Volume 39 Issue 1
Jan.  2021
Turn off MathJax
Article Contents
YANG Ying. Analysis of TCP/IP Protocol Execution Strategy Combined with Network LayerData Link Attack Behavior[J]. DIGITAL TECHNOLOGY & APPLICATION, 2021, 39(1): 186-188. doi: 10.19695/j.cnki.cn12-1369.2021.01.58
Citation: YANG Ying. Analysis of TCP/IP Protocol Execution Strategy Combined with Network Layer Data Link Attack Behavior[J]. DIGITAL TECHNOLOGY & APPLICATION, 2021, 39(1): 186-188. doi: 10.19695/j.cnki.cn12-1369.2021.01.58

Analysis of TCP/IP Protocol Execution Strategy Combined with Network Layer Data Link Attack Behavior

doi: 10.19695/j.cnki.cn12-1369.2021.01.58
  • Received Date: 2020-12-09
  • Rev Recd Date: 2021-01-17
  • Available Online: 2021-09-23
  • Publish Date: 2021-01-25
  • In order to solve the problem that the traditional implementation strategy of TCP / IP protocol is easy to cause large amount of data leakage when dealing with the network layer data link attack behavior, which can not guarantee the privacy and security of users. Based on the analysis of TCP / IP protocol execution and its defects, the random sequence of TCP / IP protocol is negotiated to establish network communication channel. Based on the security policy execution of network layer data link attack behavior, a new execution strategy is proposed. The experimental results show that, compared with the traditional execution strategy, the implementation strategy can effectively reduce the amount of data leakage and ensure the privacy and security of users in the computer network environment.

     

  • loading
  • [1]
    张松慧,熊锦江.云计算下光纤通信数据链路层信道选取模型设计[J].激光杂志,2018,39(2):135-138.
    [2]
    刘自华,车向北,刘卫波,等.基于MMS/SNMP协议的智能变电站远程运维系统设计[J].自动化与仪器仪表,2019(5):48-51.
    [3]
    易燕,陈建平,宋博.船用 CAN 网络链路层数据高效传输算法优化[J].舰船科学技术,2019,41(18):142-144.
    [4]
    傅文博,张杰,陈永乐.物联网环境下抵抗路由欺骗攻击的网络拓扑发现算法[J].吉林大学学报(工学版),2018,48(4):1231-1236.
    [5]
    娄一艇,戚浩金,叶明达.无线网络链路数据帧 Adacode 设计及其 Matlab 性能评价[J].自动化技术与应用,2020,39(5):80-83

    +95.
    [6]
    李卫东,朱苏加.基于深度学习的网络攻击行为检测与分类模型[J].河北省科学院学报,2019,36(1):1-6.
    [7]
    王中,王崇霞,张安玲.泛洪攻击下链路网络敏感数据防篡改仿真[J].计算机仿真,2019,36(10):285-288

    +338.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (162) PDF downloads(5) Cited by()
    Proportional views
    Related
    Copyright © Editorial Department of Digital Technology and Application Supported by: Beijing Renhe Information Technology Co. Ltd

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return