Network Security Optimization Method Based on Genetic Algorithm
Abstract Nowadays, the application of the Internet is more and more extensive, but also exposed many problems. Network attacks are gradually penetrating into all kinds of network terminals, and the attack means are more and more sophisticated and covert. Network paralysis, data and user information leakage and other security problems are increasingly prominent. The increasingly dangerous network security situation brings new challenges to the traditional single point and single source security defense system. At the same time, the network crime has caused more and more losses to the personal and property safety of the state, enterprises and citizens. Network security has become the most concerned problem of citizens. In order to clarify the influence of different factors on computer network security, construct effective solutions, and create a more secure environment for the development and expansion of network information technology, this paper analyzes the factors affecting computer network information security based on genetic algorithm, and proposes a BP neural network algorithm based on genetic algorithm optimization, which is used in network security optimization. The experimental results show that the accuracy of BP neural network algorithm optimized by genetic algorithm is as high as 86.5%. The combination of genetic algorithm and neural network can effectively improve the reliability of the network.KeywordsGenetic algorithmComputerNetwork securityApplication research
- Single Book
69
- 10.1007/978-1-4471-4543-1
- Jan 1, 2013
Contemporary societies have increasing dependence on computers and computer networks, and the increasing popularity of mobile computing, have given rise to numerous computer security problems. Yet despite a high proliferation of expert remedies, a viable and comprehensive solution to these security issues remains elusive, and society continues to suffer at the hands of cyber criminals, vandals and hackers. This authoritative Guide to Computer Network Security explores computer network infrastructures and protocol design security flaws, and discusses current security solutions and best practices in both fixed and mobile computer networks. The book broadly surveys thought-provoking security issues, discussing and raising questions about the impact of new technologies and protocols (with particular emphasis on the rapid growth and skyrocketing interests and use in mobile technologies). It further explores the security threats and vulnerabilities in the current network infrastructure and protocols, and outlines current security efforts. The text assumes a modest familiarity with basic computer programming and networking. Features: Covers the very core of network security, and includes chapters about the very latest in handling disasters and security in mobile network systems Presents an in-depth discussion of standardization, again informing the reader on current trends on the topic Raises awareness of the security problems in cyberspace, and more particularly, computer network security Discusses computer network infrastructure and protocol design flaws and vulnerabilities Explores the role of legislation and law enforcement in maintaining computer and computer network security Proposes efficient and widely acceptable solutions and best practices to security problems, and encourages readers to investigate other possible solutions Alerts the reader to the daunting security problems in increasingly popular mobile network systems Includes two types of end-of-chapter exercises: quickly workable questions, as well as more thought-provoking advanced exercises Devotes one complete chapter to lab exercises: weekly, semester assignments and hard open-research projects Endeavours to use open source software tools throughout Provides support materials for lecturers and students such as PowerPoint slides, syllabus suggestions, solutions, instructor manual and student laboratory materials This text/reference is an invaluable instructional and research tool for undergraduates in computer and information security. It is also a rich resource for practitioners, and professionals looking to gain an understanding of computer network infrastructure and information network security. Dr Joseph Migga Kizza has also written Computer Network Security and Ethical and Social Issues in the Information Age. Key Topics: Network Vulnerabilities Hostile Scripts Security Assessment Authentication Cryptography Computer and Network Forensics Network Security Protocols Security in Wireless and Sensor Networks
- Conference Article
5
- 10.1109/icmcce51767.2020.00397
- Dec 1, 2020
With the development of science and technology, especially the application of big data technology, the role of computer networks has become more and more significant. Computer network has a profound impact on people's life and work, and has even become a part of life and work. However, computer network technology has also exposed some problems while providing convenience to people's lives. For example, the resulting information security issues pose a threat to people's personal privacy, corporate security, national security, etc., thereby affecting the sustainable development of computer network technology. Based on this, we must strengthen the research on computer network security. In particular, it is necessary to strengthen the research on the phenomenon of computer network information leakage and its causes, and strengthen the computer network security management. At the same time, we should also take necessary preventive measures from both technical and management aspects to ensure the safety of computer network information and reduce computer network threats. In view of this, this article will analyze and explore the current factors affecting computer network security on the basis of related concepts of computer network information security. The author analyzes how we should strengthen defenses from the perspective of technology and management to ensure the security of network information.
- Book Chapter
2
- 10.1007/978-1-4614-3872-4_49
- Apr 4, 2013
Network security is the foundation to safeguard work concerning network, but various events and means to threaten network security have emerged one after another. As an effective auxiliary means in traditional security technology, the intrusion detection system has become a research hotspot in the field of computer system and network security. This paper has studied the basic algorithm of BP neural network, and adopted the improved LM-BP algorithm to design the intrusion detection system. Through comparison and analysis we find that compared with traditional algorithm of BP neural network, the algorithm of BP neural network not only has higher execution efficiency, its false alarm rate and error rate of intrusion detection are also lower than other detection methods, which has important significance to safeguard network security.
