网络安全工具及其应用研究展望

S. Vyshnavi, S. Sree, N. Jayapandian
{"title":"网络安全工具及其应用研究展望","authors":"S. Vyshnavi, S. Sree, N. Jayapandian","doi":"10.1109/I-SMAC47947.2019.9032526","DOIUrl":null,"url":null,"abstract":"The modern world technology is civilized, globalized and modernized. The technological development of social networks and e-commerce applications produce larger data. This data communication is major task, because device to device communication need network terminal. This data transmission is not safe because of different types of tools and software available to destroy the existing network. In the field of network security during data transfer from one particular node to other node some security vulnerability is happened this is the one of the critical issue in this sector. The reason for this network security is different types of data attacks are happen in day to day life. It is easy to establish a new network but protecting the entire network is a big issue. This network security is generally two parameter first one is communication and second one is data automation. The network security field is directly or indirectly linked with the concept of data encryption. The development in this network security has taken us to a level that from signature again we came back to thumb print. For example maintain the data secure we use the lock system which is a finger print type. This technology helps us to protect the physical data theft, but logical data theft is still problem for data transmission. This article will brief about the network security it also presents the various network security types. Those types are wired and wireless network security. Apart from the network security the following topics is also discussed in this article. Those are network security protocols and simulation tools in network security. The research problems in network security are privacy and vulnerability of data.","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Network Security Tools and Applications in Research Perspective\",\"authors\":\"S. Vyshnavi, S. Sree, N. Jayapandian\",\"doi\":\"10.1109/I-SMAC47947.2019.9032526\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The modern world technology is civilized, globalized and modernized. The technological development of social networks and e-commerce applications produce larger data. This data communication is major task, because device to device communication need network terminal. This data transmission is not safe because of different types of tools and software available to destroy the existing network. In the field of network security during data transfer from one particular node to other node some security vulnerability is happened this is the one of the critical issue in this sector. The reason for this network security is different types of data attacks are happen in day to day life. It is easy to establish a new network but protecting the entire network is a big issue. This network security is generally two parameter first one is communication and second one is data automation. The network security field is directly or indirectly linked with the concept of data encryption. The development in this network security has taken us to a level that from signature again we came back to thumb print. For example maintain the data secure we use the lock system which is a finger print type. This technology helps us to protect the physical data theft, but logical data theft is still problem for data transmission. This article will brief about the network security it also presents the various network security types. Those types are wired and wireless network security. Apart from the network security the following topics is also discussed in this article. Those are network security protocols and simulation tools in network security. The research problems in network security are privacy and vulnerability of data.\",\"PeriodicalId\":275791,\"journal\":{\"name\":\"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)\",\"volume\":\"19 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/I-SMAC47947.2019.9032526\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/I-SMAC47947.2019.9032526","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

摘要

现代世界的技术是文明的、全球化的、现代化的。社交网络和电子商务应用的技术发展产生了更大的数据。由于设备间的通信需要网络终端,因此数据通信是一项重要的任务。这种数据传输是不安全的,因为不同类型的工具和软件可以破坏现有的网络。在网络安全领域中,数据在从一个特定节点到另一个节点的传输过程中会发生一些安全漏洞,这是该领域的关键问题之一。这种网络安全的原因是不同类型的数据攻击发生在日常生活中。建立一个新网络很容易,但保护整个网络是一个大问题。这种网络安全一般有两个参数,一是通信,二是数据自动化。网络安全领域与数据加密的概念有着直接或间接的联系。网络安全的发展已经使我们从签名回到了拇指指纹。例如,维护数据安全,我们使用的锁系统是一种指纹类型。这种技术帮助我们保护了物理数据被盗,但逻辑数据被盗仍然是数据传输的问题。本文将简要介绍网络安全,并介绍各种网络安全类型。这些类型是有线和无线网络安全。除了网络安全,本文还讨论了以下主题。即网络安全协议和网络安全仿真工具。网络安全研究的主要问题是数据的保密性和脆弱性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Network Security Tools and Applications in Research Perspective
The modern world technology is civilized, globalized and modernized. The technological development of social networks and e-commerce applications produce larger data. This data communication is major task, because device to device communication need network terminal. This data transmission is not safe because of different types of tools and software available to destroy the existing network. In the field of network security during data transfer from one particular node to other node some security vulnerability is happened this is the one of the critical issue in this sector. The reason for this network security is different types of data attacks are happen in day to day life. It is easy to establish a new network but protecting the entire network is a big issue. This network security is generally two parameter first one is communication and second one is data automation. The network security field is directly or indirectly linked with the concept of data encryption. The development in this network security has taken us to a level that from signature again we came back to thumb print. For example maintain the data secure we use the lock system which is a finger print type. This technology helps us to protect the physical data theft, but logical data theft is still problem for data transmission. This article will brief about the network security it also presents the various network security types. Those types are wired and wireless network security. Apart from the network security the following topics is also discussed in this article. Those are network security protocols and simulation tools in network security. The research problems in network security are privacy and vulnerability of data.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
DeepStreak: Automating Car Racing Games for Self Driving using Artificial Intelligence Simulators, Emulators, and Test-beds for Internet of Things: A Comparison CNN based speaker recognition in language and text-independent small scale system Comparative Analysis of Relay Selection Techniques in Free Space Optics Natural language processing and Machine learning based phishing website detection system
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1