Acceso abierto

Optimizing the Defense System of University English Teaching Platform from the Perspective of Network Security: Preventing Data Leakage and Network Attacks

  
24 mar 2025

Cite
Descargar portada

Figure 1.

Teaching data processing system structure diagram
Teaching data processing system structure diagram

Figure 2.

The one-level of the model
The one-level of the model

Figure 3.

The two-level management
The two-level management

Figure 4.

Diagram of sub-key generation
Diagram of sub-key generation

Figure 5.

Encryption and decryption flow chart
Encryption and decryption flow chart

Figure 6.

The calculation time required for phase 1
The calculation time required for phase 1

Figure 7.

The calculation time required for phase 2
The calculation time required for phase 2

Figure 8.

Phase 1Traffic between CS1 and CS2
Phase 1Traffic between CS1 and CS2

Figure 9.

Phase 2 Traffic between CS1 and CS2
Phase 2 Traffic between CS1 and CS2

Figure 10.

Comparison of packet quantity before and after the attack
Comparison of packet quantity before and after the attack

Figure 11.

Comparison of the number of keys after re-verification
Comparison of the number of keys after re-verification

Figure 12.

Comparison of CPU usage
Comparison of CPU usage

Figure 13.

Memory usage comparison chart
Memory usage comparison chart