Abstract
Traditional LAN networks had low defense efficiency and poor stability. In order to solve this problem, a new malicious code intrusion active defense technology was studied, and the defense technology structure was designed and the work-flow was studied. The system structure was divided into hardware layer, kernel layer and executive layer. The work-flow was divided into four steps: file judgment, file compression, file processing and file display. The working effect of the technology was verified by comparison with the traditional method. It was known from the experimental results that the studied technology had high defense efficiency and strong stability.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Wang, Z., Yu, A., et al.: Construction of network security immune system. Eng. Sci. Technol. Power Monit. Control Syst. Trusted Comput. Technol. 49(2), 28–35 (2017)
Tong, Q., Zhang, Z., Wu, J.X.: Inf. Secur. J. Divers. Hardware Softw. 2(1), 1–12 (2017)
Intrusion detection research and implementation based on pattern recognition method. Hubei Mechanization 12(6), 61 (2017)
Network security active defense technology and application. Netw. Secur. Technol. Appl. 56(5), 28 (2017)
Wang, Z., Yu, A., et al.: Based on trusted computing technology, the network security immune system of power monitoring and control system. Eng. Sci. Technol. 49(2), 28–35 (2017)
Li, X.: Analysis of the design and implementation of network active defense system. Electron. Des. Eng. 25(1), 27–30 (2017)
Wang, Z., Hu, H., Cheng, G., et al.: The architecture of mimic defense under the software definition network architecture. Netw. Inf. Secur. J. 3(10), 52–61 (2017)
Su, S.X., Zhu, Z.: Design and implementation of embedded active defense system based on honeypot. Internet Things Technol. 7(7), 86–88 (2017)
Yu, A., Wang, Z.H., Zhao, B.: Research and application of trusted computing technology in power systems. Inf. Secur. Res. 3(4), 353–358 (2017)
Chen, J.: Mobile network optimization design for effective intrusion prevention design of intrusion signals. Comput. Simul. 34(7), 277–280 (2017)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Ma, L., Kang, Yj., Han, H. (2019). Research on LAN Network Malicious Code Intrusion Active Defense Technology. In: Gui, G., Yun, L. (eds) Advanced Hybrid Information Processing. ADHIP 2019. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 301. Springer, Cham. https://doi.org/10.1007/978-3-030-36402-1_6
Download citation
DOI: https://doi.org/10.1007/978-3-030-36402-1_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-36401-4
Online ISBN: 978-3-030-36402-1
eBook Packages: Computer ScienceComputer Science (R0)