Research Article

A Collaborative Detection Method of Wireless Mobile Network Intrusion Based on Cloud Computing

Table 3

Comparison of wireless mobile network security under different methods.

Performance test nameThe method of this paperReference [11] methodReference [12] method

Information confidentialityHighMediumMedium
Information integrityHighHighMedium
Forward securityHighLowHigh
Key guessing attack resistanceHighHighLow
Intrusion attack levelHighMediumMedium
Server-side data confidentialityHighLowMedium
Safety level certificationHighLowHigh
Creature template attackHighHighLow
Defend against unreliable usersHighMediumHigh