location:Home > 2018 Vol.1 Oct. No.5 > Research on LAN Network Malicious Code Intrusion Active Defense Technology

2018 Vol.1 Oct. No.5

  • Title: Research on LAN Network Malicious Code Intrusion Active Defense Technology
  • Name: Antoine Barnett
  • Company: University of Southern Indiana
  • Abstract:

    The traditional LAN network has low defense efficiency and poor stability. In order to solve this problem, a new malicious code intrusion active defense technology is studied, and the defense technology structure is designed and the workflow is studied. The system structure is divided into hardware layer, kernel layer and executive layer. The workflow is divided into four steps: file judgment, file compression, file processing and file display. The results of the technology are verified by comparison with traditional methods. The technology studied has high defensive efficiency and strong stability.

  • Keyword: Local area network; Malicious code; Code intrusion; Active defense;
  • DOI: 10.12250/jpciams2018050114
  • Citation form: Antoine Barnett.Research on LAN Network Malicious Code Intrusion Active Defense Technology[J]. Computer Informatization and Mechanical System, 2018, vol. 1, pp. 30-35.
Reference:

[1] high Kunlun, Wang Zhihao, Anning Yu, et al. Construction of network security immune system [J]. Engineering Science and technology for power monitoring and control system based on trusted computing technology, 2017, 49 (2): 28-35.  

[2] Tong Qing, Zhang Zheng, Wu Jiang Xing. [J]. Information Security Journal Based on the diversity of hardware and software, 2017, 2 (1): 1-12.

[3]. Intrusion detection research and Implementation Based on pattern recognition method, [J]. Hubei mechanization, 2017, 12 (6): 61-61.

[4] pottery. Network security active defense technology and application [J]. network security Technology and application, 2017, 56 (5): 28-28.

[5] high Kunlun, Wang Zhihao, Anning Yu, et al. Based on trusted computing technology, the network security immune system of power monitoring and control system [J]. Engineering Science and technology, 2017, 49 (2): 28-35.

[6] Li Xiujuan. Analysis of the design and implementation of network active defense system, [J]. electronic design engineering, 2017, 25 (1): 27-30.

[7] Wang Zhenpeng, Hu Hongchao, Cheng Guozhen, et al. The architecture of mimic defense under the software definition network architecture [J]. network and Information Security Journal, 2017, 3 (10): 52-61.

[8] Su Shi Xin, Zhu Zhixiang. Design and implementation of embedded active defense system based on honeypot. Internet of things technology, 2017, 7 (7): 86-88.

[9], Anning Yu, Wang Zhi Hao, Zhao Baohua. Research and application of trusted computing technology in power systems [J]. information security research, 2017, 3 (4): 353-358.

[10] Chen Jian. Mobile network optimization design for effective intrusion prevention design of intrusion signals [J]. computer simulation, 2017, 34 (7): 277-280.


Tsuruta Institute of Medical Information Technology
Address:[502,5-47-6], Tsuyama, Tsukuba, Saitama, Japan TEL:008148-28809 fax:008148-28808 Japan,Email:jpciams@hotmail.com,2019-09-16