Skip to main content

2019 | OriginalPaper | Buchkapitel

Research on LAN Network Malicious Code Intrusion Active Defense Technology

verfasst von : Lei Ma, Ying-jian Kang, Hua Han

Erschienen in: Advanced Hybrid Information Processing

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Traditional LAN networks had low defense efficiency and poor stability. In order to solve this problem, a new malicious code intrusion active defense technology was studied, and the defense technology structure was designed and the work-flow was studied. The system structure was divided into hardware layer, kernel layer and executive layer. The work-flow was divided into four steps: file judgment, file compression, file processing and file display. The working effect of the technology was verified by comparison with the traditional method. It was known from the experimental results that the studied technology had high defense efficiency and strong stability.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Wang, Z., Yu, A., et al.: Construction of network security immune system. Eng. Sci. Technol. Power Monit. Control Syst. Trusted Comput. Technol. 49(2), 28–35 (2017) Wang, Z., Yu, A., et al.: Construction of network security immune system. Eng. Sci. Technol. Power Monit. Control Syst. Trusted Comput. Technol. 49(2), 28–35 (2017)
2.
Zurück zum Zitat Tong, Q., Zhang, Z., Wu, J.X.: Inf. Secur. J. Divers. Hardware Softw. 2(1), 1–12 (2017) Tong, Q., Zhang, Z., Wu, J.X.: Inf. Secur. J. Divers. Hardware Softw. 2(1), 1–12 (2017)
3.
Zurück zum Zitat Intrusion detection research and implementation based on pattern recognition method. Hubei Mechanization 12(6), 61 (2017) Intrusion detection research and implementation based on pattern recognition method. Hubei Mechanization 12(6), 61 (2017)
4.
Zurück zum Zitat Network security active defense technology and application. Netw. Secur. Technol. Appl. 56(5), 28 (2017) Network security active defense technology and application. Netw. Secur. Technol. Appl. 56(5), 28 (2017)
5.
Zurück zum Zitat Wang, Z., Yu, A., et al.: Based on trusted computing technology, the network security immune system of power monitoring and control system. Eng. Sci. Technol. 49(2), 28–35 (2017) Wang, Z., Yu, A., et al.: Based on trusted computing technology, the network security immune system of power monitoring and control system. Eng. Sci. Technol. 49(2), 28–35 (2017)
6.
Zurück zum Zitat Li, X.: Analysis of the design and implementation of network active defense system. Electron. Des. Eng. 25(1), 27–30 (2017) Li, X.: Analysis of the design and implementation of network active defense system. Electron. Des. Eng. 25(1), 27–30 (2017)
7.
Zurück zum Zitat Wang, Z., Hu, H., Cheng, G., et al.: The architecture of mimic defense under the software definition network architecture. Netw. Inf. Secur. J. 3(10), 52–61 (2017) Wang, Z., Hu, H., Cheng, G., et al.: The architecture of mimic defense under the software definition network architecture. Netw. Inf. Secur. J. 3(10), 52–61 (2017)
8.
Zurück zum Zitat Su, S.X., Zhu, Z.: Design and implementation of embedded active defense system based on honeypot. Internet Things Technol. 7(7), 86–88 (2017) Su, S.X., Zhu, Z.: Design and implementation of embedded active defense system based on honeypot. Internet Things Technol. 7(7), 86–88 (2017)
9.
Zurück zum Zitat Yu, A., Wang, Z.H., Zhao, B.: Research and application of trusted computing technology in power systems. Inf. Secur. Res. 3(4), 353–358 (2017) Yu, A., Wang, Z.H., Zhao, B.: Research and application of trusted computing technology in power systems. Inf. Secur. Res. 3(4), 353–358 (2017)
10.
Zurück zum Zitat Chen, J.: Mobile network optimization design for effective intrusion prevention design of intrusion signals. Comput. Simul. 34(7), 277–280 (2017) Chen, J.: Mobile network optimization design for effective intrusion prevention design of intrusion signals. Comput. Simul. 34(7), 277–280 (2017)
Metadaten
Titel
Research on LAN Network Malicious Code Intrusion Active Defense Technology
verfasst von
Lei Ma
Ying-jian Kang
Hua Han
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-36402-1_6

Premium Partner