Study of Campus Network Security Based on Dynamic Self-Adaptive Network Security Model

Article Preview

Abstract:

Taking dynamic self-adaptive network security model system of the whole network as theoretical guidance, this thesis analyzes security risks faced by campus network completely and in full detail, combining with the network system features. The current mainstream of network security technologies such as firewalls, intrusion detection,VPN, certification, and others are carefully studied to illustrate security technologies which shall be focused for the campus network security. Then, taking the Jiangxi Science and Technology Normal University campus network as an example, the specific characteristics of campus network are considered to analyze the reality of network security and to design campus network security solutions, which have strong relevance and feasibility.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 846-847)

Pages:

1784-1788

Citation:

Online since:

November 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Duan Haixin. Analysis and Solutions of CERNET Campus Network Security [J]. China Education Network, 2005, p.03.

Google Scholar

[2] Sean Convery. Network Security Architectures [M]. Posts & Telecom Press, (2005).

Google Scholar

[3] IEEE. Std. 802. lx IEEE Standard for Local and Metropolitan Area Network Port Based Network Access Control[S],(2001).

DOI: 10.1109/ieeestd.2004.96095

Google Scholar

[4] Lian Hong. Research on Campus Network Authentication and Billing Management Based on 802. 1x [D]. Tianjin Polytechnic University, (2008).

Google Scholar

[5] Chen Guobiao. Design and Realization in Police Information System of SAN [D]. Tongji University, 2007, p.5.

Google Scholar

[6] Ono K, Nakamura Y, Satoh Fet al. Verifying the Consistency ofSecurity Policies by Abstracting into Security Types. 2007IEEE International Conference on Web Services (ICWS 2007).

DOI: 10.1109/icws.2007.187

Google Scholar

[7] Davy S, Jennings B, Strassner J. The policy continuum-Policyauthoring and conflict analysis. Computer Communications . (2008).

Google Scholar

[8] N. Marilleau,C. Lang,P. Chatonnay et al. A meta-model of group for urban mobility modeling. Proceedings of the 2005 International Conference on Active Media Technology . (2005).

DOI: 10.1109/amt.2005.1505380

Google Scholar