Research on the Actual Combat-Oriented Mode of Network Security Supervision Based on Networked Resources

Article Preview

Abstract:

With the rapid growth of Internet penetration, it is the disclosure problems of network information that frequently appears .At the same time, the problem of Internet safety has been attached great importance to by the countries. Thus, it is of great significance to build an Internet safety supervision mechanism. Based on white box testing technology and black box testing technology theory of network security detection, this paper proposes a WEB interface detection algorithm based on Internet resources and sets up a safety assessment model for computer security and supervision mechanism. In addition, this paper also designs the algorithm experiment by taking the data detection which considers WEB as the connector for example. Through the algorithm experiment, the following conclusions are obtained: Network interface has a higher recognition rate for E-BPM-BM algorithm which has different types and different characteristics. Among them, registered network interface owns the highest recognition rate which is up to 98.46%. When the network test node matrixa0 is 9, its matching rate reaches the maximum, namely 0.97 9.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 791-793)

Pages:

1710-1715

Citation:

Online since:

September 2013

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Intrusion detection systems: the principle, the intrusion hide and countermeasures [J]. Journal of microelectronics and computers, 2010: 45-46.

Google Scholar

[2] Lin Manjun Qian Hualin. Intrusion detection system: the principle, the intrusion hide and countermeasures [J]. Journal of microelectronics and computers, 2011(1): 23-24.

Google Scholar

[3] Pu Yuanfang, Zhang Wei, Teng Shaohua, Du hongle. Collaborative network intrusion detection based on decision tree [J]. Journal of jiangxi normal university: natural science edition, 2010, 34 (3): 302-307.

DOI: 10.1109/jcpc.2009.5420129

Google Scholar

[4] Lu Houqing Wang Feng, Song Yisheng, and so on. Damage assessment system based on battle simulation [J]. Journal of PLA university of science and technology: natural science edition, 2011, 10 (2): 139-143.

Google Scholar

[5] Wang Huimo, Zhang Yu. Research on joint operations simulation situation data model [J]. Journal of system simulation, 2010, 20 (15): 4186-4188.

Google Scholar

[6] Xu Zemin, He Jun. The design and implementation of battlefield three-dimensional graphic simulation system [J]. Computer applications, 2011, 29 (l1): 313-316.

Google Scholar

[7] Yang Chao, Cao Chunjie, Ma Jianfeng. Universal combined security Mesh network authentication protoco [J]. Journal of xi'an electronic science technology university, 2011, 34 (5): 114-117.

Google Scholar

[8] Peng Han, Guo Lei. The design and implementation of Web application security vulnerabilities testing tools Punks [J]. Journal ournal of xi 'an aviation technology college, 2011, 26(1): 154-156.

Google Scholar

[9] Li Yan. Research about the information security technology taking digital certificate as the core[J], computer CD software and application, research on information technology application , 2012, 7.

Google Scholar

[10] Cui Kai. Analysis the security of online payment system based on digital certificate [J]. Computer CD software and applications, 2012, 21(3): 78-79.

Google Scholar

[11] Zhang Lei, Zhou Jifeng, Zhang Qiang. System software reliability validation testing methods research field [J]. Computer and digital engineering, 2010(6): 45-46.

Google Scholar

[12] Yang Bolong, Zhao Baohua, Li Jing. Research on digital certificate authentication framework compatible with dual algorithm [J]. 2012 proceedings of power communication management and smart grid communication technology BBS, 2013(1): 1123-1127.

Google Scholar

[13] Liu Renshan, Meng Xianghong. The design and implementation of authentication system based on PKI [J]. Manufacturing automation, 2013(4): 102-103.

Google Scholar