Open Access Paper
28 December 2022 Research and analysis on hierarchical management balancing strategy of intelligent VPN in colleges and universities under hierarchical protection 2.0 background
Yunjia Li, Xinxiang Xiao, Zhiyong Zhang, Zhixin Chen
Author Affiliations +
Proceedings Volume 12506, Third International Conference on Computer Science and Communication Technology (ICCSCT 2022); 125064S (2022) https://doi.org/10.1117/12.2662581
Event: International Conference on Computer Science and Communication Technology (ICCSCT 2022), 2022, Beijing, China
Abstract
With the rapid development of information technology, online office and study has been applied by more and more colleges and universities, but the convenient off-campus access has brought a great threat to the network security. In order to solve this problem, this paper proposes an efficient hierarchical management balancing strategy for complex VPN under hierarchical protection 2.0. Through the process design of VPN, unified identity authentication and reverse proxy, the practical case of this strategy has been realized. The network security level of users has been significantly enhanced. In 2021, our school won the title of excellent defensive unit in the offensive and defensive exercises held by Hunan Provincial Public Security Department.
© (2022) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Yunjia Li, Xinxiang Xiao, Zhiyong Zhang, and Zhixin Chen "Research and analysis on hierarchical management balancing strategy of intelligent VPN in colleges and universities under hierarchical protection 2.0 background", Proc. SPIE 12506, Third International Conference on Computer Science and Communication Technology (ICCSCT 2022), 125064S (28 December 2022); https://doi.org/10.1117/12.2662581
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Network security

Information security

Computer security

Analytical research

Strategic intelligence

Internet

Computing systems

RELATED CONTENT

Analysis of the possibilities of using IPSec on a Linux...
Proceedings of SPIE (October 01 2018)
A secure network access system for mobile IPv6
Proceedings of SPIE (March 29 2004)
End-to-end communications security
Proceedings of SPIE (April 18 2006)

Back to Top