Abstract
Network security rely mainly on the hardware, software security and the safety of the coordination to fulfill. Network security level is not fixed, users are not the same, the network security levels are also different, such as ordinary users need to moderate level of security will be, but for business users in the higher levels of security needs. But the network security is a discipline by many with high comprehensive application technology type, and network environment is very typical of the variety and complexity, which lead to the network security vulnerability. At present, the network security situation facing more complex and severe, if only depend upon the traditional firewall technology, the password techniques, and access control technology, hard to provide effective security barrier network. Therefore need to cooperate to use different from passive safety measures to protect the intrusion detection technology to carry out the network security exception diagnosis, for the new situation of the network security with more powerful guarantee.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Xiuli Sun, Youchun Zhang (2008) Based on the electronic signature system of digital signature algorithm. China’s electronic information to learn the 15th academic annual meeting and the first national network coding academic conference on (man), Beijing, China, vol 218, pp 147–148
Wei Wei, Pei Feng, Qi Ke, Rui Lin, Cheng Zhong (2009) Many nuclear machine thread level parallel database data encryption. In: Proceedings of the Guangxi computer society conference, Nanning, China, vol 19, pp 158–161
Yuxin Hou (2007) Based on IP network solutions according to the enterprise VPN. In: Proceedings of the 2007 annual meeting of China association for science and technology, communication and information development summit BBS, Shanghai, China, vol 227, pp 205–206
ChenXiao Feng (2009) RSA software to realize further analysis. In: Proceedings of the 2008 years Chinese College of Communication Department (book 1 and book 2), Beijing, China, vol 29, pp 223–224
Zhigong Yang, Juan Zhou (2008) Information security technology and its development trend. In: Proceedings of the 10th annual meeting of China association for science and technology information and social development seminar, Shanghai, China, vol 128, pp 251–254
Meisheng Yu, YuYi, Wenyuan Liu (2009) OLAP MDX principle in the study and implementation. In: Proceedings of the 18th national database academic conference (technical report article), Nanjiang, China, vol 249, pp 233–235
Xiaoxin Wang (2008) Electronic business information security problems and countermeasures study. Sci Technol Inform (Acad Res) 09:109–111
Xiaoya Sun (2010) Computer network security explores. J Shandong Agric Manage Cadre Inst 02:208–210
XiaoHui Zhang (2008) Intelligent password system technology. China High N Technol Enterp 23:122–124
Wen Fan (2009) On computer network management and safety. Management 19:188–190
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer Science+Business Media New York
About this paper
Cite this paper
Guo, Y. (2014). Efficient Abnormality Diagnosis Scheme on Network Security. In: Zhong, S. (eds) Proceedings of the 2012 International Conference on Cybernetics and Informatics. Lecture Notes in Electrical Engineering, vol 163. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-3872-4_148
Download citation
DOI: https://doi.org/10.1007/978-1-4614-3872-4_148
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-3871-7
Online ISBN: 978-1-4614-3872-4
eBook Packages: EngineeringEngineering (R0)