Computer Network Attack and Defense Technology

Xinyue Yang, Shujun Zhou, Guanghui Ren, Yaling Liu

Article ID: 410
Vol 1, Issue 1, 2018

VIEWS - 807 (Abstract) 804 (PDF)

Abstract


In recent years, the Internet as a symbol of the computer network protocols, standards and application technology development is extremely rapid. But the Internet is like a sharp double-edged sword, it is for the convenience of people at the same time, but also for computer viruses and computer crime to provide the soil, for systems, network protocols and databases, whether it is its own design flaws, or due to human factors caused by a variety of security vulnerabilities, may be some of the other attempts to use hackers and attack, so the establishment of an effective network security system is even more urgent. To ensure network security, reliable, you must be familiar with the general process of hacker network attacks. The only way to do before the hacker attack the necessary precautions is to ensure that the network is safe and reliable operation. This article comprehensively analyzes the steps, methods and common attack tools of network attack, and tells the concrete precautionary measures from several aspects, so that readers have a comprehensive network of knowledge, in the treatment of network threats are well prepared.

Full Text:

PDF


References


1. Mu Yong, Li Peixin. Defense! Network attack insider analysis. People’s Posts and Telecommunications Press.

2. Feng Qianjin. Computer network attack and prevention. China University of Political Science and Law Press.

3. Shi Zhiguo. Computer Network Security Course. Tsinghua University Press, Beijing Jiaotong University Press.

4. Feng Yuan, Lan Shaohua, Yang Yuwang. Computer network security foundation. Science Press.

5. Jiang Jianchun, Feng Dengguo. Network intrusion detection principle and technology. National Defense Industry Press.

6. Chang Hong. Network complete technology and anti-hackers. Changchun Metallurgical Industry Press.

7. Xian Ming, Bao Weidong, Wang Yongjie. Introduction to the assessment of network attack effectiveness. National Defense University of Science and Technology Press.


Refbacks

  • There are currently no refbacks.




Creative Commons License

This site is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.