{"title":"基于虚拟化技术的计算机数据库入侵检测技术研究","authors":"Yuxuan Yao","doi":"10.1109/ICISCAE52414.2021.9590714","DOIUrl":null,"url":null,"abstract":"The computer database that handles big data efficiently has created convenience for modern society, but it has gradually exposed more potential safety hazards in the application process. Computer databases storing massive data are prone to information loss, content tampering and other problems in the face of various attacks. With the development of the Internet and the continuous breakthrough of network technology, there are more and more hidden dangers that undermine network security, and the level and scope of damage are also increasing. This paper mainly describes the related concepts of intrusion detection technology, and puts forward the effective implementation of computer database intrusion detection technology based on virtualization technology, as well as the related strategies of fully optimizing computer database intrusion detection technology, so that the computer database can be effectively protected. Diversified intrusion detection system technology is widely used, which can not only ensure the safe and normal operation of database system, but also prevent the loss of important information and the destruction of structural integrity.","PeriodicalId":121049,"journal":{"name":"2021 IEEE 4th International Conference on Information Systems and Computer Aided Education (ICISCAE)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Research on Computer Database Intrusion Detection Technology Based on Virtualization Technology\",\"authors\":\"Yuxuan Yao\",\"doi\":\"10.1109/ICISCAE52414.2021.9590714\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The computer database that handles big data efficiently has created convenience for modern society, but it has gradually exposed more potential safety hazards in the application process. Computer databases storing massive data are prone to information loss, content tampering and other problems in the face of various attacks. With the development of the Internet and the continuous breakthrough of network technology, there are more and more hidden dangers that undermine network security, and the level and scope of damage are also increasing. This paper mainly describes the related concepts of intrusion detection technology, and puts forward the effective implementation of computer database intrusion detection technology based on virtualization technology, as well as the related strategies of fully optimizing computer database intrusion detection technology, so that the computer database can be effectively protected. Diversified intrusion detection system technology is widely used, which can not only ensure the safe and normal operation of database system, but also prevent the loss of important information and the destruction of structural integrity.\",\"PeriodicalId\":121049,\"journal\":{\"name\":\"2021 IEEE 4th International Conference on Information Systems and Computer Aided Education (ICISCAE)\",\"volume\":\"108 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-09-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 IEEE 4th International Conference on Information Systems and Computer Aided Education (ICISCAE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICISCAE52414.2021.9590714\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE 4th International Conference on Information Systems and Computer Aided Education (ICISCAE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICISCAE52414.2021.9590714","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Research on Computer Database Intrusion Detection Technology Based on Virtualization Technology
The computer database that handles big data efficiently has created convenience for modern society, but it has gradually exposed more potential safety hazards in the application process. Computer databases storing massive data are prone to information loss, content tampering and other problems in the face of various attacks. With the development of the Internet and the continuous breakthrough of network technology, there are more and more hidden dangers that undermine network security, and the level and scope of damage are also increasing. This paper mainly describes the related concepts of intrusion detection technology, and puts forward the effective implementation of computer database intrusion detection technology based on virtualization technology, as well as the related strategies of fully optimizing computer database intrusion detection technology, so that the computer database can be effectively protected. Diversified intrusion detection system technology is widely used, which can not only ensure the safe and normal operation of database system, but also prevent the loss of important information and the destruction of structural integrity.