Education, Science, Technology, Innovation and Life
Open Access
Sign In

Campus Information Network Security Vulnerability Analysis and Security Reinforcement

Download as PDF

DOI: 10.23977/infkm.2023.040103 | Downloads: 5 | Views: 339


Fan Liu 1, Zhengrong Luo 1


1 Department of Electronics and Information Engineering, Guang'an Vocational & Technical College, Guang'an, China

Corresponding Author

Fan Liu


Information technology has become the core of school construction and management. Information technology construction provides high-quality teaching, management and services for schools. The campus information network becomes more and more complex. But as network complexity increases, so do network security vulnerabilities. With the development of network technology, the security loopholes of campus information network are becoming more and more prominent. It has also become the focus of attention of network security researchers and professionals. This paper firstly introduces the status and types of campus information network security vulnerabilities. The security loopholes of campus information network are analyzed. At the same time, it discusses the causes of security loopholes and their threats to the campus information network, Based on this, the corresponding security reinforcement measures are put forward in order to improve the security of the campus information network.


Campus, information network, security breach, security reinforcement


Fan Liu, Zhengrong Luo, Campus Information Network Security Vulnerability Analysis and Security Reinforcement. Information and Knowledge Management (2023) Vol. 4: 16-19. DOI:


[1] Ye W, Cho K. Hybrid p2p traffic classification with heuristic rules and machine learning. Soft Computing, 2014, 18(9): 1815–1827.
[2] Castillo CA. Android malware past, present, and future. White Paper, McAfee Mobile Security Working Group, 2011: 1–16.
[3] Zhou Y, Jiang X. Dissecting Android malware: Characterization and evolution. In: Proc. of the 2012 IEEE Symp. on Security and Privacy. IEEE, 2012. 95-109.
[4] Skoudis E, Zeltser L. Malware: Fighting Malicious Code. Upper Saddle River: Prentice Hall Professional, 2004.
[5] Sikorski M, Honig A. Practical Malware Analysis: The Hands-on Guide to Dissecting Malicious Software. San Francisco: No Starch Press, 2012.
[6] Wei Junxu, Tuyatsetseg Badarch. Research on the Application of AI in the Cyberspace Security: A Case Study of Smart Campus Network Security. American Journal of Computer Science and Technology, 2022, 5(2).
[7] Huang Chang Wei, Xiong Jin Quan. Study of Campus Network Security Based on Dynamic Self-Adaptive Network Security Model. Advanced Materials Research, 2013, 846-847(846-847).
[8] Wei Hong Fu, Jian Hua Liu. Study on Campus Network Security and Protection Technology. Applied Mechanics and Materials, 2012, 2025(220-223).
[9] Chen K, Wang XQ, Chen Y, Wang P, Lee Y, Wang XF, Ma B, Wang AH, Zhang YJ, Zou W. Following devils footprints: Crossplatform analysis of potentially harmful libraries on Android and iOS. In: Proc. of the 37th IEEE Symp. on Security and Privacy, Ser. (S & P 2016). 2016.

All published work is licensed under a Creative Commons Attribution 4.0 International License.

Copyright © 2016 - 2031 Clausius Scientific Press Inc. All Rights Reserved.