HOME JOURNALS CONTACT

Information Technology Journal

Year: 2013 | Volume: 12 | Issue: 23 | Page No.: 7193-7200
DOI: 10.3923/itj.2013.7193.7200
Research on the Network Security Supervision Practical Guide Mode Based on Network Resource
Gaofeng Luo, Tongcheng Huang and Zijuan Shi

Abstract: The problem of network security has attracted the attention of the entire world, because network security problems annually give a lot of network users resulting in loss of life and economic. This study improves the PDRR safety monitoring model and proposes a network security monitoring system model of DOM security data tag tree, finally its model is studied experimentally. Through the study found, DOM security data label tree network monitoring system can ensure the smooth transmission of data which can effectively block the malicious attacks and compared to the previous PDRR, it has good clustering and dividing partition function, improving the efficiency of network security protection. Through the network data transmission security testing, we found that the most obvious effect is the intercept on the IP fraud, before the improved is 18 times and after the improved drops to 1 which verify the effectiveness of network security monitoring system, to provide a theoretical reference for the study of network security monitoring scheme.

Fulltext PDF

How to cite this article
Gaofeng Luo, Tongcheng Huang and Zijuan Shi, 2013. Research on the Network Security Supervision Practical Guide Mode Based on Network Resource. Information Technology Journal, 12: 7193-7200.

Keywords: Network security monitoring, DOM data, PDRR data monitoring model, IP fraud and malicious attack

REFERENCES

  • Kiewitz, C., S.L.D. Restubog, T.J. Zagenczyk, K.D. Scott, P.R.J.M. Garcia and R.L. Tang, 2012. Sins of the parents: Self-control as a buffer between supervisors' previous experience of family undermining and subordinates' perceptions of abusive supervision. Leadership Q., 23: 869-882.
    CrossRef    


  • Lin, M.J. and H.L. Qian, 2011. Intrusion detection system: Principle, intrusion hiding and countermeasures. Microelectron. Comput., 31: 102-103.


  • Liu, R.S. and X.H. Meng, 2013. Design and implementation of identity authentication system based on PKI. Manuf. Automation, 20: 112-113.


  • Jin, B. and J.J. Lin, 2010. Review of intrusion detection technology. J. East China Univ. Sci. Technol., 1: 45-46.


  • Lu, H.Q., F. Wang and Y. Song, 2011. The damage assessment system based on combating simulation. J. PLA Univ. Sci. Technol., 10: 139-143.


  • Pu, Y.F., W. Zhang, S.H. Teng and H.L. Du, 2010. The cooperative network intrusion detection based on decision tree. J. Jiangxi Normal Univ. (Nat. Sci. Edn.), 34: 302-307.
    Direct Link    


  • Ho, Q.D. and T. Le-Ngoc, 2012. Smart Grid Communications Networks: Wireless Technologies, Protocols, Issues and Standards. In: Handbook of Green Information and Communication Systems, Obaidat, M.S., A. Anpalagan and I. Woungang (Eds.). Academic Press, New York, pp: 115-146


  • Wang, H.M. and Y. Zhang, 2011. Research on the model of joint operations simulation situation data. J. Syst. Simul., 20: 4186-4188.


  • Xu, Z.M. and J. He, 2011. The design and implementation of battlefield situation 3D graphics simulation system. Comput. Appl., 29: 313-316.

  • © Science Alert. All Rights Reserved