ABSTRACT
With the rapid development of computer technology and Internet, the process of global informatization has been accelerated. The Internet is entering thousands of households and plays an indispensable role in our production and life. Network and network: users are growing exponentially, and the scale of the network is also growing. Therefore, there are more and more malicious activities against the network. How to effectively ensure the normal operation of the network has become a very critical issue. In order to prevent malicious intrusion from causing damage to the network and the loss of information resources, network managers need to be able to accurately and timely understand the current status and future security trend of the whole network, timely discover attacks and harmful behaviors, and make emergency response, so as to make reasonable emergency strategies for network security settings and resource allocation, so as to achieve advance prediction. The purpose of defense and defense in depth requires timely evaluation of network security status and prediction of future development trend, and timely understanding of network status. More and more people pay attention to network security situation assessment and prediction, which has become a hot issue in the field of network security management.
- Chen Juan, Chen Haidong, Wu Huimin, et al. Research on Big Data Technology in Network Security Analysis. Digital Technology and Applications, 2018(7), 218--219.Google Scholar
- Tian Hanfeng. Research on application of Big Data Technology in Network Security Analysis. Front Drawing, 2020, 000(002), 234--234.Google Scholar
- Fu Weizu, Ma Biao. Application Research of Big Data Technology in Network Security Analysis. China Hi-tech, 2019, 000(003), 53--55.Google Scholar
- Sun Weixi. Application Research of SVM-PSO in Network Security Situation Prediction. Information Technology, 2019(02), 66--69.Google Scholar
- Chen Shanxue, Yang Zheng, Zhu Jiang, et al. A Network Security Situation Prediction Model Based on Cumulative PSO-SVM. Computer Application Research, 2015(06), 1778--1781.Google Scholar
- Liu Junnan, Chen Zhanfang, Jiang Xiaoming, et al. Research on SAGPSO-SVM Model for Network Security Situation Prediction. Journal of Changchun University of Science and Technology (Natural Science), 2019, 042(006), 126--128.Google Scholar
- Yu Wenfang, Ao Yuntao. Application Research of an RF-SVM Based Network Security Situational Awareness Algorithm. Wireless Internet Technology, 2014, 000(010), 1--2.Google Scholar
- Shi Feng. Analysis of Computer Network Security Technology. Information and Computer (Theoretical Edition), 2017, 000(022), 191--192.Google Scholar
Index Terms
- Research on Situation Analysis Technology of Network Security Incidents
Recommendations
Research on Network Security in Material Support
CECCT '23: Proceedings of the 2023 International Conference on Electronics, Computers and Communication TechnologyThe research on network security in material support is aimed at ensuring the security and stable operation of the material supply chain. This article conducts research and summary on network security in material support. Firstly, the basic situation of ...
Research on Developing a Lab Environment for Cookie Spoofing Attack and Defense Education
ICCIS '13: Proceedings of the 2013 International Conference on Computational and Information SciencesCookie spoofing is a common network attack. It's a must for web site administrators to protect their web sites from cookie spoofing attacks. In order to let the students in higher vocational colleges master the attack and defense skills of cookie ...
Towards Countermeasure of Insider Threat in Network Security
INCOS '11: Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative SystemsWe discuss countermeasure against insider threats in network security aspect. In the context of countermeasure against insider threats, there is no perimeter for access control in a network. A traditional access control process by using a firewall on a ...
Comments