack, the amount of data flowing into the target network is far more than the amount of data flowing out of the network.Computer security technology is used to improve the security of the network and prevent network virus from attacking the computer network. © 2021 SCPE.
引用
收藏
页码:161 / 170
页数:9
相关论文
共 50 条
  • [1] NETWORK VIRUS AND COMPUTER NETWORK SECURITY DETECTION TECHNOLOGY OPTIMIZATION
    Hu, Zhifeng
    Zhao, Feng
    Qin, Lina
    Lin, Hongkai
    SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2021, 22 (02): : 161 - 170
  • [2] Application of Virtual Network Technology in Computer Network Security
    Zhang, Jianjun
    FORTHCOMING NETWORKS AND SUSTAINABILITY IN THE IOT ERA (FONES-IOT 2021), VOL 2, 2022, 130 : 356 - 361
  • [3] Analysis of Computer Network Security Technology
    Gu, Yanfeng
    Sun, Huijia
    2010 INTERNATIONAL CONFERENCE ON INFORMATION, ELECTRONIC AND COMPUTER SCIENCE, VOLS 1-3, 2010, : 1788 - +
  • [4] Computer Network Security and Technology Research
    Fan Yan
    Yang Jian-wen
    Cheng Lin
    2015 SEVENTH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION (ICMTMA 2015), 2015, : 293 - 296
  • [5] Research of Computer Network Security Technology
    Tan, Juan
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON MANAGEMENT, EDUCATION, INFORMATION AND CONTROL, 2015, 125 : 736 - 740
  • [6] Research on the optimization of computer network security technology from the perspective of psychology
    Wei, Chengxin
    INTERNATIONAL JOURNAL OF MENTAL HEALTH NURSING, 2024, 33 : 91 - 91
  • [7] Computer network security and information security technology optimization by using Bayesian classification algorithm
    Fu, Rui
    INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2023,
  • [8] Application Analysis of Computer Network Security Technology Based on Network Security Maintenance
    Ma, Xiang
    Lecture Notes in Electrical Engineering, 2022, 827 LNEE : 1253 - 1258
  • [9] Optimization analysis of computer network security technology based on the perspective of applied psychology
    Ma, Huiyu
    Cui, Lianhe
    Fu, Qiang
    INTERNATIONAL JOURNAL OF MENTAL HEALTH NURSING, 2024, 33 : 87 - 87
  • [10] Computer Science Technology and Network Technology in the Application of the Computer Room Security
    Yang Zi-yan
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT, COMPUTER AND SOCIETY, 2016, 37 : 1404 - 1406