Paper
22 August 2024 Design and simulation experiments of the security model for edge devices of government terminal networks
Yuqiang Wu, Yubao Wu
Author Affiliations +
Proceedings Volume 13228, Fifth International Conference on Computer Communication and Network Security (CCNS 2024); 132281H (2024) https://doi.org/10.1117/12.3038026
Event: Fifth International Conference on Computer Communication and Network Security (CCNS 2024), 2024, Guangzhou, China
Abstract
Due to the significant asymmetry between the high frequency of access and the low protection level of government networks and their edge devices, there is a considerable risk of being targeted by hackers. This study initially presents an overview of government terminal network edge devices, proceeds to analyze the security aspects of these devices, and subsequently puts forth a security model design aimed at mitigating the identified issues and vulnerabilities that could potentially result in unauthorized intrusions. Finally, by utilizing some common technologies through simulation experiments, a cost-effective, high-performance, practical, and close-to-real-world security system is designed. The simulation experiment results demonstrate that this model design can achieve automatic defense against network intrusions, ensuring the reliability of government terminal networks and their edge devices, thereby strengthening the security of government terminal networks.
(2024) Published by SPIE. Downloading of the abstract is permitted for personal use only.
Yuqiang Wu and Yubao Wu "Design and simulation experiments of the security model for edge devices of government terminal networks", Proc. SPIE 13228, Fifth International Conference on Computer Communication and Network Security (CCNS 2024), 132281H (22 August 2024); https://doi.org/10.1117/12.3038026
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Network security

Information security

Instrument modeling

Defense and security

Computer security

Databases

Back to Top