Computer Network Security in the Era of "Internet +"
DOI: 10.23977/jaip.2022.050310 | Downloads: 19 | Views: 532
Author(s)
Juan Wu 1,2, Dexi Chen 1,2, Haiqing Liu 3
Affiliation(s)
1 School of Computer and Big Data, Jining Normal University, Wulanchabu, Inner Mongolia, China
2 Philippine Christian University Center for International Education, Manila, Philippine
3 Jining District Experimental Middle School, Wulanchabu, Inner Mongolia, China
Corresponding Author
Juan WuABSTRACT
For the majority of netizens, the Internet has opened the door to a new world for them, and obtaining information through the Internet has become a faster and more fashionable way of life. However, there are certain network security problems in many aspects, and these security problems have affected users' use of the network to a certain extent. The purpose of this paper is to study computer network security issues based on the era of "Internet +". Firstly, the definition and characteristics of Internet+ are expounded, and then some problems existing in the current Internet+ security management are analyzed. Finally, the detection technology of Internet security management and software security analysis technology are introduced in detail. It is proposed that the network security management system can solve the computer network security problems in the "Internet +" era, and it focuses on how to realize the functions of the connection of different systems, data storage, network security event monitoring and Internet application monitoring functions. The experimental results show that the system can effectively manage computer network security issues.
KEYWORDS
Internet+ Era, Computer Network, Network Security, Trojan Horse DetectionCITE THIS PAPER
Juan Wu, Dexi Chen, Haiqing Liu, Computer Network Security in the Era of "Internet +". Journal of Artificial Intelligence Practice (2022) Vol. 5: 58-63. DOI: http://dx.doi.org/10.23977/jaip.2022.050310.
REFERENCES
[1] Raj N M, Midhunchakkaravarthy D, Bhattacharyya D. Security Issues and Various Attacks in Wireless Sensor Network: A Survey [J]. International Journal of Security and its Applications, 2019, 13(3):9-16.
[2] Shyamala R, Prabakaran D. A survey on security issues and solutions in virtual private network [J]. International Journal of Pure and Applied Mathematics, 2018, 119(14):1183-1191.
[3] Gowthami K. Security Issues on IoT Environment in Wireless Network Communications [J]. International Journal of Wireless Networks and Broadband Technologies, 2019, 8(2):31-46.
[4] Chriki A, Touati H, Snoussi H, et al. FANET: Communication, mobility models and security issues [J]. Computer networks, 2019, 163(Nov.9):106877.1-106877.17.
[5] Anand A, Trivedi N K, Kumar A. Data Security Issues and Their Solutions in Cloud Computing [J]. Journal of Critical Reviews, 2020, 7(14):2597-2604.
[6] Lencse G, Kadobayashi Y. Methodology for the identification of potential security issues of different IPv6 transition technologies: Threat analysis of DNS64 and stateful NAT64 [J]. Computers & Security, 2018, 77(AUG.):397-411.
[7] Mikryukov A A, Babash A V, Sizov V A. Classifcation of events in information security systems based on neural networks [J]. Open Education, 2019, 23(1):57-63.
[8] Olimid R F, Nencioni G. 5G Network Slicing: A Security Overview [J]. IEEE Access, 2020, PP (99):1-1.
[9] Ichaba M. Security Threats and Solutions in Mobile Ad Hoc Networks; A Review [J]. Universal Journal of Communications and Network, 2019, 6(2):7-17.
[10] Chatterjee T, Ruj S, Bit S D. Security Issues in Named Data Networks [J]. Computer, 2018, 51(1):66-75.
[11] Alenezi M, Almustafa K, Hussein M. On Virtualization and Security-Awareness Performance Analysis in 5G Cellular Networks [J]. JOURNAL OF Engineering Science and Technology Review, 2018, 11(1):199-207.
[12] Dunn K. WatchGuard Technologies Firebox M270 w/Total Security Suite [J]. Sc Magazine, 2019, 30(3):40-40.
[13] Venkata K, Srihari, Karthik. A survey on certain investigation on security issue of the security model in hybrid cloud [J]. International Journal of Pure & Applied Mathematics, 2018, 118(9):113-122.
[14] Kumar S, Singh K, Kumar S, et al. Delimitated Anti Jammer Scheme for Internet of Vehicle: Machine Learning based Security Approach [J]. IEEE Access, 2019, PP (99):1-1.
[15] Bagaa M, Taleb T, Bernabe J B, et al. QoS and Resource-aware Security Orchestration and Life Cycle Management[J]. IEEE Transactions on Mobile Computing, 2020, PP (99):1-1.
[16] Ali M, Malik S, Khalid Z, et al. Security Issues, Threats and Respective Mitigation In Cloud Computing -A Systematic Review [J]. International Journal of Scientific & Technology Research, 2020, 9(8):474-484.
[17] Vk K. A Novel SDN Architecture for IoT Security [J]. Journal of Scientific Research and Development, 2020, 4(2):48-52.
[18] Perminov P, Kosachenko T, Konev A, et al. Automation of information security audit in the Information System on the example of a standard "CIS Palo Alto 8 Firewall Benchmark"[J]. International Journal of Advanced Trends in Computer Science and Engineering, 2020, 9(2):2085-2088.
Downloads: | 5942 |
---|---|
Visits: | 179688 |
Sponsors, Associates, and Links
-
Power Systems Computation
-
Internet of Things (IoT) and Engineering Applications
-
Computing, Performance and Communication Systems
-
Advances in Computer, Signals and Systems
-
Journal of Network Computing and Applications
-
Journal of Web Systems and Applications
-
Journal of Electrotechnology, Electrical Engineering and Management
-
Journal of Wireless Sensors and Sensor Networks
-
Journal of Image Processing Theory and Applications
-
Mobile Computing and Networking
-
Vehicle Power and Propulsion
-
Frontiers in Computer Vision and Pattern Recognition
-
Knowledge Discovery and Data Mining Letters
-
Big Data Analysis and Cloud Computing
-
Electrical Insulation and Dielectrics
-
Crypto and Information Security
-
Journal of Neural Information Processing
-
Collaborative and Social Computing
-
International Journal of Network and Communication Technology
-
File and Storage Technologies
-
Frontiers in Genetic and Evolutionary Computation
-
Optical Network Design and Modeling
-
Journal of Virtual Reality and Artificial Intelligence
-
Natural Language Processing and Speech Recognition
-
Journal of High-Voltage
-
Programming Languages and Operating Systems
-
Visual Communications and Image Processing
-
Journal of Systems Analysis and Integration
-
Knowledge Representation and Automated Reasoning
-
Review of Information Display Techniques
-
Data and Knowledge Engineering
-
Journal of Database Systems
-
Journal of Cluster and Grid Computing
-
Cloud and Service-Oriented Computing
-
Journal of Networking, Architecture and Storage
-
Journal of Software Engineering and Metrics
-
Visualization Techniques
-
Journal of Parallel and Distributed Processing
-
Journal of Modeling, Analysis and Simulation
-
Journal of Privacy, Trust and Security
-
Journal of Cognitive Informatics and Cognitive Computing
-
Lecture Notes on Wireless Networks and Communications
-
International Journal of Computer and Communications Security
-
Journal of Multimedia Techniques
-
Automation and Machine Learning
-
Computational Linguistics Letters
-
Journal of Computer Architecture and Design
-
Journal of Ubiquitous and Future Networks