{"title":"基于虚拟现实技术的计算机网络漏洞检测","authors":"Songlin Liu","doi":"10.12694/scpe.v24i3.2162","DOIUrl":null,"url":null,"abstract":"This paper challenges the time-related challenges inherent in conventional network security detection methodologies. It is achieved by incorporating virtual reality technology into the domain of computer network security detection. The research methodology employs optimization calculations to extract attributes that characterize network security vulnerabilities. Concurrently, the weighting of diverse vulnerability attributes is adjusted using a web crawler, a comprehensive list of injection points, and meticulous analyses of the attacks’ genetic characteristics. This collective approach facilitates the exploration of automated network security vulnerability detection within a virtual reality framework. The study’s empirical results demonstrate that the detection method proposed within this investigation exhibits a notably reduced delay of 75.33 milliseconds. The respective delays observed in the two conventional methods stand at 290.11 milliseconds and 337.30 milliseconds. The substantial decrease in detection delay validates the effectiveness and efficiency of the devised automated network vulnerability detection approach grounded in virtual reality technology.","PeriodicalId":0,"journal":{"name":"","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Vulnerability Detection in Computer Networks using Virtual Reality Technology\",\"authors\":\"Songlin Liu\",\"doi\":\"10.12694/scpe.v24i3.2162\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper challenges the time-related challenges inherent in conventional network security detection methodologies. It is achieved by incorporating virtual reality technology into the domain of computer network security detection. The research methodology employs optimization calculations to extract attributes that characterize network security vulnerabilities. Concurrently, the weighting of diverse vulnerability attributes is adjusted using a web crawler, a comprehensive list of injection points, and meticulous analyses of the attacks’ genetic characteristics. This collective approach facilitates the exploration of automated network security vulnerability detection within a virtual reality framework. The study’s empirical results demonstrate that the detection method proposed within this investigation exhibits a notably reduced delay of 75.33 milliseconds. The respective delays observed in the two conventional methods stand at 290.11 milliseconds and 337.30 milliseconds. The substantial decrease in detection delay validates the effectiveness and efficiency of the devised automated network vulnerability detection approach grounded in virtual reality technology.\",\"PeriodicalId\":0,\"journal\":{\"name\":\"\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0,\"publicationDate\":\"2023-09-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.12694/scpe.v24i3.2162\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.12694/scpe.v24i3.2162","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Vulnerability Detection in Computer Networks using Virtual Reality Technology
This paper challenges the time-related challenges inherent in conventional network security detection methodologies. It is achieved by incorporating virtual reality technology into the domain of computer network security detection. The research methodology employs optimization calculations to extract attributes that characterize network security vulnerabilities. Concurrently, the weighting of diverse vulnerability attributes is adjusted using a web crawler, a comprehensive list of injection points, and meticulous analyses of the attacks’ genetic characteristics. This collective approach facilitates the exploration of automated network security vulnerability detection within a virtual reality framework. The study’s empirical results demonstrate that the detection method proposed within this investigation exhibits a notably reduced delay of 75.33 milliseconds. The respective delays observed in the two conventional methods stand at 290.11 milliseconds and 337.30 milliseconds. The substantial decrease in detection delay validates the effectiveness and efficiency of the devised automated network vulnerability detection approach grounded in virtual reality technology.