{"title":"基于虚拟现实技术的计算机网络漏洞检测","authors":"Songlin Liu","doi":"10.12694/scpe.v24i3.2162","DOIUrl":null,"url":null,"abstract":"This paper challenges the time-related challenges inherent in conventional network security detection methodologies. It is achieved by incorporating virtual reality technology into the domain of computer network security detection. The research methodology employs optimization calculations to extract attributes that characterize network security vulnerabilities. Concurrently, the weighting of diverse vulnerability attributes is adjusted using a web crawler, a comprehensive list of injection points, and meticulous analyses of the attacks’ genetic characteristics. This collective approach facilitates the exploration of automated network security vulnerability detection within a virtual reality framework. The study’s empirical results demonstrate that the detection method proposed within this investigation exhibits a notably reduced delay of 75.33 milliseconds. The respective delays observed in the two conventional methods stand at 290.11 milliseconds and 337.30 milliseconds. The substantial decrease in detection delay validates the effectiveness and efficiency of the devised automated network vulnerability detection approach grounded in virtual reality technology.","PeriodicalId":43791,"journal":{"name":"Scalable Computing-Practice and Experience","volume":"40 1","pages":"0"},"PeriodicalIF":0.9000,"publicationDate":"2023-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Vulnerability Detection in Computer Networks using Virtual Reality Technology\",\"authors\":\"Songlin Liu\",\"doi\":\"10.12694/scpe.v24i3.2162\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper challenges the time-related challenges inherent in conventional network security detection methodologies. It is achieved by incorporating virtual reality technology into the domain of computer network security detection. The research methodology employs optimization calculations to extract attributes that characterize network security vulnerabilities. Concurrently, the weighting of diverse vulnerability attributes is adjusted using a web crawler, a comprehensive list of injection points, and meticulous analyses of the attacks’ genetic characteristics. This collective approach facilitates the exploration of automated network security vulnerability detection within a virtual reality framework. The study’s empirical results demonstrate that the detection method proposed within this investigation exhibits a notably reduced delay of 75.33 milliseconds. The respective delays observed in the two conventional methods stand at 290.11 milliseconds and 337.30 milliseconds. The substantial decrease in detection delay validates the effectiveness and efficiency of the devised automated network vulnerability detection approach grounded in virtual reality technology.\",\"PeriodicalId\":43791,\"journal\":{\"name\":\"Scalable Computing-Practice and Experience\",\"volume\":\"40 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.9000,\"publicationDate\":\"2023-09-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Scalable Computing-Practice and Experience\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.12694/scpe.v24i3.2162\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"COMPUTER SCIENCE, SOFTWARE ENGINEERING\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Scalable Computing-Practice and Experience","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.12694/scpe.v24i3.2162","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, SOFTWARE ENGINEERING","Score":null,"Total":0}
Vulnerability Detection in Computer Networks using Virtual Reality Technology
This paper challenges the time-related challenges inherent in conventional network security detection methodologies. It is achieved by incorporating virtual reality technology into the domain of computer network security detection. The research methodology employs optimization calculations to extract attributes that characterize network security vulnerabilities. Concurrently, the weighting of diverse vulnerability attributes is adjusted using a web crawler, a comprehensive list of injection points, and meticulous analyses of the attacks’ genetic characteristics. This collective approach facilitates the exploration of automated network security vulnerability detection within a virtual reality framework. The study’s empirical results demonstrate that the detection method proposed within this investigation exhibits a notably reduced delay of 75.33 milliseconds. The respective delays observed in the two conventional methods stand at 290.11 milliseconds and 337.30 milliseconds. The substantial decrease in detection delay validates the effectiveness and efficiency of the devised automated network vulnerability detection approach grounded in virtual reality technology.
期刊介绍:
The area of scalable computing has matured and reached a point where new issues and trends require a professional forum. SCPE will provide this avenue by publishing original refereed papers that address the present as well as the future of parallel and distributed computing. The journal will focus on algorithm development, implementation and execution on real-world parallel architectures, and application of parallel and distributed computing to the solution of real-life problems.