A Novel Stable Algorithm of Getting User’s Account Based on Telnet Protocol

Article Preview

Abstract:

In recent years,china input in the construction of the network management is constantly increasing;information technology has improved continuously,but,making a variety of network security incidents occur frequently,due to the vulnerability of the computer network system inherent,a direct impact on national security and social and political stability. Because of the popularity of computers and large-scale development of the Internet, network security has been increasing as the theme. Reasonable safeguards against violations of resources; regular Internet user behavior and so on has been the public's expectations of future Internet. This paper described a stable method of getting telnet user’s account in development of network management based on telnet protocol.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

130-134

Citation:

Online since:

February 2013

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Yu yijiao . The Analysis about parameters in solving TSP with genetic algorithms. Journal of Central China Normal University (Natural science). (2002).

Google Scholar

[2] Yu yijiao. Hopfield Neural Network and Genetic Algorithm in Solving Traveling Salesman Problem: Experimental Comparison and Analysis. Journal of Central China Normal University (Natural science) . (2001).

Google Scholar

[3] Sheng Juan Northeastern University at Qinhuangdao QinHuangdao, China Daifu Jun Organization: QinXing engineering project management Co., LTD at Qinhuangdao. QinHuangdao, China. The research of Network Security Management Platform System[A]. Proceedings of 2011 4th IEEE International Conference on Computer Science and Information Technology(ICCSIT 2011) VOL10[C]. (2011).

DOI: 10.7498/aps.60.110505

Google Scholar

[4] Hu Weiqi, Li Yuhong, Zou Shihong, Cheng Shiduan State Key Laboratory of Networking and Switching Technology Beijing University of Posts & Telecommunications Beijing, China. BCExt-based Proxy Mobile IPv6 Extension: A Data transmission Extension Scheme for Multi-Interface Mobile Nodes[A]. Proceedings of 2011 IEEE International Conference on Computer Science and Automation Engineering(CSAE 2011) VOL04[C]. (2011).

DOI: 10.1109/csae.2011.5952909

Google Scholar

[5] Guo Jiang Ping Registrar Office Wuhan Institute of Shipbuilding Technology Wuhan, China.  Research on the Network Performance Management System[A]. Proceedings of 2009 2nd IEEE International Conference on Computer Science and Information Technology Vol. 4[C]. (2009).

DOI: 10.1109/iccsit.2009.5234505

Google Scholar

[6] Jian-jun Shen, Zhi-chun Gan, Jing-jing Li Dept. of Information Warfare Communication Commanding Academy Wuhan, China.  The Research on Modeling and Key Issues of Tactical Internet Network Management[A]. Proceedings of 2010 3rd IEEE International Conference on Computer Science and Information Technology VOL. 3[C]. (2010).

DOI: 10.1109/iccsit.2010.5563605

Google Scholar

[7] Sun Hanlin 1, Jin Yuehui 1, Cui Yidong 1, 2, Wang Hongbo 1, Cheng Shiduan 1 1. State Key Laboratory of Networking and Switching Technology 2. School of Info & Comm Engineering Beijing University of Posts and Telecommunications, Beijing P.R. China, 100876.  IMPROVING FAIRNESS OF RED AIDED BY LIGHTWEIGHT FLOW INFORMATION[A]. Proceedings of 2009 2nd IEEE International Conference on Broadband Network & Multimedia Technology[C]. (2009).

DOI: 10.1109/icbnmt.2009.5348505

Google Scholar

[8] Liu Huixian, Li Xiaojuan Capital Normal University, Beijing.  A NOVEL TRAFFIC CLASSIFICATION ALGORITHM USING MACHINE LEARNING[A]. Proceedings of 2009 2nd IEEE International Conference on Broadband Network & Multimedia Technology[C]. (2009).

DOI: 10.1109/icbnmt.2009.5348494

Google Scholar

[9] Zhu Ye Zhejiang Shuren University Hangzhou, Zhejiang, China 310015. Research of Switchboard Network Management System[A]. Proceedings of 2011 3rd International Conference on Computer Research and Development(ICCRD 2011) VOL. 03[C]. (2011).

DOI: 10.1109/iccrd.2011.5764275

Google Scholar

[10] Yan Feng Guo School of Electronics & Information Engineering, LUT (Liaoning University of Technology) Jinzhou, China.  Effective and Faster Fault node Location Algorithm Based on Betweenness [A]. Proceedings of 2011 3rd IEEE International Conference on Information Management and Engineering(ICIME 2011) VOL. 01[C]. (2011).

Google Scholar

[11] Zhongqiu Song, Zongshui Xiao, Fangfang Wu.  A Network Services Management Middleware Architecture Model[A]. Proceedings of 2011 4th IEEE International Conference on Computer Science and Information Technology(ICCSIT 2011) VOL0.

Google Scholar