Network Virus and Computer Network Security Detection Technology Optimization

被引:0
|
作者
Hu Z. [1 ]
Zhao F. [1 ]
Qin L. [1 ]
Lin H. [1 ]
机构
[1] Modern Education Technology Center, Wuhan Business University, Hubei, Wuhan
来源
Scalable Computing | 2021年 / 22卷 / 02期
关键词
Automatic security detection; Computer network; Monitoring system; Network virus; Safety technology;
D O I
10.12694:/scpe.v22i2.1881
中图分类号
学科分类号
摘要
With the advancement in communication technology, computer network will become important for information exchange. However, the network has the potential therefore the strong security policy is needed for network security ensuring. To prevent the computer network from the virus invasion, the computer network security technology is ensured, having a clear network virus understanding. In this paper, the structural model of network security detection and monitoring system is established in a proactive way, the function of each component is described, and the design model is introduced to conduct comprehensive and effective automatic security detection on the client and each layer of the network, so as to find and avoid the system from being attacked.Result: The observed example shows that the flow rate of information in and out of the network is relatively stable, with few changes, and the rate of change is close to zero per unit time. In the case of network attack, the amount of data flowing into the target network is far more than the amount of data flowing out of the network.Computer security technology is used to improve the security of the network and prevent network virus from attacking the computer network. © 2021 SCPE.
引用
收藏
页码:161 / 170
页数:9
相关论文
共 50 条
  • [21] The Application of Computer Information Management Technology in the Network Security
    Zhang, Haicheng
    Zheng, Qun
    Di, Zheng
    2016 3RD INTERNATIONAL CONFERENCE ON MANAGEMENT INNOVATION AND BUSINESS INNOVATION (ICMIBI 2016), PT 2, 2016, 58 : 747 - 751
  • [22] Analysis of Computer Communication Network and Its Security Technology
    Wang, Rui
    PROCEEDINGS OF THE 2017 5TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND COMPUTING TECHNOLOGY (ICMMCT 2017), 2017, 126 : 1495 - 1500
  • [23] Analysis of Computer Communication Network and Security Technology Architecture
    Liu, Guangnan
    2018 5TH INTERNATIONAL CONFERENCE ON ELECTRICAL & ELECTRONICS ENGINEERING AND COMPUTER SCIENCE (ICEEECS 2018), 2018, : 334 - 337
  • [24] Research on Security Management Technology of Computer Network Database
    Sun, Lixian
    2020 5TH INTERNATIONAL CONFERENCE ON MECHANICAL, CONTROL AND COMPUTER ENGINEERING (ICMCCE 2020), 2020, : 2081 - 2084
  • [25] Discussion on the Technology and Method of Computer Network Security Management
    Zhou, Jianlei
    2017 3RD INTERNATIONAL CONFERENCE ON APPLIED MATERIALS AND MANUFACTURING TECHNOLOGY (ICAMMT 2017), 2017, 242
  • [26] The application of data mining technology in computer network security
    Ma Xiao-li
    Zhang Xiao-lei
    2015 SEVENTH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION (ICMTMA 2015), 2015, : 1126 - 1129
  • [27] Study on active defense technology and detection algorithm of virus based on computer network
    Tianjin Urban Construction Managerment Vocational Technology College, China
    Int. J. Hybrid Inf. Technol., 7 (435-442):
  • [28] Discussion on the Utilization of Prevention Technology of Computer Network Security
    Zhai Changhong
    MECHATRONICS ENGINEERING, COMPUTING AND INFORMATION TECHNOLOGY, 2014, 556-562 : 5523 - 5525
  • [29] Computer network security technology based on artificial intelligence
    Hua, Tao
    Li, Laixiang
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2019, 37 (05) : 6021 - 6028
  • [30] The Construction Research of Security Computer Network System Based on the Distributed Intrusion Detection Technology
    Huang, Xin
    Wan, Rongze
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (06): : 185 - 196