Research on the Path of Improving Network Attack and Defense Ability of Students in Applied Colleges and Universities Based on Information Security Technology
, e
05 giu 2025
INFORMAZIONI SU QUESTO ARTICOLO
Pubblicato online: 05 giu 2025
Ricevuto: 30 dic 2024
Accettato: 21 apr 2025
DOI: https://doi.org/10.2478/amns-2025-1051
Parole chiave
© 2025 Bowei Ge, Yueping Deng and Jiaxin Ren, published by Sciendo.
This work is licensed under the Creative Commons Attribution 4.0 International License.
Figure 1.

Figure 2.

Figure 3.

Figure 4.

Figure 5.

Figure 6.

The result of experiment
| Attacks | The quantity of attacks on information | |
|---|---|---|
| Tradition system | Our system | |
| Account stealing | 223 | 25 |
| Trojan plating | 129 | 23 |
| Rebound attack | 170 | 44 |
| Web attack | 211 | 29 |
| Data monitoring | 186 | 18 |
Experimental attacks
| Serial number | Attacks | Number of attacks |
|---|---|---|
| 1 | Account stealing | 25 |
| 2 | Trojan plating | 15 |
| 3 | Rebound attack | 20 |
| 4 | Web attack | 40 |
| 5 | Data monitoring | 25 |
