Analysis of Network Attack Technologies and Network Security

被引:0
|
作者
Pei, Xu [1 ]
机构
[1] NanChang Inst Sci & Technol, Nanchang, Jiangxi, Peoples R China
关键词
Network attack; Network security; Attack graph;
D O I
暂无
中图分类号
F [经济];
学科分类号
02 ;
摘要
With the continuous development and progress of Internet technology, network security has become the focus of social concern. Internet technology occupies a place in all areas of the society and provides a new model for people's lives and learning. While giving full play to the advantages of Internet technology, network attack technology is also more and more high-end, and becomes a serious threat to the security of the network. Based on analysis of the current situation, to strengthen the understanding of common network attack technology and understand the relationship between network attack technology and network security is very important for the healthy development of the Internet. It is necessary to further strengthen the information security of the Internet network, effectively prevent the loss of leaks from the common network attack technology, analyze the Internet operation and explore the relationships between the technology of network attack and network security.
引用
收藏
页码:111 / 114
页数:4
相关论文
共 50 条
  • [21] Exploring the landscape of network security: a comparative analysis of attack detection strategies
    Rajesh Kanna P.
    Santhi P.
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2024, 15 (08) : 3211 - 3228
  • [22] Attack Difficulty Metric for Assessment of Network Security
    Mukherjee, Preetam
    Mazumdar, Chandan
    [J]. 13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,
  • [23] Research on Computer Network Security Anti - attack
    Liang, Liu Zheng
    Min, Lai
    [J]. PROCEEDINGS OF THE 2017 5TH INTERNATIONAL CONFERENCE ON FRONTIERS OF MANUFACTURING SCIENCE AND MEASURING TECHNOLOGY (FMSMT 2017), 2017, 130 : 188 - 191
  • [24] Network Security Metric Based on Attack Duration
    Forghani, Shahab
    Habibi, Navid
    Firoozbakht, Mohsen
    [J]. 2015 2ND INTERNATIONAL CONFERENCE ON KNOWLEDGE-BASED ENGINEERING AND INNOVATION (KBEI), 2015, : 1093 - 1096
  • [25] Applying Attack Graphs to Network Security Metric
    Xie, Anming
    Wen, Weiping
    Zhang, Li
    Hu, Jianbin
    Chen, Zhong
    [J]. MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 427 - +
  • [26] Overview of attack and defence tactics on network security
    Sheng, Huanye
    Wang, Jue
    [J]. Shanghai Jiaotong Daxue Xuebao/Journal of Shanghai Jiaotong University, 31 (08): : 82 - 87
  • [27] An estimation of attack surface to evaluate network (in)security
    Atzeni, Andrea
    Lioy, Antonio
    [J]. ICEIS 2007: PROCEEDINGS OF THE NINTH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS: INFORMATION SYSTEMS ANALYSIS AND SPECIFICATION, 2007, : 493 - 497
  • [28] Network security under siege - The timing attack
    English, E
    Hamilton, S
    [J]. COMPUTER, 1996, 29 (03) : 95 - &
  • [29] Security against sybil attack in social network
    Kansara, Krishna B.
    Shekokar, Narendra M.
    [J]. 2016 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2016,
  • [30] Attack graph based evaluation of network security
    Kotenko, Igor
    Stepashkin, Mikhail
    [J]. COMMUNICATIONS AND MULTIMEDIA SECURITY, PROCEEDINGS, 2006, 4237 : 216 - 227