Abstract
With the continuous development of the economy and society, and the continuous improvement of Internet technology, the computer field has paid more and more attention to the use of network security technology. In fact, although network security technology has become more mature in the protection work, virus attacks have gradually matured, making network security technology more difficult in virus handling. The research purpose of this paper is to study the computer network security based on the layered evaluation protection system. This paper analyzes the characteristics of the computer network security layered protection system, studies the main technologies applied in the network security layered protection system, and combines network security The actual characteristics of protection, the design scheme of hierarchical protection evaluation system for computer network security was proposed, the hierarchical evaluation was used to establish the protection system, the computer network security was researched, and the protection system in this paper was verified through system testing. The experimental results in this paper show that the protection system based on layered evaluation in this paper has high security performance, the safety is as high as 97%. In addition, the response time in this layered protection system based on layered evaluation is short and the efficiency is higher.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Wang, Z., Zhang, H., Wu, L.: Layered location-based security mechanism for mobile sensor networks: moving security areas. Sensors 15(10), 24886–24902 (2015)
Rathore, M.M., Ahmad, A., Paul, A.: Real-time intrusion detection system for ultra-high speed big data environment. J. Supercomput. 72(9), 3489–3510 (2016)
Fazio, P., De Rango, F., Sottile, C.: A predictive cross-layered interference management in a multichannel MAC with reactive routing in VANET. IEEE Trans. Mobile Comput. 15(8), 1 (2015)
Liu, H., Wan, H., Chi, K.T.: An Encryption scheme based on synchronization of two-layered complex dynamical networks. IEEE Trans. Circuits Syst. I Regul. Pap. PP(99), 2010–2021 (2016)
Wurzenberger, M., Skopik, F., Settanni, G.: Complex log file synthesis for rapid sandbox-benchmarking of security-and computer network analysis tools. Inf. Syst. 60(C), 13–33 (2016)
Wang, Y.: Food information management and security strategy of computer network. Adv. J. Food Sci. Technol. 11(12), 792–794 (2016)
Shuo, L., Chai, B., Zhang, X.: Collaborative filtering algorithm based on improved nearest neighbors. Comput. Eng. Appl. 39(1), 53–58 (2015)
Anithaashri, T.P., Baskaran, R.: Enhancing multi-user network security using sagacity and dismissal of conquered movements (SDCM). J. Comput. Theor. Nanosci. 13(1), 69–78 (2016)
Bisht, N., Ahmad, A., Bisht, S.: Application of feature selection methods and ensembles on network security dataset. Int. J. Comput. Appl. 135(11), 1–5 (2016)
Hanamsagar, A., Borate, B., Jane, N.: Detection of firewall policy anomalies in real-time distributed network security appliances. Int. J. Comput. Appl. 116(23), 7–13 (2015)
Dui-xia, M.A., Zi-qiong, L.I.N., Feng, Z.H.U.: Application of matroids on network security. J. Chin. Comput. Syst. 43(3), 292–301 (2015)
Parmar, H., Gosai, A.: Analysis and study of network security at transport layer. Int. J. Comput. Appl. 121(13), 35–40 (2015)
Degefa, F.B., Lee, D., Kim, J.: Performance and security enhanced authentication and key agreement protocol for SAE/LTE network. Comput. Netw. 94(C), 145–163 (2015)
Chate, A.B., Chirchi, V.R.: Access control list provides security in network. Int. J. Comput. Appl. 121(22), 14–16 (2015)
Acknowledgements
This work was supported by JXJG-19-31-1: Research on structure the systematic of computer network technology specialty curriculum system of work process.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Zhou, D., Zhu, Y. (2020). Computer Network Security Based on Hierarchical Evaluation Protection System. In: Xu, Z., Parizi, R., Hammoudeh, M., Loyola-González, O. (eds) Cyber Security Intelligence and Analytics. CSIA 2020. Advances in Intelligent Systems and Computing, vol 1146. Springer, Cham. https://doi.org/10.1007/978-3-030-43306-2_7
Download citation
DOI: https://doi.org/10.1007/978-3-030-43306-2_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-43305-5
Online ISBN: 978-3-030-43306-2
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)