Analysis of Network Attack Technologies and Network Security

被引:0
|
作者
Pei, Xu [1 ]
机构
[1] NanChang Inst Sci & Technol, Nanchang, Jiangxi, Peoples R China
关键词
Network attack; Network security; Attack graph;
D O I
暂无
中图分类号
F [经济];
学科分类号
02 ;
摘要
With the continuous development and progress of Internet technology, network security has become the focus of social concern. Internet technology occupies a place in all areas of the society and provides a new model for people's lives and learning. While giving full play to the advantages of Internet technology, network attack technology is also more and more high-end, and becomes a serious threat to the security of the network. Based on analysis of the current situation, to strengthen the understanding of common network attack technology and understand the relationship between network attack technology and network security is very important for the healthy development of the Internet. It is necessary to further strengthen the information security of the Internet network, effectively prevent the loss of leaks from the common network attack technology, analyze the Internet operation and explore the relationships between the technology of network attack and network security.
引用
收藏
页码:111 / 114
页数:4
相关论文
共 50 条
  • [1] Analysis on Computer Communication Network and the Framework of the Network Security Technologies
    Li, Fengquan
    [J]. PROCEEDINGS OF THE 2017 4TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND COMPUTER (MACMC 2017), 2017, 150 : 94 - 98
  • [2] Network Security Situation Analysis Aimed at Distributed Attack
    Fu Yanming
    Chen Wen
    Li Lin
    Pan Yanxian
    [J]. MATERIALS SCIENCE AND ENGINEERING, PTS 1-2, 2011, 179-180 : 1005 - +
  • [3] Analysis of Factors Affecting Network Security and Countermeasures Based on Network Attack Roadmap
    Dong, Guoliang
    [J]. 2022 INTERNATIONAL CONFERENCE ON INDUSTRIAL IOT, BIG DATA AND SUPPLY CHAIN, IIOTBDSC, 2022, : 195 - 198
  • [4] Analytical Approach to Attack Graph Analysis for Network Security
    Kijsanayothin, Phongphun
    Hewett, Rattikorn
    [J]. FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS, 2010, : 25 - 32
  • [5] Cyber attack modeling and simulation for network security analysis
    Kuhl, Michael E.
    Kistner, Jason
    Costantini, Kevin
    Sudit, Moises
    [J]. PROCEEDINGS OF THE 2007 WINTER SIMULATION CONFERENCE, VOLS 1-5, 2007, : 1159 - +
  • [6] Compressing Network Attack Surfaces for Practical Security Analysis
    Everson, Douglas
    Cheng, Long
    [J]. 2021 IEEE SECURE DEVELOPMENT CONFERENCE (SECDEV 2021), 2021, : 23 - 29
  • [7] Research on Key Technologies of Network Security Situational Awareness for Attack Tracking Prediction
    KOU Guang
    WANG Shuo
    TANG Guangming
    [J]. Chinese Journal of Electronics, 2019, 28 (01) : 162 - 171
  • [8] Research on Key Technologies of Network Security Situational Awareness for Attack Tracking Prediction
    Kou Guang
    Wang Shuo
    Tang Guangming
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2019, 28 (01) : 162 - 171
  • [9] The Research of Network Security Technologies
    Wang, Zhen
    Liu, Zhijie
    Xie, Xiaoyao
    [J]. PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION IN COMMUNICATION, 2009, : 585 - 587
  • [10] HASN:A Hierarchical Attack Surface Network for System Security Analysis
    Kangyu Huang
    Lin Yang
    Renfang Fu
    Shengli Zhou
    Zheng Hong
    [J]. China Communications, 2019, 16 (05) : 137 - 157