Open Access

Research on the Path of Improving Network Attack and Defense Ability of Students in Applied Colleges and Universities Based on Information Security Technology

,  and   
Jun 05, 2025

Cite
Download Cover

Figure 1.

Relationship of network information risk assessment elements
Relationship of network information risk assessment elements

Figure 2.

Variation of net work efficiency under betweenness centrality strategy attacks
Variation of net work efficiency under betweenness centrality strategy attacks

Figure 3.

Variation of max connectivity under betweenness centrality strategy attacks
Variation of max connectivity under betweenness centrality strategy attacks

Figure 4.

Variation of the number of connected components under attacks
Variation of the number of connected components under attacks

Figure 5.

Variation of size of the largest connected components under attacks
Variation of size of the largest connected components under attacks

Figure 6.

The comparison of experimental results
The comparison of experimental results

The result of experiment

Attacks The quantity of attacks on information
Tradition system Our system
Account stealing 223 25
Trojan plating 129 23
Rebound attack 170 44
Web attack 211 29
Data monitoring 186 18

Experimental attacks

Serial number Attacks Number of attacks
1 Account stealing 25
2 Trojan plating 15
3 Rebound attack 20
4 Web attack 40
5 Data monitoring 25
Language:
English