Welcome to Francis Academic Press

Academic Journal of Computing & Information Science, 2022, 5(14); doi: 10.25236/AJCIS.2022.051405.

Analysis of Computer Virus Defense Strategy Based on Network Security


Peihong Wang

Corresponding Author:
Peihong Wang

HaniYi Autonomous Prefecture of Honghe Public Resources Trading Center, Mengzi, Yunnan, 661199, China


Computer viruses seriously endanger computer network information security. After the computer is generated, the security of the computer network is attacked by computer computer virus every moment. Computer viruses in computer networks can be brought into the computer through e-mail, downloading software, browsing web pages, etc. The user will unknowingly bring the computer into the computer, causing serious harm to the user's information security. The virus is extremely stealthy, and once the computer is attacked, it is difficult for users to remove it in time, and in the case of undetectable, it will cause incalculable damage to the computer's system. Once discovered, it can cause great damage to the user's computer data. In the actual use process, as people's dependence on the Internet increases day by day, once attacked by the Trojan virus, it will greatly affect people's work and life. In this paper, through the analysis of the propagation mechanism and characteristics of computer network viruses, the corresponding preventive measures are proposed, in order to provide reference for the prevention of computer viruses in China.


Network Security, Computer Virus, Defense Strategy

Cite This Paper

Peihong Wang. Analysis of Computer Virus Defense Strategy Based on Network Security. Academic Journal of Computing & Information Science (2022), Vol. 5, Issue 14: 33-39. https://doi.org/10.25236/AJCIS.2022.051405.


[1] Ravi Tomar, Yogesh Awasthi. A Systematic Review of Network Security Breaches and Solutions[J]. International Journal of Innovative Technology and Exploring Engineering (IJITEE), 2020, 9(11): 125-128.

[2] Wu Xu, Wei Dezhi, Vasgi Bharati P., Oleiwi Ahmed Kareem, Bangare Sunil L., Asenso Evans. Research on Network Security Situational Awareness Based on Crawler Algorithm[J]. Security and Communication Networks, 2022:26-32.

[3] Jialin Chen, Zheng Zhou, Yi Tang, Yi He, Shiwen Zhao. Research on Network Security Risk Assessment Model Based on Grey Language Variables[J]. IOP Conference Series: Materials Science and Engineering, 2019, 677(4):177-181.

[4] Yu Tianxi, Yin Xiaoyao, Yao Menglin, Liu Tong. Network Security Monitoring Method Based on Deep Learning [J]. Journal of Physics: Conference Series, 2021, 1955(1):236-241.

[5] Bai Yong, Huang Dong, Liao Yong, Pen Guangbin, Xu Luyao, Deng Yongsheng, Wang Chun. Information Network Security Situation Awareness Technology Based on Artificial Intelligence[C]//. Proceedings of 2019 International Conference on Information, Communication Technology and Automation(ICICTA 2019).Francis Academic Press,2019:58-62.

[6] Yang Yang. Construction of Network Security Law Enforcement Virtual Simulation Experiment and Teaching Platform[C]//.Proceedings of 2021 6th International Conference on Education Reform and Modern Management (ERMM2021).2021:165-169.

[7] Shahid Naveed, Aziz-ur Rehman Muhammad, Khalid Asma, Fatima Umbreen, Sumbal Shaikh Tahira, Ahmed Nauman, Alotaibi Hammad, Rafiq Muhammad, Khan Ilyas, Sooppy Nisar Kottakkaran. Mathematical analysis and numerical investigation of advection-reaction-diffusion computer virus model [J]. Results in Physics, 2021:98-102.

[8] Dong Nguyen Phuong, Long Hoang Viet, Giang Nguyen Long. The fuzzy fractional SIQR model of computer virus propagation in wireless sensor network using Caputo Atangana–Baleanu derivatives[J]. Fuzzy Sets and Systems, 2022:458-462.

[9] Madhusudanan V.,Srinivas M.N.,Nwokoye C.H.,Murthy B.S.N,Sridhar S.. HOPF- BIFURCATION ANALYSIS OF DELAYED COMPUTER VIRUS MODEL WITH HOLLING TYPE III INCIDENCE FUNCTION AND TREATMENT [J]. Scientific African, 2022(prepublish):109-116.

[10] Titus Ifeanyi Chinebu, Ikechukwu Valentine Udegbe,Edmund Onwubiko Ezennorom. Analysis of Optimal Control Strategies for Preventing Computer Virus Infection and Reduce Program Files Damage with Other Symptoms [J]. Journal of Scientific Research and Reports,2021:361-365.

[11] Coronel Aníbal, Huancas Fernando,Pinto Manuel. Sufficient conditions for the existence of positive periodic solutions of a generalized nonresident computer virus model[J]. Quaestiones Mathematicae, 2021,44(2):111-119.

[12] Raza Ali, Fatima Umbreen, Rafiq Muhammad, Ahmed Nauman, Khan Ilyas, Sooppy Nisar Kottakkaran, Iqbal Zafar. Mathematical Analysis and Design of the Nonstandard Computational Method for an Epidemic Model of Computer Virus with Delay Effect: Application of Mathematical Biology in Computer Science[J]. Results in Physics,2020(prepublish):208-212.

[13] Muhammad Shoaib Arif, Ali Raza,Muhammad Rafiq, Mairaj Bibi,JaveriaNawaz Abbasi,Amna Nazeer,Umer Javed. Numerical Simulations for Stochastic Computer Virus Propagation Model[J]. CMC: Computers, Materials & Continua, 2020,62(1):36-45.

[14] Coronel Aníbal, Huancas Fernando, Pinto Manuel. Sufficient conditions for the existence of positive periodic solutions of a generalized nonresident computer virus model[J]. Quaestiones Mathematicae, 2019:251-255.

[15] Nauman Ahmed,12,Umbreen Fatima,Shahzaib Iqbal,Ali Raza,Muhammad Rafiq,4,Muhammad Aziz-ur-Rehman,Shehla Saeed,Ilyas Khan,Kottakkaran Sooppy Nisar. Spatio-Temporal Dynamics and Structure Preserving Algorithm for Computer Virus Model[J]. Computers, Materials & Continua, 2021, 68(1): 267-274.

[16] João N.C. Gonçalves, Helena Sofia Rodrigues, M. Teresa T. Monteiro. Preventing Computer Virus Prevalence using EpidemiologicalModeling and Optimal Control[J]. Discontinuity, Nonlinearity, and Complexity, 2020,9(2);101-106.