DocumentCode :
2832740
Title :
The Examinational Technology of Invasion Analysis Based on Network Security
Author :
Jing, Zhou ; Yuan, Fang
Author_Institution :
Dept. of Comput. Sci. & Technol., Huanggang Normal Univ., Huanggang, China
fYear :
2009
fDate :
11-12 July 2009
Firstpage :
624
Lastpage :
627
Abstract :
This article introduced the present situation of network information security and the present domestic network face existence main threat, as well as the prevent security threat main safety work classification and detailed explanation. Based on this elaboration this article main analysis each kind of invasion examinational technology characteristic and function superiority; In view of the current world network application scope expanding and popularization, network users increase in the number of technological capability and users of the network security question also get attention. Especially in the network attack, have many network researchers actively looking for research and solve the network intrusion detection technology of vulnerability. Finally the basis discusses the invasion examinational technology which analyzes to the showing off correspondence evaluating indicator as well as the present network invades the limitation which the examinational technology exists, and the summarizes manifests the network security invasion examination engineering research the necessity.
Keywords :
security of data; invasion analysis; network attack; network information security; network intrusion detection; network security invasion examination; network threat; Computer networks; Computer science; Computer security; Control systems; Controllability; Cryptography; Domestic safety; IP networks; Information analysis; Information security; Examinational invasion; Limitation; Necessary; Safe; Target;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Control, Automation and Systems Engineering, 2009. CASE 2009. IITA International Conference on
Conference_Location :
Zhangjiajie
Print_ISBN :
978-0-7695-3728-3
Type :
conf
DOI :
10.1109/CASE.2009.145
Filename :
5194532
Link To Document :
بازگشت