iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://unpaywall.org/10.1007/978-3-030-43306-2_7
Computer Network Security Based on Hierarchical Evaluation Protection System | SpringerLink
Skip to main content

Computer Network Security Based on Hierarchical Evaluation Protection System

  • Conference paper
  • First Online:
Cyber Security Intelligence and Analytics (CSIA 2020)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1146))

Abstract

With the continuous development of the economy and society, and the continuous improvement of Internet technology, the computer field has paid more and more attention to the use of network security technology. In fact, although network security technology has become more mature in the protection work, virus attacks have gradually matured, making network security technology more difficult in virus handling. The research purpose of this paper is to study the computer network security based on the layered evaluation protection system. This paper analyzes the characteristics of the computer network security layered protection system, studies the main technologies applied in the network security layered protection system, and combines network security The actual characteristics of protection, the design scheme of hierarchical protection evaluation system for computer network security was proposed, the hierarchical evaluation was used to establish the protection system, the computer network security was researched, and the protection system in this paper was verified through system testing. The experimental results in this paper show that the protection system based on layered evaluation in this paper has high security performance, the safety is as high as 97%. In addition, the response time in this layered protection system based on layered evaluation is short and the efficiency is higher.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Wang, Z., Zhang, H., Wu, L.: Layered location-based security mechanism for mobile sensor networks: moving security areas. Sensors 15(10), 24886–24902 (2015)

    Article  Google Scholar 

  2. Rathore, M.M., Ahmad, A., Paul, A.: Real-time intrusion detection system for ultra-high speed big data environment. J. Supercomput. 72(9), 3489–3510 (2016)

    Article  Google Scholar 

  3. Fazio, P., De Rango, F., Sottile, C.: A predictive cross-layered interference management in a multichannel MAC with reactive routing in VANET. IEEE Trans. Mobile Comput. 15(8), 1 (2015)

    Google Scholar 

  4. Liu, H., Wan, H., Chi, K.T.: An Encryption scheme based on synchronization of two-layered complex dynamical networks. IEEE Trans. Circuits Syst. I Regul. Pap. PP(99), 2010–2021 (2016)

    Article  Google Scholar 

  5. Wurzenberger, M., Skopik, F., Settanni, G.: Complex log file synthesis for rapid sandbox-benchmarking of security-and computer network analysis tools. Inf. Syst. 60(C), 13–33 (2016)

    Article  Google Scholar 

  6. Wang, Y.: Food information management and security strategy of computer network. Adv. J. Food Sci. Technol. 11(12), 792–794 (2016)

    Article  Google Scholar 

  7. Shuo, L., Chai, B., Zhang, X.: Collaborative filtering algorithm based on improved nearest neighbors. Comput. Eng. Appl. 39(1), 53–58 (2015)

    Google Scholar 

  8. Anithaashri, T.P., Baskaran, R.: Enhancing multi-user network security using sagacity and dismissal of conquered movements (SDCM). J. Comput. Theor. Nanosci. 13(1), 69–78 (2016)

    Article  Google Scholar 

  9. Bisht, N., Ahmad, A., Bisht, S.: Application of feature selection methods and ensembles on network security dataset. Int. J. Comput. Appl. 135(11), 1–5 (2016)

    Google Scholar 

  10. Hanamsagar, A., Borate, B., Jane, N.: Detection of firewall policy anomalies in real-time distributed network security appliances. Int. J. Comput. Appl. 116(23), 7–13 (2015)

    Google Scholar 

  11. Dui-xia, M.A., Zi-qiong, L.I.N., Feng, Z.H.U.: Application of matroids on network security. J. Chin. Comput. Syst. 43(3), 292–301 (2015)

    Google Scholar 

  12. Parmar, H., Gosai, A.: Analysis and study of network security at transport layer. Int. J. Comput. Appl. 121(13), 35–40 (2015)

    Google Scholar 

  13. Degefa, F.B., Lee, D., Kim, J.: Performance and security enhanced authentication and key agreement protocol for SAE/LTE network. Comput. Netw. 94(C), 145–163 (2015)

    Google Scholar 

  14. Chate, A.B., Chirchi, V.R.: Access control list provides security in network. Int. J. Comput. Appl. 121(22), 14–16 (2015)

    Google Scholar 

Download references

Acknowledgements

This work was supported by JXJG-19-31-1: Research on structure the systematic of computer network technology specialty curriculum system of work process.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yong Zhu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhou, D., Zhu, Y. (2020). Computer Network Security Based on Hierarchical Evaluation Protection System. In: Xu, Z., Parizi, R., Hammoudeh, M., Loyola-González, O. (eds) Cyber Security Intelligence and Analytics. CSIA 2020. Advances in Intelligent Systems and Computing, vol 1146. Springer, Cham. https://doi.org/10.1007/978-3-030-43306-2_7

Download citation

Publish with us

Policies and ethics