[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3230348.3230451acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiciebConference Proceedingsconference-collections
research-article

The Network Security Analysis System Design Based on B/S Structure

Published: 25 April 2018 Publication History

Abstract

Based on the B / S network architecture is very widespread, and the distance between the browser and the application server is usually more distant, and therefore ensure that the information transmitted over the remote line is particularly important. Many domestic and foreign academic institutions, enterprises and standardization organizations have recognized some of the research in this area began to build a meaning and importance based on the variety of network and security infrastructure of unified security management system, and. However, due to security reasons, openness and safety management system and other aspects, the research work safety management system is still in the exploratory stage. Through systematic research study found that the direction of research relevant literature and conduct adequate research and analysis of the existing network security detection systems cannot efficiently detect unknown intrusion defects, we propose a detection and analysis of network security architecture uses mode, design mode network security monitoring and analysis system architecture based architecture.

References

[1]
Shiravi H, Shiravi A, Ghorbani A, 2012. A survey of visualization systems for network security. Visualization and Computer Graphics, IEEE Transactions on. 18, 8, 1313--1329.
[2]
Aydin M A, Zaim A H, Ceylan K G, 2009. A hybrid intrusion detection system design for computer network security. Computers & Electrical Engineering. 35, 3, 517--526.
[3]
Cutillo L A, Molva R, Strufe T, 2009. Safebook: A privacy-preserving online social network leveraging on real-life trust. Communications Magazine, IEEE. 47, 12, 94--101.
[4]
Al-Kuwaiti M, Kyriakopoulos N, Hussein S, 2009. A comparative analysis of network dependability, fault-tolerance, reliability, security, and survivability. {J}. Communications Surveys & Tutorials, IEEE. 11, 2, 106--124.
[5]
Shabtai A, Fledel Y, Kanonov U, et al, 2010. Google android: A comprehensive security assessment. IEEE Security & Privacy. 2, 35--44.
[6]
Garcia-Teodoro P, Diaz-Verdejo J, Maciá-Fernández G, et al, 2009. Anomaly-based network intrusion detection: Techniques, systems and challenges. Computers & Security. 28, 1, 18--28.

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICIEB '18: Proceedings of the 2018 1st International Conference on Internet and e-Business
April 2018
389 pages
ISBN:9781450363754
DOI:10.1145/3230348
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

In-Cooperation

  • Wuhan Univ.: Wuhan University, China
  • City University of Hong Kong: City University of Hong Kong

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 25 April 2018

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. B/S architecture
  2. Network Monitoring
  3. Network Security

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ICIEB '18

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 147
    Total Downloads
  • Downloads (Last 12 months)4
  • Downloads (Last 6 weeks)0
Reflects downloads up to 14 Dec 2024

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media