- Research Article
735
- 10.1145/2480741.2480742
- Jun 1, 2013
- ACM Computing Surveys
This survey provides a structured and comprehensive overview of research on security and privacy in computer and communication networks that use game-theoretic approaches. We present a selected set of works to highlight the application of game theory in addressing different forms of security and privacy problems in computer networks and mobile applications. We organize the presented works in six main categories: security of the physical and MAC layers, security of self-organizing networks, intrusion detection systems, anonymity and privacy, economics of network security, and cryptography. In each category, we identify security problems, players, and game models. We summarize the main results of selected works, such as equilibrium analysis and security mechanism designs. In addition, we provide a discussion on the advantages, drawbacks, and future direction of using game theory in this field. In this survey, our goal is to instill in the reader an enhanced understanding of different research approaches in applying game-theoretic methods to network security. This survey can also help researchers from various fields develop game-theoretic solutions to current and emerging security problems in computer networking.
- Research Article
1
- 10.1088/1742-6596/1852/3/032054
- Apr 1, 2021
- Journal of Physics: Conference Series
With the current implementation of my country’s reform and opening up, a large number of advanced concepts have been introduced for domestic science and technology, the purpose is to gradually optimize the security performance of domestic computer network (CN) systems. Network security cannot be guaranteed and the development process of CNs cannot be guaranteed. Therefore, people apply genetic algorithms to the innovation and development of CN security performance and obtain more optimization benefits. CN attack technology is diverse and concealed, which makes it difficult to be detected, seriously endangering CN security and accurately identifying network abnormalities. In order to overcome the shortcomings of traditional network security and the low detection accuracy of anomaly detection technology, a genetic algorithm-based support vector machine-based network security performance optimization method was developed. This article first reviews the research and development of CN security systems at home and abroad, summarizes the main problems currently facing the research field of CN security systems, and introduces the main performance optimization technologies, aiming at the current existing CNs The ubiquitous performance shortcomings and problems of security systems, based on the in-depth analysis of the characteristics of network attacks and intrusions, have carried out a more systematic study of the genetic algorithm theory. The experimental results show that the network anomaly detection accuracy of the least square support vector machine classifier based on genetic algorithm optimization is high and the effect is good, which provides a reliable guarantee for the optimization of network security performance.
- Research Article
- 10.1088/1742-6596/2066/1/012039
- Nov 1, 2021
- Journal of Physics: Conference Series
With the continuous growth of economy and the continuous development of society, once the computer came out, it has been rapidly developed and popularized, especially now, people’s life is more and more inseparable from the computer, and they have a serious dependence on the computer. Some industries even directly use the computer as the business pillar, once such industries leave the computing industry Therefore, the reliability of computer network is a very important topic. It is very important to improve the reliability of computer network. In order to explore the effect of genetic algorithm on improving the reliability of computer network, two experimental groups are set up in this paper. The experimental group adds genetic algorithm in its computer network operation, while the control group uses the traditional algorithm. Finally, the experimental results show that the accuracy and security of the computer network in the experimental group are higher than those in the control group. For example, the highest accuracy and security of the experimental group are 99.78% and 98.83% respectively, while the highest accuracy and security of the control group are 84.31% and 88.58%. These experimental data show that the genetic algorithm can play a positive effect on the security of computer network.
- Research Article
- 10.62517/jbdc.202401413
- Dec 1, 2024
- Journal of Big Data and Computing
In the daily operation of computer network, data security problems such as theft, network instability and connection failure often occur, which pose a serious threat to data security. With the continuous expansion of the application scope of computer technology, the problem of network security has become more and more complex. The emergence of virtual network technology provides a new idea to solve the problem of network security. Through virtualization technology, computer networks can be effectively isolated management between different local area networks, to realize the security of data transmission, so as to improve the security of the network. Virtual network technology can ensure the safe flow of information in the virtual network, and improve the operation efficiency of the network through the flexible network architecture design. Therefore, exploring the effect of virtual network technology in computer network security has become an important topic to be studied urgently.
- Research Article
- 10.34219/2078-8320-2022-13-3-27-30
- Jan 1, 2022
- Informatization and communication
Information security in computer networks is currently one of the priority tasks. The paper presents the elements of the methodology for for information security and information protection in computer networks. It is assumed that the proposed methodology will reduce the incompleteness and inaccuracy of the initial data used to attack modeling and take into account the features of the operator’s cognitive apparatus when displaying the simulation results.
