Design of the Security Component in Reconfigurable Network

2013 ◽  
Vol 718-720 ◽  
pp. 2120-2124
Author(s):  
Fan Zhang ◽  
Xing Ming Zhang ◽  
Ke Song

New threats to and requirements of security come forth endlessly while the network technology progresses continually. Security equipment has little adaptive capacity in the existing rigid network. It has bad influence on network security in Mainland China. A reconfigurable security component is designed in this paper. It can fit the coming requirements of network development in the future. A prototype of this security component is implemented and analyzed.

Author(s):  
Muhammad Syaeful Bahry ◽  
Bambang Sugiantoro

The development of technology today is very fast one only with the existence of the use of the computer network. This can be seen in the increasing number of organizations or companies that use the computer network to facilitate the flow of information within the organization or the company. But with the abundance of the use of network technology is only advancing network progressed only, but not maximize resource so that sometimes allows for the problem or traffic network. For that can be needed by network development solution made VLAN topology using NDLC method (Network Development Life Cycle). Vlans are able to improve the capabilities of the network and can reduce the amount of data that is sent to a destination that does not need to be so that the traffic in the network will be reduced by itself. In addition there is another reason why requires a VLAN is to reduce the possibility of the misuse of access rights. It can use the Mode Access. With the Mode will divide each Host into the VLAN each. With the existence of a VLAN shows can increase network ability as much as 13.4 %. With the data shows that a VLAN successful and able to make the network more efficient. In the VLAN network security aspect is able to optimize network security with the existence of access mode, so that the new host are not capable of entering it into the existing network topology.


2014 ◽  
Vol 1044-1045 ◽  
pp. 1298-1301
Author(s):  
Qian Wu

Early network development, people more emphasis on network convenience and availability, and ignore the security of the network. With the development of computer network technology, when people run in the network critical business such as banking, when government activity is increasingly networked, computer network security has become a problem that not allows to ignore. In this paper, the existing network security technology to prevent the analysis and comparison, especially to strengthen security measures should be taken in order to do a more in-depth discussion, and describes the future development trend of this research field.


2013 ◽  
Vol 433-435 ◽  
pp. 1720-1723
Author(s):  
Jun Ruan ◽  
Pan Zhang ◽  
Hong Bi Ding

With the rapid development of computer network technology, global information has become mega-trend of modern social development. But due to all kinds of defects existing in the network itself and variety and openness of network interconnection form, network security has become the focus of social attention. So in this paper, a lot of current advanced network security technologies and products are used in order to make network security, which is under the general principles of network security situation.


2014 ◽  
Vol 687-691 ◽  
pp. 1892-1895
Author(s):  
Shuang Ping Li

With the rapid development of network technology, the network security related threats are more and more serious at present. To guarantee the security of the network, now the main defense technology is static, but the static defense technology don’t change with the corresponding preventive measures change and unable to attack intention and attack strategies. Based on the analysis of the current situation, this paper mainly analyses the dynamic non cooperative game theory, and applied the theory to network security prevention, and achieved good results.


Sign in / Sign up

Export Citation Format

Share Document