The prospect of intrusion prevention research

Source: Internet
Author: User
The prospect of intrusion prevention research
China Branch network Granville Hu Shansheng Liu Baoxu Bi Coya, etc.
The development history of Internet in the world has gone through three main stages: The invention stage based on military demand in 60-70 years, the application and perfection of the scientific research field in 70-80 years, and the commercialization development after the 90 's. Because of the characteristics of the early network users mainly to the scientific research personnel, the network design is mainly to share and open for the purpose of the network protocol with only the least security options, these options are usually ignored by the router, resulting in insufficient network safety factors. This network protocol (IPV4) has been used so far and has been simply transplanted into the web of businesses and governments. However, because the user object of the network has changed, the content of the information on the network has been greatly different, which makes the security problem of the Internet stand out immediately.
At present, the Internet is combined with telephone network, TV network, wireless network, satellite network, the Internet is driven by commercial operation, more rapid development. But the existing Internet is indeed not a safe network, there are fatal weaknesses and shortcomings, especially in China, the Internet application started late, software and hardware facilities are basically copying foreign goods and models, less innovative and have the internal strength. Many networks in the early days of construction or do not consider the corresponding measures such as security precautions, thus leaving a lot of security risks, to hackers at any time created an opportunity. Coupled with the lack of necessary technical personnel and solutions, the hacker intrusion incident emergency processing is still in a spontaneous, disorderly state, this situation is not enough to deal with the current possible variety of viruses and hackers attack sudden events.
The trend of network development
After five years, the speed of computer development will continue to advance by leaps and bounds. At that time, computers with 2GHz microprocessors, 1G memory, and 50G hard drives could be connected to thousands of Gigabit Ethernet or 10 Gigabit wireless networks, with a telephone or TV network at more than a trillion speed available at home. With such remarkable microprocessors, memory, hard drives, and bandwidth, many of today's impossible things will suddenly become possible, and more technology that can only be demonstrated today will become mainstream.
Five years later, computers will become more popular, but the bigger growth will come from so-called smart home appliances. Future televisions, telephones, "e-books" (E-book) and "Personal Data Assistants" (PDAs) will be equipped with microprocessors and software that will have the capabilities of the computer. The new generation of Internet Protocol IPV6 allows each device to become a network node, regardless of size, mobile or fixed, can be uninterrupted data transmission.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.