- Book Chapter
1
- 10.1007/978-981-33-4572-0_94
- Dec 18, 2020
Computer network security (NS) is the most concerned problem of society and people. With the increasing amount of network information, the computer NS management in the era of Big Data (BD) is very important, and has become the primary topic of NS management. This paper studies the computer NS and preventive measures based on BD technology. In this paper, through the method of literature analysis and questionnaire survey, 150 teachers and students majoring in Computer Science in our school were investigated to understand the current situation of computer NS in China and the solutions. The research results show that the computer NS problems in the era of BD are mainly divided into three aspects: the security problems caused by human factors account for about 30%, the security problems in data transmission account for about 45%, and the security problems of computers themselves account for about 25%. In view of these NS problems, this paper details the NS problems, and proposes corresponding solutions to these problems, so as to effectively improve the level of NS management and promote the efficient development of computer network technology(NT).
- Research Article
3
- 10.2174/1874444301507012097
- Oct 29, 2015
- The Open Automation and Control Systems Journal
Development and improvement has brought a very great impact to the network technology of the computer, besides the security of the network information has become a focus of the social safety questions.In this paper, through the analysis of security threats to computer network information and protective factors conducted, a strategy for a common computer network information security and protection strategy has been proposed, and useful lessons for our computer network and information security and protection reference have been provided.A series of questions such as security and dependability regarding the computer network system arise, which has been taken into consideration in proposing the strategy.This paper puts forward proposals with respects to the importance of the computer network system, existing problems of the online security of the computer, and precautionary measures.The detailed discussion will help the mass users to become conscious regarding network security and take precautionary measures while using the network.
- Conference Article
- 10.2991/amcce-15.2015.203
- Jan 1, 2015
The traditional network intrusion detection is performed on single-dimensional data feature of invasion, once the intrusion has intrusion feature of abnormally high-dimensional data, which can not achieve a unified detection rules, resulting in decreasing efficiency and accuracy of detection.This paper proposes a network intrusion detection method based on genetic ant colony optimization algorithm.According to genetic algorithm building individual coding, employing fitness function to initialize the population, setting pheromone of ants and establishing global pheromone updating rules by ant colony state transition rules, and then ultimately intrusion detection network is accomplished.Experimental results show that modified algorithm for network intrusion detection can improve the speed of training and testing, with significant advantages on increasing detection rate and reducing fault rate.
- Research Article
2
- 10.54097/fbem.v7i1.3684
- Dec 20, 2022
- Frontiers in Business, Economics and Management
With the rapid development of computer technology and big data technology, the security of computer network has become a key problem that restricts its development. The improved new technology also causes huge network security problems. The continuous development of big data will improve the design level of computer network security system. However, as a media, the computer's requirements for computer network security will also increase. Therefore, it is necessary to continuously strengthen the security of computer network system, improve users' usage and improve the network security status. It is a very effective means to improve the network security through legal restrictions, so it has become the first task. With the continuous improvement of information and data transmission speed, information and data will accumulate in the process of information technology utilization, thus causing security problems. The computer network security technology in the big data environment seriously affects the development of information technology and the development of the whole society.
- Conference Article
- 10.2991/ameii-15.2015.76
- Jan 1, 2015
Test optimization selection is a set cover problem, and heuristic algorithm for set covering problem is effective method. A genetic simulated annealing neural network fused algorithm was proposed by fusing the genetic algorithm, BP neural network and the simulated annealing algorithm, the genetic algorithm global search ability, strong ability of BP neural network training algorithm and fast search ability of simulated annealing algorithm were made full use of in this algorithm, the phenomenon falling into local optimum was avoided, and also the search efficiency and accuracy wad improved, the algorithm is applied to solve the test optimization selection problem. Example proves that this algorithm can effectively and quickly obtain test the optimal solution of optimization problems. Introduction In order to optimize the selection, the optimal combination test is chose in all possible combination of tests in the system, and the testability index can be met, while the minimum cost, include test time and test expense[1][2]. Perspective of mathematics, optimization selection is a test set covering problem, but we know set cover problem is a NP problem, when the system is on a big scale, to obtain the optimal solution is very difficult[3][4]. At present there are many more effective to solve the set covering problem of heuristic algorithm, such as genetic algorithm (GA) and simulated annealing algorithm (SA), neural network (ANN), tabu search (TS), ant colony system (ACO), etc., but these algorithms have their own advantages and defects, the effect is not ideal to solve alone, to complement each other mutual fusion has become the focus of future research[5][6][7]. This article is based on this idea, BP neural network and simulated annealing algorithm and introduced on the basis of traditional genetic algorithm, and a genetic simulated annealing neural network fusion algorithm has been formed, optimization selection can be solved faster and more accurate. Fusion algorithm Operation process of fusion algorithm The operation process of fusion algorithm is shown in Figure 1. Extreme value and dead zone analysis of algorithm In the process of solving the traditional heuristic algorithm, the maximum and minimum values appear easily. These extreme values are very close to the optimal value of algorithm, but the fusion algorithm is based on genetic algorithm, and the advantages of genetic algorithm is strong global search capability, which can avoid the occurrence of extreme value in the whole search space[8][9]. Therefore, the occurrence of extreme value can be avoided in the fusion algorithm can the occurrence of extreme value. Similarly, the genetic algorithm is good at global search, which can search to every corner of the space in the process of search, and the dead zone can be avoided in the fusion algorithm. Because of strong global search ability of the genetic algorithm, extreme value and dead zone can be avoided, but the disadvantage of slow speed is also caused in the genetic algorithm. Moreover, International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2015) © 2015. The authors Published by Atlantis Press 402 The BP neural network and simulated annealing algorithm are introduced in the fusion algorithm, the search speed can be improved, and the optimal solution can solved quickly and effectively[10][11].
