Education, Science, Technology, Innovation and Life
Open Access
Sign In

Computer Network Security in the Era of "Internet +"

Download as PDF

DOI: 10.23977/jaip.2022.050310 | Downloads: 19 | Views: 532

Author(s)

Juan Wu 1,2, Dexi Chen 1,2, Haiqing Liu 3

Affiliation(s)

1 School of Computer and Big Data, Jining Normal University, Wulanchabu, Inner Mongolia, China
2 Philippine Christian University Center for International Education, Manila, Philippine
3 Jining District Experimental Middle School, Wulanchabu, Inner Mongolia, China

Corresponding Author

Juan Wu

ABSTRACT

For the majority of netizens, the Internet has opened the door to a new world for them, and obtaining information through the Internet has become a faster and more fashionable way of life. However, there are certain network security problems in many aspects, and these security problems have affected users' use of the network to a certain extent. The purpose of this paper is to study computer network security issues based on the era of "Internet +". Firstly, the definition and characteristics of Internet+ are expounded, and then some problems existing in the current Internet+ security management are analyzed. Finally, the detection technology of Internet security management and software security analysis technology are introduced in detail. It is proposed that the network security management system can solve the computer network security problems in the "Internet +" era, and it focuses on how to realize the functions of the connection of different systems, data storage, network security event monitoring and Internet application monitoring functions. The experimental results show that the system can effectively manage computer network security issues.

KEYWORDS

Internet+ Era, Computer Network, Network Security, Trojan Horse Detection

CITE THIS PAPER

Juan Wu, Dexi Chen, Haiqing Liu, Computer Network Security in the Era of "Internet +". Journal of Artificial Intelligence Practice (2022) Vol. 5: 58-63. DOI: http://dx.doi.org/10.23977/jaip.2022.050310.

REFERENCES

[1] Raj N M, Midhunchakkaravarthy D, Bhattacharyya D. Security Issues and Various Attacks in Wireless Sensor Network: A Survey [J]. International Journal of Security and its Applications, 2019, 13(3):9-16.
[2] Shyamala R, Prabakaran D. A survey on security issues and solutions in virtual private network [J]. International Journal of Pure and Applied Mathematics, 2018, 119(14):1183-1191.
[3] Gowthami K. Security Issues on IoT Environment in Wireless Network Communications [J]. International Journal of Wireless Networks and Broadband Technologies, 2019, 8(2):31-46.
[4] Chriki A, Touati H, Snoussi H, et al. FANET: Communication, mobility models and security issues [J]. Computer networks, 2019, 163(Nov.9):106877.1-106877.17.
[5] Anand A, Trivedi N K, Kumar A. Data Security Issues and Their Solutions in Cloud Computing [J]. Journal of Critical Reviews, 2020, 7(14):2597-2604.
[6] Lencse G, Kadobayashi Y. Methodology for the identification of potential security issues of different IPv6 transition technologies: Threat analysis of DNS64 and stateful NAT64 [J]. Computers & Security, 2018, 77(AUG.):397-411.
[7] Mikryukov A A, Babash A V, Sizov V A. Classifcation of events in information security systems based on neural networks [J]. Open Education, 2019, 23(1):57-63.
[8] Olimid R F, Nencioni G. 5G Network Slicing: A Security Overview [J]. IEEE Access, 2020, PP (99):1-1.
[9] Ichaba M. Security Threats and Solutions in Mobile Ad Hoc Networks; A Review [J]. Universal Journal of Communications and Network, 2019, 6(2):7-17.
[10] Chatterjee T, Ruj S, Bit S D. Security Issues in Named Data Networks [J]. Computer, 2018, 51(1):66-75.
[11] Alenezi M, Almustafa K, Hussein M. On Virtualization and Security-Awareness Performance Analysis in 5G Cellular Networks [J]. JOURNAL OF Engineering Science and Technology Review, 2018, 11(1):199-207.
[12] Dunn K. WatchGuard Technologies Firebox M270 w/Total Security Suite [J]. Sc Magazine, 2019, 30(3):40-40.
[13] Venkata K, Srihari, Karthik. A survey on certain investigation on security issue of the security model in hybrid cloud [J]. International Journal of Pure & Applied Mathematics, 2018, 118(9):113-122.
[14] Kumar S, Singh K, Kumar S, et al. Delimitated Anti Jammer Scheme for Internet of Vehicle: Machine Learning based Security Approach [J]. IEEE Access, 2019, PP (99):1-1.
[15] Bagaa M, Taleb T, Bernabe J B, et al. QoS and Resource-aware Security Orchestration and Life Cycle Management[J]. IEEE Transactions on Mobile Computing, 2020, PP (99):1-1.
[16] Ali M, Malik S, Khalid Z, et al. Security Issues, Threats and Respective Mitigation In Cloud Computing -A Systematic Review [J]. International Journal of Scientific & Technology Research, 2020, 9(8):474-484.
[17] Vk K. A Novel SDN Architecture for IoT Security [J]. Journal of Scientific Research and Development, 2020, 4(2):48-52.
[18] Perminov P, Kosachenko T, Konev A, et al. Automation of information security audit in the Information System on the example of a standard "CIS Palo Alto 8 Firewall Benchmark"[J]. International Journal of Advanced Trends in Computer Science and Engineering, 2020, 9(2):2085-2088.

Downloads: 5942
Visits: 179688

Sponsors, Associates, and Links


All published work is licensed under a Creative Commons Attribution 4.0 International License.

Copyright © 2016 - 2031 Clausius Scientific Press Inc. All Rights Reserved.