{"title":"多媒体网络中边境安全的设计与部署","authors":"L. Ao","doi":"10.1109/ICPICS55264.2022.9873567","DOIUrl":null,"url":null,"abstract":"This paper introduces the design of boundary security in Multimedia Network in detail. It needs to complete the deployment of boundary division, boundary detection and boundary defense. In terms of boundary division, the firewall is used to create the security domain to avoid security accidents spreading to other areas; In the aspect of boundary detection, real-time boundary intrusion detection is realized to make up for the deficiency of firewall; In terms of border defense, as a part of defense and monitoring, it is used to strengthen users’ network security management ability and enable users to timely understand the security status of the network. At last, this paper uses the method of real-time detection according to the time period to test the function of the boundary security system, and verifies the performance of the boundary security system through the obtained data.","PeriodicalId":257180,"journal":{"name":"2022 IEEE 4th International Conference on Power, Intelligent Computing and Systems (ICPICS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Design and Deployment of Border Security in Multimedia Network\",\"authors\":\"L. Ao\",\"doi\":\"10.1109/ICPICS55264.2022.9873567\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper introduces the design of boundary security in Multimedia Network in detail. It needs to complete the deployment of boundary division, boundary detection and boundary defense. In terms of boundary division, the firewall is used to create the security domain to avoid security accidents spreading to other areas; In the aspect of boundary detection, real-time boundary intrusion detection is realized to make up for the deficiency of firewall; In terms of border defense, as a part of defense and monitoring, it is used to strengthen users’ network security management ability and enable users to timely understand the security status of the network. At last, this paper uses the method of real-time detection according to the time period to test the function of the boundary security system, and verifies the performance of the boundary security system through the obtained data.\",\"PeriodicalId\":257180,\"journal\":{\"name\":\"2022 IEEE 4th International Conference on Power, Intelligent Computing and Systems (ICPICS)\",\"volume\":\"12 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-07-29\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 IEEE 4th International Conference on Power, Intelligent Computing and Systems (ICPICS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICPICS55264.2022.9873567\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE 4th International Conference on Power, Intelligent Computing and Systems (ICPICS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICPICS55264.2022.9873567","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Design and Deployment of Border Security in Multimedia Network
This paper introduces the design of boundary security in Multimedia Network in detail. It needs to complete the deployment of boundary division, boundary detection and boundary defense. In terms of boundary division, the firewall is used to create the security domain to avoid security accidents spreading to other areas; In the aspect of boundary detection, real-time boundary intrusion detection is realized to make up for the deficiency of firewall; In terms of border defense, as a part of defense and monitoring, it is used to strengthen users’ network security management ability and enable users to timely understand the security status of the network. At last, this paper uses the method of real-time detection according to the time period to test the function of the boundary security system, and verifies the performance of the boundary security system through the obtained data.