- Research Article
- 10.58944/mcne2043
- Jan 1, 2023
- Ingenious
This scientific article aims to examine the issue of security in computer networks, highlighting the threats, challenges, and methods of protection. With the development of technology and the increased use of the internet, security in computer networks has become a critical issue for individuals, organizations, and society as a whole. In this article, we will discuss how attackers can infiltrate communication systems and compromise the integrity, confidentiality, and availability of data. The techniques used by attackers to achieve their malicious goals will also be described. Furthermore, the main challenges faced by computer network security specialists will be discussed. These challenges include identifying potential threats, assessing the risk level, developing defense strategies, implementing security policies, and continuous monitoring of network activity. Additionally, legal aspects of network security will be addressed, including current legislation and regulations that impact information security management. In the next section of the article, protective measures to prevent attacks on computer networks will be examined. These measures include implementing strict security policies, utilizing advanced firewall technologies, data encryption, twofactor authentication, and monitoring suspicious events. The role of user education in network security and the need for ongoing awareness of new threats and best security practices will also be discussed. Finally, this article will provide an overview of various studies and research conducted in the field of computer network security. Key findings and recommendations for further development of security in computer networks will be discussed.
- Conference Article
- 10.1109/isi.2011.5984773
- Jul 1, 2011
On the computer and network technology as its symbol of information trend changed the world, including accounting, various industries caused profound effect, this trend not only change the habit of people thinking, has also changed the way of people work. The traditional book accounting system has been increasingly replaced by computer, database and the network accounting system, make efficiency and lower cost. But at the same time, a new network accounting system also brought a safety problem, particularly, as the continued computer network security technology development; this problem is becoming more and more outstanding. The issues of accounting information system is a system problems, only by the security technology and safety product cannot guarantee the system safety, only from the view of the system, and set up the comprehensive security system, so can better cope with the serious security challenges. Accounting information system is a computer network system, network system, financial software, database and accountants subsystems such as consisted of an organic whole, so the network accounting information system security not only consider a son tasseled safety, but covers all subsystems, and comprehensive management factors and personnel training, the integrated system. This system includes three elements: safety technology, security system and the talented person troop construction. Network accounting information system safety technical systems include computer security, network security and database security three aspects. Network is bearing network accounting information system communication and data exchange platform, each unit is connection system formation of the organic whole resists outside attack link, is the first line of defense, so the safety of network of accounting information system for network security plays an important role. The computer is a network of accounting information system of information processing platform, responsible for data collection, analysis, organizing and storage work, so the computer security have a vital role. Network accounting information system of the core business and database access are closely related. Database security includes database software security and database data security. Database system security and network security, operating system security and protocol security is the information system security four major field of study. Specific include security database programming technology, data storage and backup technique and data recovery technology, etc. Along with the computer and network technology development, the network of accounting information system of external threat facing more and more, accordingly, master necessary information security knowledge become the era of accounting personnel's request inevitably. Two is to cultivate the accounting personnel to abide by the regulations of consciousness. Good rules only instructing can eventually gets effective. To strengthen the training of talents with, is to develop both know computer, network and information security knowledge, and understand accounting and enterprise management compound talents. On the one hand we can introduce information security professional talents and make its work in familiar with accounting industry knowledge; on the other hand strengthen personnel on the continuing education and training, selection again with certain computer knowledge of accounting business backbone to university education information security of professional knowledge, promote practitioners of knowledge updating. Based on the network of accounting information system efficiency greatly improved, original data collection, accounting business handling and accounting statements generated has realized automation. Meanwhile, the development of technology also gives the security of the system has brought great challenges. Network security system of accounting information system construction is a complex comprehensive systems engineering, any hope by single security technology to solve all security issues wish is irrelevant to reality. And we also want to see, completely safe information system is not exist in the process of practice, how to choose the appropriate security technology and model, not only need the professional knowledge and rich practical experience, still need comprehensive consideration of the accounting information system of the scale and system itself security requirements, safety and project budget must be in balance.
- Ask R Discovery
- Chat PDF
AI summaries and top papers from 250M+ research sources.