Abstract

This study analyzes and designs a network security management system based on the K-means algorithm. Through the investigation of network security managers, this article uses structured modeling technology to derive the system’s logical business functions, which are data acquisition function, data analysis function, and post-processing function. This study uses a three-tier architecture to design the system, describes the system data business processing flow, and gives the key flow of the K-means algorithm application. In addition, the system database is designed to provide support for system data processing. This study proposes a dual-network text matching model based on local interactive components. This model composes two modalities of single-modal short text data: a positional structural modal for describing local interactions and a global semantic understanding modal for extracting global semantic information. Two heterogeneous networks are used to extract two modalities. The principle of complementarity of modalities is realized by constructing the differences of each modal. At the same time, through the attention mechanism, the position information of the position structure modal is transferred to the global semantic understanding modal to obtain consistent comprehensive information so as to realize the principle of modal consistency. On this basis, by designing low-order interaction functions and high-order interaction functions, and using long- and short-term memory networks, we have, respectively, improved the position structure modal and global semantic understanding modal. The theoretical analysis and simulation results of the model show that the propagation characteristics of the network worm are completely determined by the threshold R0 required for its existence. When R0 >1, the network worm will become popular even with a small initial infection number; conversely, even if the initial infection machine is large, the network worm will eventually become extinct. The research results of this article also show that the introduction of mobile devices has an important impact on the defense technology of network worms. To curb network worms that use both the network and mobile devices to spread, and to increase the proportion of machines that have never been infected with the virus, the most effective method is to control the number of mobile devices and reduce the possibility of cross-infection between mobile devices and machines. The simulation results show that, regardless of whether dynamic isolation and antivirus software are considered, the local area network-based choke method given in this study can effectively curb intelligent network worms that have slow scanning rates and clear scanning targets. In addition, the choke method presented in this article can determine the choke threshold without affecting the normal network scanning behavior of users in the local area network.

Highlights

  • With the continuous update and popularization of network information, people have more and more opportunities to use the network in life and work, which makes network security a major issue that is urgently needed at the moment [1, 2]

  • Defense against the Spread of Network Worms. is section simulates and analyzes the control strategy of network worms based on mobile devices and network propagation. e results show that the convergence of the simulation algorithm is guaranteed

  • Since this section focuses on the impact of mobile devices as a means of spreading network worms on the spread and control of network worms, only the parameters related to mobile devices are simulated, including the number of mobile devices, the infection rate of mobile devices, and the recovery rate of mobile devices

Read more

Summary

Introduction

With the continuous update and popularization of network information, people have more and more opportunities to use the network in life and work, which makes network security a major issue that is urgently needed at the moment [1, 2]. When the network virus is successfully activated, it will cause system data to be damaged and system resources. Scientific Programming to be taken, interfere with system operation, damage computer hardware, and steal user information and data and other vicious behaviors [4]. Computer viruses can cause heavy workloads on optical drives, hard drives, printers, etc., shortening the working life. Ese are passive network security defense strategies that are implemented after an attack has occurred The government and enterprises adopt traditional defensive measures, such as firewall technology, antivirus software, and intrusion detection system, in response to network security issues [6]. ese are passive network security defense strategies that are implemented after an attack has occurred

Objectives
Methods
Results
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call