Computer Network Intrusion Detection and Countermeasures

被引:0
|
作者
Xu, Liguo [1 ]
Chi, Jingyuan [1 ]
机构
[1] Haikou Collece Econm, Haikou 571127, Hainan, Peoples R China
关键词
Computer; network security; intrusion detection; countermeasure;
D O I
暂无
中图分类号
C [社会科学总论];
学科分类号
03 ; 0303 ;
摘要
Intrusion detection technology is to ensure the security of the computer system and the design and configuration of a can timely detect and report unauthorized or system abnormalities in the technology, which is used for a security policy violation behavior detection in computer network technology. Computer database intrusion detection technology refers to the use of computer network resources in the daily use may be used to identify malicious behavior, and its behavior for the corresponding processing and testing process. The process includes not only the invasion outside the system, but also can detect the unauthorized users within the system, thus intrusion detection of computer database technology is very effective for the protection of computer system security. In this paper, the current computer network security risks are analyzed in detail, and expounds the role of computer database intrusion detection technology.
引用
收藏
页码:438 / 443
页数:6
相关论文
共 50 条
  • [1] Problems of network-based intrusion detection system and their countermeasures
    Zhang, Minglai
    Jin, Chengbiao
    Zhao, Wenyun
    [J]. Jisuanji Gongcheng/Computer Engineering, 2002, 28 (01):
  • [2] Computer network intrusion detection software development
    Hashim, SJ
    Jumari, K
    Ismail, M
    Elektrik, JK
    Sistem, ED
    Kejuruteraan, F
    [J]. IEEE 2000 TENCON PROCEEDINGS, VOLS I-III: INTELLIGENT SYSTEMS AND TECHNOLOGIES FOR THE NEW MILLENNIUM, 2000, : B117 - B123
  • [3] Research on Computer Network Intrusion Detection System
    Sun, Bo
    [J]. PROCEEDINGS OF THE 2017 4TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND COMPUTER (MACMC 2017), 2017, 150 : 27 - 30
  • [4] Research on Computer Network Intrusion Detection System
    Xia, Yong
    Lai, Min
    [J]. PROCEEDINGS OF THE 2016 6TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS, ENVIRONMENT, BIOTECHNOLOGY AND COMPUTER (MMEBC), 2016, 88 : 165 - 168
  • [5] Computer Network Intrusion Anomaly Detection with Recurrent Neural Network
    Fu, Zeyuan
    [J]. MOBILE INFORMATION SYSTEMS, 2022, 2022
  • [6] A novel intrusion detection system for a local computer network
    Tokhtabayev, A.
    Altaibek, A.
    Skormin, V.
    Tukeyev, U.
    [J]. COMPUTER NETWORK SECURITY, PROCEEDINGS, 2007, 1 : 320 - +
  • [7] A decisional framework system for computer network intrusion detection
    Fessi, B. A.
    Hamdi, M.
    Benabdallah, S.
    Boudriga, N.
    [J]. EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2007, 177 (03) : 1824 - 1838
  • [8] Research and Design of Intrusion Detection System in Computer Network
    Zhang, Xiaohui
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON SOCIAL SCIENCE AND TECHNOLOGY EDUCATION (ICSSTE 2015), 2015, 18 : 390 - 392
  • [9] Realistic Computer Network Simulation for Network Intrusion Detection Dataset Generation
    Payer, Garrett
    [J]. NEXT-GENERATION ROBOTICS II; AND MACHINE INTELLIGENCE AND BIO-INSPIRED COMPUTATION: THEORY AND APPLICATIONS IX, 2015, 9494
  • [10] Artificial Neural Network Classifier for Intrusion Detection System in Computer Network
    Lokeswari, N.
    Rao, B. Chakradhar
    [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION TECHNOLOGIES, IC3T 2015, VOL 3, 2016, 381 : 581 - 591