contains active and passive behavior. The former
can destroy important computer information by
various methods; the latter can intercept and decode
secret computer information. In general, computer
attack is presented by change, damage and steal of
information. The common attack methods are as
follows.
(1) Forged IP and MAC addresses can result
in network interruption, communication block or
indirect invasion.
(2) The attack, started by vulnerability of
development spot, can cause unusual software
operation and system crash.
(3) Trojan horse program and virus are usually
used to start attack by the hacker. Trojan horse
program has characteristics including concealment,
latency, ignitionability and destruction. Once
attacked, the host will be controlled and destroyed,
thus causing disclosure of important information.
Virus can be spread through hard, soft and light
disks as well as network operations including
document copy and transmission, thus causing
damage of system documents and decrease of
working efficiency.
(4) With characteristic of concealment,
olfactory detector can intercept information
destination from network interface and obtain user
name and password by analysis of information, thus
causing network security threats. Scan attack is to
attack the host using computer network vulnerability
and obtain host information.
As the important means by which criminals
attack network, these attack methods are prevention
targets of network security. Computer network has
characteristics such as open, wide distribution and
resource sharing. The hacker can perform hostile
attack behaviors including data interception,
correction and damage, thus causing hidden danger
of computer network application. At present, the
best method to deal with all kinds of attack is
prevention because of virtual network and difficult
user identification.
2.3 Factors causing network security
problems
Factors that cause computer network security
problems in network times are as follows. Firstly,
damage of computer hardware such as hard disk will
cause system crash. Secondly, there is great security
hidden danger in network system. E.g., open
network provides convenience for hacker to attack.
Besides, hackers can disguise IP address to perform
network attack based on TCP/IP protocol. Thirdly,
the defect and vulnerability of computer software, as
the target of hacker attack, can cause operational
obstacles and security problems. Fourthly, most
operators are short of security prevention
consciousness of computer network application,
although with popular computer network. E.g.,
simple user passwords, such as single repeat
numbers and birth dates, are easily decoded, thus
causing hidden network security danger. In addition,
operation miss can result in system crack and
document loss. Fifthly, some network attacks are
caused by curiosity and desire, while other attacks
are performed with purpose. E.g., serious security
problems can be caused by stealing information and
password of objective computer, as well as activities
including commercial crimes, religious
dissemination, spread of harmful information and
program damage. Sixthly, Network is an open
environment with a large amount of information at
different levels. Great benefit of network crimes and
deficiency of computer network escalate network
security problems. With the popularization of
network security, various measurements are
conducted to ensure security and stable operation of
computer network.
3 PREVENTION STRATEGY OF
NETWORK SECURITY
3.1 Prevention technology of network
security
Prevention technology of network security is to
prevent and clear hidden danger in network
operation. At present, protocol isolation, firewall and
encryption techniques are widely used.
(1) Internal network is insulated from the rest
to form a protocol by protocol isolation technique.
The two hosts are connected with network, serial,
parallel and USB interfaces and bound by
specialized protocol. If network is invaded,
dangerous information and file packets will be
isolated by protocol for the purpose of prevention.
Under specialized protocol, operators can hardly
enter internal network for invasion through external
network, thus making a positive significance in
internal network protection.
(2) A barrier between internal and external
network can control information communication of
different networks by filtration and detection of
firewall technique. Then, internal network can be
prevented from bad access of external users.
ISME 2016 - Information Science and Management Engineering IV
230