2021
DOI: 10.1088/1742-6596/1915/4/042071
|View full text |Cite
|
Sign up to set email alerts
|

Application of Virtual Private Network Technology in University Network Information Security

Abstract: With the rapid progress of network technology, people gradually increase the coverage of the network. Network technology integration in all aspects of people’s lives. Information has become everyone’s important property. Many schools begin to pay attention to information security. In this process, people found some main measures of network security protection[5]. The application of campus security information protection based on virtual private network technology has become a hot topic of experts. This paper d… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
2
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 4 publications
0
2
0
Order By: Relevance
“…Their rigorous research focuses on comparing the following three traffic generators, constant bit rate (CBR), file transfer protocol (FTP) and hypertext transfer protocol by varying their application in VPNs and non-VPNs. Throughput and time delay calculations allow for the deeper examination of performance [27]. Their results suggest a constant throughput in the case of CBR and a decrease in the case of FTP and HTTP for both situations and observed time delay increase as a consequence of changing the traffic generators.…”
Section: Benefits and Challenges Of Virtual Private Networkmentioning
confidence: 99%
“…Their rigorous research focuses on comparing the following three traffic generators, constant bit rate (CBR), file transfer protocol (FTP) and hypertext transfer protocol by varying their application in VPNs and non-VPNs. Throughput and time delay calculations allow for the deeper examination of performance [27]. Their results suggest a constant throughput in the case of CBR and a decrease in the case of FTP and HTTP for both situations and observed time delay increase as a consequence of changing the traffic generators.…”
Section: Benefits and Challenges Of Virtual Private Networkmentioning
confidence: 99%
“…Due to the multi-dimensional problem of obtaining the features of the university's network data in Section II (B) (1), in order to improve the accuracy of threat detection in the university's network space security, a non-negative matrix decomposition algorithm is used to perform multi-feature dimensionality reduction on university network data [16]. The non-negative matrix decomposition algorithm has the advantages of simple decomposition implementation and small space occupation.…”
Section: ) Multi-feature Dimensionality Reduction Processing Of Unive...mentioning
confidence: 99%
“…The rapid development of the Internet has led to a large number of intrusion behaviours, posing a huge threat to the network security of universities. Therefore, achieving a comprehensive perception and defense of the university's cyberspace attack events is significant for building a complete network security defense system [1]- [3].…”
Section: Introductionmentioning
confidence: 99%
“…Each data block contains the data of the last block, the current transaction, and transaction time. Therefore, for a new block, if the function value of the last block is verified equal to the value of all accounts before verification, the BC formed in this way is relatively easy to verify (Yin, 2021;Zheng et al, 2021b).…”
Section: Research On Nis and Fr Under Bc And Ecmentioning
confidence: 99%