Computer Deep Learning Network Security Vulnerability Detection Based on Virtual Reality Technology

In order to detect the computer network security technology vulnerabilities due to various factors, the normal operation of the computer network must be ensured, the user’s confidential information must be protected, and it is proposed that the analysis and research on security vulnerability detecti...

Full description

Saved in:
Bibliographic Details
Main Author: Xiaokun Zheng
Format: Article
Language:English
Published: Wiley 2022-01-01
Series:Advances in Multimedia
Online Access:http://dx.doi.org/10.1155/2022/6039690
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832553503409569792
author Xiaokun Zheng
author_facet Xiaokun Zheng
author_sort Xiaokun Zheng
collection DOAJ
description In order to detect the computer network security technology vulnerabilities due to various factors, the normal operation of the computer network must be ensured, the user’s confidential information must be protected, and it is proposed that the analysis and research on security vulnerability detection must be strengthened. This study introduces the working principle of the network security monitoring system, analyzes the key technologies involved in the system development process and network programming technology, gives the overall architecture of the system, and designs the processing flow of the monitoring function. The test and analysis of the system show that the design of the system has achieved the expected design goal. The design of the system has achieved the expected design goal. The five test points can meet the standard time specified in the demand analysis process. The time difference of all module test points in the test is less than 3 s. The system can realize the remote acquisition and real-time monitoring of the network access, file system operation, system operation status, and other information of the controlled computer. Through the test and analysis of the system, it is shown that the system has achieved the expected design goal, the working state problem, and can meet the functional requirements of internal network security monitoring. It can be applied to enterprises, institutions, and departments that have higher requirements for intranet information security.
format Article
id doaj-art-d8daf88b819c4e89bbc15afa885a97f9
institution Kabale University
issn 1687-5699
language English
publishDate 2022-01-01
publisher Wiley
record_format Article
series Advances in Multimedia
spelling doaj-art-d8daf88b819c4e89bbc15afa885a97f92025-02-03T05:53:50ZengWileyAdvances in Multimedia1687-56992022-01-01202210.1155/2022/6039690Computer Deep Learning Network Security Vulnerability Detection Based on Virtual Reality TechnologyXiaokun Zheng0Yantai Gold CollegeIn order to detect the computer network security technology vulnerabilities due to various factors, the normal operation of the computer network must be ensured, the user’s confidential information must be protected, and it is proposed that the analysis and research on security vulnerability detection must be strengthened. This study introduces the working principle of the network security monitoring system, analyzes the key technologies involved in the system development process and network programming technology, gives the overall architecture of the system, and designs the processing flow of the monitoring function. The test and analysis of the system show that the design of the system has achieved the expected design goal. The design of the system has achieved the expected design goal. The five test points can meet the standard time specified in the demand analysis process. The time difference of all module test points in the test is less than 3 s. The system can realize the remote acquisition and real-time monitoring of the network access, file system operation, system operation status, and other information of the controlled computer. Through the test and analysis of the system, it is shown that the system has achieved the expected design goal, the working state problem, and can meet the functional requirements of internal network security monitoring. It can be applied to enterprises, institutions, and departments that have higher requirements for intranet information security.http://dx.doi.org/10.1155/2022/6039690
spellingShingle Xiaokun Zheng
Computer Deep Learning Network Security Vulnerability Detection Based on Virtual Reality Technology
Advances in Multimedia
title Computer Deep Learning Network Security Vulnerability Detection Based on Virtual Reality Technology
title_full Computer Deep Learning Network Security Vulnerability Detection Based on Virtual Reality Technology
title_fullStr Computer Deep Learning Network Security Vulnerability Detection Based on Virtual Reality Technology
title_full_unstemmed Computer Deep Learning Network Security Vulnerability Detection Based on Virtual Reality Technology
title_short Computer Deep Learning Network Security Vulnerability Detection Based on Virtual Reality Technology
title_sort computer deep learning network security vulnerability detection based on virtual reality technology
url http://dx.doi.org/10.1155/2022/6039690
work_keys_str_mv AT xiaokunzheng computerdeeplearningnetworksecurityvulnerabilitydetectionbasedonvirtualrealitytechnology