Research on Multi-Core Network Equipment Virus Defense System

Article Preview

Abstract:

With the arrival of the wave of information technology, the business activities of a variety of business systems via the network to complete. But the virus to exploit system vulnerabilities to sneak into the enterprise information network server, the enterprise network into a leak and suffered the double threat of external hackers. Leverage existing security infrastructure, enterprise networks, statistical analysis of all possible virus invasion point, combined with a good virus defense technology layers protection system vulnerabilities, the formation of a whole network antivirus, coordinated operations, a unified management modernization virus defense systems.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1197-1200

Citation:

Online since:

March 2015

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2015 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Yu xin Yang. The Trojan virus analysis and security measures in chinese [J]. Science and Technology Innovation Herald, Vol 31-32(2011). p.36.

Google Scholar

[2] Liu Lu. Joint Distributed Firewall and Intrusion Detection for Network Security Protection System in chinese[J]. modern computer (Pro), Vol. 63-65(2012), p.2.

Google Scholar

[3] Fang Shi-lin, Liu Li-qiang, Fang Xin, Li Yi. Design and Realization of the IPv6-oriented Intrusion Detection System [J]. Process Automation Instrumentation, Vol. 32-35(2012), p.2.

Google Scholar

[4] zhong wei Li, Zhang Jian li. power enterprise network information security management in chinese[J]. Technological Wind, Vol. 84-85(2012), p.1.

Google Scholar

[5] Zhao Jian ying, Sun Chun sheng. viral marketing spread of network externalities products market impact study in chinese [J]. China Business & Trade, Vol. 51-52 (2012) , p.12.

Google Scholar

[6] Wang Zai tian. Enterprise network firewall design and selection in chinese[J]. Occupation, Vol. 127-128(2012) , p.11.

Google Scholar

[7] Liu Jian kun. Analysis of network security defense system implementation strategy in chinese [J]. China Computer & Communication (theoretical), Vol. 16-17(2010), p.11.

Google Scholar