{"title":"Research on Computer Database Intrusion Detection Technology Based on Virtualization Technology","authors":"Yuxuan Yao","doi":"10.1109/ICISCAE52414.2021.9590714","DOIUrl":null,"url":null,"abstract":"The computer database that handles big data efficiently has created convenience for modern society, but it has gradually exposed more potential safety hazards in the application process. Computer databases storing massive data are prone to information loss, content tampering and other problems in the face of various attacks. With the development of the Internet and the continuous breakthrough of network technology, there are more and more hidden dangers that undermine network security, and the level and scope of damage are also increasing. This paper mainly describes the related concepts of intrusion detection technology, and puts forward the effective implementation of computer database intrusion detection technology based on virtualization technology, as well as the related strategies of fully optimizing computer database intrusion detection technology, so that the computer database can be effectively protected. Diversified intrusion detection system technology is widely used, which can not only ensure the safe and normal operation of database system, but also prevent the loss of important information and the destruction of structural integrity.","PeriodicalId":121049,"journal":{"name":"2021 IEEE 4th International Conference on Information Systems and Computer Aided Education (ICISCAE)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE 4th International Conference on Information Systems and Computer Aided Education (ICISCAE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICISCAE52414.2021.9590714","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
The computer database that handles big data efficiently has created convenience for modern society, but it has gradually exposed more potential safety hazards in the application process. Computer databases storing massive data are prone to information loss, content tampering and other problems in the face of various attacks. With the development of the Internet and the continuous breakthrough of network technology, there are more and more hidden dangers that undermine network security, and the level and scope of damage are also increasing. This paper mainly describes the related concepts of intrusion detection technology, and puts forward the effective implementation of computer database intrusion detection technology based on virtualization technology, as well as the related strategies of fully optimizing computer database intrusion detection technology, so that the computer database can be effectively protected. Diversified intrusion detection system technology is widely used, which can not only ensure the safe and normal operation of database system, but also prevent the loss of important information and the destruction of structural integrity.