Jianxin Ji, Chunli Xia, Tong Zhang, Yichuan Wang, Sheng Liu
{"title":"Research on A Vulnerability Detection Technology for Network Topology Security","authors":"Jianxin Ji, Chunli Xia, Tong Zhang, Yichuan Wang, Sheng Liu","doi":"10.1109/NaNA53684.2021.00064","DOIUrl":null,"url":null,"abstract":"Vulnerability detection plays an important role in topology network security. Topology network application scope, users, and transmit the data type of the change, the increasing of the existing vulnerability detection in the process of diversification of data transmission, positioning fuzzy vulnerability detection, error messages are not clear, it is difficult to positioning and eliminate network fault in time. For this, put forward topology network multiplexer output port complex data mutation vulnerability detection. Based on topology network multiplexer output port complex data priority extraction, according to build complex data mutation scanning module and loopholes in the database are defined in the holes details to complete the multiplexer output port complex data mutation detection process. Simulation experiments show that the topology of the network multiplexer output port complex data mutation vulnerability detecting system that can effectively save the data in time. Make vulnerability detection accuracy greatly improved, provides the stability and security of the topology network security.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Networking and Network Applications (NaNA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NaNA53684.2021.00064","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Vulnerability detection plays an important role in topology network security. Topology network application scope, users, and transmit the data type of the change, the increasing of the existing vulnerability detection in the process of diversification of data transmission, positioning fuzzy vulnerability detection, error messages are not clear, it is difficult to positioning and eliminate network fault in time. For this, put forward topology network multiplexer output port complex data mutation vulnerability detection. Based on topology network multiplexer output port complex data priority extraction, according to build complex data mutation scanning module and loopholes in the database are defined in the holes details to complete the multiplexer output port complex data mutation detection process. Simulation experiments show that the topology of the network multiplexer output port complex data mutation vulnerability detecting system that can effectively save the data in time. Make vulnerability detection accuracy greatly improved, provides the stability and security of the topology network security.