Skip to main content

Efficient Abnormality Diagnosis Scheme on Network Security

  • Conference paper
  • First Online:
Proceedings of the 2012 International Conference on Cybernetics and Informatics

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 163))

  • 155 Accesses

Abstract

Network security rely mainly on the hardware, software security and the safety of the coordination to fulfill. Network security level is not fixed, users are not the same, the network security levels are also different, such as ordinary users need to moderate level of security will be, but for business users in the higher levels of security needs. But the network security is a discipline by many with high comprehensive application technology type, and network environment is very typical of the variety and complexity, which lead to the network security vulnerability. At present, the network security situation facing more complex and severe, if only depend upon the traditional firewall technology, the password techniques, and access control technology, hard to provide effective security barrier network. Therefore need to cooperate to use different from passive safety measures to protect the intrusion detection technology to carry out the network security exception diagnosis, for the new situation of the network security with more powerful guarantee.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 429.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 549.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Xiuli Sun, Youchun Zhang (2008) Based on the electronic signature system of digital signature algorithm. China’s electronic information to learn the 15th academic annual meeting and the first national network coding academic conference on (man), Beijing, China, vol 218, pp 147–148

    Google Scholar 

  2. Wei Wei, Pei Feng, Qi Ke, Rui Lin, Cheng Zhong (2009) Many nuclear machine thread level parallel database data encryption. In: Proceedings of the Guangxi computer society conference, Nanning, China, vol 19, pp 158–161

    Google Scholar 

  3. Yuxin Hou (2007) Based on IP network solutions according to the enterprise VPN. In: Proceedings of the 2007 annual meeting of China association for science and technology, communication and information development summit BBS, Shanghai, China, vol 227, pp 205–206

    Google Scholar 

  4. ChenXiao Feng (2009) RSA software to realize further analysis. In: Proceedings of the 2008 years Chinese College of Communication Department (book 1 and book 2), Beijing, China, vol 29, pp 223–224

    Google Scholar 

  5. Zhigong Yang, Juan Zhou (2008) Information security technology and its development trend. In: Proceedings of the 10th annual meeting of China association for science and technology information and social development seminar, Shanghai, China, vol 128, pp 251–254

    Google Scholar 

  6. Meisheng Yu, YuYi, Wenyuan Liu (2009) OLAP MDX principle in the study and implementation. In: Proceedings of the 18th national database academic conference (technical report article), Nanjiang, China, vol 249, pp 233–235

    Google Scholar 

  7. Xiaoxin Wang (2008) Electronic business information security problems and countermeasures study. Sci Technol Inform (Acad Res) 09:109–111

    Google Scholar 

  8. Xiaoya Sun (2010) Computer network security explores. J Shandong Agric Manage Cadre Inst 02:208–210

    Google Scholar 

  9. XiaoHui Zhang (2008) Intelligent password system technology. China High N Technol Enterp 23:122–124

    Google Scholar 

  10. Wen Fan (2009) On computer network management and safety. Management 19:188–190

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yunhong Guo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer Science+Business Media New York

About this paper

Cite this paper

Guo, Y. (2014). Efficient Abnormality Diagnosis Scheme on Network Security. In: Zhong, S. (eds) Proceedings of the 2012 International Conference on Cybernetics and Informatics. Lecture Notes in Electrical Engineering, vol 163. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-3872-4_148

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-3872-4_148

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-3871-7

  • Online ISBN: 978-1-4614-3872-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics