
Modeling and simulation analysis of computer network defense
Author(s) -
Juan Wang
Publication year - 2020
Publication title -
iop conference series. materials science and engineering
Language(s) - English
Resource type - Journals
eISSN - 1757-899X
pISSN - 1757-8981
DOI - 10.1088/1757-899x/750/1/012181
Subject(s) - computer science , network security , computer security , network simulation , network access control , hacker , flexibility (engineering) , enterprise private network , computer network programming , computer network operations , network traffic simulation , context (archaeology) , computer security model , network architecture , computer network , network management station , network traffic control , cloud computing security , operating system , cloud computing , paleontology , statistics , mathematics , network packet , biology
With the continuous development of computer network, its network drawbacks are also increasingly prominent. There are more and more computer network attacks caused by computer network hackers and viruses, which have gradually attracted the attention and attention of government departments, military agencies and national security departments. In order to effectively improve the security of computer network, various computer network attack and defense technologies are constantly updated, and the network attack and defense simulation methods are proposed for the characteristics of network attack and defense technologies Analysis and experiment provide a platform for development. In this context, the computer network modeling and simulation method is born. Applying the modeling and simulation method to the network attack and defense security of the computer can effectively avoid the damage of the computer network. At the same time, this modeling and simulation method also has certain repeatability, flexibility, and does not consume a lot of time, which can effectively ensure the network security of the computer. This paper mainly analyzes this computer modeling and simulation method, in order to promote the computer network security.