Research on Constructing an Internet-based Multi-step Security System

被引:0
|
作者
Ki, Hoesung [1 ]
Ahn, Seongjin [2 ]
机构
[1] Sungshin Womens Univ, Off Informat & Commun Staff, Seoul, South Korea
[2] Sungkyunkwan Univ, Dept Comp Educ, Seoul, South Korea
关键词
Multi-step security system; firewall; intrusion detection system; intrusion prevention system; virus wall; security system construction model;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the side effects of the increasing Internet population and the proliferation of new cyberspace culture on the current Internet culture, this research seeks to construct a multi-step security system as a counter measure. This multi-step security system utilizes the existing legacy security solution firewall, intrusion detection system, and intrusion prevention system and virus wall to provide a new security system, which maximizes the effectiveness of the entire system, and also presents an ideal security system by enforcing security steps. It is also a momentous security system model which can successfully defend the system from hacking, worm virus, spam mails, and DDoS attack..
引用
收藏
页码:275 / 280
页数:6
相关论文
共 50 条
  • [1] Research of security for Internet-based EDI
    Ju, Chun-Hua
    Ling, Yun
    Wang, Guang-Ming
    [J]. Xiaoxing Weixing Jisuanji Xitong/Mini-Micro Systems, 2002, 23 (11):
  • [2] Multi-step attack threat recognition algorithm based on attribute association in internet of things security
    Ding, Zhenguo
    Wang, Yuejin
    [J]. WIRELESS NETWORKS, 2024, 30 (05) : 4275 - 4286
  • [3] Constructing an efficient multi-step iterative scheme for nonlinear system of equations
    Lotfi, Taher
    Momenzadeh, Mohammad
    [J]. COMPUTATIONAL METHODS FOR DIFFERENTIAL EQUATIONS, 2021, 9 (03): : 710 - 721
  • [4] Security risk assessment based on bayesian multi-step attack graphs
    Yang, Yunxue
    Jin, Shuyuan
    Fang, Binxing
    [J]. Journal of Computational Information Systems, 2015, 11 (11): : 3911 - 3918
  • [5] Development and research on Internet-based water system CAD
    Zhang, Q.
    Zhang, G.Q.
    Chen, Z.K.
    Liu, X.X.
    [J]. Nuantong Kongtiao/HV & AC, 2001, 31 (04):
  • [6] An Internet-Based Migraine Headache Diary: Issues in Internet-Based Research
    Moloney, Margaret F.
    Aycock, Dawn M.
    Cotsonis, George A.
    Myerburg, Stuart
    Farino, Christopher
    Lentz, Martha
    [J]. HEADACHE, 2009, 49 (05): : 673 - 686
  • [7] Multi-Step Algorithm for Constructing Statistical Estimates Based on the Bayesian Approach in Measurement Problems
    R. Z. Khayrullin
    [J]. Measurement Techniques, 2022, 65 : 250 - 257
  • [8] Correlating multi-step attack and constructing attack scenarios based on attack pattern modeling
    Liu, Zhijie
    Wang, Chongjun
    Chen, Shifu
    [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 214 - +
  • [9] Multi-step Prediction AR Model of Ship Motion Based On Constructing and Correcting Error
    Wang, Xiaoyu
    Tong, Ming
    Du, Liang
    [J]. 2018 IEEE CSAA GUIDANCE, NAVIGATION AND CONTROL CONFERENCE (CGNCC), 2018,
  • [10] Multi-Step Algorithm for Constructing Statistical Estimates Based on the Bayesian Approach in Measurement Problems
    Khayrullin, R. Z.
    [J]. MEASUREMENT TECHNIQUES, 2022, 65 (04) : 250 - 257