Efficient Abnormality Diagnosis Scheme on Network Security

Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 163)


Network security rely mainly on the hardware, software security and the safety of the coordination to fulfill. Network security level is not fixed, users are not the same, the network security levels are also different, such as ordinary users need to moderate level of security will be, but for business users in the higher levels of security needs. But the network security is a discipline by many with high comprehensive application technology type, and network environment is very typical of the variety and complexity, which lead to the network security vulnerability. At present, the network security situation facing more complex and severe, if only depend upon the traditional firewall technology, the password techniques, and access control technology, hard to provide effective security barrier network. Therefore need to cooperate to use different from passive safety measures to protect the intrusion detection technology to carry out the network security exception diagnosis, for the new situation of the network security with more powerful guarantee.


Network security Fault diagnosis Intrusion detection technology Security scanning technology Process view 


  1. 1.
    Xiuli Sun, Youchun Zhang (2008) Based on the electronic signature system of digital signature algorithm. China’s electronic information to learn the 15th academic annual meeting and the first national network coding academic conference on (man), Beijing, China, vol 218, pp 147–148Google Scholar
  2. 2.
    Wei Wei, Pei Feng, Qi Ke, Rui Lin, Cheng Zhong (2009) Many nuclear machine thread level parallel database data encryption. In: Proceedings of the Guangxi computer society conference, Nanning, China, vol 19, pp 158–161Google Scholar
  3. 3.
    Yuxin Hou (2007) Based on IP network solutions according to the enterprise VPN. In: Proceedings of the 2007 annual meeting of China association for science and technology, communication and information development summit BBS, Shanghai, China, vol 227, pp 205–206Google Scholar
  4. 4.
    ChenXiao Feng (2009) RSA software to realize further analysis. In: Proceedings of the 2008 years Chinese College of Communication Department (book 1 and book 2), Beijing, China, vol 29, pp 223–224Google Scholar
  5. 5.
    Zhigong Yang, Juan Zhou (2008) Information security technology and its development trend. In: Proceedings of the 10th annual meeting of China association for science and technology information and social development seminar, Shanghai, China, vol 128, pp 251–254Google Scholar
  6. 6.
    Meisheng Yu, YuYi, Wenyuan Liu (2009) OLAP MDX principle in the study and implementation. In: Proceedings of the 18th national database academic conference (technical report article), Nanjiang, China, vol 249, pp 233–235Google Scholar
  7. 7.
    Xiaoxin Wang (2008) Electronic business information security problems and countermeasures study. Sci Technol Inform (Acad Res) 09:109–111Google Scholar
  8. 8.
    Xiaoya Sun (2010) Computer network security explores. J Shandong Agric Manage Cadre Inst 02:208–210Google Scholar
  9. 9.
    XiaoHui Zhang (2008) Intelligent password system technology. China High N Technol Enterp 23:122–124Google Scholar
  10. 10.
    Wen Fan (2009) On computer network management and safety. Management 19:188–190Google Scholar

Copyright information

© Springer Science+Business Media New York 2014

Authors and Affiliations

  1. 1.Zhengzhou Railway Vocational and Technical CollegeZhengzhouChina

Personalised recommendations