Network Virus and Computer Network Security Detection Technology Optimization

被引:0
|
作者
Hu Z. [1 ]
Zhao F. [1 ]
Qin L. [1 ]
Lin H. [1 ]
机构
[1] Modern Education Technology Center, Wuhan Business University, Hubei, Wuhan
来源
Scalable Computing | 2021年 / 22卷 / 02期
关键词
Automatic security detection; Computer network; Monitoring system; Network virus; Safety technology;
D O I
10.12694:/scpe.v22i2.1881
中图分类号
学科分类号
摘要
With the advancement in communication technology, computer network will become important for information exchange. However, the network has the potential therefore the strong security policy is needed for network security ensuring. To prevent the computer network from the virus invasion, the computer network security technology is ensured, having a clear network virus understanding. In this paper, the structural model of network security detection and monitoring system is established in a proactive way, the function of each component is described, and the design model is introduced to conduct comprehensive and effective automatic security detection on the client and each layer of the network, so as to find and avoid the system from being attacked.Result: The observed example shows that the flow rate of information in and out of the network is relatively stable, with few changes, and the rate of change is close to zero per unit time. In the case of network attack, the amount of data flowing into the target network is far more than the amount of data flowing out of the network.Computer security technology is used to improve the security of the network and prevent network virus from attacking the computer network. © 2021 SCPE.
引用
收藏
页码:161 / 170
页数:9
相关论文
共 50 条
  • [31] Computer Deep Learning Network Security Vulnerability Detection Based on Virtual Reality Technology
    Zheng, Xiaokun
    ADVANCES IN MULTIMEDIA, 2022, 2022
  • [32] An Exhaustive Research on the Application of Intrusion Detection Technology in Computer Network Security in Sensor Networks
    Wang, Yajing
    Ma, Juan
    Sharma, Ashutosh
    Singh, Pradeep Kumar
    Gaba, Gurjot Singh
    Masud, Mehedi
    Baz, Mohammed
    JOURNAL OF SENSORS, 2021, 2021
  • [33] Computer network security
    Janson, P
    Rudin, H
    COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 1999, 31 (08): : 785 - 786
  • [34] On computer network security
    Ma, Ting-ting
    Renmin Changjiang/Yangtze River, 2000, 31 (01):
  • [35] A Study of Vulnerability Detection and Prevention on Computer Network Security
    Yang, Xiaohong
    Chen, Yuefeng
    MECHATRONICS AND INDUSTRIAL INFORMATICS, PTS 1-4, 2013, 321-324 : 2630 - +
  • [36] Statistical outlier detection algorithm for computer network security
    Mareboyana, M
    Minukuri, R
    Namburu, R
    INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND CONTROL TECHNOLOGIES, VOL 1, PROCEEDINGS, 2004, : 296 - 301
  • [37] Research on Computer Network Security Based on Data Encryption Technology
    Zhang, Yicong
    Zhou, Shujun
    PROCEEDINGS OF THE 2017 2ND INTERNATIONAL CONFERENCE ON MATERIALS SCIENCE, MACHINERY AND ENERGY ENGINEERING (MSMEE 2017), 2017, 123 : 1383 - 1387
  • [38] Application of the Data Encryption Technology in the Computer Network Communication Security
    Hu, Xiaoling
    BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2020, 126 : 283 - 283
  • [39] Experimental Teaching Research and Practice of "Computer Network Security Technology"
    Peng Hehuan
    Wei Li
    Ran Xinxia
    PROCEEDINGS OF 2012 7TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, VOLS I-VI, 2012, : 610 - 612
  • [40] The research on Data Flow Technology in Computer Network Security Monitoring
    Yin XiaoHong
    PROCEEDINGS OF 2014 IEEE WORKSHOP ON ADVANCED RESEARCH AND TECHNOLOGY IN INDUSTRY APPLICATIONS (WARTIA), 2014, : 787 - 789