2014
DOI: 10.1155/2014/178937
|View full text |Cite
|
Sign up to set email alerts
|

Hybrid Network Defense Model Based on Fuzzy Evaluation

Abstract: With sustained and rapid developments in the field of information technology, the issue of network security has become increasingly prominent. The theme of this study is network data security, with the test subject being a classified and sensitive network laboratory that belongs to the academic network. The analysis is based on the deficiencies and potential risks of the network's existing defense technology, characteristics of cyber attacks, and network security technologies. Subsequently, a distributed netwo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 25 publications
(28 reference statements)
0
3
0
Order By: Relevance
“…Based on the ratings of each alternative and the weight of each criterion, Chen (2001) developed a multiple criteria decision-making process, with a final assessment value to determine the location of the distribution center. Cho and Pan (2014) based on the deficiencies and potential risks of the network's existing defense technology, establish an improvement over the traditional single-technology model that addresses the inadequacies. Table 3.…”
Section: Fuzzy Linguistic Methodsmentioning
confidence: 99%
“…Based on the ratings of each alternative and the weight of each criterion, Chen (2001) developed a multiple criteria decision-making process, with a final assessment value to determine the location of the distribution center. Cho and Pan (2014) based on the deficiencies and potential risks of the network's existing defense technology, establish an improvement over the traditional single-technology model that addresses the inadequacies. Table 3.…”
Section: Fuzzy Linguistic Methodsmentioning
confidence: 99%
“…Reference [4] described a network defense model composed of a hybrid firewall module, IDS, and a virtual honeynet. Each are linked up to conduct real-time monitoring and detection [4]. The hybrid firewall segregates the model from the rest of the network and the internet.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The hybrid firewall ensures that connections outside the model is preventing malicious activity. Some issues to be investigatedinclude examining encrypted traffic, secure data communications between the components, and more study into early warnings to improve threat intelligence of the model [4].…”
Section: Literature Reviewmentioning
confidence: 99%