Skip to main content
Top

2019 | OriginalPaper | Chapter

Research on LAN Network Malicious Code Intrusion Active Defense Technology

Authors : Lei Ma, Ying-jian Kang, Hua Han

Published in: Advanced Hybrid Information Processing

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Traditional LAN networks had low defense efficiency and poor stability. In order to solve this problem, a new malicious code intrusion active defense technology was studied, and the defense technology structure was designed and the work-flow was studied. The system structure was divided into hardware layer, kernel layer and executive layer. The work-flow was divided into four steps: file judgment, file compression, file processing and file display. The working effect of the technology was verified by comparison with the traditional method. It was known from the experimental results that the studied technology had high defense efficiency and strong stability.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Wang, Z., Yu, A., et al.: Construction of network security immune system. Eng. Sci. Technol. Power Monit. Control Syst. Trusted Comput. Technol. 49(2), 28–35 (2017) Wang, Z., Yu, A., et al.: Construction of network security immune system. Eng. Sci. Technol. Power Monit. Control Syst. Trusted Comput. Technol. 49(2), 28–35 (2017)
2.
go back to reference Tong, Q., Zhang, Z., Wu, J.X.: Inf. Secur. J. Divers. Hardware Softw. 2(1), 1–12 (2017) Tong, Q., Zhang, Z., Wu, J.X.: Inf. Secur. J. Divers. Hardware Softw. 2(1), 1–12 (2017)
3.
go back to reference Intrusion detection research and implementation based on pattern recognition method. Hubei Mechanization 12(6), 61 (2017) Intrusion detection research and implementation based on pattern recognition method. Hubei Mechanization 12(6), 61 (2017)
4.
go back to reference Network security active defense technology and application. Netw. Secur. Technol. Appl. 56(5), 28 (2017) Network security active defense technology and application. Netw. Secur. Technol. Appl. 56(5), 28 (2017)
5.
go back to reference Wang, Z., Yu, A., et al.: Based on trusted computing technology, the network security immune system of power monitoring and control system. Eng. Sci. Technol. 49(2), 28–35 (2017) Wang, Z., Yu, A., et al.: Based on trusted computing technology, the network security immune system of power monitoring and control system. Eng. Sci. Technol. 49(2), 28–35 (2017)
6.
go back to reference Li, X.: Analysis of the design and implementation of network active defense system. Electron. Des. Eng. 25(1), 27–30 (2017) Li, X.: Analysis of the design and implementation of network active defense system. Electron. Des. Eng. 25(1), 27–30 (2017)
7.
go back to reference Wang, Z., Hu, H., Cheng, G., et al.: The architecture of mimic defense under the software definition network architecture. Netw. Inf. Secur. J. 3(10), 52–61 (2017) Wang, Z., Hu, H., Cheng, G., et al.: The architecture of mimic defense under the software definition network architecture. Netw. Inf. Secur. J. 3(10), 52–61 (2017)
8.
go back to reference Su, S.X., Zhu, Z.: Design and implementation of embedded active defense system based on honeypot. Internet Things Technol. 7(7), 86–88 (2017) Su, S.X., Zhu, Z.: Design and implementation of embedded active defense system based on honeypot. Internet Things Technol. 7(7), 86–88 (2017)
9.
go back to reference Yu, A., Wang, Z.H., Zhao, B.: Research and application of trusted computing technology in power systems. Inf. Secur. Res. 3(4), 353–358 (2017) Yu, A., Wang, Z.H., Zhao, B.: Research and application of trusted computing technology in power systems. Inf. Secur. Res. 3(4), 353–358 (2017)
10.
go back to reference Chen, J.: Mobile network optimization design for effective intrusion prevention design of intrusion signals. Comput. Simul. 34(7), 277–280 (2017) Chen, J.: Mobile network optimization design for effective intrusion prevention design of intrusion signals. Comput. Simul. 34(7), 277–280 (2017)
Metadata
Title
Research on LAN Network Malicious Code Intrusion Active Defense Technology
Authors
Lei Ma
Ying-jian Kang
Hua Han
Copyright Year
2019
DOI
https://doi.org/10.1007/978-3-030-36402-1_6

Premium Partner