Abstract

In order to further solve the problem of weak attack defense existing in the traditional network architecture, improve the shortcomings of network architecture in processing capacity, hardware expansion, security protection and other aspects, and better cope with the security challenges under the new network architecture, this article aims to provide more secure computer information exchange and sharing services for enterprises. A network access layer security protection system based on zero trust architecture is constructed. At the same time, the zero-trust architecture evaluation algorithm based on fuzzy theory is used to construct the security protection model. System tests show that more than 100 hosts on the enterprise access layer network use switches that support SNMP, and the security protection system at the network access layer processes more than 1500 attacks. In addition, malicious IP address changes are effectively prevented and the security protection level is greatly improved.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.