Research Article

Big Data-Based Access Control System in Educational Information Security Assurance

Table 2

Abnormal test results.

Test itemTest contentTest results

Performance testingThe link repeatedly up/down, whether the packet is retransmittedThere is debugging information for retransmission of packets
Construct the correct protocol packet attack and observe the debugging informationMessage is discarded
Construct wrong protocol packet attack, observe debugging informationMessage is discarded
Plug and unplug the interface and observe whether the main/standby switchover is successfulActive/standby switchover succeeded