Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 842))

  • 1530 Accesses

Abstract

With the development of the information technology, computer information system has played an important role in modern society. As long as any break appears in computer information system, it takes a huge effect in whole society. Based on the analysis of network information safety factors, and then put forward common computer network information safety protection strategy, and the development of the network information safety was prospected and formed the network information safety protection system. There is an important, direct and realistic significance in research about computer system security. With the development of computer and communication technology, the computer net will penetrate every field of our social life as an important method of exchanging information. So, recognizing the frangibility and potential threatens of the net and some existent security problems objectively, taking effectively security strategy and ensuring the security of the net information are the things that every country, and group and every person must envisage. From the basic concept and existent problem of the net information security, some digital security technologies, such as information cryptography technology, digital abstract, digital signature, digital envelope and digital credentials have been analyzed in the paper.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Parikh, D., Chen, T.: Data fusion and cost minimization for intrusion detection. IEEE Trans. Inf. Forensics Secur. 3(3), 381–389 (2008)

    Article  Google Scholar 

  2. Gui, H.X.: Research of the intrusion detection system based on data mining. In: Proceeding of the International Conference on e-Education Entertainment and e-Management, pp. 190–192 (2011)

    Google Scholar 

  3. Zhang, B.Y., Chen, Z.Q., Tang, W.S., Fan, Q., Yan, X.A., Wang, S.L.: Network security situation assessment based on stochastic game model. Adv. Intell. Comput. 6838, 517–525 (2011)

    Article  Google Scholar 

  4. Lv, H.Y., Cao, Y.D.: Research on network risk situation assessment based on threat analysis. In: 2008 International Symposium on Information Science and Engineering, pp. 252–257 (2008)

    Google Scholar 

  5. Wei, Y., Lian, Y.F.: Network security situational awareness model based on log audit and performance correction. Chin. J. Comput. 32(4), 763–772 (2009)

    Article  Google Scholar 

  6. Acampora, G.: Exploiting timed automata based fuzzy controllers for designing adaptive intrusion detection systems. Soft. Comput. 16(7), 1183–1196 (2012)

    Article  Google Scholar 

  7. Li, X.Y., Wang, Q.X., Yang, L.: Research of network security situation index system and visualization technology. J. Commun. 32(11), 109–118 (2011)

    Google Scholar 

  8. Hubballi, N., Biswas, S., Nandi, S.: Network specific false alarm reduction in intrusion detection system. Secur. Commun. Netw. 4(11), 1339–1349 (2011)

    Article  Google Scholar 

  9. Liu, N., Li, G., Liu, Y.: A method of network security situation prediction based on gray neural network model. Appl. Mech. Mater. 63–64(6), 936–939 (2011)

    Article  Google Scholar 

  10. Shifflet, J.A.: Technique independent fusion model for network intrusion detection. In: Proceeding of the Misdates Conference on Undergraduate Research in Computer Science and Mathematics, vol. 3, no. 1, pp. 13–19 (2005)

    Google Scholar 

  11. Wen, C.L., Wen, C.B.: The multistate sequential filter with multisensory data fusion systems and control in aerospace and astronautics. In: Proceedings of the 1st International Conference on Systems and Control in Aerospace and Astronautics (2006)

    Google Scholar 

  12. Dartique, C., Jang, H., Zeng, W.: A new data- mining based approach for network intrusion detection. In: Proceedings of the 7th Annual Conference on CNSR. IEEE Computer Society, Los Alamitos, pp. 372–377 (2009)

    Google Scholar 

  13. Conti, M.D., Pietro, R., Gabrielli, A., Mancini, L.V.: Secure topology maintenance and events collection in WSNs. Secur. Commun. Netw. 4(7), 744–762 (2011)

    Article  Google Scholar 

  14. Li, Z.T., Ma, Y.M., Wang, L., Ma, J.E.: A novel real- time aggregation method on network security events. Kybernetes 40(5), 912–920 (2011)

    Article  Google Scholar 

  15. Xiao, H.D, Li, J.H. Arithmetic of security data fusion under high performance computing environment. In: Proceeding of WSEAS2005 (2005)

    Google Scholar 

  16. Tian, J., Chen, J., Dou, L.H., Zhang, Y.H.: The research of test and evaluation for multisensory data fusion systems. In: Proceedings of Intelligent Control and Automation, vol. 3, no. 6, pp. 2104–2108 (2002)

    Google Scholar 

  17. Ritchey, R., Ammann, P.: Using model checking to analyze network vulnerabilities. In: Proceedings of 2000 IEEE Symposium on Security and Privacy, pp. 156–165. IEEE Computer Society Press, Los Alamitos (2000)

    Google Scholar 

  18. Wu, S.L.: A geometric probabilistic framework for data fusion in information retrieval. In: 10th International Conference on Information Fusion (2007)

    Google Scholar 

  19. Sheyner, O., Haines, J., Jha, S., et al.: Automated generation and analysis of attack graphs. In: Proceedings of 2002 IEEE Symposium on Security and Privacy, pp. 273–284. IEEE Computer Society Press, Berkeley California (2002)

    Google Scholar 

Download references

Acknowledgement

The authors wish to thank the Education Department of Jilin Province [2015] (127th) and [2015] (182nd), Jilin science and Technology Bureau (201467006), Science and Technology Department of Jilin Province (20150204045NY). Under which the present work was possible.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shen Wei .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wei, S. (2019). Computer Network Security Technology Research. In: Abawajy, J., Choo, KK., Islam, R., Xu, Z., Atiquzzaman, M. (eds) International Conference on Applications and Techniques in Cyber Security and Intelligence ATCI 2018. ATCI 2018. Advances in Intelligent Systems and Computing, vol 842. Springer, Cham. https://doi.org/10.1007/978-3-319-98776-7_98

Download citation

Publish with us

Policies and ethics