Gaofeng Luo
Hunan Provincial Key Laboratory of Information Service in Rural Area of Southwestern Hunan, Shaoyang University, Shaoyang, 422000, China
Tongcheng Huang
Hunan Provincial Key Laboratory of Information Service in Rural Area of Southwestern Hunan, Shaoyang University, Shaoyang, 422000, China
Zijuan Shi
Hunan Provincial Key Laboratory of Information Service in Rural Area of Southwestern Hunan, Shaoyang University, Shaoyang, 422000, China
ABSTRACT
The problem of network security has attracted the attention of the entire world, because network security problems annually give a lot of network users resulting in loss of life and economic. This study improves the PDRR safety monitoring model and proposes a network security monitoring system model of DOM security data tag tree, finally its model is studied experimentally. Through the study found, DOM security data label tree network monitoring system can ensure the smooth transmission of data which can effectively block the malicious attacks and compared to the previous PDRR, it has good clustering and dividing partition function, improving the efficiency of network security protection. Through the network data transmission security testing, we found that the most obvious effect is the intercept on the IP fraud, before the improved is 18 times and after the improved drops to 1 which verify the effectiveness of network security monitoring system, to provide a theoretical reference for the study of network security monitoring scheme.
PDF References Citation
How to cite this article
Gaofeng Luo, Tongcheng Huang and Zijuan Shi, 2013. Research on the Network Security Supervision Practical Guide Mode Based on
Network Resource. Information Technology Journal, 12: 7193-7200.
DOI: 10.3923/itj.2013.7193.7200
URL: https://scialert.net/abstract/?doi=itj.2013.7193.7200
DOI: 10.3923/itj.2013.7193.7200
URL: https://scialert.net/abstract/?doi=itj.2013.7193.7200
REFERENCES
- Kiewitz, C., S.L.D. Restubog, T.J. Zagenczyk, K.D. Scott, P.R.J.M. Garcia and R.L. Tang, 2012. Sins of the parents: Self-control as a buffer between supervisors' previous experience of family undermining and subordinates' perceptions of abusive supervision. Leadership Q., 23: 869-882.
CrossRef - Pu, Y.F., W. Zhang, S.H. Teng and H.L. Du, 2010. The cooperative network intrusion detection based on decision tree. J. Jiangxi Normal Univ. (Nat. Sci. Edn.), 34: 302-307.
Direct Link