scholarly journals Network Security Model Based on Active and Passive Defense Hybrid Strategy

CONVERTER ◽  
2021 ◽  
pp. 45-51
Author(s):  
Zhaofang Du

This paper studies a new network information security system and its evaluation method based on the security threat situation network security model. This paper expounds the application of active defense system and passive defense system in network security, and uses advanced technical support platform and network security model. In this paper, the active defense system and the passive defense system are organically combined to form a new model of computer network security with characteristics. At the same time, based on the idea of security threat situation evaluation, this paper extends the traditional PDRR security model and proposes a network active defense security model and defense in depth security strategy. On this basis, a hybrid architecture of active and passive defense is proposed. The architecture integrates some new network active defense technologies, and constructs a comprehensive and deep network defense system together with network passive defense means. The experimental results show that the proposed defense model improves the security defense efficiency and effective defense rate of the traditional PDRR security model.

2014 ◽  
Vol 971-973 ◽  
pp. 1684-1687
Author(s):  
Xiu Juan Sun

this article from the various security threats facing the computer network, systematically introduces the network security technology. And in view of the campus network security issues, firstly analyzes the hidden dangers to the safety of network system in colleges and universities, and then from the build two aspects of security defense system and strengthen the safety management design of the campus network security policy. This paper study, the first thing I learned the main threat to the network security problem, and use the knowledge of security network security problems are analyzed. Secondly, based on the research of the network technology, campus network will also be faced with the security threat. Finally, the idea of established with P2DR model to establish campus network security defense system. And it is concluded that the building of a set of effective network security defense system is the solution Campus network main threats and hidden trouble of necessary ways and measures.


Author(s):  
Chanintorn Jittawiriyanukoon

<span>To secure a wealth of data traversing the computer network at your fingertips is compulsory. But when attack arises at various parts of the network it is difficult to protect, especially when each incident is investigated separately. Geography is a necessary construct in computer networks. The analytics of geography algorithms and metrics to curate insight from a security problem are a critical method of analysis for computer systems. A geography based representation is employed to highlight aspects (on a local and global level) of a security problem which are Eigenvalue, eccentricity, clustering coefficient and cliques. Network security model based on attack undirected geography (AUG) is familiarized. First, analysis based upon association rules is presented then the attack threshold value is set from AUG. The probability of an individual attack edge and associated network nodes are computed in order to quantify the security threat. The simulation is exploited to validate that results are effective.</span>


2020 ◽  
Vol 39 (6) ◽  
pp. 8897-8905
Author(s):  
Gaoli Zhao ◽  
Junping Song

To build a network security system combining active defense and passive defense during covid-19, we need to break the original Castle type passive defense concept and build a reliable, controllable, flexible and active network environment to find defense points. The key is that the system should be able to actively predict and control our defenses. Any scheme cannot achieve absolute safety, only to minimize the probability of safety accidents, through various measures to assess and predict the possible points of safety accidents, and actively prevent the occurrence of accidents. In the management and construction of network security, we should realize that network security management is a comprehensive system engineering. We should start from the three aspects of strategy, management and technology, and build a more effective and reliable network security system on the basis of traditional passive defense and active defense technology, which can better maintain big data security during covid-19.


2014 ◽  
Vol 686 ◽  
pp. 458-462
Author(s):  
Zi Yan Shi ◽  
Guo Lin Zhao ◽  
Qiao Lin Hu

The security evaluation for an information network system is an important management tool to insure its normal operation. We must realize the significance of the comprehensive network security risks. A network evaluation model and the algorithm are presented and adapt the hierarchical method to characterize the security risk situation. The evaluation method is used to evaluate the key nodes and the mathematics is used to analyze the whole network security situation. Compared with others, the method can automatically create a rule-based security evaluation model to evaluate the security threat from the individual security elements and the combination of security elements, and then evaluation the network situation. It is shown that this system provides a valuable model and algorithms to help to find the security rules, adjust the security measure, improve the security performance and design the appropriate security risk evaluation and management tools.


Sign in / Sign up

Export Citation Format

Share Document