Skip to main content

Research on Computer Network Information Security and Preventive Countermeasures

  • Conference paper
  • First Online:
International Conference on Applications and Techniques in Cyber Security and Intelligence ATCI 2018 (ATCI 2018)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 842))

  • 1557 Accesses

Abstract

The collection, transmission and use of information are inseparable from the network. Precisely because the broad applications of computer network information security vulnerability and complexity. Makes computer networks more and more attacks, security has also become increasingly vulnerable, so that information security is growing more difficult. This article from network information security vulnerabilities, network security for common network attacks and countermeasures, to prevent the main construction principles of network security technologies, such as analysis of the various aspects of the current network information security issues, and solutions to common network attacks raised the technical level of, and the principles of network security. At its core are key to preventing network security technologies, and the comparison of several key technologies.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Mendez, D.J., et al.: System and method for globally and securely accessing unified information in a computer network. U.S. Patent No. 9,361,603, 7 June 2016

    Google Scholar 

  2. Guo, J., et al.: An approach to network security evaluation of computer network information system with triangular fuzzy information. J. Intell. Fuzzy Syst. 28(5), 2029–2035 (2015)

    Article  MathSciNet  Google Scholar 

  3. Sun, Q.L.: Information under the network environment using computer information security technology. In: 2015 International Conference on Intelligent Transportation, Big Data and Smart City (ICITBS). IEEE (2015)

    Google Scholar 

  4. Ab Rahman, N.H., Choo, K.-K.R.: A survey of information security incident handling in the cloud. Comput. Secur. 49, 45–69 (2015)

    Article  Google Scholar 

  5. Porras, P.A., Skinner, K.M., Dawson, S.M.: Security actuator for a dynamically programmable computer network. U.S. Patent No. 9,571,523, 14 February 2017

    Google Scholar 

  6. Shropshire, J., Warkentin, M., Sharma, S.: Personality, attitudes, and intentions: predicting initial adoption of information security behavior. Comput. Secur. 49, 177–191 (2015)

    Article  Google Scholar 

  7. Zhang, Y.: Research on the computer network security evaluation based on the DHFHCG operator with dual hesitant fuzzy information. J. Intell. Fuzzy Syst. 28(1), 199–204 (2015)

    MathSciNet  Google Scholar 

  8. Titus, J.: The eclipse of stand. J. Zhongkai Agrotech. Coll. 19(2), 32–35 (2006)

    Google Scholar 

  9. Aleksy, M., Korthaus, A., Schader, M.: Use Java and the CORBA realization distribute type system. J. Pingxiang Coll. 4, 104–105 (2005)

    MATH  Google Scholar 

  10. Clay Richardson, W., Avondolio, D.: The Java high class weaves a distance: JDK 5. Sci. Technol. Book Rev. 3, 17–18 (2006)

    Google Scholar 

  11. Li, J., Vuong, S.: A semantics-based routing scheme for grid resource discovery. In: E-Science: First International Conference on E-Science and Grid Computing, pp. 58–70, 90 (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiaohui Chai .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Li, G., Yu, S., Chai, X. (2019). Research on Computer Network Information Security and Preventive Countermeasures. In: Abawajy, J., Choo, KK., Islam, R., Xu, Z., Atiquzzaman, M. (eds) International Conference on Applications and Techniques in Cyber Security and Intelligence ATCI 2018. ATCI 2018. Advances in Intelligent Systems and Computing, vol 842. Springer, Cham. https://doi.org/10.1007/978-3-319-98776-7_147

Download citation

Publish with us

Policies and ethics