scholarly journals Data Transmission Security in Computer Network Communication

2021 ◽  
Vol 1881 (4) ◽  
pp. 042014
Author(s):  
Fei Chen
2013 ◽  
Vol 756-759 ◽  
pp. 1870-1874
Author(s):  
Ji Ming Ma ◽  
Kai Sui Cai ◽  
Xiao Jiao Li

In computer network communication, adopted the error-check control methods to reduce the error code frequency of data transmission commonly. The CRC (Cyclic Redundancy Check) method is the best one of them. This paper analyzed the principle and the check rules of CRC algorithm. For the CRC algorithm of bytes operation, proposed a new table-driven algorithm which is visual, compact and easy to be understood. A strict mathematic proof of the CRC algorithm is given. By diagrammatizing, deduct the calculated process of CRC-ITU and CRC-32 code in detail. At the same time, we designed a concise CRC-ITU algorithm with assembly language similarly, and discussed the method using the remainder of F(x)/G(x) as a surveillance code briefly.


2013 ◽  
Vol 39 (10) ◽  
pp. 1623
Author(s):  
Yun ZHANG ◽  
Zheng-Guo XU ◽  
Wen-Hai WANG ◽  
Jian-Gang LU ◽  
You-Xian SUN

2014 ◽  
Vol 687-691 ◽  
pp. 3818-3821
Author(s):  
Zhi Zhang

The virtual network communication system and its construction method is researched, the service quality of the virtual network communication is improved. In view of the virtual network communication problems, the construction method of virtual network communication system is proposed based on UDP protocol. The communication system, it needs to build the UDP protocol. The protocol is taken as the virtual network communication platform, and the data transmission of virtual network communication is completed. Simulation results show that the improved algorithm is applied in the virtual network communication, the virtual network communication system is constructed, and the error rate can be effectively reduced, the efficiency of communication is improved, and it can meet the actual needs of users.


2018 ◽  
Vol 3 (4) ◽  
pp. 19-24
Author(s):  
Nur Khairani Kamarudin ◽  
Nur Nazifa Md Hasani ◽  
Rafiza Ruslan ◽  
Rashidah Ramle ◽  
Nurul Hidayah Ahmad Zukri ◽  
...  

People in this new era of modernization nowadays take Internet as one of the vital thing for daily activities. Internet is not only for adults, it is also a needs for people of all ages. However, network vulnerabilities exist in all network that are connec ted to the Internet. The network mostly are exposed to the malicious software or mostly known as malware. In fact, this malware is growing rapidly and giving a bad impact to the human intervention. The number of attack are increasing rapidly and it comes i n various way just to exploit the victims. There are various type of malware attack. For instance, viruses, worms, spyware, rootkits, Trojan horse and botnet are considered as noteworthy threat for the computer network. Some people giving full confidence on the security of data transmission to the network. However, other can access the personal information without them realizing it. The objective of this paper is to detect malware attack using honeypot Dionaea. Malicious file launched was detected by the honeypot and the file was analyzed by using the sandbox tool, Virus Total. This paper found that honeypot Dionaea is helpful in detecting various types of malware attack.


Sign in / Sign up

Export Citation Format

Share Document