Abstract

AbstractSince entering the 21st century, computer Internet technology has made breakthrough progress. However, in the context of network resource sharing, computer network security issues have become more and more important. The endless network intrusions and attacks such as web viruses and hacker attacks have caused huge losses to the social economy and corporate costs. Therefore, the prevention of computer network security has become an urgent problem to be solved. The purpose of this article is to study the attack methods and prevention strategies of computer network security. This article first summarizes the common computer network security attacks from the aspects of information leakage, denial of service attacks, and hidden attacks, expounds related defense strategies, and designs a computer network security attack defense model based on stochastic differential games. This paper verifies through experiments that the strategy designed in this paper improves the detection accuracy and detection speed of network security intrusion. Experimental data shows that for nodes S1, S2, and S3, the traditional detection method takes 0.39 us, 0.52 us, and 0.53 us respectively; the node verification calculation time under the stochastic differential game model is 0.24 us, 0.46 us, and 0.41 us. It shows that the stochastic differential game model is beneficial to improve the detection speed of attacking nodes in network security.KeywordsNetwork securityNetwork attackAttack preventionOffensive and defensive game

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.